Current Conditions
São Paulo
nuvens dispersas

28 ℃
51%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 15:30:01
  1. [USD] USD 70,911.03
  1. [BRL] BRL 372,389.26 [USD] USD 70,911.03 [GBP] GBP 52,815.17 [EUR] EUR 61,084.53
    Price index provided by blockchain.info.
  2. Bitcoin Core version 29.3 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-13554] [Modified: 02-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A security vulnerability has been detected in Campcodes Supplier Management System 1.0. This impacts an unknown function of the file /index.php of the component Login. Such manipulation of the argument txtUsername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

[CVE-2025-13557] [Modified: 26-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability has been found in Campcodes Online Polling System 1.0. Affected by this issue is some unknown functionality of the file /registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

[CVE-2025-13560] [Modified: 26-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was found in SourceCodester Company Website CMS 1.0. This affects an unknown part of the file /admin/reset-password.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

[CVE-2025-13561] [Modified: 26-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was determined in SourceCodester Company Website CMS 1.0. This vulnerability affects unknown code of the file /admin/index.php. This manipulation of the argument Username causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

[CVE-2025-13562] [Modified: 26-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown processing of the file /gena.cgi. Such manipulation of the argument service leads to command injection. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-13564] [Modified: 02-12-2025] [Analyzed] [V3.1 S5.4:MEDIUM] A security flaw has been discovered in SourceCodester Pre-School Management System 1.0. Impacted is the function removefile of the file app/controllers/FilehelperController.php. Performing manipulation of the argument filepath results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

[CVE-2025-13565] [Modified: 26-11-2025] [Analyzed] [V3.1 S5.3:MEDIUM] A weakness has been identified in SourceCodester Inventory Management System 1.0. The affected element is an unknown function of the file /model/user/resetPassword.php. Executing manipulation can lead to weak password recovery. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

[CVE-2025-13567] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was detected in itsourcecode COVID Tracking System 1.0. This affects an unknown function of the file /admin/?page=establishment. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

[CVE-2025-13568] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A flaw has been found in itsourcecode COVID Tracking System 1.0. This impacts an unknown function of the file /admin/?page=people. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

[CVE-2025-13569] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/?page=city. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

[CVE-2025-13570] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=state. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.

[CVE-2025-13571] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was determined in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /listorder.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

[CVE-2025-13572] [Modified: 02-12-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability was identified in projectworlds Advanced Library Management System 1.0. This affects an unknown part of the file /delete_admin.php. The manipulation of the argument admin_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

[CVE-2025-13573] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A security flaw has been discovered in projectworlds can pass malicious payloads up to 1.0. This vulnerability affects unknown code of the file /add_book.php. The manipulation of the argument image results in unrestricted upload. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

[CVE-2025-13574] [Modified: 02-12-2025] [Analyzed] [V3.1 S4.7:MEDIUM] A weakness has been identified in code-projects Online Bidding System 1.0. This issue affects the function categoryadd of the file /administrator/addcategory.php. This manipulation of the argument catimage causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

[CVE-2025-13575] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A security vulnerability has been detected in code-projects Blog Site 1.0. Impacted is the function category_exists of the file /resources/functions/blog.php of the component Category Handler. Such manipulation of the argument name/field leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. Multiple endpoints are affected.

[CVE-2025-13576] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was detected in code-projects Blog Site 1.0. The affected element is an unknown function of the file /admin.php. Performing manipulation results in improper authorization. It is possible to initiate the attack remotely. The exploit is now public and may be used. Multiple endpoints are affected.

[CVE-2025-13578] [Modified: 26-11-2025] [Analyzed] [V3.1 S7.3:HIGH] A vulnerability has been found in code-projects Library System 1.0. This affects an unknown function of the file /index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

[CVE-2025-13579] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was found in code-projects Library System 1.0. This impacts an unknown function of the file /return.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

[CVE-2025-13580] [Modified: 02-12-2025] [Analyzed] [V3.1 S6.3:MEDIUM] A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.