<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T09:10:17.251515+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/61cb5da5-d587-45c9-9786-d1911f591cfc/export</id>
    <title>61cb5da5-d587-45c9-9786-d1911f591cfc</title>
    <updated>2026-05-22T09:10:17.403370+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "61cb5da5-d587-45c9-9786-d1911f591cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27682\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:41:19.974Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/61cb5da5-d587-45c9-9786-d1911f591cfc/export"/>
    <published>2025-04-15T21:55:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b4ec5f23-e507-4ccc-b0a1-daa06445f0d3/export</id>
    <title>b4ec5f23-e507-4ccc-b0a1-daa06445f0d3</title>
    <updated>2026-05-22T09:10:17.403299+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b4ec5f23-e507-4ccc-b0a1-daa06445f0d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11927", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27681\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:39.288Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b4ec5f23-e507-4ccc-b0a1-daa06445f0d3/export"/>
    <published>2025-04-15T21:55:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/91586339-cd36-44ba-8778-a6cf2cb0a539/export</id>
    <title>91586339-cd36-44ba-8778-a6cf2cb0a539</title>
    <updated>2026-05-22T09:10:17.403226+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "91586339-cd36-44ba-8778-a6cf2cb0a539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:03.268Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/91586339-cd36-44ba-8778-a6cf2cb0a539/export"/>
    <published>2025-04-15T21:55:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d/export</id>
    <title>0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d</title>
    <updated>2026-05-22T09:10:17.403155+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d/export"/>
    <published>2025-04-23T20:32:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/85beaedf-d754-4287-a233-ab7b1acbeadb/export</id>
    <title>85beaedf-d754-4287-a233-ab7b1acbeadb</title>
    <updated>2026-05-22T09:10:17.403076+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "85beaedf-d754-4287-a233-ab7b1acbeadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "seen", "source": "https://t.me/cvedetector/23611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2768 - Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-2768 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25041. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/85beaedf-d754-4287-a233-ab7b1acbeadb/export"/>
    <published>2025-04-23T21:10:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1e48b5e6-3a19-4378-89df-d98efb94b391/export</id>
    <title>1e48b5e6-3a19-4378-89df-d98efb94b391</title>
    <updated>2026-05-22T09:10:17.402999+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1e48b5e6-3a19-4378-89df-d98efb94b391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27689\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-06-12T20:36:24.943Z\n\ud83d\udccf Modified: 2025-06-12T20:36:24.943Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000323242/dsa-2025-169-security-update-for-dell-idrac-tools-vulnerabilities", "creation_timestamp": "2025-06-12T21:34:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1e48b5e6-3a19-4378-89df-d98efb94b391/export"/>
    <published>2025-06-12T21:34:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/63122126-90f1-4977-8996-63ac82a5a8cf/export</id>
    <title>63122126-90f1-4977-8996-63ac82a5a8cf</title>
    <updated>2026-05-22T09:10:17.402927+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "63122126-90f1-4977-8996-63ac82a5a8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrhak33t4h2e", "content": "", "creation_timestamp": "2025-06-13T01:04:17.801008Z"}</content>
    <link href="https://db.gcve.eu/sighting/63122126-90f1-4977-8996-63ac82a5a8cf/export"/>
    <published>2025-06-13T01:04:17.801008+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/30afabed-13be-4af6-91d2-a83ee7e2b0f3/export</id>
    <title>30afabed-13be-4af6-91d2-a83ee7e2b0f3</title>
    <updated>2026-05-22T09:10:17.402850+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "30afabed-13be-4af6-91d2-a83ee7e2b0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114674546048798396", "content": "", "creation_timestamp": "2025-06-13T06:05:09.616713Z"}</content>
    <link href="https://db.gcve.eu/sighting/30afabed-13be-4af6-91d2-a83ee7e2b0f3/export"/>
    <published>2025-06-13T06:05:09.616713+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/27b26fb6-c281-44fa-952d-0d901d88b68e/export</id>
    <title>27b26fb6-c281-44fa-952d-0d901d88b68e</title>
    <updated>2026-05-22T09:10:17.402752+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "27b26fb6-c281-44fa-952d-0d901d88b68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/27b26fb6-c281-44fa-952d-0d901d88b68e/export"/>
    <published>2025-08-09T17:25:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f367147d-04d9-422a-854f-f0fbe4aa0d8b/export</id>
    <title>f367147d-04d9-422a-854f-f0fbe4aa0d8b</title>
    <updated>2026-05-22T09:10:17.401125+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f367147d-04d9-422a-854f-f0fbe4aa0d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f367147d-04d9-422a-854f-f0fbe4aa0d8b/export"/>
    <published>2025-09-10T07:00:40+00:00</published>
  </entry>
</feed>
