Common Vulnerabilities and Exposures (CVE)

CVE-2025-35436

Sep 17, 2025 16:53:47 UTC

CISA Thorium uses '.unwrap()' to handle errors related to account verification email messages. An unauthenticated remote attacker could cause a crash by providing a specially crafted email address or response. Fixed in commit 6a65a27.

CVE-2025-35435

Sep 17, 2025 16:53:22 UTC

CISA Thorium accepts a stream split size of zero then divides by this value. A remote, authenticated attacker could cause the service to crash. Fixed in commit 89101a6.

CVE-2025-35434

Sep 17, 2025 16:53:08 UTC

CISA Thorium does not validate TLS certificates when connecting to Elasticsearch. An unauthenticated attacker with access to a Thorium cluster could impersonate the Elasticsearch service. Fixed in 1.1.2.

CVE-2025-35433

Sep 17, 2025 16:52:53 UTC

CISA Thorium does not properly invalidate previously used tokens when resetting passwords. An attacker that possesses a previously used token could still log in after a password reset. Fixed in 1.1.1.

CVE-2024-6333

Sep 17, 2025 16:52:52 UTC

Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products.

CVE-2025-35432

Sep 17, 2025 16:52:34 UTC

CISA Thorium does not rate limit requests to send account verification email messages. A remote unauthenticated attacker can send unlimited messages to a user who is pending verification. Fixed in 1.1.1 by adding a rate limit set by default...

CVE-2025-35431

Sep 17, 2025 16:52:16 UTC

CISA Thorium does not escape user controlled strings used in LDAP queries. An authenticated remote attacker can modify LDAP authorization data such as group memberships. Fixed in 1.1.1.

CVE-2025-35430

Sep 17, 2025 16:51:52 UTC

CISA Thorium does not adequately validate the paths of downloaded files via 'download_ephemeral' and 'download_children'. A remote, authenticated attacker could access arbitrary files subject to file system permissions. Fixed in 1.1.2.

CVE-2024-55925

Sep 17, 2025 16:49:42 UTC

In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a va...

CVE-2025-10598

Sep 17, 2025 16:19:54 UTC

A vulnerability was identified in SourceCodester Pet Grooming Management Software 1.0. This issue affects some unknown processing of the file /admin/search_product.php. Such manipulation of the argument group_id leads to sql injection. The ...

CVE-2025-10599

Sep 17, 2025 16:19:20 UTC

A security flaw has been discovered in itsourcecode Web-Based Internet Laboratory Management System 1.0. Impacted is the function User::AuthenticateUser of the file login.php. Performing manipulation of the argument user_email results in sq...

CVE-2025-56562

Sep 17, 2025 15:42:46 UTC

An incorrect API discovered in Signify Wiz Connected 1.9.1 allows attackers to remotely launch a DoS on Wiz devices only requiring the MAC address.

CVE-2025-9862

Sep 17, 2025 15:42:32 UTC

Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an attacker to access internal resources.This issue affects Ghost: from 6.0.0 through 6.0.8, from 5.99.0 through 5.130.3.

CVE-2025-9784

Sep 17, 2025 15:35:38 UTC

A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server ...

CVE-2025-9760

Sep 17, 2025 15:24:36 UTC

A weakness has been identified in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /module/Api/matricula of the component Matricula API. Executing manipulation can lead to improper authorization. It is possible to la...