{"vulnerability": "CVE-2025-2769", "sightings": [{"uuid": "2e3d1180-2c01-4dff-8095-23ff2f6810ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10072", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27694\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to  WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.\n\ud83d\udccf Published: 2025-04-02T00:12:16.032Z\n\ud83d\udccf Modified: 2025-04-02T13:24:43.503Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-04-02T13:33:44.000000Z"}, {"uuid": "837095a4-45eb-4a1a-ba46-bf4b7d72361a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "Telegram/q1v6fpd4crrHq44DB9Nj1uDJuUzOEqw5zlM7k7RhTjpY9VU", "content": "", "creation_timestamp": "2025-04-10T05:30:42.000000Z"}, {"uuid": "2d6ddd24-49fd-43ee-87ae-6b5445e75c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfizfdtk2i", "content": "", "creation_timestamp": "2025-04-02T03:01:21.400249Z"}, {"uuid": "371d4030-4da8-45b9-9774-a069fcf2d5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmglg5pcsk2w", "content": "", "creation_timestamp": "2025-04-10T03:40:19.834137Z"}, {"uuid": "e953e8f0-6758-4765-a705-c6844490ad5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmgn774vhn2h", "content": "", "creation_timestamp": "2025-04-10T04:12:14.363688Z"}, {"uuid": "a7ce6754-d1da-418d-a26b-bcd48eeb67e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114312092801164112", "content": "", "creation_timestamp": "2025-04-10T05:48:32.077424Z"}, {"uuid": "a94d0698-d2ae-479e-8663-5ac99116381f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnj4fb6ha52a", "content": "", "creation_timestamp": "2025-04-23T21:14:34.342428Z"}, {"uuid": "e5327e73-46ce-4834-ba7f-b3db75b56102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11387", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27690\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.\n\ud83d\udccf Published: 2025-04-10T02:04:43.949Z\n\ud83d\udccf Modified: 2025-04-11T03:55:24.269Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-11T04:49:39.000000Z"}, {"uuid": "704a68d2-cd2c-4fa0-a18e-ad1509d2add1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16086", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27696\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Improper Authorization vulnerability in Apache Superset allows ownership takeover of dashboards, charts or datasets by authenticated users with read permissions.\n\nThis issue affects Apache Superset: through 4.1.1.\n\nUsers are recommended to upgrade to version 4.1.2 or above, which fixes the issue.\n\ud83d\udccf Published: 2025-05-13T08:21:21.199Z\n\ud83d\udccf Modified: 2025-05-13T08:21:21.199Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/k2od03bxnxs6vcp80sr03ywcxl194413", "creation_timestamp": "2025-05-13T08:30:18.000000Z"}, {"uuid": "53ab7403-509e-4c86-9b16-1a96af53d98d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://t.me/cvedetector/22615", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27690 - Dell PowerScale OneFS Default Password Vulnerability (Remote Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-27690 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:46.000000Z"}, {"uuid": "9c328502-10fc-4e0a-8d1e-500248c708aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27693", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiyksa42m", "content": "", "creation_timestamp": "2025-04-02T03:01:17.279531Z"}, {"uuid": "2554d122-eaaa-4874-a578-280548ed23a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27692", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiyuik526", "content": "", "creation_timestamp": "2025-04-02T03:01:18.121238Z"}, {"uuid": "6c9175f6-9703-4243-966b-29b7da60b984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.537070Z"}, {"uuid": "03a05c84-13bb-47ec-b19f-433f0187651e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7shg5c2q", "content": "", "creation_timestamp": "2025-04-13T12:08:39.476182Z"}, {"uuid": "1ac47109-4132-4427-a70c-ffd9f6f57f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7tljg22q", "content": "", "creation_timestamp": "2025-04-13T12:08:39.998734Z"}, {"uuid": "504add99-c918-46eb-8679-67ae29c33576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7uuiws2q", "content": "", "creation_timestamp": "2025-04-13T12:08:40.524356Z"}, {"uuid": "2f14c08a-911f-40b2-a4a2-b3db25c7cf1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loyh66t75c2t", "content": "", "creation_timestamp": "2025-05-12T17:02:36.350285Z"}, {"uuid": "68380d94-f706-4842-a19a-141524548db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/119", "content": "", "creation_timestamp": "2025-05-12T14:34:57.000000Z"}, {"uuid": "431b6968-b960-4f6d-82dd-95e4c62f018a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15592", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27695\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure.\n\ud83d\udccf Published: 2025-05-08T19:06:42.090Z\n\ud83d\udccf Modified: 2025-05-08T19:06:42.090Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-05-08T19:24:10.000000Z"}, {"uuid": "203385af-4922-436b-ab36-793922c689bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://t.me/cvedetector/24844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27695 - Dell Wyse Management Suite Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27695 \nPublished : May 8, 2025, 7:16 p.m. | 17\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T21:48:12.000000Z"}, {"uuid": "c1f4ccee-817e-4e7d-a2c9-7d587ad4065f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "seen", "source": "https://t.me/cvedetector/23612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2769 - Bdrive NetDrive OpenSSL Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2769 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25295. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:35.000000Z"}, {"uuid": "4d117232-5300-4bc2-9e24-c775613b572d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27693", "type": "seen", "source": "https://t.me/cvedetector/21841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27693 - Dell Wyse Management Suite Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27693 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:10.000000Z"}, {"uuid": "91ac8f75-5d6a-46f6-8aae-483c71b504fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27692", "type": "seen", "source": "https://t.me/cvedetector/21840", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27692 - Dell Wyse Management Suite Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27692 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Unrestricted Upload of File with Dangerous Type vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service, Information disclosure, and Remote execution \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:10.000000Z"}, {"uuid": "ca43d2a5-1983-45c1-ba31-8b90bd8ca381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://t.me/cvedetector/21836", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27694 - Dell Wyse Management Suite Insufficient Resource Pool Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27694 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to  WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:04.000000Z"}, {"uuid": "c15dd793-125b-4489-ac51-e257927db259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}, {"uuid": "efbf0ac1-ec6a-473a-ad73-d47fce64f3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-183/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}, {"uuid": "0d7c3a1e-12d9-40aa-8b7b-26b567fd7d3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114315653926253783", "content": "", "creation_timestamp": "2025-04-10T20:54:10.334119Z"}, {"uuid": "464626fb-ca53-4a50-8d1f-562d9308243c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looojr5xpch2", "content": "", "creation_timestamp": "2025-05-08T19:48:25.486171Z"}, {"uuid": "f03d9615-18a0-41cb-9b2a-f7151e3656a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq22syp2n", "content": "", "creation_timestamp": "2025-05-08T22:32:17.668560Z"}]}