Post Content Source: Read More 

Tx-PEARS is a comprehensive non-functional testing platform that enhances software quality across performance, security, resilience, and accessibility. Developed by Tx TCoE, it streamlines testing processes and integrates smoothly into DevOps workflows, helping teams deliver reliable and secure applications.
The post Tx-PEARS: Elevate Software Quality with Smarter NFT Practices first appeared on TestingXperts.

CVE ID : CVE-2025-4951

Published : May 20, 2025, 9:15 a.m. | 2 hours, 52 minutes ago

Description : Editions of Rapid7 AppSpider Pro before version 7.5.018 is vulnerable to a stored cross-site scripting vulnerability in the “ScanName” field.
Despite the application preventing the inclusion of special characters within the “ScanName” field, this could be bypassed by modifying the configuration file directly.

This is fixed as of version 7.5.018

Severity: 4.6 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-37892

Published : May 20, 2025, 11:15 a.m. | 52 minutes ago

Description : In the Linux kernel, the following vulnerability has been resolved:

mtd: inftlcore: Add error check for inftl_read_oob()

In INFTL_findwriteunit(), the return value of inftl_read_oob()
need to be checked. A proper implementation can be
found in INFTL_deleteblock(). The status will be set as
SECTOR_IGNORE to break from the while-loop correctly
if the inftl_read_oob() fails.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-40633

Published : May 20, 2025, 11:15 a.m. | 52 minutes ago

Description : A Stored Cross-Site Scripting (XSS) vulnerability has been found in
Koibox for versions prior to e8cbce2. This vulnerability allows an
authenticated attacker to upload an image containing malicious
JavaScript code as profile picture in the
‘/es/dashboard/clientes/ficha/’ endpoint

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-40634

Published : May 20, 2025, 11:15 a.m. | 52 minutes ago

Description : Stack-based buffer overflow vulnerability in the ‘conn-indicator’ binary running as root on the TP-Link Archer AX50 router, in firmware versions prior to 1.0.15 build 241203 rel61480. This vulnerability allows an attacker to execute arbitrary code on the device over LAN and WAN networks.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…