Current Conditions
São Paulo
nuvens quebradas

20 ℃
95%
Temperatura
Umidade
Fonte: OpenWeatherMap. - 15:00:02
  1. [USD] USD 70,913.74
  1. [BRL] BRL 364,801.56 [USD] USD 70,913.74 [GBP] GBP 52,683.17 [EUR] EUR 60,899.94
    Price index provided by blockchain.info.
  2. Bitcoin Core version 29.3 is now available for download. See the release notes for more information about the bug fixes in this release.
    If you have any questions, please stop by the #bitcoin IRC chatroom (IRC, web) and we’ll do our best to help you.

[CVE-2025-12480] [Modified: 14-11-2025] [Analyzed] [V3.1 S9.1:CRITICAL] Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

[CVE-2025-63710] [Modified: 17-11-2025] [Analyzed] [V3.1 S6.5:MEDIUM] The send_message.php endpoint in SourceCodester Simple Public Chat Room 1.0 is vulnerable to Cross-Site Request Forgery (CSRF). The application does not implement any CSRF-protection mechanisms such as tokens, nonces, or same-site cookie restrictions. An attacker can create a malicious HTML page that, when visited by an authenticated user, will automatically submit a forged POST request to the vulnerable endpoint. This request will be executed with the victim's privileges, allowing the attacker to perform unauthorized actions on their behalf, such as sending arbitrary messages in any chat room.

[CVE-2025-63711] [Modified: 17-11-2025] [Analyzed] [V3.1 S7.1:HIGH] A Cross-Site Request Forgery (CSRF) vulnerability in the SourceCodester Client Database Management System 1.0 allows an attacker to cause an authenticated administrative user to perform user deletion actions without their consent. The application's user deletion endpoint (e.g., superadmin_user_delete.php) accepts POST requests containing a user_id parameter and does not enforce request origin or anti-CSRF tokens. Because the endpoint lacks proper authentication/authorization checks and CSRF protections, a remote attacker can craft a malicious page that triggers deletion when visited by an authenticated admin, resulting in arbitrary removal of user accounts.

[CVE-2025-46430] [Modified: 12-11-2025] [Analyzed] [V3.1 S7.3:HIGH] Dell Display and Peripheral Manager, versions prior to 2.1.2.12, contains an Execution with Unnecessary Privileges vulnerability in the Installer. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

[CVE-2025-63152] [Modified: 17-11-2025] [Analyzed] [V3.1 S7.5:HIGH] Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the wpapsk_crypto parameter of the wlSetExternParameter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

[CVE-2025-63153] [Modified: 17-11-2025] [Analyzed] [V3.1 S7.5:HIGH] TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the ssid parameter of the urldecode function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

[CVE-2025-63154] [Modified: 17-11-2025] [Analyzed] [V3.1 S7.5:HIGH] TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the addEffect parameter of the urldecode function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

[CVE-2025-63455] [Modified: 17-11-2025] [Analyzed] [V3.1 S7.5:HIGH] Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the shareSpeed parameter in the fromSetWifiGusetBasic function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

[CVE-2025-63497] [Modified: 11-12-2025] [Analyzed] [V3.1 S7.1:HIGH] The patient prescription viewing functionality in his_doc_view_single_patient.php of rickxy Hospital Management System version 1.0 contains an SQL injection vulnerability. The pat_number GET parameter is directly concatenated into SQL queries without proper sanitization, allowing authenticated attackers (doctor role) to execute arbitrary SQL queries.

[CVE-2025-43723] [Modified: 20-02-2026] [Analyzed] [V3.1 S5.9:MEDIUM] Dell PowerScale OneFS, versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.

[CVE-2025-47286] [Modified: 21-11-2025] [Analyzed] [V3.1 S7.2:HIGH] Combodo iTop is a web based IT service management tool. In versions prior to 2.7.13 and 3.2.2, an administrator can, by editing the configuration of the iTop instance, execute code on the server. Versions 2.7.13 and 3.2.2 escape and check the config parameter before executing a command based on it.

[CVE-2025-47773] [Modified: 21-11-2025] [Analyzed] [V3.1 S8.8:HIGH] Combodo iTop is a web based IT service management tool. Versions prior to 2.7.13 and 3.2.2 are vulnerable to cross-site scripting when a dashboard is edited via an AJAX call. Versions 2.7.13 and 3.2.2 protect rendered HTML content.

[CVE-2025-63288] [Modified: 11-12-2025] [Analyzed] [V3.1 S7.5:HIGH] In Open5GS 2.7.6, AMF crashes when receiving an abnormal NGSetupRequest message, resulting in denial of service.

[CVE-2025-12428] [Modified: 13-11-2025] [Analyzed] [V3.1 S8.8:HIGH] Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

[CVE-2025-12429] [Modified: 13-11-2025] [Analyzed] [V3.1 S8.8:HIGH] Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

[CVE-2025-12430] [Modified: 13-11-2025] [Analyzed] [V3.1 S7.5:HIGH] Object lifecycle issue in Media in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)

[CVE-2025-12431] [Modified: 13-11-2025] [Analyzed] [V3.1 S6.5:MEDIUM] Inappropriate implementation in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: High)

[CVE-2025-12432] [Modified: 13-11-2025] [Analyzed] [V3.1 S8.8:HIGH] Race in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

[CVE-2025-12433] [Modified: 13-11-2025] [Analyzed] [V3.1 S4.3:MEDIUM] Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

[CVE-2025-12434] [Modified: 13-11-2025] [Analyzed] [V3.1 S4.2:MEDIUM] Race in Storage in Google Chrome on Windows prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)