Current Conditions
São Paulo
nuvens dispersas

24 ℃
58%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 15:00:02
  1. [USD] USD 73,108.06
  1. [BRL] BRL 366,004.51 [USD] USD 73,108.06 [GBP] GBP 54,335.22 [EUR] EUR 62,344.28
    Price index provided by blockchain.info.
  2. Bitcoin Core version 28.4 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-36743] [Modified: 23-12-2025] [Analyzed] [V3.1 S6.8:MEDIUM] SolarEdge SE3680H has an exposed debug/test interface accessible to unauthenticated actors, allowing disclosure of system internals and execution of debug commands.

[CVE-2025-36744] [Modified: 23-12-2025] [Analyzed] [V3.1 S2.4:LOW] SolarEdge SE3680H has unauthenticated disclosure of sensitive information during the bootloader loop. While the device repeatedly initializes and waits for boot instructions, the bootloader emits diagnostic output this behavior can leak operating system information.

[CVE-2025-36745] [Modified: 23-12-2025] [Analyzed] [V3.1 S7.8:HIGH] SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. An attacker with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or disclosure of sensitive information.

[CVE-2025-36746] [Modified: 16-12-2025] [Analyzed] [V3.1 S5.4:MEDIUM] SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that allows an authenticated user to inject payloads into report names, which may execute in a victim’s browser during a deletion attempt.

[CVE-2025-54947] [Modified: 15-12-2025] [Analyzed] [V3.1 S9.8:CRITICAL] In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Attackers may obtain this key through reverse engineering or code analysis, potentially decrypting sensitive data or forging encrypted information, leading to information disclosure or unauthorized system access. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-54981] [Modified: 15-12-2025] [Analyzed] [V3.1 S7.5:HIGH] Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-58770] [Modified: 12-01-2026] [Analyzed] [V3.1 S8.8:HIGH] APTIOV contains a vulnerability in BIOS where a user may cause “Improper Handling of Insufficient Permissions or Privileges” by local access. Successful exploitation of this vulnerability can lead to escalation of authorization and potentially impact Integrity and Availability.

[CVE-2025-12843] [Modified: 05-01-2026] [Analyzed] [V3.1 S5.5:MEDIUM] Code Injection using Electron Fuses in waveterm on MacOS allows TCC Bypass. This issue affects waveterm: 0.12.2.

[CVE-2025-14567] [Modified: 23-12-2025] [Analyzed] [V3.1 S5.3:MEDIUM] A weakness has been identified in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This affects an unknown function of the file /api/employees. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.

[CVE-2025-53960] [Modified: 16-12-2025] [Analyzed] [V3.1 S5.9:MEDIUM] When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

[CVE-2025-65530] [Modified: 19-12-2025] [Analyzed] [V3.1 S8.8:HIGH] An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32.7.4 allows attackers to overwrite arbitrary files as root via scanning a crafted file.

[CVE-2025-65854] [Modified: 19-12-2025] [Analyzed] [V3.1 S9.8:CRITICAL] Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.

[CVE-2025-66430] [Modified: 06-01-2026] [Analyzed] [V3.1 S9.1:CRITICAL] Plesk 18.0 has Incorrect Access Control.

[CVE-2025-67341] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.6:MEDIUM] jshERP versions 3.5 and earlier are affected by a stored XSS vulnerability. This vulnerability allows attackers to upload PDF files containing XSS payloads. Additionally, these PDF files can be accessed via static URLs, making them accessible to all users.

[CVE-2025-67344] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.6:MEDIUM] jshERP v3.5 and earlier is affected by a stored Cross Site Scripting (XSS) vulnerability via the /msg/add endpoint.

[CVE-2023-29144] [Modified: 19-12-2025] [Analyzed] [V3.1 S3.3:LOW] Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.

[CVE-2025-64011] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.3:MEDIUM] Nextcloud Server 30.0.0 is vulnerable to an Insecure Direct Object Reference (IDOR) in the /core/preview endpoint. Any authenticated user can access previews of arbitrary files belonging to other users by manipulating the fileId parameter. This allows unauthorized disclosure of sensitive data, such as text files or images, without prior sharing permissions.

[CVE-2025-67342] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.6:MEDIUM] RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in the /system/menu/edit endpoint. While the endpoint is protected by an XSS filter, the protection can be bypassed. Additionally, because the menu is shared across all users, any user with menu modification permissions can impact all users by exploiting this stored XSS vulnerability.

[CVE-2025-67818] [Modified: 19-12-2025] [Analyzed] [V3.1 S7.2:HIGH] An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.

[CVE-2025-67819] [Modified: 19-12-2025] [Analyzed] [V3.1 S4.9:MEDIUM] An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.