IBM Sterling B2B Integrator and File Gateway 5.1 and 5.2 allow remote authenticated users to obtain sensitive information
Reporter | Title | Published | Views | Family All 28 |
---|---|---|---|---|
![]() | CVE-2013-2987 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-0475 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-0463 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-0567 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-3020 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-0568 | 3 Jul 201313:54 | – | nvd |
![]() | CVE-2013-2985 | 3 Jul 201313:54 | – | nvd |
![]() | Code injection | 3 Jul 201313:54 | – | prion |
![]() | Code injection | 3 Jul 201313:54 | – | prion |
![]() | Code injection | 3 Jul 201313:54 | – | prion |
Source | Link |
---|---|
www-01 | www.www-01.ibm.com/support/docview.wss |
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/84008 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo