Current Conditions
São Paulo
chuva fraca

26 ℃
74%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 15:30:02
  1. [USD] USD 68,615.09
  1. [BRL] BRL 354,122.49 [USD] USD 68,615.09 [GBP] GBP 51,712.38 [EUR] EUR 59,242.13
    Price index provided by blockchain.info.
  2. Bitcoin Core version 28.4 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-14248] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was identified in code-projects Simple Shopping Cart 1.0. Impacted is an unknown function of the file /adminlogin.php. The manipulation of the argument admin_username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

[CVE-2025-14249] [Modified: 10-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A security flaw has been discovered in code-projects Online Ordering System 1.0. The affected element is an unknown function of the file /user_school.php. The manipulation of the argument product_id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

[CVE-2025-60912] [Modified: 10-12-2025] [Analyzed] [V3.1 S3.3:LOW] phpIPAM v1.7.3 contains a Cross-Site Request Forgery (CSRF) vulnerability in the database export functionality. The generate-mysql.php function, located in the /app/admin/import-export/ endpoint, allows remote attackers to trigger large database dump downloads via crafted HTTP GET requests if an administrator has an active session.

[CVE-2025-14250] [Modified: 10-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A weakness has been identified in code-projects Online Ordering System 1.0. The impacted element is an unknown function of the file /user_contact.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

[CVE-2025-14251] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A security vulnerability has been detected in code-projects Online Ordering System 1.0. This affects an unknown function of the file /admin/ of the component Admin Login. Such manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

[CVE-2025-61318] [Modified: 09-12-2025] [Analyzed] [V3.1 S9.1:CRITICAL] Emlog Pro 2.5.20 has an arbitrary file deletion vulnerability. This vulnerability stems from the admin/template.php component and the admin/plugin.php component. They fail to perform path verification and dangerous code filtering for deletion parameters, allowing attackers to exploit this feature for directory traversal.

[CVE-2025-65796] [Modified: 09-12-2025] [Analyzed] [V3.1 S4.3:MEDIUM] Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily delete reactions made to other users' Memos.

[CVE-2025-65798] [Modified: 09-12-2025] [Analyzed] [V3.1 S5.4:MEDIUM] Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily modify or delete attachments made by other users.

[CVE-2025-14256] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was detected in itsourcecode Student Management System 1.0. This impacts an unknown function of the file /newcurriculm.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.

[CVE-2025-14257] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A flaw has been found in itsourcecode Student Management System 1.0. Affected is an unknown function of the file /newrecord.php. Executing manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used.

[CVE-2025-22420] [Modified: 10-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In multiple locations, there is a possible way to leak audio files across user profiles due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-22432] [Modified: 10-12-2025] [Analyzed] [V3.1 S6.7:MEDIUM] In notifyTimeout of CallRedirectionProcessor.java, there is a possible persistent connection due to improper input validation. This could lead to local escalation of privilege and background activity launches with User execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-32319] [Modified: 09-12-2025] [Analyzed] [V3.1 S6.7:MEDIUM] In ensureBound of RemotePrintService.java, there is a possible way for a background app to keep foreground permissions due to a permissions bypass. This could lead to local escalation of privilege with user execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-32328] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In multiple functions of Session.java, there is a possible way to view images belonging to a different user of the device due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-32329] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In multiple functions of Session.java, there is a possible way to view images belonging to a different user of the device due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-48525] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In disassociate of DisassociationProcessor.java, there is a possible way for an app to continue reading notifications when not associated to a companion device due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-48536] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In grantAllowlistedPackagePermissions of SettingsSliceProvider.java, there is a possible way for a third party app to modify secure settings due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-48555] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In multiple functions of NotificationStation.java, there is a possible cross-profile information disclosure due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-48564] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.0:HIGH] In multiple locations, there is a possible intent filter bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

[CVE-2025-48565] [Modified: 09-12-2025] [Analyzed] [V3.1 S7.8:HIGH] In multiple locations, there is a possible way to bypass the cross profile intent filter due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.