Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sterling b2b integrator vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2019-4148
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
5.4
CVSSv3
CVE-2019-4258
IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a...
Ibm Sterling B2b Integrator 6.0.0.0
Ibm Sterling B2b Integrator 6.0.0.1
5.3
CVSSv3
CVE-2016-0210
IBM Sterling B2B Integrator Standard Edition could allow a remote malicious user to obtain sensitive information. By allowing HTTP OPTIONS method, a remote attacker could send a specially-crafted query to a vulnerable server running to cause the server to disclose sensitive infor...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
NA
CVE-2013-0494
IBM Sterling B2B Integrator 5.0 and 5.1 allows remote malicious users to cause a denial of service (memory and CPU consumption) via a crafted HTTP (1) Range or (2) Request-Range header.
Ibm Sterling B2b Integrator 5.0
Ibm Sterling B2b Integrator 5.1
8.1
CVSSv3
CVE-2014-0927
The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling File Gateway 2.1
NA
CVE-2012-5936
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
NA
CVE-2012-5766
Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerabilit...
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
NA
CVE-2013-2982
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
NA
CVE-2013-0539
An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote malicious users to hijack sessions, and consequently obtain sensitive information, via a brute-forc...
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
NA
CVE-2013-2984
Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »