IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Aug 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ibm aix
Ibm sterling Connect Direct Web Services Linux Linux linux Kernel Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Ibm aix
Ibm sterling Connect Direct Web Services Linux Linux linux Kernel Microsoft Microsoft windows |
Thu, 22 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 Aug 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. | |
Title | IBM Sterling Connect:Direct Web Services information disclosure | |
First Time appeared |
Ibm
Ibm sterling Connect |
|
Weaknesses | CWE-311 | |
CPEs | cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:windows:*:* |
|
Vendors & Products |
Ibm
Ibm sterling Connect |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: ibm
Published: 2024-08-22T10:29:54.169Z
Updated: 2024-08-22T13:12:41.207Z
Reserved: 2024-06-28T09:34:46.056Z
Link: CVE-2024-39746
Vulnrichment
Updated: 2024-08-22T13:12:35.208Z
NVD
Status : Analyzed
Published: 2024-08-22T11:15:13.920
Modified: 2024-08-23T15:25:02.123
Link: CVE-2024-39746
Redhat
No data.