{"uuid": "6727b6aa-0b1b-441d-afc9-5857e188ed47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6633", "type": "seen", "source": "https://t.me/KomunitiSiber/2478", "content": "Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability\nhttps://thehackernews.com/2024/08/fortra-issues-patch-for-high-risk.html\n\nFortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access.\nThe vulnerability, tracked as CVE-2024-6633, carries a CVSS score of 9.8, and stems from the use of a static password to connect to a HSQL database.\n\"The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are", "creation_timestamp": "2024-08-28T19:27:49.000000Z"}