A vulnerability was found in xpeedstudio Wp Social Login and Register Social Counter Plugin up to 3.1.0 on WordPress. It has been rated as problematic. This issue affects the function counter_access_key_setup of the component Setting Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-1506. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Tenda RX3 16.03.13.11_multi_TDE01. Affected by this vulnerability is an unknown functionality of the file /goform/SetPptpServerCfg of the component Packet Handler. The manipulation of the argument startIp/endIp leads to denial of service.
This vulnerability is known as CVE-2025-29357. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in transformeroptimus superagi up to 0.0.14. Affected is an unknown function of the file /api/users/get/{id} of the component API Endpoint. The manipulation leads to insufficiently protected credentials.
This vulnerability is traded as CVE-2024-9418. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in binary-husky gpt_academic up to 3.9.0. This affects an unknown part of the file debug_log.html of the component Latex Proof-Reading Module. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-0183. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Vaelsys 4.1.0 and classified as critical. This issue affects some unknown processing of the file /grid/vgrid_server.php of the component User Creation Handler. The manipulation leads to improper authorization.
The identification of this vulnerability is CVE-2025-8261. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in JetBrains TeamCity and classified as problematic. Affected by this issue is some unknown functionality of the component GitHub App Connection Flow. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-54528. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Vaelsys 4.1.0 and classified as problematic. This vulnerability affects unknown code of the file /grid/vgrid_server.php of the component MD4 Hash Handler. The manipulation of the argument xajaxargs leads to use of weak hash.
This vulnerability was named CVE-2025-8260. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/SetFirewallCfg of the component Packet Handler. The manipulation of the argument firewallEn leads to denial of service.
This vulnerability is handled as CVE-2025-29358. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01. It has been classified as problematic. This affects an unknown part of the file /goform/saveParentControlInfo of the component Packet Handler. The manipulation of the argument deviceId leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-29359. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/SetSysTimeCfg of the component Packet Handler. The manipulation of the argument timeZone leads to denial of service.
This vulnerability was named CVE-2025-29360. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in URI Gem up to 0.11.2/0.12.3/0.13.1/1.0.2 on Ruby. It has been rated as problematic. Affected by this issue is the function URI.join/URI#merge/URI#+. The manipulation leads to improper removal of sensitive information before storage or transfer.
This vulnerability is handled as CVE-2025-27221. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.