Post

2025-06-13 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2025-2745AVEVA - PI Web APIA cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser.CVSS3.1: 6.5 - MEDIUM CVSS4.0: 4.5 - MEDIUM0 1Exploitation: noneAutomatable: noTechnical Impact: partialAVEVA PI Web API Cross-site Scriptinggithub
CVE-2021-25736Kubernetes - KubernetesKube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.CVSS3.1: 5.8 - MEDIUM0 1 2Exploitation: noneAutomatable: noTechnical Impact: partialWindows kube-proxy LoadBalancer contentiongithub
CVE-2022-26461MediaTek, Inc. - MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8791, MT8797In vow, there is a possible undefined behavior due to an API misuse. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032604; Issue ID: ALPS07032604.CNA n/a CVSS3.1: 6.7 - MEDIUM0Exploitation: noneAutomatable: noTechnical Impact: totalundefinedgithub
CVE-2025-35978Fujitsu Client Computing Limited - UpdateNaviFujitsu Client Computing Limited - UpdateNaviInstallServiceImproper restriction of communication channel to intended endpoints issue exists in UpdateNavi V1.4 L10 to L33 and UpdateNaviInstallService Service 1.2.0091 to 1.2.0125. If a local authenticated attacker send malicious data, an arbitrary registry value may be modified or arbitrary code may be executed.CVSS4.0: 6.9 - MEDIUM0 1Exploitation: noneAutomatable: noTechnical Impact: totalundefinedgithub
This post is licensed under CC BY 4.0 by the author.