Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Perkinelmer Perkinelmer processplus |
|
CPEs | cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Perkinelmer Perkinelmer processplus |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: CyberDanube
Published: 2024-07-22T20:51:15.342Z
Updated: 2024-08-01T21:45:38.344Z
Reserved: 2024-07-19T08:59:59.939Z
Link: CVE-2024-6912
Vulnrichment
Updated: 2024-08-01T21:45:38.344Z
NVD
Status : Modified
Published: 2024-07-22T21:15:05.453
Modified: 2024-11-21T09:50:31.730
Link: CVE-2024-6912
Redhat
No data.