Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm sterling secure proxy 3.4.1.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-0520
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data.
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.4.1.2
NA
CVE-2013-0518
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 does not refuse to be rendered in different-origin frames, which makes it easier for remote malicious users to conduct clickjacking attack...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
NA
CVE-2013-0519
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 prior to 3.3.01.23 Interim Fix 1, 3.4.0 prior to 3.4.0.6 Interim Fix 1, and 3.4.1 prior to 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote malicious ...
Ibm Sterling Secure Proxy 3.4.0.0
Ibm Sterling Secure Proxy 3.4.1.0
Ibm Sterling Secure Proxy 3.4.1.2
Ibm Sterling Secure Proxy 3.2.0.0
Ibm Sterling Secure Proxy 3.3.0.1
Ibm Sterling Secure Proxy 3.4.1.6
Ibm Sterling Secure Proxy 3.4.1.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started