<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 09:10:17 +0000</lastBuildDate>
    <item>
      <title>61cb5da5-d587-45c9-9786-d1911f591cfc</title>
      <link>https://db.gcve.eu/sighting/61cb5da5-d587-45c9-9786-d1911f591cfc/export</link>
      <description>{"uuid": "61cb5da5-d587-45c9-9786-d1911f591cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27682\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:41:19.974Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:49.000000Z"}</description>
      <content:encoded>{"uuid": "61cb5da5-d587-45c9-9786-d1911f591cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27682\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:41:19.974Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/61cb5da5-d587-45c9-9786-d1911f591cfc/export</guid>
      <pubDate>Tue, 15 Apr 2025 21:55:49 +0000</pubDate>
    </item>
    <item>
      <title>b4ec5f23-e507-4ccc-b0a1-daa06445f0d3</title>
      <link>https://db.gcve.eu/sighting/b4ec5f23-e507-4ccc-b0a1-daa06445f0d3/export</link>
      <description>{"uuid": "b4ec5f23-e507-4ccc-b0a1-daa06445f0d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11927", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27681\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:39.288Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:50.000000Z"}</description>
      <content:encoded>{"uuid": "b4ec5f23-e507-4ccc-b0a1-daa06445f0d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11927", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27681\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:39.288Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b4ec5f23-e507-4ccc-b0a1-daa06445f0d3/export</guid>
      <pubDate>Tue, 15 Apr 2025 21:55:50 +0000</pubDate>
    </item>
    <item>
      <title>91586339-cd36-44ba-8778-a6cf2cb0a539</title>
      <link>https://db.gcve.eu/sighting/91586339-cd36-44ba-8778-a6cf2cb0a539/export</link>
      <description>{"uuid": "91586339-cd36-44ba-8778-a6cf2cb0a539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:03.268Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:51.000000Z"}</description>
      <content:encoded>{"uuid": "91586339-cd36-44ba-8778-a6cf2cb0a539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:03.268Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/91586339-cd36-44ba-8778-a6cf2cb0a539/export</guid>
      <pubDate>Tue, 15 Apr 2025 21:55:51 +0000</pubDate>
    </item>
    <item>
      <title>0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d</title>
      <link>https://db.gcve.eu/sighting/0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d/export</link>
      <description>{"uuid": "0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}</description>
      <content:encoded>{"uuid": "0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d/export</guid>
      <pubDate>Wed, 23 Apr 2025 20:32:34 +0000</pubDate>
    </item>
    <item>
      <title>85beaedf-d754-4287-a233-ab7b1acbeadb</title>
      <link>https://db.gcve.eu/sighting/85beaedf-d754-4287-a233-ab7b1acbeadb/export</link>
      <description>{"uuid": "85beaedf-d754-4287-a233-ab7b1acbeadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "seen", "source": "https://t.me/cvedetector/23611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2768 - Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-2768 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25041. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:34.000000Z"}</description>
      <content:encoded>{"uuid": "85beaedf-d754-4287-a233-ab7b1acbeadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "seen", "source": "https://t.me/cvedetector/23611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2768 - Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-2768 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25041. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/85beaedf-d754-4287-a233-ab7b1acbeadb/export</guid>
      <pubDate>Wed, 23 Apr 2025 21:10:34 +0000</pubDate>
    </item>
    <item>
      <title>1e48b5e6-3a19-4378-89df-d98efb94b391</title>
      <link>https://db.gcve.eu/sighting/1e48b5e6-3a19-4378-89df-d98efb94b391/export</link>
      <description>{"uuid": "1e48b5e6-3a19-4378-89df-d98efb94b391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27689\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-06-12T20:36:24.943Z\n\ud83d\udccf Modified: 2025-06-12T20:36:24.943Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000323242/dsa-2025-169-security-update-for-dell-idrac-tools-vulnerabilities", "creation_timestamp": "2025-06-12T21:34:40.000000Z"}</description>
      <content:encoded>{"uuid": "1e48b5e6-3a19-4378-89df-d98efb94b391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27689\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-06-12T20:36:24.943Z\n\ud83d\udccf Modified: 2025-06-12T20:36:24.943Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000323242/dsa-2025-169-security-update-for-dell-idrac-tools-vulnerabilities", "creation_timestamp": "2025-06-12T21:34:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1e48b5e6-3a19-4378-89df-d98efb94b391/export</guid>
      <pubDate>Thu, 12 Jun 2025 21:34:40 +0000</pubDate>
    </item>
    <item>
      <title>63122126-90f1-4977-8996-63ac82a5a8cf</title>
      <link>https://db.gcve.eu/sighting/63122126-90f1-4977-8996-63ac82a5a8cf/export</link>
      <description>{"uuid": "63122126-90f1-4977-8996-63ac82a5a8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrhak33t4h2e", "content": "", "creation_timestamp": "2025-06-13T01:04:17.801008Z"}</description>
      <content:encoded>{"uuid": "63122126-90f1-4977-8996-63ac82a5a8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrhak33t4h2e", "content": "", "creation_timestamp": "2025-06-13T01:04:17.801008Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/63122126-90f1-4977-8996-63ac82a5a8cf/export</guid>
      <pubDate>Fri, 13 Jun 2025 01:04:17 +0000</pubDate>
    </item>
    <item>
      <title>30afabed-13be-4af6-91d2-a83ee7e2b0f3</title>
      <link>https://db.gcve.eu/sighting/30afabed-13be-4af6-91d2-a83ee7e2b0f3/export</link>
      <description>{"uuid": "30afabed-13be-4af6-91d2-a83ee7e2b0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114674546048798396", "content": "", "creation_timestamp": "2025-06-13T06:05:09.616713Z"}</description>
      <content:encoded>{"uuid": "30afabed-13be-4af6-91d2-a83ee7e2b0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114674546048798396", "content": "", "creation_timestamp": "2025-06-13T06:05:09.616713Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/30afabed-13be-4af6-91d2-a83ee7e2b0f3/export</guid>
      <pubDate>Fri, 13 Jun 2025 06:05:09 +0000</pubDate>
    </item>
    <item>
      <title>27b26fb6-c281-44fa-952d-0d901d88b68e</title>
      <link>https://db.gcve.eu/sighting/27b26fb6-c281-44fa-952d-0d901d88b68e/export</link>
      <description>{"uuid": "27b26fb6-c281-44fa-952d-0d901d88b68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}</description>
      <content:encoded>{"uuid": "27b26fb6-c281-44fa-952d-0d901d88b68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/27b26fb6-c281-44fa-952d-0d901d88b68e/export</guid>
      <pubDate>Sat, 09 Aug 2025 17:25:38 +0000</pubDate>
    </item>
    <item>
      <title>f367147d-04d9-422a-854f-f0fbe4aa0d8b</title>
      <link>https://db.gcve.eu/sighting/f367147d-04d9-422a-854f-f0fbe4aa0d8b/export</link>
      <description>{"uuid": "f367147d-04d9-422a-854f-f0fbe4aa0d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}</description>
      <content:encoded>{"uuid": "f367147d-04d9-422a-854f-f0fbe4aa0d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f367147d-04d9-422a-854f-f0fbe4aa0d8b/export</guid>
      <pubDate>Wed, 10 Sep 2025 07:00:40 +0000</pubDate>
    </item>
  </channel>
</rss>
