Products
PerkinElmer ProcessPlus
- through 1.11.6507.0
Source
office@cyberdanube.com
Tags
CVE-2024-6912 details
Published : July 22, 2024, 9:15 p.m.
Last Modified : July 22, 2024, 9:15 p.m.
Last Modified : July 22, 2024, 9:15 p.m.
Description
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-798 | Use of Hard-coded Credentials | The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. |
References
URL | Source |
---|---|
https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ | office@cyberdanube.com |
This website uses the NVD API, but is not approved or certified by it.