Lucene search

K

Sterling B2b Integrator Security Vulnerabilities

cve
cve

CVE-2012-5936

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http...

6.5AI Score

0.002EPSS

2013-07-03 01:54 PM
18
cve
cve

CVE-2013-0456

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie...

6.2AI Score

0.001EPSS

2013-07-03 01:54 PM
16
cve
cve

CVE-2013-0476

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified...

7AI Score

0.002EPSS

2013-07-03 01:54 PM
19
cve
cve

CVE-2013-0479

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted...

6.2AI Score

0.001EPSS

2013-07-03 01:54 PM
16
cve
cve

CVE-2012-5766

Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than...

8AI Score

0.002EPSS

2013-07-03 01:54 PM
21
cve
cve

CVE-2013-0475

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020,...

5.4AI Score

0.001EPSS

2013-07-03 01:54 PM
21
cve
cve

CVE-2012-5937

Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown...

7.7AI Score

0.006EPSS

2013-04-12 07:55 PM
30
Total number of security vulnerabilities157