Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sterling_b2b_integrator
(Ibm)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 153 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-07-03 | CVE-2013-3020 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-2987 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-2985 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-2984 | Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-02 | CVE-2013-2983 | Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling File Gateway 2.2 and Sterling B2B Integrator allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2013-0468. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-2982 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0568 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0567 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0560 | Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0558 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. | Sterling_b2b_integrator, Sterling_file_gateway | N/A |