Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
Docs
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling connect direct web services 6.3.0.0 vulnerabilities and exploits
(subscribe to this query)
6.3
CVSSv3
CVE-2024-45651
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
Ibm Sterling Connect Direct Web Services 6.1.0.0
Ibm Sterling Connect Direct Web Services 6.2.0.0
Ibm Sterling Connect Direct Web Services 6.3.0.0
Ibm Sterling Connect Direct Web Services
6.3
CVSSv3
CVE-2024-49808
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 could allow an authenticated user to spoof the identity of another user due to improper authorization which could allow the user to bypass access restrictions.
Ibm Sterling Connect Direct Web Services 6.1.0.0
Ibm Sterling Connect Direct Web Services 6.2.0.0
Ibm Sterling Connect Direct Web Services 6.3.0.0
Ibm Sterling Connect Direct Web Services
4.3
CVSSv3
CVE-2024-45653
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system.
Ibm Sterling Connect Direct Web Services 6.0.0.0
Ibm Sterling Connect Direct Web Services 6.1.0.0
Ibm Sterling Connect Direct Web Services 6.2.0.0
Ibm Sterling Connect Direct Web Services 6.3.0.0
Ibm Sterling Connect Direct Web Services
Ibm Sterling Connect Direct Web Services 6.0.0
Ibm Sterling Connect Direct Web Services 6.1.0
Ibm Sterling Connect Direct Web Services 6.2.0
Ibm Sterling Connect Direct Web Services 6.3.0
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
adp application developer platform 应用开发者平台
type confusion
flir
CVE-2025-6268
overflow
dir-825
CVE-2025-6018
CVE-2025-2783
CVE-2025-6292
webassembly
authentication bypass
CVE-2025-4479
CVE-2025-6306
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started