Vulnerabilities > IBM > Sterling B2B Integrator
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-01-01 | CVE-2015-7410 | Code vulnerability in IBM Sterling B2B Integrator 5.2 The Health Check tool in IBM Sterling B2B Integrator 5.2 does not properly use cookies in conjunction with HTTPS sessions, which allows man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors. | 5.8 |
2015-11-08 | CVE-2015-5019 | Permissions, Privileges, and Access Controls vulnerability in IBM Sterling B2B Integrator and Sterling Integrator IBM Sterling Integrator 5.1 before 5010004_8 and Sterling B2B Integrator 5.2 before 5020500_9 allow remote authenticated users to read or upload files by leveraging a password-change requirement. | 5.5 |
2015-10-06 | CVE-2015-4992 | Improper Input Validation vulnerability in IBM Sterling B2B Integrator 5.2 IBM Sterling B2B Integrator 5.2 before 5020500_8 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors. | 3.5 |
2015-01-10 | CVE-2014-6199 | Resource Management Errors vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote attackers to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request. | 5.0 |
2014-11-08 | CVE-2014-6146 | Information Exposure vulnerability in IBM Sterling B2B Integrator 5.2.1/5.2.2/5.2.4 IBM Sterling B2B Integrator 5.2.x through 5.2.4, when the Connect:Direct Server Adapter is configured, does not properly process the logging configuration, which allows local users to obtain sensitive information by reading log files. | 1.9 |
2014-10-26 | CVE-2014-6099 | Credentials Management vulnerability in IBM Sterling B2B Integrator 5.2/5.2.4 The Change Password feature in IBM Sterling B2B Integrator 5.2.x through 5.2.4 does not have a lockout protection mechanism for invalid login requests, which makes it easier for remote attackers to obtain admin access via a brute-force approach. | 5.0 |
2013-12-21 | CVE-2013-5413 | Improper Authentication vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation. | 4.3 |
2013-12-21 | CVE-2013-5411 | Improper Input Validation vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote attackers to inject links and trigger unintended navigation or actions via unspecified vectors. | 4.3 |
2013-12-21 | CVE-2013-5409 | SQL Injection vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | 6.5 |
2013-12-21 | CVE-2013-5407 | Improper Input Validation vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not properly restrict use of FRAME elements, which allows remote authenticated users to bypass intended access restrictions or obtain sensitive information via a crafted web site, related to a "frame injection" issue. | 4.9 |