Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling b2b integrator 5.2 vulnerabilities and exploits
(subscribe to this query)
356
VMScore
CVE-2013-0456
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
356
VMScore
CVE-2013-0463
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
312
VMScore
CVE-2013-0468
Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
356
VMScore
CVE-2013-0475
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
570
VMScore
CVE-2013-0476
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote malicious users to inject arbitrary FTP commands via unspecified vectors.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
445
VMScore
CVE-2013-0481
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to read stack traces by triggering (1) an error or (2) an exception.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
356
VMScore
CVE-2013-2985
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
356
VMScore
CVE-2013-3020
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
312
VMScore
CVE-2017-1482
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session...
Ibm Sterling B2b Integrator 5.2
312
VMScore
CVE-2015-4992
IBM Sterling B2B Integrator 5.2 prior to 5020500_8 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors.
Ibm Sterling B2b Integrator 5.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »