Total vulnerabilities in the database
IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.
Software | From | Fixed in |
---|---|---|
ibm / sterling_b2b_integrator | 5.2.4.2 | 5.2.4.2.x |
ibm / sterling_b2b_integrator | 5.2.6 | 5.2.6.x |
ibm / sterling_b2b_integrator | 5.2.4.1 | 5.2.4.1.x |
ibm / sterling_b2b_integrator | 5.2 | 5.2.x |
ibm / sterling_b2b_integrator | 5.2.2 | 5.2.2.x |
ibm / sterling_b2b_integrator | 5.2.5 | 5.2.5.x |
ibm / sterling_b2b_integrator | 5.2.1 | 5.2.1.x |
ibm / sterling_b2b_integrator | 5.2.4 | 5.2.4.x |