Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling secure proxy 3.4.0.0 vulnerabilities and exploits
(subscribe to this query)
356
VMScore
CVE-2013-0520
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data.
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.0.0
445
VMScore
CVE-2013-0519
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote malicious ...
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.0.0
383
VMScore
CVE-2013-0518
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 does not refuse to be rendered in different-origin frames, which makes it easier for remote malicious users to conduct clickjacking attack...
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.0.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started