Current Conditions
São Paulo
céu limpo

27 ℃
49%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 13:30:01
  1. [USD] USD 78,212.10
  1. [BRL] BRL 389,590.12 [USD] USD 78,212.10 [GBP] GBP 57,704.81 [EUR] EUR 66,272.40
    Price index provided by blockchain.info.
  2. Bitcoin Core version 28.4 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-65000] [Modified: 23-12-2025] [Analyzed] [V3.1 S5.3:MEDIUM] SSH private keys of the "Remote alert handlers (Linux)" rule were exposed in the rule page's HTML source in Checkmk <= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed.

[CVE-2025-1029] [Modified: 16-01-2026] [Analyzed] [V3.1 S7.5:HIGH] Use of Hard-coded Credentials vulnerability in Utarit Information Services Inc. SoliClub allows Read Sensitive Constants Within an Executable.This issue affects SoliClub: from 5.2.4 before 5.3.7.

[CVE-2025-1030] [Modified: 16-01-2026] [Analyzed] [V3.1 S7.5:HIGH] Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Utarit Informatics Services Inc. SoliClub allows Query System for Information.This issue affects SoliClub: from 5.2.4 before 5.3.7.

[CVE-2025-1031] [Modified: 16-01-2026] [Analyzed] [V3.1 S7.5:HIGH] Authorization Bypass Through User-Controlled Key vulnerability in Utarit Informatics Services Inc. SoliClub allows Functionality Misuse.This issue affects SoliClub: from 5.2.4 before 5.3.7.

[CVE-2025-63757] [Modified: 30-12-2025] [Analyzed] [V3.1 S7.5:HIGH] Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.

[CVE-2025-64461] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds write vulnerability in NI LabVIEW in mgocre_SH_25_3!RevBL() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64462] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::RGetMemFileHandle() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64463] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in LVResource::DetachResource() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64464] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in lvre!VisaWriteFromFile() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64465] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64466] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64467] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-64468] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions

[CVE-2025-64469] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.8:HIGH] There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

[CVE-2025-7047] [Modified: 16-01-2026] [Analyzed] [V3.1 S4.3:MEDIUM] Missing Authorization vulnerability in Utarit Informatics Services Inc. SoliClub allows Privilege Abuse.This issue affects SoliClub: before 5.3.7.

[CVE-2025-7358] [Modified: 16-01-2026] [Analyzed] [V3.1 S7.5:HIGH] Use of Hard-coded Credentials vulnerability in Utarit Informatics Services Inc. SoliClub allows Authentication Abuse.This issue affects SoliClub: before 5.3.7.

[CVE-2025-9787] [Modified: 29-01-2026] [Analyzed] [V3.1 S6.1:MEDIUM] Zohocorp ManageEngine Applications Manager versions 177400 and below are vulnerable to Stored Cross-Site Scripting vulnerability in the NOC view.

[CVE-2025-14823] [Modified: 16-01-2026] [Analyzed] [V3.1 S5.3:MEDIUM] In deployments using the ScreenConnect™ Certificate Signing Extension, encrypted configuration values including an Azure Key Vault-related key, could be returned to unauthenticated users through a client-facing endpoint under certain conditions. The values remained encrypted and securely stored at rest; however, an encrypted representation could be exposed in client responses. Updating the Certificate Signing Extension to version 1.0.12 or higher ensures configuration handling occurs exclusively on the server side, preventing encrypted values from being transmitted to or rendered by client-side components.

[CVE-2025-14877] [Modified: 24-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was identified in Campcodes Supplier Management System 1.0. This affects an unknown function of the file /admin/add_retailer.php. The manipulation of the argument cmbAreaCode leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

[CVE-2025-64723] [Modified: 19-02-2026] [Analyzed] [V3.1 S4.4:MEDIUM] Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.