| Added |
CVSS V3.1 |
|
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
|
| Added |
CWE |
|
CWE-89
|
| Added |
CPE Configuration |
|
OR
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*
*cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:* versions up to (excluding) 5.1.6
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:-:*:*:*:*:*:*
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build114:*:*:*:*:*:*
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build126:*:*:*:*:*:*
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build130:*:*:*:*:*:*
*cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build135:*:*:*:*:*:*
|
| Added |
Reference Type |
|
CVE: https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0 Types: Mitigation, Vendor Advisory
|
| Added |
Reference Type |
|
CVE: https://www.fortra.com/security/advisory/fi-2024-008 Types: Vendor Advisory
|
| Added |
Reference Type |
|
CVE: https://www.tenable.com/security/research/tra-2024-25 Types: Exploit, Third Party Advisory
|
| Added |
Reference Type |
|
Fortra: https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0 Types: Mitigation, Vendor Advisory
|
| Added |
Reference Type |
|
Fortra: https://www.fortra.com/security/advisory/fi-2024-008 Types: Vendor Advisory
|
| Added |
Reference Type |
|
Fortra: https://www.tenable.com/security/research/tra-2024-25 Types: Exploit, Third Party Advisory
|