Development

The blog discusses how AI is upscaling quality assurance through autonomous testing, where systems independently create, run, and maintain test cases. This approach reduces manual work, boosts accuracy, and adapts to changes in real-time.
The post Role of AI-driven Autonomous Testing in Software QA first appeared on TestingXperts.

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk

Summary:
Trend Micro Research discovered a pattern of exposed NVIDIA Riva API endpoints across multiple organizations deploying Riva in cloud environments. These exposed instances were found operating …
Read more

Published Date:
Apr 28, 2025 (12 hours, 31 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-23243

CVE-2025-23242

CVE ID : CVE-2025-22235

Published : April 28, 2025, 8:15 a.m. | 4 hours, 14 minutes ago

Description : EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.

Your application may be affected by this if all the following conditions are met:

* You use Spring Security
* EndpointRequest.to() has been used in a Spring Security chain configuration
* The endpoint which EndpointRequest references is disabled or not exposed via web
* Your application handles requests to /null and this path needs protection

You are not affected if any of the following is true:

* You don’t use Spring Security
* You don’t use EndpointRequest.to()
* The endpoint which EndpointRequest.to() refers to is enabled and is exposed
* Your application does not handle requests to /null or this path does not need protection

Severity: 7.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-4007

Published : April 28, 2025, 8:15 a.m. | 4 hours, 14 minutes ago

Description : A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-32470

Published : April 28, 2025, 9:15 a.m. | 3 hours, 14 minutes ago

Description : A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.

Severity: 7.5 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-32471

Published : April 28, 2025, 9:15 a.m. | 3 hours, 14 minutes ago

Description : The device’s passwords have not been adequately salted, making them vulnerable to password extraction attacks.

Severity: 3.7 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-42598

Published : April 28, 2025, 9:15 a.m. | 3 hours, 14 minutes ago

Description : Multiple SEIKO EPSON printer drivers for Windows OS are configured with an improper access permission settings when installed or used in a language other than English. If a user is directed to place a crafted DLL file in a location of an attacker’s choosing, the attacker may execute arbitrary code with SYSTEM privilege on a Windows system on which the printer driver is installed.

Severity: 7.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-4011

Published : April 28, 2025, 9:15 a.m. | 3 hours, 14 minutes ago

Description : A vulnerability has been found in Redmine 6.0.0/6.0.1/6.0.2/6.0.3 and classified as problematic. This vulnerability affects unknown code of the component Custom Query Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 6.0.4 is able to address this issue. It is recommended to upgrade the affected component.

Severity: 3.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…