Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
150 vulnerabilities found for virtual_appliance by printerlogic
FKIE_CVE-2025-27682
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F054B2-088A-4AC2-B280-4E01C33FB057",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6185114D-1761-4326-85EC-EAB1D417DF46",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite permisos de registro inseguros V-2022-005."
}
],
"id": "CVE-2025-27682",
"lastModified": "2025-11-03T20:18:06.390",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27680
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A048F8C-D94B-44D0-9242-C3544544E307",
"versionEndExcluding": "20.0.1442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91A7722A-1BCF-48A2-8B78-F0CA759B449F",
"versionEndExcluding": "1.0.750",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.750 La aplicaci\u00f3n 20.0.1442 permite una imagen de firmware insegura con verificaci\u00f3n insuficiente de la autenticidad de los datos V-2024-004."
}
],
"id": "CVE-2025-27680",
"lastModified": "2025-11-03T20:18:06.117",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.047",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-345"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27681
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F054B2-088A-4AC2-B280-4E01C33FB057",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6185114D-1761-4326-85EC-EAB1D417DF46",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 gestiona incorrectamente la seguridad entre procesos del cliente V-2022-004."
}
],
"id": "CVE-2025-27681",
"lastModified": "2025-11-03T20:18:06.253",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.177",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-602"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27685
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA & Private Key V-2022-001.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F054B2-088A-4AC2-B280-4E01C33FB057",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6185114D-1761-4326-85EC-EAB1D417DF46",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA \u0026 Private Key V-2022-001."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite el archivo de configuraci\u00f3n que contiene CA y clave privada V-2022-001."
}
],
"id": "CVE-2025-27685",
"lastModified": "2025-11-03T20:18:06.803",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.663",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-312"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27684
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F054B2-088A-4AC2-B280-4E01C33FB057",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6185114D-1761-4326-85EC-EAB1D417DF46",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la depuraci\u00f3n El paquete contiene datos confidenciales V-2022-003."
}
],
"id": "CVE-2025-27684",
"lastModified": "2025-11-03T20:18:06.667",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.540",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-215"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27683
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F054B2-088A-4AC2-B280-4E01C33FB057",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6185114D-1761-4326-85EC-EAB1D417DF46",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la carga sin restricciones de archivos con el tipo peligroso V-2022-006."
}
],
"id": "CVE-2025-27683",
"lastModified": "2025-11-03T20:18:06.530",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:41.427",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27677
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Symbolic Links For Unprivileged File Interaction V-2022-002.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Symbolic Links For Unprivileged File Interaction V-2022-002."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite enlaces simb\u00f3licos para la interacci\u00f3n de archivos sin privilegios V-2022-002."
}
],
"id": "CVE-2025-27677",
"lastModified": "2025-11-03T20:18:05.693",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.683",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27678
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Client Remote Code Execution V-2023-001.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Client Remote Code Execution V-2023-001."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la ejecuci\u00f3n remota de c\u00f3digo del cliente V-2023-001."
}
],
"id": "CVE-2025-27678",
"lastModified": "2025-11-03T20:18:05.830",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.817",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27674
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Hardcoded IdP Key V-2023-006.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Hardcoded IdP Key V-2023-006."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la clave IdP codificada V-2023-006."
}
],
"id": "CVE-2025-27674",
"lastModified": "2025-11-03T20:18:05.273",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.293",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-321"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27673
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:45
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cookie Returned in Response Body OVE-20230524-0017.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cookie Returned in Response Body OVE-20230524-0017."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la devoluci\u00f3n de cookies en el cuerpo de respuesta OVE-20230524-0017."
}
],
"id": "CVE-2025-27673",
"lastModified": "2025-04-01T20:45:50.660",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.167",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-539"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27675
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Vulnerable OpenID Implementation V-2023-004.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Vulnerable OpenID Implementation V-2023-004."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la implementaci\u00f3n de OpenID vulnerable V-2023-004."
}
],
"id": "CVE-2025-27675",
"lastModified": "2025-11-03T20:18:05.410",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.420",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27672
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:45
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows OAUTH Security Bypass OVE-20230524-0016.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows OAUTH Security Bypass OVE-20230524-0016."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la omisi\u00f3n de seguridad OAUTH OVE-20230524-0016."
}
],
"id": "CVE-2025-27672",
"lastModified": "2025-04-01T20:45:54.157",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.043",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27676
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Reports V-2023-002.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Reports V-2023-002."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite cross site scripting en los informes V-2023-002."
}
],
"id": "CVE-2025-27676",
"lastModified": "2025-11-03T20:18:05.550",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.553",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-xss-03"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27679
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Badge Registration V-2023-005.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Badge Registration V-2023-005."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite cross site scripting en el registro de credenciales V-2023-005."
}
],
"id": "CVE-2025-27679",
"lastModified": "2025-11-03T20:18:05.977",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:40.933",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27668
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la inclusi\u00f3n de contenido arbitrario a trav\u00e9s de Iframe OVE-20230524-0012."
}
],
"id": "CVE-2025-27668",
"lastModified": "2025-04-01T20:49:09.607",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:39.237",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27669
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:48
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite escaneo de red remoto (XSPA)/DoS OVE-20230524-0013."
}
],
"id": "CVE-2025-27669",
"lastModified": "2025-04-01T20:48:31.823",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:39.373",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27667
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la enumeraci\u00f3n de correo electr\u00f3nico de usuario administrativo OVE-20230524-0011."
}
],
"id": "CVE-2025-27667",
"lastModified": "2025-04-01T20:49:15.403",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:39.100",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27670
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:48
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Signature Validation OVE-20230524-0014.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Signature Validation OVE-20230524-0014."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una validaci\u00f3n de firma insuficiente OVE-20230524-0014."
}
],
"id": "CVE-2025-27670",
"lastModified": "2025-04-01T20:48:24.070",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:39.537",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27671
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:51
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Device Impersonation OVE-20230524-0015.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Device Impersonation OVE-20230524-0015."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la suplantaci\u00f3n de dispositivo OVE-20230524-0015."
}
],
"id": "CVE-2025-27671",
"lastModified": "2025-04-01T20:51:43.753",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:39.903",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-290"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27666
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Authorization Checks OVE-20230524-0010.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Authorization Checks OVE-20230524-0010."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite comprobaciones de autorizaci\u00f3n insuficientes OVE-20230524-0010."
}
],
"id": "CVE-2025-27666",
"lastModified": "2025-04-01T20:49:21.367",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.970",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27662
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Password in URL OVE-20230524-0005.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Password in URL OVE-20230524-0005."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite contrase\u00f1a en la URL OVE-20230524-0005."
}
],
"id": "CVE-2025-27662",
"lastModified": "2025-04-01T20:49:44.823",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.467",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-256"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27665
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Antivirus Protection and thus drivers can have known malicious code OVE-20230524-0009.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Antivirus Protection and thus drivers can have known malicious code OVE-20230524-0009."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una protecci\u00f3n antivirus insuficiente y, por lo tanto, los controladores pueden tener el c\u00f3digo malicioso conocido OVE-20230524-0009."
}
],
"id": "CVE-2025-27665",
"lastModified": "2025-04-01T20:49:26.257",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.840",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27664
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient CSRF Protection OVE-20230524-0008.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient CSRF Protection OVE-20230524-0008."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite protecci\u00f3n CSRF insuficiente OVE-20230524-0008."
}
],
"id": "CVE-2025-27664",
"lastModified": "2025-04-01T20:49:32.760",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.717",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27660
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:52
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross Site Scripting OVE-20230524-0003.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross Site Scripting OVE-20230524-0003."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite cross site scripting OVE-20230524-0003."
}
],
"id": "CVE-2025-27660",
"lastModified": "2025-04-01T20:52:30.800",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.190",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27661
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:52
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Session Fixation OVE-20230524-0004.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Session Fixation OVE-20230524-0004."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la fijaci\u00f3n de sesi\u00f3n OVE-20230524-0004."
}
],
"id": "CVE-2025-27661",
"lastModified": "2025-04-01T20:52:26.040",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.337",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-384"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27663
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-04-01 20:49
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Weak Password Encryption / Encoding OVE-20230524-0007.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F3BE9A-A4F8-4BB5-BD84-FF3E6CF1476A",
"versionEndExcluding": "20.0.1923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419C7C30-354A-451E-AA7E-24FBB1A80483",
"versionEndExcluding": "22.0.843",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Weak Password Encryption / Encoding OVE-20230524-0007."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite el cifrado/codificaci\u00f3n de contrase\u00f1as d\u00e9biles OVE-20230524-0007."
}
],
"id": "CVE-2025-27663",
"lastModified": "2025-04-01T20:49:37.603",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:38.587",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-521"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27652
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2677342E-4440-4762-BD6D-C3C4F2944BAC",
"versionEndExcluding": "20.0.2014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40E9FDF8-6F72-452E-8E4A-8CF98632D06C",
"versionEndExcluding": "22.0.862",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: rfIDEAS V-2023-015."
}
],
"id": "CVE-2025-27652",
"lastModified": "2025-11-03T20:18:04.433",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:37.077",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27653
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Preauthenticated Cross Site Scripting (XSS): Badge Registration V-2023-012.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2677342E-4440-4762-BD6D-C3C4F2944BAC",
"versionEndExcluding": "20.0.2014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40E9FDF8-6F72-452E-8E4A-8CF98632D06C",
"versionEndExcluding": "22.0.862",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Preauthenticated Cross Site Scripting (XSS): Badge Registration V-2023-012."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite cross site scripting (XSS) preautenticadas: registro de insignia V-2023-012."
}
],
"id": "CVE-2025-27653",
"lastModified": "2025-11-03T20:18:04.570",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:37.203",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-stored-xss"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27655
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: CPA v1 V-2023-009.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2677342E-4440-4762-BD6D-C3C4F2944BAC",
"versionEndExcluding": "20.0.2014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40E9FDF8-6F72-452E-8E4A-8CF98632D06C",
"versionEndExcluding": "22.0.862",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: CPA v1 V-2023-009."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: CPA v1 V-2023-009."
}
],
"id": "CVE-2025-27655",
"lastModified": "2025-11-03T20:18:04.840",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:37.480",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27654
Vulnerability from fkie_nvd - Published: 2025-03-05 06:15 - Updated: 2025-11-03 20:18
Severity ?
Summary
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Cross Site Scripting (XSS) V-2023-017.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| printerlogic | vasion_print | * | |
| printerlogic | virtual_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printerlogic:vasion_print:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2677342E-4440-4762-BD6D-C3C4F2944BAC",
"versionEndExcluding": "20.0.2014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40E9FDF8-6F72-452E-8E4A-8CF98632D06C",
"versionEndExcluding": "22.0.862",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Cross Site Scripting (XSS) V-2023-017."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite cross site scripting (XSS) V-2023-017."
}
],
"id": "CVE-2025-27654",
"lastModified": "2025-11-03T20:18:04.707",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-05T06:15:37.340",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"source": "cve@mitre.org",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/18"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-xss-04"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}