Current Conditions
São Paulo
céu limpo

18 ℃
95%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 06:30:01
  1. [USD] USD 71,856.68
  1. [BRL] BRL 383,060.75 [USD] USD 71,856.68 [GBP] GBP 54,284.70 [EUR] EUR 62,683.02
    Price index provided by blockchain.info.
  2. Bitcoin Core version 29.3 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-13189] [Modified: 20-11-2025] [Analyzed] [V3.1 S8.8:HIGH] A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta. This affects the function genacgi_main of the file gena.cgi. The manipulation of the argument SERVER_ID/HTTP_SID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-13190] [Modified: 20-11-2025] [Analyzed] [V3.1 S8.8:HIGH] A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-13191] [Modified: 19-11-2025] [Analyzed] [V3.1 S8.8:HIGH] A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-11865] [Modified: 19-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] An issue has been discovered in GitLab EE affecting all versions from 18.1 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that, under certain circumstances, could have allowed an attacker to remove Duo flows of another user.

[CVE-2025-11990] [Modified: 19-11-2025] [Analyzed] [V3.1 S3.1:LOW] GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated user to gain CSRF tokens by exploiting improper input validation in repository references combined with redirect handling weaknesses.

[CVE-2025-2615] [Modified: 19-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.7 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2, that could have allowed a blocked user to access sensitive information by establishing GraphQL subscriptions through WebSocket connections.

[CVE-2025-6171] [Modified: 20-11-2025] [Analyzed] [V3.1 S5.3:MEDIUM] GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.2 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker with reporter access to view branch names and pipeline details by accessing the packages API endpoint even when repository access was disabled.

[CVE-2025-6945] [Modified: 20-11-2025] [Analyzed] [V3.1 S3.5:LOW] GitLab has remediated an issue in GitLab EE affecting all versions from 17.8 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker to leak sensitive information from confidential issues by injecting hidden prompts into merge request comments.

[CVE-2025-7000] [Modified: 20-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] An issue has been discovered in GitLab CE/EE affecting all versions from 17.6 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2, that, under specific conditions, could have allowed unauthorized users to view confidential branch names by accessing project issues with related merge requests.

[CVE-2025-7736] [Modified: 19-11-2025] [Analyzed] [V3.1 S3.1:LOW] GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker to bypass access control restrictions and view GitLab Pages content intended only for project members by authenticating through OAuth providers.

[CVE-2025-12983] [Modified: 19-11-2025] [Analyzed] [V3.1 S3.5:LOW] GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker to cause a denial of service condition by submitting specially crafted markdown content with nested formatting patterns.

[CVE-2025-13199] [Modified: 19-11-2025] [Analyzed] [V3.1 S5.3:MEDIUM] A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.

[CVE-2025-13200] [Modified: 19-11-2025] [Analyzed] [V3.1 S5.3:MEDIUM] A vulnerability was determined in SourceCodester Farm Management System 1.0. Affected by this vulnerability is an unknown functionality. This manipulation causes exposure of information through directory listing. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

[CVE-2025-13201] [Modified: 19-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was identified in code-projects Simple Cafe Ordering System 1.0. Affected by this issue is some unknown functionality of the file /login.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.

[CVE-2025-13202] [Modified: 19-11-2025] [Analyzed] [V3.1 S3.5:LOW] A security flaw has been discovered in code-projects Simple Cafe Ordering System 1.0. This affects an unknown part of the file /add_to_cart. Performing manipulation of the argument product_name results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

[CVE-2025-13203] [Modified: 19-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A weakness has been identified in code-projects Simple Cafe Ordering System 1.0. This vulnerability affects unknown code of the file /addmem.php. Executing manipulation of the argument studentnum can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

[CVE-2025-13210] [Modified: 18-11-2025] [Analyzed] [V3.1 S4.7:MEDIUM] A security vulnerability has been detected in itsourcecode Inventory Management System 1.0. This impacts an unknown function of the file /admin/products/index.php?view=add. Such manipulation of the argument PROMODEL leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

[CVE-2025-13233] [Modified: 18-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability has been found in itsourcecode Inventory Management System 1.0. The affected element is an unknown function of the file /index.php?q=single-item. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

[CVE-2025-13234] [Modified: 18-11-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was found in itsourcecode Inventory Management System 1.0. The impacted element is an unknown function of the file /index.php?q=product. Performing manipulation of the argument PROID results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.

[CVE-2025-13235] [Modified: 18-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was determined in itsourcecode Inventory Management System 1.0. This affects an unknown function of the file /admin/login.php. Executing manipulation of the argument user_email can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.