Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling file gateway - vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2013-0567
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
4
CVSSv2
CVE-2013-0568
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
5
CVSSv2
CVE-2012-5936
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
4
CVSSv2
CVE-2013-0479
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
5
CVSSv2
CVE-2013-0558
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote malicious users to obtain sensitive information about application implementation via unspecified vectors.
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
5
CVSSv2
CVE-2014-0912
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote malicious users to obtain sensitive product information via vectors related to an error page. IBM X-Force ID: 92072.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling File Gateway 2.1
4
CVSSv2
CVE-2015-0194
XML External Entity (XXE) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and IBM Sterling File Gateway 2.1 and 2.2 allows remote malicious users to read arbitrary files via a crafted XML data.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
3.5
CVSSv2
CVE-2013-0468
Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
4.3
CVSSv2
CVE-2014-0927
The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling File Gateway 2.1
6.5
CVSSv2
CVE-2013-2982
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »