28 lines
933 B
JSON
Raw Normal View History

{
"id": "CVE-2023-33524",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T17:15:08.940",
"lastModified": "2023-06-07T00:15:09.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. If one traverses to the affected URL, one enumerates Contact information on the host which contains usernames, e-mail addresses, and other internal information stored within the web app."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.report/CVE-2023-33524",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/barrett092/9ed092e4b14b9145f4d046556eb9dab7",
"source": "cve@mitre.org"
},
{
"url": "https://www.advent.com/resources/all-resources/info-kit-tamale-rms-for-asset-owners/",
"source": "cve@mitre.org"
}
]
}