Files accessible without authentication in Windows system due to local file inclusion in PerkinElmer ProcessPlu
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2024-6911 | 22 Jul 202421:15 | – | nvd |
![]() | CVE-2024-6911 Unauthenticated Local File Inclusion | 22 Jul 202420:44 | – | cvelist |
![]() | CVE-2024-6911 Unauthenticated Local File Inclusion | 22 Jul 202420:44 | – | vulnrichment |
![]() | PerkinElmer ProcessPlus <= 1.11.6507.0 - Local File Inclusion | 22 Aug 202411:53 | – | nuclei |
![]() | Perten Instruments Process Plus Software 1.11.6507.0 LFI / Hardcoded Credentials | 23 Jul 202400:00 | – | packetstorm |
![]() | Generic HTTP Directory Traversal (Web Application URL Parameter) - Active Check | 26 Sep 201700:00 | – | openvas |
[
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "ProcessPlus",
"vendor": "PerkinElmer",
"versions": [
{
"lessThanOrEqual": "1.11.6507.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
cyberdanube | www.cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ |
seclists | www.seclists.org/fulldisclosure/2024/Jul/13 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo