No analysis available yet.
Vendor Solution
The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microcom360
Microcom360 zeusweb |
|
| CPEs | cpe:2.3:a:microcom360:zeusweb:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom360
Microcom360 zeusweb |
|
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31. | |
| Title | LEAK OF SENSITIVE INFORMATION ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-497 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T15:44:04.829Z
Reserved: 2025-11-25T09:45:49.686Z
Link: CVE-2025-13651
Updated: 2026-02-11T15:41:18.204Z
Status : Analyzed
Published: 2026-02-11T09:15:50.303
Modified: 2026-03-26T17:56:48.587
Link: CVE-2025-13651
No data.
OpenCVE Enrichment
Updated: 2026-02-11T21:45:52Z