CVE-2025-27676 – Vasion Print Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-27676 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27675 – Vasion Print OpenID Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-27675 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27674 – Vasion Print (formerly PrinterLogic) Hardcoded IdP Key Vulnerability
The following table lists the changes that have been made to the CVE-2025-27674 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27671 – Vasion Print (formerly PrinterLogic) Device Impersonation Vulnerability
The following table lists the changes that have been made to the CVE-2025-27671 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27670 – Vasion Print (formerly PrinterLogic) Insufficient Signature Validation Vulnerability
The following table lists the changes that have been made to the CVE-2025-27670 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27669 – Vasion Print (formerly PrinterLogic) Remote Network Scanning and DoS Vulnerability
The following table lists the changes that have been made to the CVE-2025-27669 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27668 – Vasion Print (formerly PrinterLogic) IFrame Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27668 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27667 – Vasion Print (formerly PrinterLogic) Administrative User Email Enumeration Vulnerability
The following table lists the changes that have been made to the CVE-2025-27667 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27659 – Vasion Print SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-27659 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 05, 2025 Action […]
CVE-2025-27666 – Vasion Print (formerly PrinterLogic) Insufficient Authorization Checks
The following table lists the changes that have been made to the CVE-2025-27666 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.