Current Conditions
São Paulo
nuvens dispersas

18 ℃
98%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 07:00:01
  1. [USD] USD 72,044.69
  1. [BRL] BRL 378,415.52 [USD] USD 72,044.69 [GBP] GBP 54,299.58 [EUR] EUR 62,892.85
    Price index provided by blockchain.info.
  2. Bitcoin Core version 29.3 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-64271] [Modified: 13-02-2026] [Analyzed] [V3.1 S6.5:MEDIUM] Cross-Site Request Forgery (CSRF) vulnerability in HasThemes WP Plugin Manager wp-plugin-manager allows Cross Site Request Forgery.This issue affects WP Plugin Manager: from n/a through <= 1.4.7.

[CVE-2025-12764] [Modified: 19-11-2025] [Analyzed] [V3.1 S7.5:HIGH] pgAdmin <= 9.9  is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and the client to process an unusual amount of data DOS.

[CVE-2025-12765] [Modified: 19-11-2025] [Analyzed] [V3.1 S7.5:HIGH] pgAdmin <= 9.9  is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification.

[CVE-2025-13114] [Modified: 25-11-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was identified in macrozheng mall-swarm up to 1.0.3. This affects the function updateAttr of the file /cart/update/attr. Such manipulation leads to improper authorization. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

[CVE-2025-13115] [Modified: 25-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] A security flaw has been discovered in macrozheng mall-swarm and mall up to 1.0.3. This impacts the function detail of the file /order/detail/ of the component Order Details Handler. Performing manipulation of the argument orderId results in improper authorization. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

[CVE-2025-13116] [Modified: 25-11-2025] [Analyzed] [V3.1 S5.4:MEDIUM] A weakness has been identified in macrozheng mall-swarm and mall up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

[CVE-2025-13117] [Modified: 25-11-2025] [Analyzed] [V3.1 S5.4:MEDIUM] A security vulnerability has been detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this vulnerability is the function cancelOrder of the file /order/cancelOrder. The manipulation of the argument orderId leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

[CVE-2025-13118] [Modified: 25-11-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

[CVE-2025-13119] [Modified: 17-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] A flaw has been found in Fabian Ros/SourceCodester Simple E-Banking System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been published and may be used.

[CVE-2025-30662] [Modified: 09-01-2026] [Analyzed] [V3.1 S6.6:MEDIUM] Symlink following in the installer for the Zoom Workplace VDI Plugin macOS Universal installer before version 6.3.14, 6.4.14, and 6.5.10 in their respective tracks may allow an authenticated user to conduct a disclosure of information via network access.

[CVE-2025-30669] [Modified: 13-01-2026] [Analyzed] [V3.1 S4.8:MEDIUM] Improper certificate validation in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via adjacent access.

[CVE-2025-62482] [Modified: 13-01-2026] [Analyzed] [V3.1 S4.3:MEDIUM] Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may allow an unauthenticated user to impact integrity via network access.

[CVE-2025-62483] [Modified: 13-01-2026] [Analyzed] [V3.1 S5.3:MEDIUM] Improper removal of sensitive information in certain Zoom Clients before version 6.5.10 may allow an unauthenticated user to conduct a disclosure of information via network access.

[CVE-2025-64738] [Modified: 13-01-2026] [Analyzed] [V3.1 S5.0:MEDIUM] External control of file name or path in Zoom Workplace for macOS before version 6.5.10 may allow an authenticated user to conduct a disclosure of information via local access.

[CVE-2025-64739] [Modified: 13-01-2026] [Analyzed] [V3.1 S4.3:MEDIUM] External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.

[CVE-2025-64740] [Modified: 13-01-2026] [Analyzed] [V3.1 S7.5:HIGH] Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

[CVE-2025-64741] [Modified: 13-01-2026] [Analyzed] [V3.1 S8.1:HIGH] Improper authorization handling in Zoom Workplace for Android before version 6.5.10 may allow an unauthenticated user to conduct an escalation of privilege via network access.

[CVE-2025-52186] [Modified: 09-01-2026] [Analyzed] [V3.1 S6.5:MEDIUM] Lichess lila before commit 11b4c0fb00f0ffd823246f839627005459c8f05c (2025-06-02) contains a Server-Side Request Forgery (SSRF) vulnerability in the game export API. The players parameter is passed directly to an internal HTTP client without validation, allowing remote attackers to force the server to send HTTP requests to arbitrary URLs

[CVE-2025-60682] [Modified: 17-11-2025] [Analyzed] [V3.1 S6.5:MEDIUM] A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device.

[CVE-2025-60683] [Modified: 17-11-2025] [Analyzed] [V3.1 S6.5:MEDIUM] A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() without escaping. An attacker with write access to this file can execute arbitrary commands on the device.