minor-update
parent
ae73f68881
commit
a02e68206a
|
@ -1,4 +1,5 @@
|
||||||
id: CVE-2024-6911
|
id: CVE-2024-6911
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: PerkinElmer ProcessPlus <= 1.11.6507.0 - Local File Inclusion
|
name: PerkinElmer ProcessPlus <= 1.11.6507.0 - Local File Inclusion
|
||||||
author: s4e-io
|
author: s4e-io
|
||||||
|
@ -9,20 +10,21 @@ info:
|
||||||
- http://seclists.org/fulldisclosure/2024/Jul/13
|
- http://seclists.org/fulldisclosure/2024/Jul/13
|
||||||
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/
|
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-6911
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-6911
|
||||||
|
- https://github.com/adminlove520/pocWiki
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
|
cvss-metrics: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
|
||||||
cvss-score: 8.7
|
cvss-score: 8.7
|
||||||
cve-id: CVE-2024-6911
|
cve-id: CVE-2024-6911
|
||||||
cwe-id: CWE-552
|
cwe-id: CWE-552
|
||||||
epss-score: 0.00043
|
epss-score: 0.00043
|
||||||
epss-percentile: 0.09526
|
epss-percentile: 0.09524
|
||||||
cpe: cpe:2.3:a:perkinelmer:processplus:1.11.6507:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:perkinelmer:processplus:1.11.6507:*:*:*:*:*:*:*
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 1
|
||||||
vendor: perkinelmer
|
vendor: perkinelmer
|
||||||
product: processplus
|
product: processplus
|
||||||
fofa-query: '"Process Plus" && icon_hash="1772087922"'
|
fofa-query: '"Process Plus" && icon_hash="1772087922"'
|
||||||
tags: cve,cve2024,processplus,intrusive,lfi
|
tags: cve,cve2024,processplus,intrusive,lfi,seclists
|
||||||
|
|
||||||
flow: http(1) && http(2)
|
flow: http(1) && http(2)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue