Development

CVE ID : CVE-2025-58163

Published : Sept. 3, 2025, 2:15 a.m. | 29 minutes ago

Description : FreeScout is a free help desk and shared inbox built with PHP’s Laravel framework. In versions 1.8.185 and below, the application performs deserialization of data that can allow authenticated attackers with knowledge of the application’s APP_KEY to achieve remote code execution. The vulnerability can be exploited via endpoint: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The vulnerable code performs decryption using Laravel’s built-in encryption functions, which subsequently deserializes the decrypted payload without sanitization. This is fixed in version 1.8.186.

Severity: 8.6 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

A quick overview of all changes and news from the entire Total.js Platform. Read more about our work. Source: Read…

The blog discusses how mid-market Global Capability Centers are scaling faster than ever, but speed without quality is a risk. Inconsistent QA processes, fragmented handoffs, and outdated testing models can erode trust and stall innovation. This blog explores how AI and automation are redefining quality for GCCs and how Txs helps enterprises embed scalable, high-velocity QA practices that deliver measurable impact across regions.
The post Lead With Quality or Fall Behind: Why Mid-Market GCCs Need AI-Driven QA Now first appeared on TestingXperts.

CVE ID : CVE-2025-6507

Published : Sept. 1, 2025, 6:15 a.m. | 20 hours, 8 minutes ago

Description : A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code execution and reading of system files. This issue affects the latest master branch version 3.47.0.99999. The vulnerability arises from the ability to bypass regular expression filters intended to prevent malicious parameter injection in JDBC connections. Attackers can manipulate spaces between parameters to evade detection, allowing for unauthorized file access and code execution. The vulnerability is addressed in version 3.46.0.8.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-54857

Published : Sept. 1, 2025, 6:15 a.m. | 20 hours, 8 minutes ago

Description : Improper neutralization of special elements used in an OS command (‘OS Command Injection’) issue exists in SkyBridge BASIC MB-A130 Ver.1.5.8 and earlier. If exploited, a remote unauthenticated attacker may execute arbitrary OS commands with root privileges.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…