Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Copy9 | 1byte | 1 | Application |
Exactspy | 1byte | 1 | Application |
Fonetracker | 1byte | 1 | Application |
Guestspy | 1byte | 1 | Application |
Modicon premium tsxp57 6634m | Schneider electric | 6 | Hardware |
Ispyoo | 1byte | 1 | Application |
Modicon quantum 140cpu65150 | Schneider electric | 9 | Hardware |
Modicon quantum 140cpu65150c | Schneider electric | 9 | Hardware |
Mxspy | 1byte | 1 | Application |
Modicon quantum 140cpu65160 | Schneider electric | 9 | Hardware |
Secondclone | 1byte | 1 | Application |
The truth spy | 1byte | 1 | Application |
Chuanhuchatgpt | Chuanhuchatgpt project | 1 | Application |
Modicon quantum 140cpu65160c | Schneider electric | 9 | Hardware |
Thespyapp | 1byte | 1 | Application |
Plc simulator for ecostruxure control expert | Schneider electric | 4 | Hardware |
Plc simulator for ecostruxure process expert | Schneider electric | 4 | Hardware |
Trilium | Trilium project | 3 | Application |
Compaq wl310 firmware | Hpe | 1 | Operating system |
Orinoco rg 1000 firmware | Proxim | 1 | Operating system |