Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling b2b integrator vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2012-5937
Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 up to and including 2.2 and other products, allows remote malicious users to execute arbit...
Ibm Sterling File Gateway 2.0
Ibm Gentran Integration Suite 4.3
Ibm Sterling Integrator 5.1
Ibm Sterling Integrator 5.0
Ibm Sterling File Gateway 1.1
Ibm Sterling B2b Integrator 5.2
Ibm Sterling File Gateway 2.1
Ibm Sterling File Gateway 2.2
9
CVSSv2
CVE-2019-4728
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 up to and including 5.2.6.5_2, 6.0.0.0 up to and including 6.0.3.2, and 6.1.0.0 could allow a remote malicious user to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially ...
Ibm Sterling B2b Integrator
Ibm Sterling B2b Integrator 6.1.0.0
7.5
CVSSv2
CVE-2021-29798
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database...
Ibm Sterling B2b Integrator
7.5
CVSSv2
CVE-2021-29903
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 up to and including 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database...
Ibm Sterling B2b Integrator
6.8
CVSSv2
CVE-2020-4668
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.0.3.5, 6.1.0.0 up to and including 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an malicious user to execute malicious and unauthorized actions transmitted from a user...
Ibm Sterling B2b Integrator
Ibm Sterling B2b Integrator 6.1.1.0
6.8
CVSSv2
CVE-2021-29837
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 up to and including 6.1.1.0 is vulnerable to cross-site request forgery which could allow an malicious user to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913.
Ibm Sterling B2b Integrator
6.5
CVSSv2
CVE-2020-4762
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 up to and including 5.2.6.5_2, 6.0.0.0 up to and including 6.0.3.2, and 6.1.0.0 could allow an authenticated user to create a privileged account due to improper access controls. IBM X-Force ID: 188896.
Ibm Sterling B2b Integrator
Ibm Sterling B2b Integrator 6.1.0.0
6.5
CVSSv2
CVE-2020-4655
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.0.3.2 and 5.2.0.0 up to and including 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the malicious user to view, add, modify or del...
Ibm Sterling B2b Integrator
6.5
CVSSv2
CVE-2020-4700
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 up to and including 6.0.3.2 and 5.2.0.0 up to and including 5.2.6.5 could allow an authenticated user belonging to a specific user group to create a user or group with administrative privileges. IBM X-Force ID: 187077.
Ibm Sterling B2b Integrator
6.5
CVSSv2
CVE-2019-4680
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 up to and including 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database...
Ibm Sterling B2b Integrator
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »