Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Perkin Elmer
Perkin Elmer process Plus |
|
CPEs | cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:* | |
Vendors & Products |
Perkin Elmer
Perkin Elmer process Plus |
|
Metrics |
ssvc
|
Wed, 11 Sep 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Perkinelmer Perkinelmer processplus |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Perkinelmer Perkinelmer processplus |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: CyberDanube
Published:
Updated: 2025-02-13T17:58:02.105Z
Reserved: 2024-07-19T09:00:05.218Z
Link: CVE-2024-6913

Updated: 2024-08-01T21:45:38.350Z

Status : Modified
Published: 2024-07-22T21:15:05.560
Modified: 2024-11-21T09:50:31.873
Link: CVE-2024-6913

No data.