Summary
Detail | |||
---|---|---|---|
Vendor | Vaelsys | First view | 2025-07-28 |
Product | Vaelsys | Last view | 2025-07-28 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:vaelsys:vaelsys:4.1.0:*:*:*:*:*:*:* | 3 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2025-07-28 | CVE-2025-8261 | A vulnerability was found in Vaelsys 4.1.0 and classified as critical. This issue affects some unknown processing of the file /grid/vgrid_server.php of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
7.5 | 2025-07-28 | CVE-2025-8260 | A vulnerability has been found in Vaelsys 4.1.0 and classified as problematic. This vulnerability affects unknown code of the file /grid/vgrid_server.php of the component MD4 Hash Handler. The manipulation of the argument xajaxargs leads to use of weak hash. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
9.8 | 2025-07-28 | CVE-2025-8259 | A vulnerability, which was classified as critical, was found in Vaelsys 4.1.0. This affects the function execute_DataObjectProc of the file /grid/vgrid_server.php. The manipulation of the argument xajaxargs leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
16% (1) | CWE-328 | Reversible One-Way Hash |
16% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
16% (1) | CWE-285 | Improper Access Control (Authorization) |
16% (1) | CWE-266 | Incorrect Privilege Assignment |
16% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
16% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |