CVE-2025-41015 – User Enumeration vulnerability in TCMAN GIM

Affected Products The following products are affected by CVE-2025-41015 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet

CVE-2025-41014 – User Enumeration vulnerability in TCMAN GIM

Affected Products The following products are affected by CVE-2025-41014 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet

CVE-2025-41012 – Unauthorized access vulnerability in TCMAN GIM

The following table lists the changes that have been made to the CVE-2025-41012 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-40700 – Reflected Cross-Site Scripting (XSS) in Governalia by IDI Eikon

The following table lists the changes that have been made to the CVE-2025-40700 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-13879 – Directory traversal vulnerability in EfficientIP’s SOLIDserver IPAM

The following table lists the changes that have been made to the CVE-2025-13879 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-12465 – Blind SQL Injection in QuickCMS

The following table lists the changes that have been made to the CVE-2025-12465 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-11789 – Out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50

The following table lists the changes that have been made to the CVE-2025-11789 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-11788 – Heap-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50

The following table lists the changes that have been made to the CVE-2025-11788 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-11787 – Command injection vulnerability in Circutor SGE-PLC1000/SGE-PLC50

The following table lists the changes that have been made to the CVE-2025-11787 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]

CVE-2025-11786 – Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50

The following table lists the changes that have been made to the CVE-2025-11786 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]