Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling secure proxy 3.2.0.0 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-0518
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 does not refuse to be rendered in different-origin frames, which makes it easier for remote malicious users to conduct clickjacking attack...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
5
CVSSv2
CVE-2013-0519
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote malicious ...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
4
CVSSv2
CVE-2013-0520
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data.
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started