Latest ibm sterling file gateway Vulnerabilities

IBM Sterling File Gateway could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further a...
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.5
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.4
IBM Sterling File Gateway<=6.1.1.0 - 6.1.1.1
IBM Sterling File Gateway>=6.0.0.0<6.0.3.6
IBM Sterling File Gateway>=6.1.0.0<6.1.0.5
IBM Sterling File Gateway>=6.1.1.0<6.1.1.2
and 5 more
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.5
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.4
IBM Sterling File Gateway<=6.1.1.0 - 6.1.1.1
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway could allow a remote attacker to upload arbitrary files, caused by improper access controls.
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_4
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.2
IBM Sterling B2B Integrator>=2.2.0.0<=5.2.6.5_4
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling File Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially l...
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_4
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.2
IBM Sterling B2B Integrator>=2.2.0.0<=5.2.6.5_4
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling File Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially l...
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway>=2.2.0.0<=5.2.6.5_3
IBM Sterling File Gateway>=6.0.0.0<=6.0.0.6
IBM Sterling File Gateway>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling File Gateway could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further a...
IBM Sterling File Gateway<=6.0.1.0 - 6.1.0.2
IBM Sterling File Gateway>=6.0.1.0<=6.1.0.2
IBM AIX
Linux Linux kernel
Microsoft Windows
IBM Sterling File Gateway could allow a remote authenticated user to cause a denial of another user's service due to insufficient permission checking.
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling B2B Integrator>=2.2.0.0<=5.2.6.5_3
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.0.6
IBM Sterling B2B Integrator>=6.0.1.0<=6.0.3.4
and 1 more
IBM Sterling File Gateway could allow an authenticated attacker to enumerate usernames due to there being an observable discrepancy in returned messages.
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling B2B Integrator>=2.2.0.0<=5.2.6.5_3
IBM Sterling B2B Integrator>=6.0.0.0<=6.0.3.4
IBM Sterling B2B Integrator>=6.1.0.0<=6.1.0.1
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_4
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.2
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_4
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.2
IBM Sterling File Gateway<=6.0.1.0 - 6.1.0.2
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.3
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway could allow an authenticated user to obtain sensitive information due to improper permission control.
IBM Sterling File Gateway<=2.2.0.0 - 5.2.6.5_3
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.4
IBM Sterling File Gateway<=6.1.0.0 - 6.1.0.1
IBM Sterling File Gateway>=2.2.0.0<5.2.6.5_4
IBM Sterling File Gateway>=6.0.0.0<6.0.3.5
IBM Sterling File Gateway>=6.1.0.0<6.1.0.2
IBM Sterling File Gateway<=2.2.0.0 - 6.1.0.3
IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended function...
IBM Sterling File Gateway<=2.2.0.0 - 6.1.0.3
IBM Sterling File Gateway>=2.2.0.0<=6.1.0.3
IBM Sterling File Gateway could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further a...
IBM Sterling File Gateway<=2.2.0.0 - 6.1.0.3
IBM Sterling File Gateway>=2.2.0.0<=6.1.0.3
IBM Sterling File Gateway<=2.2.0.0 - 6.1.0.3
IBM Sterling File Gateway 2.2.0.0 through 6.0.3.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended fun...
IBM Sterling File Gateway>=2.2.0.0<=6.0.3.2
HP HP-UX
IBM AIX
IBM i
Linux Linux kernel
Microsoft Windows
and 2 more
IBM Sterling File Gateway<=2.2.0.0 - 6.0.3.2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through 2.2.6.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie valu...
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway>=2.2.0.0<=2.2.6.5
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.2
IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through 6.0.3.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the b...
IBM Sterling File Gateway>=2.2.0.0<=2.2.6.5
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in th...
IBM Sterling File Gateway>=2.2.0.0<=2.2.6.5
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through 6.0.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie valu...
IBM Sterling File Gateway>=2.2.0.0<=2.2.6.5
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.2
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_2
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to em...
IBM Sterling B2B Integrator>=5.2.0.0<=6.0.3.1
IBM Sterling File Gateway>=2.2.0.0<=6.0.3.1
IBM Sterling File Gateway<=2.2.0.0 - 6.0.3.1
IBM Sterling File Gateway<=2.2.0.0 - 6.0.3.1
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.1
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_1
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 could expose sensitive information to a user through a specially crafted HTTP request. IBM X-Force ID: 176606.
IBM Sterling File Gateway>=5.2.0.0<=5.2.6.5_1
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.1
HP HP-UX
IBM AIX
IBM i
Linux Linux kernel
and 4 more
IBM Sterling File Gateway could allow an authenticated user could manipulate cookie information and remove or add modules from the cookie to access functionality not authorized to.
IBM Sterling File Gateway<=6.0.0.0 - 6.0.3.1
IBM Sterling File Gateway<=2.2.0.0 - 2.2.6.5_1
IBM Sterling File Gateway>=2.2.0.0<=2.2.6.5_1
IBM Sterling File Gateway>=6.0.0.0<=6.0.3.1
HP HP-UX
IBM AIX
and 4 more
 IBM Sterling File Gateway could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arb...
IBM Sterling File Gateway>=2.2.0.0<=6.0.1.0
 IBM Sterling B2B Integrator Standard Edition displays sensitive information in HTTP requests which could be used in further attacks against the system.
IBM Sterling File Gateway>=2.2.0.0<=6.0.1.0
IBM Sterling File Gateway>=2.2<=6.0.1.0
IBM Sterling File Gateway 2.2.0 through 2.2.6 could allow a remote authenticated attacker to obtain sensitive information displayed in the URL that could lead to further attacks against the system. IB...
IBM Sterling File Gateway>=2.2.0<=2.2.6
IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code i...
IBM Sterling B2B Integrator>=5.2.0.1<=5.2.6.3
IBM Sterling File Gateway>=2.2.0<=2.2.6
IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) uses weaker than expected cryptographic algorithms that could allow a local attacker to decrypt highly sens...
IBM Sterling File Gateway>=2.2.0<=2.2.6
IBM Sterling File Gateway 2.2.0 through 2.2.6 could allow a remote attacker to download certain files that could contain sensitive information. IBM X-Force ID: 138434.
IBM Sterling File Gateway>=2.2.0<=2.2.6
IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) caches usernames and passwords in browsers that could be used by a local attacker to obtain sensitive infor...
IBM Sterling File Gateway>=2.2.0<=2.2.6
The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to bypass authentication by leveraging knowledge of the port ...
IBM Sterling B2B Integrator=5.1
IBM Sterling B2B Integrator=5.2
IBM Sterling File Gateway=2.1
IBM Sterling File Gateway=2.2
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive product information via vectors related to an error page. IBM X-Force ID: 92072...
IBM Sterling B2B Integrator=5.1
IBM Sterling B2B Integrator=5.2
IBM Sterling File Gateway=2.1
IBM Sterling File Gateway=2.2

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203