Current Conditions
São Paulo
nuvens quebradas

29 ℃
45%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 14:30:02
  1. [USD] USD 90,876.54
  1. [BRL] BRL 489,597.35 [USD] USD 90,876.54 [GBP] GBP 67,657.77 [EUR] EUR 78,004.88
    Price index provided by blockchain.info.
  2. Bitcoin Core version 30.1 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-10231] [Modified: 22-09-2025] [Analyzed] [V3.1 S7.0:HIGH] An Incorrect File Handling Permission bug exists on the N-central Windows Agent and Probe that, in the right circumstances, can allow a local low-level user to run commands with elevated permissions.

[CVE-2025-56404] [Modified: 17-09-2025] [Analyzed] [V3.1 S7.5:HIGH] An issue was discovered in MariaDB MCP 0.1.0 allowing attackers to gain sensitive information via the SSE service as the SSE service lacks user validation.

[CVE-2025-56405] [Modified: 17-09-2025] [Analyzed] [V3.1 S7.5:HIGH] An issue was discovered in litmusautomation litmus-mcp-server thru 0.0.1 allowing unauthorized attackers to control the target's MCP service through the SSE protocol.

[CVE-2025-56407] [Modified: 06-10-2025] [Analyzed] [V3.1 S8.8:HIGH] A vulnerability has been found in HuangDou UTCMS V9 and classified as critical. This vulnerability affects the function RunSql of the file app/modules/ut-data/admin/mysql.php. The manipulation of the argument sql leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

[CVE-2025-56413] [Modified: 18-11-2025] [Analyzed] [V3.1 S8.8:HIGH] OS Command injection vulnerability in function OperateSSH in 1panel 2.0.8 allowing attackers to execute arbitrary commands via the operation parameter to the /api/v2/hosts/ssh/operate endpoint.

[CVE-2025-56466] [Modified: 06-10-2025] [Analyzed] [V3.1 S7.5:HIGH] Hardcoded credentials in Dietly v1.25.0 for android allows attackers to gain sensitive information.

[CVE-2025-29592] [Modified: 19-11-2025] [Analyzed] [V3.1 S5.6:MEDIUM] oasys v1.1 is vulnerable to Directory Traversal in ProcedureController.

[CVE-2025-43725] [Modified: 04-11-2025] [Analyzed] [V3.1 S7.8:HIGH] Dell PowerProtect Data Manager, Generic Application Agent, version(s) 19.19 and 19.20, contain(s) an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.

[CVE-2025-43884] [Modified: 17-09-2025] [Analyzed] [V3.1 S8.2:HIGH] Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

[CVE-2025-43885] [Modified: 20-10-2025] [Analyzed] [V3.1 S7.8:HIGH] Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

[CVE-2025-43886] [Modified: 20-10-2025] [Analyzed] [V3.1 S4.4:MEDIUM] Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) a Path Traversal: '.../...//' vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.

[CVE-2025-43887] [Modified: 20-10-2025] [Analyzed] [V3.1 S7.0:HIGH] Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

[CVE-2025-43888] [Modified: 20-10-2025] [Analyzed] [V3.1 S8.8:HIGH] Dell PowerProtect Data Manager, Hyper-V, version(s) 19.19 and 19.20, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.

[CVE-2025-43938] [Modified: 20-10-2025] [Analyzed] [V3.1 S5.0:MEDIUM] Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to gain unauthorized access with privileges of the compromised account.

[CVE-2025-57569] [Modified: 17-09-2025] [Analyzed] [V3.1 S5.6:MEDIUM] Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the portList parameter in /goform/setNAT.

[CVE-2025-57570] [Modified: 17-09-2025] [Analyzed] [V3.1 S5.6:MEDIUM] Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the QosList parameter in goform/setQoS.

[CVE-2025-57571] [Modified: 17-09-2025] [Analyzed] [V3.1 S5.6:MEDIUM] Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow. via the macFilterList parameter in goform/setNAT.

[CVE-2025-57572] [Modified: 17-09-2025] [Analyzed] [V3.1 S5.6:MEDIUM] Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the onlineList parameter in goform/setParentControl.

[CVE-2025-57573] [Modified: 17-09-2025] [Analyzed] [V3.1 S5.6:MEDIUM] Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi.

[CVE-2025-58764] [Modified: 24-10-2025] [Analyzed] [V3.1 S9.8:CRITICAL] Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to version 1.0.105 or the latest version.