Vulnerabilities > Fortra > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-09 | CVE-2024-8264 | Information Exposure Through Log Files vulnerability in Fortra Robot Schedule Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled. | 5.5 |
2024-08-14 | CVE-2024-25157 | Improper Authentication vulnerability in Fortra Goanywhere Managed File Transfer An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. | 6.5 |
2024-03-14 | CVE-2024-25156 | Path Traversal vulnerability in Fortra Goanywhere Managed File Transfer A path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients. | 6.5 |
2024-03-13 | CVE-2024-25154 | Path Traversal vulnerability in Fortra Filecatalyst Direct Improper URL validation leads to path traversal in FileCatalyst Direct 3.8.8 and earlier allowing an encoded payload to cause the web server to return files located outside of the web root which may lead to data leakage. | 5.3 |
2024-03-13 | CVE-2024-25155 | Cross-site Scripting vulnerability in Fortra Filecatalyst Direct In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. | 6.1 |
2023-11-22 | CVE-2023-6253 | Insecure Storage of Sensitive Information vulnerability in Fortra Digital Guardian Agent A saved encryption key in the Uninstaller in Digital Guardian's Agent before version 7.9.4 allows a local attacker to retrieve the uninstall key and remove the software by extracting the uninstaller key from the memory of the uninstaller file. | 6.0 |