Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling b2b integrator vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2016-6020
IBM Sterling B2B Integrator Standard Edition could allow a remote malicious user to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed...
Ibm Sterling B2b Integrator 5.2.6
Ibm Sterling B2b Integrator 5.2.4.2
Ibm Sterling B2b Integrator 5.2.4.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.5
5.4
CVSSv3
CVE-2017-1496
IBM Sterling B2B Integrator Standard Edition 5.2.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted sessi...
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling B2b Integrator 5.2.5
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.3
Ibm Sterling B2b Integrator 5.2.6
NA
CVE-2014-6199
The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request.
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.4.1
Ibm Sterling B2b Integrator 5.2.4.2
Ibm Sterling B2b Integrator 5.2.5.0
Ibm Sterling B2b Integrator 5.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.2
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
7.5
CVSSv3
CVE-2018-1720
IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 147294.
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
Ibm Sterling B2b Integrator 5.2.0.1
Ibm Sterling B2b Integrator 5.2.6.3 6
NA
CVE-2014-6146
IBM Sterling B2B Integrator 5.2.x up to and including 5.2.4, when the Connect:Direct Server Adapter is configured, does not properly process the logging configuration, which allows local users to obtain sensitive information by reading log files.
Ibm Sterling B2b Integrator 5.2.1
Ibm Sterling B2b Integrator 5.2.4
Ibm Sterling B2b Integrator 5.2.2
5.4
CVSSv3
CVE-2022-22352
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials dis...
Ibm Sterling B2b Integrator
Ibm Sterling B2b Integrator 6.1.2.0
8.8
CVSSv3
CVE-2022-43920
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.1.2.1 could allow an authenticated user to gain privileges in a different group due to an access control vulnerability in the Sftp server adapter. IBM X-Force ID: 241362.
Ibm Sterling B2b Integrator 6.1.2.0
Ibm Sterling B2b Integrator
4.7
CVSSv3
CVE-2018-1800
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 and 6.2.6.1 could allow a local user to obtain highly sensitive information during a short time period when installation is occurring. IBM X-Force ID: 149607.
Ibm Sterling B2b Integrator 6.2.6.1
Ibm Sterling B2b Integrator
6.5
CVSSv3
CVE-2022-22337
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.1.2.1 could disclose sensitive information to an authenticated user. IBM X-Force ID: 219507.
Ibm Sterling B2b Integrator 6.1.2.0
Ibm Sterling B2b Integrator
9.8
CVSSv3
CVE-2022-22338
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.1.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database...
Ibm Sterling B2b Integrator
Ibm Sterling B2b Integrator 6.1.2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »