Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling b2b integrator 6.0.0.1 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2018-1720
IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 147294.
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
Ibm Sterling B2b Integrator 5.2.0.1
Ibm Sterling B2b Integrator 5.2.6.3 6
312
VMScore
CVE-2019-4148
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
356
VMScore
CVE-2019-4222
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to view process definition of a business process without permission. IBM X-Force ID: 159231.
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4258
IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4146
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to obtain sensitive document information under unusual circumstances. IBM X-Force ID: 158401.
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4073
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4074
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4075
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4076
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
312
VMScore
CVE-2019-4077
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »