{"vulnerability": "cve-2025-2766", "sightings": [{"uuid": "4106b177-d148-40f6-98d0-02ed71c10c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27666", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27666\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Authorization Checks OVE-20230524-0010.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:35.929Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:22.000000Z"}, {"uuid": "62631c90-f6f2-49f8-b441-5e76f6b76e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27667", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6504", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27667\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:36.657Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:21.000000Z"}, {"uuid": "eafe864d-c0d9-49be-ba19-3a497c8a4786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27668", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6503", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27668\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:37.454Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:21.000000Z"}, {"uuid": "86245f2f-4f1b-4ed7-be8a-c827955a36a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27669", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6502", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27669\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:38.236Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:20.000000Z"}, {"uuid": "26786dda-939c-42e7-b9de-d78cac45e9c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27669", "type": "seen", "source": "https://t.me/cvedetector/19601", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27669 - Vasion Print (formerly PrinterLogic) Remote Network Scanning and DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27669 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:56.000000Z"}, {"uuid": "b3063ba0-8462-49e2-8375-1b7a57c1293b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27668", "type": "seen", "source": "https://t.me/cvedetector/19600", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27668 - Vasion Print (formerly PrinterLogic) IFrame Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27668 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:55.000000Z"}, {"uuid": "926c5ab8-a51b-461f-8d62-d519500f9540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27667", "type": "seen", "source": "https://t.me/cvedetector/19599", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27667 - Vasion Print (formerly PrinterLogic) Administrative User Email Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27667 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:52.000000Z"}, {"uuid": "4d11e318-c779-4950-9327-37c1e501e3e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27661", "type": "seen", "source": "https://t.me/cvedetector/19604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27661 - Vasion Print (formerly PrinterLogic) Session Fixation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27661 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Session Fixation OVE-20230524-0004. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:58.000000Z"}, {"uuid": "7a4b2f2c-7861-42ce-b3a8-18a3b2440a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27665", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzqng7n2u", "content": "", "creation_timestamp": "2025-03-06T12:00:20.355962Z"}, {"uuid": "7cc03666-7e49-4b0a-8ab1-e5b7e22ba940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27668", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljmnuukc422s", "content": "", "creation_timestamp": "2025-03-05T09:24:44.935650Z"}, {"uuid": "45d33ee4-d5c4-4717-9cf6-d8bdfea80dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27667", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljmnuvb56a2y", "content": "", "creation_timestamp": "2025-03-05T09:24:47.823025Z"}, {"uuid": "d3bbaa18-e4d0-4ab0-b970-11fdaf3c861f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27668", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzrathg2q", "content": "", "creation_timestamp": "2025-03-06T12:00:22.275788Z"}, {"uuid": "3cae15eb-43bf-47f2-a9fa-78590b59488e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27661", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzpztfw2q", "content": "", "creation_timestamp": "2025-03-06T12:00:18.365291Z"}, {"uuid": "234da138-9bc9-46fd-9772-723740cc2152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27662", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzq6x6t2e", "content": "", "creation_timestamp": "2025-03-06T12:00:18.959577Z"}, {"uuid": "3347d470-69ec-49ce-881f-317fb2901bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27663", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzqe7cu2b", "content": "", "creation_timestamp": "2025-03-06T12:00:19.668580Z"}, {"uuid": "11d056c9-a995-494d-819c-4bfa2bce661d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27666", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzqujpz26", "content": "", "creation_timestamp": "2025-03-06T12:00:21.029851Z"}, {"uuid": "893e58c6-90bc-4d24-8445-9b2a146b171e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27667", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzr2o2u2b", "content": "", "creation_timestamp": "2025-03-06T12:00:21.723409Z"}, {"uuid": "ffa30d77-9d1c-4bed-8c04-f8aa40b51ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2766", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-180/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}, {"uuid": "394e4f94-8c01-42d4-aabb-af011c8950cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27662", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljo6scejsp2g", "content": "", "creation_timestamp": "2025-03-06T00:00:25.977164Z"}, {"uuid": "23d64576-723f-4d0a-8213-a7e938966fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27663", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnszhievp2s", "content": "", "creation_timestamp": "2025-03-05T20:29:27.117197Z"}, {"uuid": "6f8b6e7b-d795-4bb4-80da-b1c69b338eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27664", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnszhmdov2f", "content": "", "creation_timestamp": "2025-03-05T20:29:27.785048Z"}, {"uuid": "e1bda9fd-a81d-47f5-8ad6-9b527e1bdc82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27661", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnszhqoyj2o", "content": "", "creation_timestamp": "2025-03-05T20:29:28.448013Z"}, {"uuid": "7d7eb692-4c6f-4262-a6b4-527d8668e175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27662", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnszhv7yi2q", "content": "", "creation_timestamp": "2025-03-05T20:29:29.058373Z"}, {"uuid": "7babc3a9-412e-4bc5-a60c-2476de7fbefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27661", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljo6sc73ae2q", "content": "", "creation_timestamp": "2025-03-06T00:00:25.406364Z"}, {"uuid": "4c534db1-bb16-46dd-8dac-bbac0f549bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27663", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljo6sckfpm2f", "content": "", "creation_timestamp": "2025-03-06T00:00:26.740181Z"}, {"uuid": "39dc261a-1e4a-4d50-ba2b-3e61285e0ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27665", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljo6scrwmi2p", "content": "", "creation_timestamp": "2025-03-06T00:00:27.458074Z"}, {"uuid": "c27b3783-3fed-4c6b-b5b2-a58d288841bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2766", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqxrf2ujit2s", "content": "", "creation_timestamp": "2025-06-06T21:23:07.501389Z"}]}