![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5766
https://notcve.org/view.php?id=CVE-2012-5766
03 Jul 2013 — Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than CVE-2013-0560. Múltiples vulnerabilidades de inyección SQL en IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 que permite a usuarios autenticados de forma remota ejecutar código SQL a través de vec... • http://www-01.ibm.com/support/docview.wss?uid=swg1IC84082 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0558
https://notcve.org/view.php?id=CVE-2013-0558
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a atacantes remotos obtener información sensible acerca de la implementación de la aplicación a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC90483 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0481
https://notcve.org/view.php?id=CVE-2013-0481
03 Jul 2013 — The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. La consola en IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 permite a atacantes remotos leer trazas de la pila mediante la activación de (1) un error o (2) una excepción. • http://www-01.ibm.com/support/docview.wss?uid=swg21627986 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0568
https://notcve.org/view.php?id=CVE-2013-0568
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente la obtención de información sensible sobre la implementación de la ap... • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5936
https://notcve.org/view.php?id=CVE-2012-5936
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 no configura la bandera de seguridad para la sesión de cookie en una sesión https, lo que hace más fácil a atacantes remotos capturar esas cookies interceptando esa... • http://www-01.ibm.com/support/docview.wss?uid=swg21627985 • CWE-310: Cryptographic Issues •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0479
https://notcve.org/view.php?id=CVE-2013-0479
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename. IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 no restringen adecuadamente los tipos de archivos y extensiones, lo que permite a usuarios remotos autenticados eludir las restricciones de acceso previstas a través de un nombre de fichero manipulado. • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0476
https://notcve.org/view.php?id=CVE-2013-0476
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors. IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 permite a atacantes remotos inyectar comandos FTP arbitrarios a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2982
https://notcve.org/view.php?id=CVE-2013-2982
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente subir archivos remotamente a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2985
https://notcve.org/view.php?id=CVE-2013-2985
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. IBM Sterling B2B Integrator 5.1 y 5.2 y Sterling File Gateway 2.1 y 2.2, permite a usuarios autenticados remotamente la obtención de información sensible sobre la implementación de la ap... • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0475
https://notcve.org/view.php?id=CVE-2013-0475
03 Jul 2013 — IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. IBM Sterling B2B Integrator v5.1 y v5.2 y Sterling File Gateway v2.1 y v2.2 permite a usuarios remotos autenticados obtener información confidencial sobre la implementación de aplicacion... • http://www-01.ibm.com/support/docview.wss?uid=swg21640830 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •