Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remotely on all installation
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2024-6912 | 22 Jul 202421:15 | – | cve |
![]() | CVE-2024-6912 Hardcoded MSSQL Credentials | 22 Jul 202420:51 | – | cvelist |
![]() | CVE-2024-6912 Hardcoded MSSQL Credentials | 22 Jul 202420:51 | – | vulnrichment |
![]() | Perten Instruments Process Plus Software 1.11.6507.0 LFI / Hardcoded Credentials | 23 Jul 202400:00 | – | packetstorm |
![]() | Microsoft SQL (MSSQL) Server Brute Force Logins With Default Credentials (TCP/IP Listener) | 3 Nov 200500:00 | – | openvas |
Source | Link |
---|---|
seclists | www.seclists.org/fulldisclosure/2024/Jul/13 |
cyberdanube | www.cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo