{"vulnerability": "cve-2025-2768", "sightings": [{"uuid": "0454c7a2-3dd8-4dbd-ada0-e5de0ca6633d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}, {"uuid": "86449a3d-6a4a-4c18-9679-3d4fafcaca2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27688", "type": "seen", "source": "Telegram/ZmfziCHx2cuj0taxRv_bC9hjPhDUM9ZhE0x1NEedA7HOlQU", "content": "", "creation_timestamp": "2025-03-18T18:00:21.000000Z"}, {"uuid": "ccd3fdfe-e17d-47cf-93e4-e1f1c809fde4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27684", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljmnuvqhel22", "content": "", "creation_timestamp": "2025-03-05T09:24:48.952572Z"}, {"uuid": "6121bbcf-768e-46d1-a378-58f6d9609efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-182/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}, {"uuid": "dba92587-1a3f-439d-9ebe-14a61abef498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27688", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoihyv6cs2e", "content": "", "creation_timestamp": "2025-03-18T20:18:36.511786Z"}, {"uuid": "30afabed-13be-4af6-91d2-a83ee7e2b0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114674546048798396", "content": "", "creation_timestamp": "2025-06-13T06:05:09.616713Z"}, {"uuid": "5bbfe369-3198-4f8a-9c76-088151d1bede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6490", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27681\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:48.638Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:02.000000Z"}, {"uuid": "fd14ff69-aaea-42ed-aa16-ddd1da3b2eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27684", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27684\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:51.044Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:00.000000Z"}, {"uuid": "61cb5da5-d587-45c9-9786-d1911f591cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27682\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:41:19.974Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:49.000000Z"}, {"uuid": "b7b5fb1f-3283-478c-8694-c0e43d8b3b0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27685", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11922", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27685\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA &amp; Private Key V-2022-001.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:43:43.753Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:42.000000Z"}, {"uuid": "97d8a181-4c2d-4860-95b8-858bbcae8084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27683", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11925", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27683\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:42:06.247Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:48.000000Z"}, {"uuid": "85beaedf-d754-4287-a233-ab7b1acbeadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2768", "type": "seen", "source": "https://t.me/cvedetector/23611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2768 - Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-2768 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25041. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:34.000000Z"}, {"uuid": "b4a8cebf-e270-4f70-b6ba-45084a477e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "https://t.me/cvedetector/22305", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27686 - Dell Unisphere for PowerMax LDAP Injection\", \n  \"Content\": \"CVE ID : CVE-2025-27686 \nPublished : April 7, 2025, 2:15 p.m. | 23\u00a0minutes ago \nDescription : Dell Unisphere for PowerMax, version(s) prior to 10.2.0.9 and PowerMax version(s) prior to PowerMax 9.2.4.15, contain an Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T17:04:08.000000Z"}, {"uuid": "09e72f76-e841-4e10-9dc8-f2aa6a410c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27688", "type": "seen", "source": "https://t.me/cvedetector/20571", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27688 - Dell ThinOS Elevation of Privileges Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27688 \nPublished : March 18, 2025, 4:15 p.m. | 16\u00a0minutes ago \nDescription : Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:03.000000Z"}, {"uuid": "35cc7b7a-b757-4776-9c43-924fc20d8c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljmnuugtel2s", "content": "", "creation_timestamp": "2025-03-05T09:24:44.387217Z"}, {"uuid": "ca4a3f3d-07c3-442b-acae-f35d2e22a412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27683", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljmnuvuxdk2s", "content": "", "creation_timestamp": "2025-03-05T09:24:49.539106Z"}, {"uuid": "3b243f4f-1fbd-4494-8a67-d362496522c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzsva4h2p", "content": "", "creation_timestamp": "2025-03-06T12:00:27.881318Z"}, {"uuid": "a06d13db-2bbe-4ef9-a920-5fcd8de64bea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzt3i6j2g", "content": "", "creation_timestamp": "2025-03-06T12:00:28.505340Z"}, {"uuid": "d3d82dee-0233-4085-9aac-2ea2c70c2e64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgztbv7d2e", "content": "", "creation_timestamp": "2025-03-06T12:00:29.094734Z"}, {"uuid": "63122126-90f1-4977-8996-63ac82a5a8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrhak33t4h2e", "content": "", "creation_timestamp": "2025-06-13T01:04:17.801008Z"}, {"uuid": "f367147d-04d9-422a-854f-f0fbe4aa0d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}, {"uuid": "27b26fb6-c281-44fa-952d-0d901d88b68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "f7efa9fc-0be8-4173-93df-b1132779b6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6491", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:47.861Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:06.000000Z"}, {"uuid": "e4d6ed2a-2fe0-4225-8bb0-0834d05b6d44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6489", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27682\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:49.455Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:01.000000Z"}, {"uuid": "53ec49fa-f7c6-4212-8fbb-308f1ba65616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27683", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27683\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:50.321Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:33:00.000000Z"}, {"uuid": "304b6aca-e69b-4bd9-ac17-218fdb4168a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27685", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6486", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27685\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA &amp; Private Key V-2022-001.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T05:25:51.859Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", "creation_timestamp": "2025-03-05T05:32:59.000000Z"}, {"uuid": "91586339-cd36-44ba-8778-a6cf2cb0a539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:03.268Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:51.000000Z"}, {"uuid": "b4ec5f23-e507-4ccc-b0a1-daa06445f0d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11927", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27681\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:40:39.288Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:50.000000Z"}, {"uuid": "5df5ff71-0546-4ffc-8cdd-3f42eea0236c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27685", "type": "seen", "source": "https://t.me/cvedetector/19590", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27685 - Vasion Print (formerly PrinterLogic) Configuration File Private Key Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27685 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA &amp; Private Key V-2022-001. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:42.000000Z"}, {"uuid": "bc0a66a2-6bbf-4408-ad19-90bc2923bf38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27683", "type": "seen", "source": "https://t.me/cvedetector/19589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27683 - Vasion Print PrinterLogic Driver Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27683 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:38.000000Z"}, {"uuid": "32270a3c-8565-4c80-b350-1062584001d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27682", "type": "seen", "source": "https://t.me/cvedetector/19588", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27682 - Vasion Print (formerly PrinterLogic) Insecure Log Permissions Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27682 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:37.000000Z"}, {"uuid": "ee145b6d-1e0c-40be-8c40-d50afd4a2629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27681", "type": "seen", "source": "https://t.me/cvedetector/19587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27681 - Vasion Print (formerly PrinterLogic) Inter-process Security Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27681 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:36.000000Z"}, {"uuid": "037dba5c-9aa9-4dd2-a0c2-60c583ac558d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27684", "type": "seen", "source": "https://t.me/cvedetector/19586", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27684 - Vasion Print Debug Bundle Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27684 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:36.000000Z"}, {"uuid": "54418ec3-e870-478e-bd80-af688aed34e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27680", "type": "seen", "source": "https://t.me/cvedetector/19585", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27680 - Vasion Print (formerly PrinterLogic) Firmware Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27680 \nPublished : March 5, 2025, 6:15 a.m. | 46\u00a0minutes ago \nDescription : Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T08:34:35.000000Z"}, {"uuid": "a4abeb25-da24-4c0e-a5fd-04ebe5079f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27688", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8022", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27688\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-03-18T15:55:44.470Z\n\ud83d\udccf Modified: 2025-03-19T03:55:50.783Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107", "creation_timestamp": "2025-03-19T04:48:49.000000Z"}, {"uuid": "03dba169-ad1c-459b-a1b3-eb0a249481f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27686", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10701", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27686\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Dell Unisphere for PowerMax, version(s) prior to 10.2.0.9 and PowerMax version(s) prior to PowerMax 9.2.4.15, contain an Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection.\n\ud83d\udccf Published: 2025-04-07T13:23:08.166Z\n\ud83d\udccf Modified: 2025-04-07T13:23:08.166Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-ao/000302223/dsa-2025-111-dell-powermaxos-dell-powermax-eem-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-unisphere-360-dell-solutions-enabler-and-dell-solutions-enabler-virtual-appliance-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-04-07T13:45:27.000000Z"}, {"uuid": "e829b026-556a-4fb3-8ef4-a85b494df631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11924", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27684\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T21:42:42.012Z\n\ud83d\udd17 References:\n1. https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm\n2. https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html", "creation_timestamp": "2025-04-15T21:55:47.000000Z"}, {"uuid": "1e48b5e6-3a19-4378-89df-d98efb94b391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27689\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-06-12T20:36:24.943Z\n\ud83d\udccf Modified: 2025-06-12T20:36:24.943Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000323242/dsa-2025-169-security-update-for-dell-idrac-tools-vulnerabilities", "creation_timestamp": "2025-06-12T21:34:40.000000Z"}]}