CVE-2024-45651
- EPSS 0.04%
- Published 18.04.2025 11:04:55
- Last modified 18.07.2025 14:16:12
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
CVE-2024-49808
- EPSS 0.04%
- Published 18.04.2025 11:03:58
- Last modified 18.07.2025 13:44:31
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 could allow an authenticated user to spoof the identity of another user due to improper authorization which could allow the user to bypass access restrictions.
CVE-2024-45653
- EPSS 0.09%
- Published 19.01.2025 03:15:07
- Last modified 25.03.2025 14:27:46
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system.
CVE-2024-39747
- EPSS 0.18%
- Published 31.08.2024 02:15:12
- Last modified 16.09.2024 17:13:47
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.
CVE-2024-39744
- EPSS 0.12%
- Published 22.08.2024 11:15:13
- Last modified 23.08.2024 15:25:31
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVE-2024-39745
- EPSS 0.08%
- Published 22.08.2024 11:15:13
- Last modified 23.08.2024 15:25:13
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2024-39746
- EPSS 0.03%
- Published 22.08.2024 11:15:13
- Last modified 29.09.2025 16:15:34
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to ob...