CVE-2025-34210 - Vasion Print (formerly PrinterLogic) Readable Cleartext Passwords
CVE ID : CVE-2025-34210
Published : Oct. 2, 2025, 4:13 p.m. | 1 hour, 9 minutes ago
Description : Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."
Severity: 9.4 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-34210
Published : Oct. 2, 2025, 4:13 p.m. | 1 hour, 9 minutes ago
Description : Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."
Severity: 9.4 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56154 - "htmly XSS Reflected"
CVE ID : CVE-2025-56154
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : htmly v3.0.8 is vulnerable to Cross Site Scripting (XSS) in the /author/:name endpoint of the affected application. The name parameter is not properly sanitized before being reflected in the HTML response, allowing attackers to inject arbitrary JavaScript payloads.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-56154
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : htmly v3.0.8 is vulnerable to Cross Site Scripting (XSS) in the /author/:name endpoint of the affected application. The name parameter is not properly sanitized before being reflected in the HTML response, allowing attackers to inject arbitrary JavaScript payloads.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56161 - YOSHOP Unauthenticated Comment Information Disclosure Vulnerability
CVE ID : CVE-2025-56161
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : YOSHOP 2.0 allows unauthenticated information disclosure via comment-list API endpoints in the Goods module. The Comment model eagerly loads the related User model without field filtering; because User.php defines no $hidden or $visible attributes, sensitive fields (bcrypt password hash, mobile number, pay_money, expend_money.) are exposed in JSON responses. Route names vary per deployment (e.g. /api/goods.pinglun/list), but all call the same vulnerable model logic.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-56161
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : YOSHOP 2.0 allows unauthenticated information disclosure via comment-list API endpoints in the Goods module. The Comment model eagerly loads the related User model without field filtering; because User.php defines no $hidden or $visible attributes, sensitive fields (bcrypt password hash, mobile number, pay_money, expend_money.) are exposed in JSON responses. Route names vary per deployment (e.g. /api/goods.pinglun/list), but all call the same vulnerable model logic.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56162 - YOSHOP Unauthenticated SQL Injection
CVE ID : CVE-2025-56162
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-56162
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-57305 - VitaraCharts SSRF
CVE ID : CVE-2025-57305
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : VitaraCharts 5.3.5 is vulnerable to Server-Side Request Forgery in fileLoader.jsp.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-57305
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : VitaraCharts 5.3.5 is vulnerable to Server-Side Request Forgery in fileLoader.jsp.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60660 - Tenda AC18 Stack Overflow Vulnerability
CVE ID : CVE-2025-60660
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-60660
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60662 - Tenda AC18 Stack Overflow Vulnerability
CVE ID : CVE-2025-60662
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanSpeed parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-60662
Published : Oct. 2, 2025, 4:15 p.m. | 1 hour, 7 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanSpeed parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59403 - Flock Safety Android Collins Unauthenticated Remote Code Execution and Information Disclosure Vulnerability
CVE ID : CVE-2025-59403
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59403
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59405 - Flock Safety Peripheral Cleartext DataDog API Key Exposure
CVE ID : CVE-2025-59405
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Peripheral com.flocksafety.android.peripheral application 7.38.3 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) contains a cleartext DataDog API key within in its codebase. Because application binaries can be trivially decompiled or inspected, attackers can recover the OAuth secret without special privileges. This secret is intended to remain confidential and should never be embedded directly in client-side software.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59405
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Peripheral com.flocksafety.android.peripheral application 7.38.3 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) contains a cleartext DataDog API key within in its codebase. Because application binaries can be trivially decompiled or inspected, attackers can recover the OAuth secret without special privileges. This secret is intended to remain confidential and should never be embedded directly in client-side software.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59406 - Flock Safety Pisco OAuth Client Secret Exposed
CVE ID : CVE-2025-59406
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Pisco com.flocksafety.android.pisco application 6.21.11 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) has a cleartext Auth0 client secret in its codebase. Because application binaries can be trivially decompiled or inspected, attackers can recover this OAuth secret without special privileges. This secret is intended to remain confidential and should never be embedded directly in client-side software.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59406
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety Pisco com.flocksafety.android.pisco application 6.21.11 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) has a cleartext Auth0 client secret in its codebase. Because application binaries can be trivially decompiled or inspected, attackers can recover this OAuth secret without special privileges. This secret is intended to remain confidential and should never be embedded directly in client-side software.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59407 - Flock Safety Java Keystore Hardcoded Password Vulnerability
CVE ID : CVE-2025-59407
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety DetectionProcessing com.flocksafety.android.objects application 6.35.33 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) bundles a Java Keystore (flock_rye.bks) along with its hardcoded password (flockhibiki17) in its code. The keystore contains a private key.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59407
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : The Flock Safety DetectionProcessing com.flocksafety.android.objects application 6.35.33 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) bundles a Java Keystore (flock_rye.bks) along with its hardcoded password (flockhibiki17) in its code. The keystore contains a private key.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59409 - Flock Safety Falcon and Sparrow License Plate Readers Wi-Fi Cleartext Credentials Vulnerability
CVE ID : CVE-2025-59409
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Flock Safety Falcon and Sparrow License Plate Readers OPM1.171019.026 ship with development Wi-Fi credentials (test_flck) stored in cleartext in production firmware.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59409
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Flock Safety Falcon and Sparrow License Plate Readers OPM1.171019.026 ship with development Wi-Fi credentials (test_flck) stored in cleartext in production firmware.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60661 - Tenda AC18 Stack Overflow Vulnerability
CVE ID : CVE-2025-60661
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the cloneType parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-60661
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the cloneType parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60663 - Tenda AC18 Stack Overflow Vulnerability
CVE ID : CVE-2025-60663
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanMTU parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-60663
Published : Oct. 2, 2025, 5:16 p.m. | 2 hours, 8 minutes ago
Description : Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanMTU parameter in the fromAdvSetMacMtuWan function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56019 - Agasta Easytouch+ BLE Unauthenticated Remote Denial of Service (DoS)
CVE ID : CVE-2025-56019
Published : Oct. 2, 2025, 6:15 p.m. | 1 hour, 8 minutes ago
Description : An insecure permission vulnerability exists in the Agasta Easytouch+ version 9.3.97 The device allows unauthorized mobile applications to connect via Bluetooth Low Energy (BLE) without authentication. Once an unauthorized connection is established, legitimate applications are unable to connect, causing a denial of service. The attack requires proximity to the device, making it exploitable from an adjacent network location.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-56019
Published : Oct. 2, 2025, 6:15 p.m. | 1 hour, 8 minutes ago
Description : An insecure permission vulnerability exists in the Agasta Easytouch+ version 9.3.97 The device allows unauthorized mobile applications to connect via Bluetooth Low Energy (BLE) without authentication. Once an unauthorized connection is established, legitimate applications are unable to connect, causing a denial of service. The attack requires proximity to the device, making it exploitable from an adjacent network location.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59835 - LangBot has a cross-directory file upload vulnerability, which could lead to system takeover
CVE ID : CVE-2025-59835
Published : Oct. 2, 2025, 6:59 p.m. | 24 minutes ago
Description : LangBot is a global IM bot platform designed for LLMs. In versions 4.1.0 up to but not including 4.3.5, authorized attackers can exploit the /api/v1/files/documents interface to perform arbitrary file uploads. Since this interface does not strictly restrict the storage directory of files on the server, it is possible to upload dangerous files to specific system directories. This is fixed in version 4.3.5.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-59835
Published : Oct. 2, 2025, 6:59 p.m. | 24 minutes ago
Description : LangBot is a global IM bot platform designed for LLMs. In versions 4.1.0 up to but not including 4.3.5, authorized attackers can exploit the /api/v1/files/documents interface to perform arbitrary file uploads. Since this interface does not strictly restrict the storage directory of files on the server, it is possible to upload dangerous files to specific system directories. This is fixed in version 4.3.5.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-32942 - SSH Tectia Server Remote Session Hijacking Vulnerability
CVE ID : CVE-2025-32942
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : SSH Tectia Server before 6.6.6 sometimes allows attackers to read and alter a user's session traffic.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-32942
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : SSH Tectia Server before 6.6.6 sometimes allows attackers to read and alter a user's session traffic.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-49090 - "Matrix State Resolution Deficient"
CVE ID : CVE-2025-49090
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : The Matrix specification before 1.16 (i.e., with a room version before 12 and State Resolution before 2.1) has deficient state resolution.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-49090
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : The Matrix specification before 1.16 (i.e., with a room version before 12 and State Resolution before 2.1) has deficient state resolution.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54315 - Matrix Create Event Uniqueness Vulnerability
CVE ID : CVE-2025-54315
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : The Matrix specification before 1.16 (i.e., with a room version before 12) lacks create event uniqueness.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-54315
Published : Oct. 2, 2025, 7:15 p.m. | 4 hours, 11 minutes ago
Description : The Matrix specification before 1.16 (i.e., with a room version before 12) lacks create event uniqueness.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10653 - Raise3D Pro2 Series 3D Printers Authentication Bypass Using an Alternate Path or Channel
CVE ID : CVE-2025-10653
Published : Oct. 2, 2025, 8:15 p.m. | 3 hours, 11 minutes ago
Description : An unauthenticated debug port may allow access to the device file system.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-10653
Published : Oct. 2, 2025, 8:15 p.m. | 3 hours, 11 minutes ago
Description : An unauthenticated debug port may allow access to the device file system.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54086 - Excess Permissions in Warehouse
CVE ID : CVE-2025-54086
Published : Oct. 2, 2025, 8:15 p.m. | 3 hours, 11 minutes ago
Description : CVE-2025-54086 is an excess permissions vulnerability in the Warehouse component of Absolute Secure Access prior to version 14.10. Attackers with access to the local file system can read the Java keystore file. The attack complexity is low, there are no attack requirements, the privileges required are low and no user interaction is required. Impact to confidentiality is low, there is no impact to integrity or availability.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-54086
Published : Oct. 2, 2025, 8:15 p.m. | 3 hours, 11 minutes ago
Description : CVE-2025-54086 is an excess permissions vulnerability in the Warehouse component of Absolute Secure Access prior to version 14.10. Attackers with access to the local file system can read the Java keystore file. The attack complexity is low, there are no attack requirements, the privileges required are low and no user interaction is required. Impact to confidentiality is low, there is no impact to integrity or availability.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...