Current Conditions
São Paulo
céu limpo

22 ℃
65%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 10:30:01
  1. [USD] USD 72,663.34
  1. [BRL] BRL 363,778.11 [USD] USD 72,663.34 [GBP] GBP 54,004.70 [EUR] EUR 61,965.04
    Price index provided by blockchain.info.
  2. Bitcoin Core version 28.4 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-23408] [Modified: 18-12-2025] [Analyzed] [V3.1 S6.5:MEDIUM] Weak Password Requirements vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0. Users are encouraged to upgrade to version 1.13.0, the latest release.

[CVE-2025-26866] [Modified: 29-12-2025] [Analyzed] [V3.1 S8.8:HIGH] A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.

[CVE-2025-58130] [Modified: 18-12-2025] [Analyzed] [V3.1 S9.1:CRITICAL] Insufficiently Protected Credentials vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.

[CVE-2025-58137] [Modified: 18-12-2025] [Analyzed] [V3.1 S8.1:HIGH] Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.

[CVE-2025-36743] [Modified: 23-12-2025] [Analyzed] [V3.1 S6.8:MEDIUM] SolarEdge SE3680H has an exposed debug/test interface accessible to unauthenticated actors, allowing disclosure of system internals and execution of debug commands.

[CVE-2025-36744] [Modified: 23-12-2025] [Analyzed] [V3.1 S2.4:LOW] SolarEdge SE3680H has unauthenticated disclosure of sensitive information during the bootloader loop. While the device repeatedly initializes and waits for boot instructions, the bootloader emits diagnostic output this behavior can leak operating system information.

[CVE-2025-36745] [Modified: 23-12-2025] [Analyzed] [V3.1 S7.8:HIGH] SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. An attacker with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or disclosure of sensitive information.

[CVE-2025-36746] [Modified: 16-12-2025] [Analyzed] [V3.1 S5.4:MEDIUM] SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that allows an authenticated user to inject payloads into report names, which may execute in a victim’s browser during a deletion attempt.

[CVE-2025-54947] [Modified: 15-12-2025] [Analyzed] [V3.1 S9.8:CRITICAL] In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Attackers may obtain this key through reverse engineering or code analysis, potentially decrypting sensitive data or forging encrypted information, leading to information disclosure or unauthorized system access. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-54981] [Modified: 15-12-2025] [Analyzed] [V3.1 S7.5:HIGH] Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-58770] [Modified: 12-01-2026] [Analyzed] [V3.1 S8.8:HIGH] APTIOV contains a vulnerability in BIOS where a user may cause “Improper Handling of Insufficient Permissions or Privileges” by local access. Successful exploitation of this vulnerability can lead to escalation of authorization and potentially impact Integrity and Availability.

[CVE-2025-12843] [Modified: 05-01-2026] [Analyzed] [V3.1 S5.5:MEDIUM] Code Injection using Electron Fuses in waveterm on MacOS allows TCC Bypass. This issue affects waveterm: 0.12.2.

[CVE-2025-14567] [Modified: 23-12-2025] [Analyzed] [V3.1 S5.3:MEDIUM] A weakness has been identified in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This affects an unknown function of the file /api/employees. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-53960] [Modified: 16-12-2025] [Analyzed] [V3.1 S5.9:MEDIUM] When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-65530] [Modified: 19-12-2025] [Analyzed] [V3.1 S8.8:HIGH] An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32.7.4 allows attackers to overwrite arbitrary files as root via scanning a crafted file.

[CVE-2025-65854] [Modified: 19-12-2025] [Analyzed] [V3.1 S9.8:CRITICAL] Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.

[CVE-2025-66430] [Modified: 06-01-2026] [Analyzed] [V3.1 S9.1:CRITICAL] Plesk 18.0 has Incorrect Access Control.

[CVE-2025-67341] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.6:MEDIUM] jshERP versions 3.5 and earlier are affected by a stored XSS vulnerability. This vulnerability allows attackers to upload PDF files containing XSS payloads. Additionally, these PDF files can be accessed via static URLs, making them accessible to all users.

[CVE-2025-67344] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.6:MEDIUM] jshERP v3.5 and earlier is affected by a stored Cross Site Scripting (XSS) vulnerability via the /msg/add endpoint.

[CVE-2023-29144] [Modified: 19-12-2025] [Analyzed] [V3.1 S3.3:LOW] Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.