CVE-2024-6632
- EPSS 0.59%
- Veröffentlicht 27.08.2024 15:15:17
- Zuletzt bearbeitet 30.08.2024 14:07:18
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.
CVE-2024-6633
- EPSS 1.44%
- Veröffentlicht 27.08.2024 15:15:17
- Zuletzt bearbeitet 29.08.2025 21:15:35
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the softw...
CVE-2024-5276
- EPSS 85.36%
- Veröffentlicht 25.06.2024 20:15:14
- Zuletzt bearbeitet 04.04.2025 23:59:36
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration ...
CVE-2024-5275
- EPSS 0.05%
- Veröffentlicht 18.06.2024 15:15:52
- Zuletzt bearbeitet 21.11.2024 09:47:19
A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in...
CVE-2024-25153
- EPSS 82.11%
- Veröffentlicht 13.03.2024 15:15:50
- Zuletzt bearbeitet 19.09.2025 13:15:42
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploade...