Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Very High

CVE-2023-0669

Disclosure Date: February 06, 2023 (last updated June 29, 2024)
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
Attacker Value
Very High

CVE-2024-0204

Disclosure Date: January 22, 2024 (last updated January 30, 2024)
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Attacker Value
Unknown

CVE-2024-11923

Disclosure Date: January 18, 2025 (last updated January 18, 2025)
Under certain log settings the IAM or CORE service will log credentials in the iam logfile in Fortra Application Hub (Formerly named Helpsystems One) prior to version 1.3
0
Attacker Value
Unknown

CVE-2024-9945

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
An information-disclosure vulnerability exists in Fortra's GoAnywhere MFT application prior to version 7.7.0 that allows external access to the resources in certain admin root folders.
0
Attacker Value
Unknown

CVE-2024-3334

Disclosure Date: November 15, 2024 (last updated November 16, 2024)
A security bypass vulnerability exists in the Removable Media Encryption (RME)component of Digital Guardian Windows Agents prior to version 8.2.0. This allows a user to circumvent encryption controls by modifying metadata on the USB device thereby compromising the confidentiality of the stored data.
0
Attacker Value
Unknown

CVE-2024-8264

Disclosure Date: October 09, 2024 (last updated October 18, 2024)
Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled.
Attacker Value
Unknown

CVE-2024-6633

Disclosure Date: August 27, 2024 (last updated August 31, 2024)
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
Attacker Value
Unknown

CVE-2024-6632

Disclosure Date: August 27, 2024 (last updated August 31, 2024)
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.
Attacker Value
Unknown

CVE-2024-25157

Disclosure Date: August 14, 2024 (last updated August 20, 2024)
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.
Attacker Value
Unknown

CVE-2024-5276

Disclosure Date: June 25, 2024 (last updated June 26, 2024)
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
0