Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Jupyterhub | 4 | 4 | Application | 
| Ovation | 3 | 3 | Application | 
| Rocket chat | 2 | 53 | Application | 
| Aspcms | 1 | 1 | Application | 
| Sap | 416 | 1968 | Application | 
| Umbraco | 6 | 65 | Application | 
| Idera | 2 | 9 | Application | 
| Minicom project | 1 | 1 | Application | 
| Jquery update project | 1 | 1 | Application | 
| Haxx | 2 | 236 | Application | 
| Lansweeper | 1 | 18 | Application | 
| Labjs project | 1 | 1 | Application | 
| Wuzhi cms project | 1 | 8 | Application | 
| Crocoblock | 14 | 64 | Application | 
| Ibm | 977 | 11056 | Application | 
| Icmsdev | 1 | 18 | Application | 
| Puppet | 28 | 203 | Application | 
| 1234n | 1 | 31 | Application | 
| Qnap | 48 | 263 | Application | 
| Discourse | 20 | 195 | Application |