Current Conditions
São Paulo
nuvens quebradas

26 ℃
41%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 16:00:01
  1. [USD] USD 75,044.56
  1. [BRL] BRL 374,712.48 [USD] USD 75,044.56 [GBP] GBP 55,461.53 [EUR] EUR 63,707.05
    Price index provided by blockchain.info.
  2. Bitcoin Core version 28.4 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2024-29370] [Modified: 05-01-2026] [Analyzed] [V3.1 S5.3:MEDIUM] In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

[CVE-2025-14727] [Modified: 08-01-2026] [Analyzed] [V3.1 S8.3:HIGH] A vulnerability exists in NGINX Ingress Controller's nginx.org/rewrite-target annotation validation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

[CVE-2025-20393] [Modified: 16-01-2026] [Analyzed] [V3.1 S10.0:CRITICAL] A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

[CVE-2025-53398] [Modified: 02-01-2026] [Analyzed] [V3.1 S7.8:HIGH] The Portrait Dell Color Management application 3.3.8 for Dell monitors has Insecure Permissions,

[CVE-2025-53919] [Modified: 02-01-2026] [Analyzed] [V3.1 S7.8:HIGH] An issue was discovered in the Portrait Dell Color Management application through 3.3.008 for Dell monitors, It creates a temporary folder, with weak permissions, during installation and uninstallation. A low-privileged attacker with local access could potentially exploit this, leading to elevation of privileges.

[CVE-2025-65185] [Modified: 05-01-2026] [Analyzed] [V3.1 S2.8:LOW] There is a username enumeration via local user login in Entrinsik Informer v5.10.1 which allows malicious users to enumerate users by entering an OTP code and new password then reviewing application responses.

[CVE-2025-65855] [Modified: 06-01-2026] [Analyzed] [V3.1 S6.6:MEDIUM] The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.

[CVE-2025-66921] [Modified: 18-12-2025] [Analyzed] [V3.1 S7.2:HIGH] A Cross-site scripting (XSS) vulnerability in Create/Update Item(s) Module in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

[CVE-2025-67164] [Modified: 02-01-2026] [Analyzed] [V3.1 S9.9:CRITICAL] An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.

[CVE-2025-67165] [Modified: 02-01-2026] [Analyzed] [V3.1 S9.8:CRITICAL] An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.

[CVE-2025-67285] [Modified: 02-01-2026] [Analyzed] [V3.1 S7.3:HIGH] A SQL injection vulnerability was found in the '/cts/admin/?page=zone' file of ITSourcecode COVID Tracking System Using QR-Code v1.0. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation.

[CVE-2025-65203] [Modified: 05-01-2026] [Analyzed] [V3.1 S7.1:HIGH] KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials into documents rendered under a browser-enforced CSP directive and iframe attribute sandbox, allowing attacker-controlled script in the sandboxed document to access populated form fields and exfiltrate credentials.

[CVE-2025-66923] [Modified: 18-12-2025] [Analyzed] [V3.1 S7.2:HIGH] A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the phone_number parameter.

[CVE-2025-66924] [Modified: 18-12-2025] [Analyzed] [V3.1 S6.1:MEDIUM] A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

[CVE-2025-67172] [Modified: 18-12-2025] [Analyzed] [V3.1 S7.2:HIGH] RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the parse_special_tags() function.

[CVE-2024-46060] [Modified: 05-01-2026] [Analyzed] [V3.1 S7.8:HIGH] Anaconda3 macOS installers before 2024.06-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user.

[CVE-2024-46062] [Modified: 05-01-2026] [Analyzed] [V3.1 S7.8:HIGH] Miniconda3 macOS installers before 23.11.0-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This flaw allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user.

[CVE-2025-12689] [Modified: 29-12-2025] [Analyzed] [V3.1 S6.5:MEDIUM] Mattermost versions 11.0.x <= 11.0.4, 10.12.x <= 10.12.2, 10.11.x <= 10.11.6 fail to check WebSocket request field for proper UTF-8 format, which allows attacker to crash Calls plug-in via sending malformed request.

[CVE-2025-13321] [Modified: 18-12-2025] [Analyzed] [V3.1 S3.3:LOW] Mattermost Desktop App versions <6.0.0 fail to sanitize sensitive information from Mattermost logs and clear data on server deletion which allows an attacker with access to the users system to gain access to potentially sensitive information via reading the application logs.

[CVE-2025-13324] [Modified: 29-12-2025] [Analyzed] [V3.1 S3.7:LOW] Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed.