Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sterling b2b integrator vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2013-0456
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
6.4
CVSSv2
CVE-2013-0476
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote malicious users to inject arbitrary FTP commands via unspecified vectors.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
4
CVSSv2
CVE-2013-0479
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename.
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.2
5
CVSSv2
CVE-2013-0481
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote malicious users to read stack traces by triggering (1) an error or (2) an exception.
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
6.5
CVSSv2
CVE-2013-0560
Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
4
CVSSv2
CVE-2013-0568
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE...
Ibm Sterling B2b Integrator 5.2
Ibm Sterling B2b Integrator 5.1
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
5.5
CVSSv2
CVE-2015-5019
IBM Sterling Integrator 5.1 prior to 5010004_8 and Sterling B2B Integrator 5.2 prior to 5020500_9 allow remote authenticated users to read or upload files by leveraging a password-change requirement.
Ibm Sterling B2b Integrator 5.2
Ibm Sterling Integrator 5.1
NA
CVE-2023-22876
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.0.3.7 and 6.1.0.0 up to and including 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 244364.
Ibm Sterling B2b Integrator
NA
CVE-2023-42016
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.0.3.8 and 6.1.0.0 up to and including 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a use...
Ibm Sterling B2b Integrator
NA
CVE-2023-32341
IBM Sterling B2B Integrator 6.0.0.0 up to and including 6.0.3.8 and 6.1.0.0 up to and including 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827.
Ibm Sterling B2b Integrator
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »