Browse all 3 CVE security advisories affecting PerkinElmer. AI-powered Chinese analysis, POCs, and references for each vulnerability.
PerkinElmer develops scientific instruments and software for laboratory testing and industrial applications, primarily serving healthcare and environmental sectors. Historically, their systems have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often in web interfaces and connected devices. The company maintains a moderate CVE count with three active records, suggesting manageable but persistent security challenges. While no major public incidents have been widely reported, the nature of their equipment—often handling sensitive research data—necessitates robust security practices. Their products' integration into critical infrastructure underscores the importance of addressing vulnerabilities promptly to prevent potential exploitation in research and industrial settings.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-6913 | Execution with Unnecessary Privileges — ProcessPlusCWE-250 | 9.8AI | CriticalAI | 2024-07-22 |
| CVE-2024-6912 | Hardcoded MSSQL Credentials — ProcessPlusCWE-798 | 9.8AI | CriticalAI | 2024-07-22 |
| CVE-2024-6911 | Unauthenticated Local File Inclusion — ProcessPlusCWE-552 | 7.5AI | HighAI | 2024-07-22 |
This page lists every published CVE security advisory associated with PerkinElmer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.