
CVE-2013-5413
https://notcve.org/view.php?id=CVE-2013-5413
21 Dec 2013 — IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation. IBM Sterling B2B Integrator 5.2 y Sterling File Gateway 2.2 no invalidan la sesión en una acción de logout, lo cual permite a atacantes remotos sortear la autenticación aprovechando una estación desatendida. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC96051 • CWE-287: Improper Authentication •

CVE-2013-5411
https://notcve.org/view.php?id=CVE-2013-5411
21 Dec 2013 — IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote attackers to inject links and trigger unintended navigation or actions via unspecified vectors. IBM Sterling B2B Integrator 5.2 y Sterling File Gateway 2.2 permite a atacantes remotos inyectar enlaces y disparar navegación o acciones no contempladas a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC96059 • CWE-20: Improper Input Validation •

CVE-2013-4002 – OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
https://notcve.org/view.php?id=CVE-2013-4002
23 Jul 2013 — XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute... • https://github.com/tafamace/CVE-2013-4002 • CWE-20: Improper Input Validation •

CVE-2013-2985
https://notcve.org/view.php?id=CVE-2013-2985
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente la obtención de información sensible sobre la implementación de la ap... • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-0475
https://notcve.org/view.php?id=CVE-2013-0475
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 permite a usuarios remotos autenticados obtener información confidencial sobre la implementación de aplicacion... • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-0567
https://notcve.org/view.php?id=CVE-2013-0567
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente la obtención de información sensible sobre la implementación de la ap... • http://www-01.ibm.com/support/docview.wss?uid=swg1IC91151 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-2984
https://notcve.org/view.php?id=CVE-2013-2984
03 Jul 2013 — Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. Vulnerabilidad de salto de directorio en IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente leer o modificar archivos a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC91046 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2012-5766
https://notcve.org/view.php?id=CVE-2012-5766
03 Jul 2013 — Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than CVE-2013-0560. Múltiples vulnerabilidades de inyección SQL en IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 que permite a usuarios autenticados de forma remota ejecutar código SQL a través de vec... • http://www-01.ibm.com/support/docview.wss?uid=swg1IC84082 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2013-0481
https://notcve.org/view.php?id=CVE-2013-0481
03 Jul 2013 — The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. La consola en IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 permite a atacantes remotos leer trazas de la pila mediante la activación de (1) un error o (2) una excepción. • http://www-01.ibm.com/support/docview.wss?uid=swg21627986 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-0558
https://notcve.org/view.php?id=CVE-2013-0558
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a atacantes remotos obtener información sensible acerca de la implementación de la aplicación a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC90483 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •