Total vulnerabilities in the database
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception.
Software | From | Fixed in |
---|---|---|
ibm / sterling_b2b_integrator | 5.2 | 5.2.x |
ibm / sterling_b2b_integrator | 5.1 | 5.1.x |
ibm / sterling_file_gateway | 2.1 | 2.1.x |
ibm / sterling_file_gateway | 2.2 | 2.2.x |