Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling b2b integrator 5.2 vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2017-1496
IBM Sterling B2B Integrator Standard Edition 5.2.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted sessi...
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling B2b Integrator 5.2.5
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.3
Ibm Sterling B2b Integrator 5.2.6
5.8
CVSSv2
CVE-2016-6020
IBM Sterling B2B Integrator Standard Edition could allow a remote malicious user to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed...
Ibm Sterling B2b Integrator 5.2.6
Ibm Sterling B2b Integrator 5.2.4.2
Ibm Sterling B2b Integrator 5.2.4.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.5
5
CVSSv2
CVE-2014-6199
The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request.
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.4.1
Ibm Sterling B2b Integrator 5.2.4.2
Ibm Sterling B2b Integrator 5.2.5.0
Ibm Sterling B2b Integrator 5.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
5
CVSSv2
CVE-2014-6099
The Change Password feature in IBM Sterling B2B Integrator 5.2.x up to and including 5.2.4 does not have a lockout protection mechanism for invalid login requests, which makes it easier for remote malicious users to obtain admin access via a brute-force approach.
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2
5
CVSSv2
CVE-2016-0210
IBM Sterling B2B Integrator Standard Edition could allow a remote malicious user to obtain sensitive information. By allowing HTTP OPTIONS method, a remote attacker could send a specially-crafted query to a vulnerable server running to cause the server to disclose sensitive infor...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
5.5
CVSSv2
CVE-2015-5019
IBM Sterling Integrator 5.1 prior to 5010004_8 and Sterling B2B Integrator 5.2 prior to 5020500_9 allow remote authenticated users to read or upload files by leveraging a password-change requirement.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling Integrator 5.1
4
CVSSv2
CVE-2013-0475
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
4
CVSSv2
CVE-2013-0479
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
5
CVSSv2
CVE-2013-0481
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to read stack traces by triggering (1) an error or (2) an exception.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
5
CVSSv2
CVE-2013-0558
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote malicious users to obtain sensitive information about application implementation via unspecified vectors.
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
hardcoded
arbitrary code
CVE-2024-2404
CVE-2024-21111
CVE-2024-28627
CVE-2024-4073
information disclosure
CVE-2024-32780
CVE-2024-4040
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »