Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2021-35975

Disclosure Date: November 30, 2023 (last updated December 12, 2023)
Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25)
Attacker Value
Unknown

CVE-2022-39838

Disclosure Date: September 05, 2022 (last updated February 24, 2025)
Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames.
Attacker Value
Unknown

CVE-2019-18924

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
Systematic IRIS WebForms 5.4 is vulnerable to directory traversal. By manipulating variables that reference files with ../ (and variations), it is possible to list all the directories and check if a particular file exists.
Attacker Value
Unknown

CVE-2019-18925

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
Systematic IRIS WebForms 5.4 and its functionalities can be accessed and used without any form of authentication.
Attacker Value
Unknown

CVE-2019-18926

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
Systematic IRIS Standards Management (ISM) v2.1 SP1 89 is vulnerable to unauthenticated reflected Cross Site Scripting (XSS). A user input (related to dialog information) is reflected directly in the web page, allowing a malicious user to conduct a Cross Site Scripting attack against users of the application.
Attacker Value
Unknown

CVE-2018-9115

Disclosure Date: April 04, 2018 (last updated November 26, 2024)
Systematic SitaWare 6.4 SP2 does not validate input from other sources sufficiently. e.g., information utilizing the NVG interface. An attacker can freeze the Situational Layer, which means that the Situational Picture is no longer updated. Unfortunately, the user cannot notice until he tries to work with that layer.
0