2023-06-05 18:00:29 +00:00
{
"id" : "CVE-2023-33524" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-06-05T17:15:08.940" ,
2023-06-09 11:28:17 +00:00
"lastModified" : "2023-06-07T00:15:09.300" ,
"vulnStatus" : "Awaiting Analysis" ,
2023-06-05 18:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-06-05 20:01:50 +00:00
"value" : "Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. If one traverses to the affected URL, one enumerates Contact information on the host which contains usernames, e-mail addresses, and other internal information stored within the web app."
2023-06-05 18:00:29 +00:00
}
] ,
"metrics" : { } ,
"references" : [
2023-06-05 20:01:50 +00:00
{
"url" : "https://cve.report/CVE-2023-33524" ,
"source" : "cve@mitre.org"
} ,
2023-06-05 18:00:29 +00:00
{
"url" : "https://gist.github.com/barrett092/9ed092e4b14b9145f4d046556eb9dab7" ,
"source" : "cve@mitre.org"
2023-06-09 11:28:17 +00:00
} ,
{
"url" : "https://www.advent.com/resources/all-resources/info-kit-tamale-rms-for-asset-owners/" ,
"source" : "cve@mitre.org"
2023-06-05 18:00:29 +00:00
}
]
}