📦 Sterling Secure Proxy
by Ibm
🔍 What is Sterling Secure Proxy?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in IBM Sterling Secure Proxy allows privileged users to execute arbitrary operating system commands through improper input validation. It affects versions 6.0.0.0 through 6.2.0.0. A...
IBM Sterling Secure Proxy versions 6.0.0.0 through 6.2.0.0 contain incorrect permission assignments that could allow unauthorized attackers to retrieve or alter sensitive information. This vulnerabili...
CVE-2024-41784 is a path traversal vulnerability in IBM Sterling Secure Proxy that allows remote attackers to read arbitrary files on the system by sending specially crafted URL requests containing 'd...
This vulnerability in IBM Sterling External Authentication Server and IBM Sterling Secure Proxy allows a remote attacker to cause a denial of service by consuming system resources through a resource l...
This vulnerability in IBM Sterling Secure Proxy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information transmitted through the proxy. It affects multiple versio...
This vulnerability in IBM Secure External Authentication Server and IBM Secure Proxy allows remote attackers to cause a denial of service by consuming system resources through a resource leak. Affecte...
IBM Sterling Secure Proxy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information transmitted through the proxy. This affects organizations running vulnerable ve...