Total vulnerabilities in the database
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors.
Software | From | Fixed in |
---|---|---|
ibm / sterling_b2b_integrator | 5.2 | 5.2.x |
ibm / sterling_b2b_integrator | 5.1 | 5.1.x |
ibm / sterling_file_gateway | 2.1 | 2.1.x |
ibm / sterling_file_gateway | 2.2 | 2.2.x |