Development

In today’s fast-paced development world, AI agents for automation testing are no longer science fiction they’re transforming how teams ensure software quality. Imagine giving an intelligent “digital coworker” plain English instructions, and it automatically generates, executes, and even adapts test cases across your application. This blog explains what AI agents in testing are, how they
The post AI Agents for Automation Testing: Revolutionizing Software QA appeared first on Codoid.

Microsoft Outlook Vulnerability Let Attackers Execute Arbitrary Code Remotely

A significant security vulnerability in the Microsoft Outlook email client could allow attackers to execute arbitrary code remotely, even if they require local access to trigger the exploit.
The vulne …
Read more

Published Date:
Jun 11, 2025 (4 hours, 20 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-47176

Microsoft waarschuwt voor actief aangevallen RCE-lek in WebDAV

Microsoft waarschuwt voor een actief aangevallen kwetsbaarheid in WebDAV die remote code execution mogelijk maakt en is met een beveiligingsupdate gekomen om het lek te verhelpen. Volgens securitybedr …
Read more

Published Date:
Jun 11, 2025 (2 hours, 29 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-33053

June 2025 Patch Tuesday: One Zero-Day and Nine Critical Vulnerabilities Among 66 CVEs

Microsoft has addressed 66 vulnerabilities in its June 2025 security update release. This month’s patches include fixes for one actively exploited zero-day vulnerability and nine Critical vulnerabilit …
Read more

Published Date:
Jun 11, 2025 (1 hour, 21 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-47953

CVE-2025-47172

CVE-2025-47167

CVE-2025-47164

CVE-2025-47162

CVE-2025-33073

CVE-2025-33071

CVE-2025-33070

CVE-2025-33053

CVE-2025-32710

CVE-2025-29828

Adobe adviseert webshops kritiek beveiligingslek binnen 72 uur te patchen

Adobe adviseert webshops die gebruikmaken van Magento Open Source of Adobe Commerce om een kritieke kwetsbaarheid binnen 72 uur te patchen. Om ervoor te zorgen dat webwinkels dit ook zo snel mogelijk …
Read more

Published Date:
Jun 11, 2025 (1 hour, 16 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-47110

Thunderbird-lek laat aanvaller stilletjes Windows-inloggegevens stelen

Een kwetsbaarheid in e-mailclient Thunderbird maakt het mogelijk voor aanvallers om stilletjes pdf-bestanden op de desktop of in de home directory van gebruikers te plaatsen, ook als het automatisch o …
Read more

Published Date:
Jun 11, 2025 (41 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE ID : CVE-2025-33073

Published : June 10, 2025, 5:23 p.m. | 16 hours, 30 minutes ago

Description : Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5395

Published : June 11, 2025, 7:15 a.m. | 2 hours, 37 minutes ago

Description : The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘core.php’ file in all versions up to, and including, 3.115.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-29756

Published : June 11, 2025, 8:15 a.m. | 43 minutes ago

Description : SunGrow’s back end users system iSolarCloud https://isolarcloud.com  uses an MQTT service to transport data from the user’s connected devices to the user’s web browser. 
The MQTT server however did not have sufficient restrictions in place to limit the topics that a user could subscribe to. 
While the data that is transmitted through the MQTT server is encrypted and the credentials for the MQTT server are obtained though an API call, the credentials could be used to subscribe to any topic and the encryption key can be used to decrypt all messages received.
An attack with an account on iSolarCloud.com could extract MQTT credentials and the decryption key from the browser and then use an external program to subscribe to the topic ‘#’ and thus recieve all messages from all connected devices.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5991

Published : June 11, 2025, 8:15 a.m. | 43 minutes ago

Description : There is a “Use After Free” vulnerability in Qt’s QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a
POST request and the simultaneous handling of HTTP error responses.

This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-41661

Published : June 11, 2025, 9:15 a.m. | 37 minutes ago

Description : An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection in the Main Web Interface (endpoint event_mail_test).

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-41663

Published : June 11, 2025, 9:15 a.m. | 37 minutes ago

Description : An unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers and gain arbitrary command execution with elevated privileges.

Severity: 8.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-41662

Published : June 11, 2025, 9:15 a.m. | 37 minutes ago

Description : An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection in the Main Web Interface (endpoint tls_iotgen_setting).

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Insyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware

A newly disclosed vulnerability in Insyde H2O UEFI firmware, tracked as CVE-2025-4275, allows attackers to bypass Secure Boot protections by injecting rogue digital certificates into a poorly protecte …
Read more

Published Date:
Jun 11, 2025 (5 hours, 19 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-4275

CVE-2025-3052

CVE-2025-30194

CVE-2023-30847

Ivanti Patches High-Severity Credential Decryption Flaws in Workspace Control

Ivanti has released critical security updates addressing three high-severity vulnerabilities in Ivanti Workspace Control (IWC)—a widely-used tool for centralized desktop and application management in …
Read more

Published Date:
Jun 11, 2025 (5 hours, 17 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-4275

CVE-2025-5353

CVE-2025-22463

CVE-2025-22455