cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-5275,https://securityvulnerability.io/vulnerability/CVE-2024-5275,Hard-coded Password Vulnerability in FileCatalyst TransferAgent Could Lead to MiTM Attacks,"The vulnerability arises from a hard-coded password embedded in the FileCatalyst TransferAgent, which provides a potential pathway for unauthorized users to access sensitive keystore contents, such as private keys for certificates. This flaw permits attackers to exploit the agent, enabling man-in-the-middle (MiTM) attack scenarios that could compromise the confidentiality and integrity of data being transferred. All versions of FileCatalyst Direct prior to 3.8.10 Build 138 and FileCatalyst Workflow prior to 5.1.6 Build 130 are affected, necessitating immediate mitigation actions by users to secure their environments.",Fortra,"Filecatalyst Direct,Filecatalyst Workflow",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-18T14:11:37.005Z,0