Vulnerabilities (CVE)

Filtered by CWE-548
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-32511 1 Qsan 1 Storage Manager 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
QSAN Storage Manager through directory listing vulnerability in ViewBroserList allows remote authenticated attackers to list arbitrary directories via the file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
CVE-2021-32510 1 Qsan 1 Storage Manager 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
QSAN Storage Manager through directory listing vulnerability in antivirus function allows remote authenticated attackers to list arbitrary directories by injecting file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
CVE-2021-27505 1 Myscada 1 Mypro 2024-11-21 5.0 MEDIUM 7.5 HIGH
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information.
CVE-2024-8711 1 Oretnom23 1 Food Ordering Management System 2024-09-13 5.0 MEDIUM 7.5 HIGH
A vulnerability, which was classified as problematic, has been found in SourceCodester Food Ordering Management System 1.0. Affected by this issue is some unknown functionality of the file /includes/. The manipulation leads to exposure of information through directory listing. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-45096 1 Ibm 1 Aspera Faspex 2024-09-06 N/A 6.5 MEDIUM
IBM Aspera Faspex 5.0.0 through 5.0.9 could allow a user with access to the package to obtain sensitive information through a directory listing.
CVE-2024-7912 1 Online Railway Reservation System Project 1 Online Railway Reservation System 2024-08-19 5.0 MEDIUM 5.3 MEDIUM
A vulnerability was found in CodeAstro Online Railway Reservation System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/assets/. The manipulation leads to exposure of information through directory listing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.