Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4564 | An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system. |
Solution
Elseta recommends affected users update to version 3.2.3.19 or later. Contact Elseta for more information. https://elseta.com/support/
Workaround
No workaround given by the vendor.
Thu, 20 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Feb 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system. | |
| Title | Elseta Vinci Protocol Analyzer OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-20T20:52:00.934Z
Reserved: 2025-02-12T21:47:00.118Z
Link: CVE-2025-1265
Updated: 2025-02-20T20:51:54.965Z
Status : Received
Published: 2025-02-20T20:15:46.537
Modified: 2025-02-20T20:15:46.537
Link: CVE-2025-1265
No data.
OpenCVE Enrichment
No data.
EUVD