Latest ibm sterling b2b integrator Vulnerabilities

IBM Sterling B2B Integrator information disclosure
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.3
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.8
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.2.3
IBM Sterling B2B Integrator denial of service
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.3
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.8
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.2.3
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.3
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.3
IBM Sterling B2B Integrator information disclosure
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.9
IBM Sterling B2B Integrator>=6.1.0.0<6.1.2.3
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator cross-site request forgery
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.8
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.9
IBM Sterling B2B Integrator>=6.1.0.0<6.1.2.3
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against...
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.8
IBM Sterling B2B Integrator>=6.1.0.0<6.1.2.2
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.1
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended function...
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.2.0
IBM AIX
Linux Linux kernel
and 1 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended function...
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.2.0
IBM AIX
Linux Linux kernel
and 1 more
IBM Sterling B2B Integrator Standard Edition could allow an authenticated user to perform unauthorized actions due to improper access controls.
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.2.0
IBM AIX
Linux Linux kernel
and 1 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.7
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.2.0
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition could allow an authenticated user to perform actions they should not have access to due to improper permission controls.
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.1.1
IBM Sterling B2B Integrator=6.1.2.0
IBM AIX
Linux Linux kernel
Microsoft Windows
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.2, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.0.5
IBM Sterling B2B Integrator>=6.1.1.0<=6.1.1.2
IBM Sterling B2B Integrator=6.1.2.0
IBM AIX
Linux Linux kernel
and 3 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.2, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the syst...
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.0.5
IBM Sterling B2B Integrator>=6.1.1.0<=6.1.1.1
IBM Sterling B2B Integrator=6.1.2.0
IBM AIX
Linux Linux kernel
and 3 more
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 could allow an authenticated user to gain privileges in a different group due to an access control vulnerability in the Sftp server...
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.6
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.3
IBM Sterling B2B Integrator=6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.2, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 could disclose sensitive information to an authenticated user. IBM X-Force ID: 219507.
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.6
IBM Sterling B2B Integrator>=6.1.1.0<6.1.2.1
IBM Sterling B2B Integrator=6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.2, 6.1.2.0
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.6
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
IBM Sterling B2B Integrator=6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.2, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive info...
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.6
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
IBM Sterling B2B Integrator=6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to vi...
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.7
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.6
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
IBM Sterling B2B Integrator=6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.6
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.5, 6..1.1.0 - 6.1.1.1, 6.1.2.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator Standard Edition could allow an authenticated user to obtain sensitive information due to improper permission controls.
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.5
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
and 5 more
IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended function...
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.5
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
and 5 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator Standard Edition is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delet...
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<6.1.0.5
IBM Sterling B2B Integrator>=6.1.1.0<6.1.1.2
and 5 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.4
IBM Sterling B2B Integrator<=6.1.1.0 - 6.1.1.1
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could disclose sensitive version information that could aid in future attacks against the system. IBM X...
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.5
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.1.0
IBM AIX
Linux Linux kernel
Microsoft Windows
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
and 1 more
IBM Sterling B2B Integrator<=5.2.0.0 - 5.2.6.5_4
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.3
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow an authenticated user to upload files that could fill up the filesystem and cause a denial ...
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.5
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.1.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.0
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.1.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message i...
IBM Sterling B2B Integrator>=6.0.0.0<6.0.3.6
IBM Sterling B2B Integrator>=6.1.0.0<6.1.1.1
IBM AIX
Linux Linux kernel
Microsoft Windows
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
and 1 more
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.3.5
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.3, 6.1.1.0
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute maliciou...
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.5
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.0.3
IBM Sterling B2B Integrator=6.1.1.0
IBM AIX
Linux Linux kernel
Microsoft Windows
and 2 more
IBM Sterling B2B Integrator Standard Edition could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system.
IBM Sterling B2B Integrator<=5.2.0.0 - 5.2.6.5_4
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.2
IBM Sterling B2B Integrator>=5.2.0.0<=5.2.6.5_4
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling File Gateway could allow a remote attacker to upload arbitrary files, caused by improper access controls.
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_4
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.2
IBM Sterling B2B Integrator>=2.2.0.0<=5.2.6.5_4
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling B2B Integrator is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality pote...
IBM Sterling B2B Integrator<=5.2.0.0 - 5.2.6.5_4
IBM Sterling B2B Integrator<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling B2B Integrator<=6.1.0.0 - 6.1.0.3
IBM Sterling B2B Integrator>=5.2.0.0<=5.2.6.5_4
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203