Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

PerkinElmer — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting PerkinElmer. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PerkinElmer develops scientific instruments and software for laboratory testing and industrial applications, primarily serving healthcare and environmental sectors. Historically, their systems have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often in web interfaces and connected devices. The company maintains a moderate CVE count with three active records, suggesting manageable but persistent security challenges. While no major public incidents have been widely reported, the nature of their equipment—often handling sensitive research data—necessitates robust security practices. Their products' integration into critical infrastructure underscores the importance of addressing vulnerabilities promptly to prevent potential exploitation in research and industrial settings.

Top products by PerkinElmer: ProcessPlus
CVE IDTitleCVSSSeverityPublished
CVE-2024-6913 Execution with Unnecessary Privileges — ProcessPlusCWE-250 9.8AICriticalAI2024-07-22
CVE-2024-6912 Hardcoded MSSQL Credentials — ProcessPlusCWE-798 9.8AICriticalAI2024-07-22
CVE-2024-6911 Unauthenticated Local File Inclusion — ProcessPlusCWE-552 7.5AIHighAI2024-07-22

This page lists every published CVE security advisory associated with PerkinElmer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.