Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2013-2985 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-2984 |
Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 6.5 MEDIUM |
CVE-2013-2982 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 6.5 MEDIUM |
CVE-2013-0568 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-0567 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-0560 |
Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 6.5 MEDIUM |
CVE-2013-0558 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2013-0539 |
An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote attackers to hijack sessions, and consequently obtain sensitive information, via a brute-force attack. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2013-0481 |
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. Published: July 03, 2013; 9:54:31 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2013-0479 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-0476 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 6.4 MEDIUM |
CVE-2013-0475 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-0468 |
Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2013-0463 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-0456 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2012-5936 |
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2012-5766 |
Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than CVE-2013-0560. Published: July 03, 2013; 9:54:30 AM -0400 |
V3.x:(not available) V2.0: 6.5 MEDIUM |
CVE-2013-2983 |
Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling File Gateway 2.2 and Sterling B2B Integrator allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2013-0468. Published: July 02, 2013; 10:12:50 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2012-5937 |
Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors. Published: April 12, 2013; 3:55:01 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |