Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sterling_connect_direct_web_services
(Ibm)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-08-31 | CVE-2024-39747 | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality. | Sterling_connect_direct_web_services | 9.8 | ||
2024-08-22 | CVE-2024-39744 | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | Sterling_connect_direct_web_services | 4.3 | ||
2024-08-22 | CVE-2024-39745 | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | Sterling_connect_direct_web_services | 7.5 | ||
2024-08-22 | CVE-2024-39746 | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. | Sterling_connect_direct_web_services | 5.9 |