Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sterling secure proxy vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-6023
Directory traversal vulnerability in the Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 prior to 3.4.2.0 iFix 8 and 3.4.3 prior to 3.4.3.0 iFix 1 allows remote malicious users to read arbitrary files via a crafted URL.
Ibm Sterling Secure Proxy 3.4.2.0
Ibm Sterling Secure Proxy 3.4.3.0
5.9
CVSSv3
CVE-2016-6025
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 prior to 3.4.2.0 iFix 8 and 3.4.3 prior to 3.4.3.0 iFix 1 allows remote malicious users to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified U...
Ibm Sterling Secure Proxy 3.4.2.0
Ibm Sterling Secure Proxy 3.4.3.0
6.1
CVSSv3
CVE-2016-6027
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 prior to 3.4.2.0 iFix 8 and 3.4.3 prior to 3.4.3.0 iFix 1 does not enable the HSTS protection mechanism, which makes it easier for remote malicious users to obtain sensitive information or modify data by leveragin...
Ibm Sterling Secure Proxy 3.4.3.0
Ibm Sterling Secure Proxy 3.4.2.0
NA
CVE-2013-0519
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote malicious ...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
NA
CVE-2013-0518
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 does not refuse to be rendered in different-origin frames, which makes it easier for remote malicious users to conduct clickjacking attack...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
NA
CVE-2013-0520
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data.
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3