{"vulnerability": "CVE-2025-27694", "sightings": [{"uuid": "2d6ddd24-49fd-43ee-87ae-6b5445e75c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfizfdtk2i", "content": "", "creation_timestamp": "2025-04-02T03:01:21.400249Z"}, {"uuid": "2e3d1180-2c01-4dff-8095-23ff2f6810ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10072", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27694\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to  WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.\n\ud83d\udccf Published: 2025-04-02T00:12:16.032Z\n\ud83d\udccf Modified: 2025-04-02T13:24:43.503Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-04-02T13:33:44.000000Z"}, {"uuid": "ca43d2a5-1983-45c1-ba31-8b90bd8ca381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27694", "type": "seen", "source": "https://t.me/cvedetector/21836", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27694 - Dell Wyse Management Suite Insufficient Resource Pool Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27694 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to  WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:04.000000Z"}]}