Imagine this familiar scene: it’s Friday evening, and your team is prepping a hot-fix release. The code passes unit tests, the sprint board is almost empty, and you’re already tasting weekend freedom. Suddenly, a support ticket pings:“Screen-reader users can’t reach the checkout button. The focus keeps looping back to the promo banner.”The clock is ticking,
The post AI in Accessibility Testing: The Future Awaits appeared first on Codoid.

CVE ID : CVE-2025-51534

Published : Aug. 4, 2025, 5:15 p.m. | 1 day, 6 hours ago

Description : A cross-site scripting (XSS) vulnerability in Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name field.

Severity: 8.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-51390

Published : Aug. 4, 2025, 6:15 p.m. | 1 day, 5 hours ago

Description : TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig function.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-54119

Published : Aug. 5, 2025, 1:15 a.m. | 22 hours, 26 minutes ago

Description : ADOdb is a PHP database class library that provides abstractions for performing queries and managing databases. In versions 5.22.9 and below, improper escaping of a query parameter may allow an attacker to execute arbitrary SQL statements when the code using ADOdb connects to a sqlite3 database and calls the metaColumns(), metaForeignKeys() or metaIndexes() methods with a crafted table name. This is fixed in version 5.22.10. To workaround this issue, only pass controlled data to metaColumns(), metaForeignKeys() and metaIndexes() method’s $table parameter.

Severity: 10.0 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-54135

Published : Aug. 5, 2025, 1:15 a.m. | 22 hours, 26 minutes ago

Description : Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn’t. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don’t already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.

Severity: 8.5 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…