Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sterling_file_gateway
(Ibm)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 64 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-07-03 | CVE-2013-0560 | Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0558 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0539 | An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote attackers to hijack sessions, and consequently obtain sensitive information, via a brute-force attack. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0481 | The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0479 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0476 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0475 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0468 | Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0463 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | Sterling_b2b_integrator, Sterling_file_gateway | N/A | ||
2013-07-03 | CVE-2013-0456 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path. | Sterling_b2b_integrator, Sterling_file_gateway | N/A |