Логотип exploitDog
bind:CVE-2023-33524
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-33524

Количество 2

Количество 2

nvd логотип

CVE-2023-33524

больше 2 лет назад

Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. If one traverses to the affected URL, one enumerates Contact information on the host which contains usernames, e-mail addresses, and other internal information stored within the web app.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-vv78-mf5r-v5q7

больше 2 лет назад

Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. The configuration backup file, which contains username hashes, cleartext passwords, and API keys, can be downloaded. This could allow a malicious actor to crack the passwords offline and/or utilize the API keys to control the remote application.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-33524

Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. If one traverses to the affected URL, one enumerates Contact information on the host which contains usernames, e-mail addresses, and other internal information stored within the web app.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-vv78-mf5r-v5q7

Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. The configuration backup file, which contains username hashes, cleartext passwords, and API keys, can be downloaded. This could allow a malicious actor to crack the passwords offline and/or utilize the API keys to control the remote application.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу