Use of hard-coded MSSQL credentials in PerkinElmer...
Critical severity
Unreviewed
Published
Jul 22, 2024
to the GitHub Advisory Database
•
Updated Sep 11, 2024
Description
Published by the National Vulnerability Database
Jul 22, 2024
Published to the GitHub Advisory Database
Jul 22, 2024
Last updated
Sep 11, 2024
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
References