
CVE-2021-29725
https://notcve.org/view.php?id=CVE-2021-29725
15 Jul 2021 — IBM Secure External Authentication Server 2.4.3.2, 6.0.1, 6.0.2 and IBM Secure Proxy 3.4.3.2, 6.0.1, 6.0.2 could allow a remote user to consume resources causing a denial of service due to a resource leak. IBM Secure External Authentication Server versiones 2.4.3.2, 6.0.1, 6.0.2 e IBM Secure Proxy versiones 3.4.3.2, 6.0.1, 6.0.2, podrían permitir a un usuario remoto consumir recursos causando una denegación de servicio debido a una fuga de recursos • https://exchange.xforce.ibmcloud.com/vulnerabilities/201102 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2020-4462
https://notcve.org/view.php?id=CVE-2020-4462
16 Jul 2020 — IBM Sterling External Authentication Server 6.0.1, 6.0.0, 2.4.3.2, and 2.4.2 and IBM Sterling Secure Proxy 6.0.1, 6.0.0, 3.4.3, and 3.4.2 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181482. IBM Sterling External Authentication Server versiones 6.0.1, 6.0.0, 2.4.3.2 y 2.4.2 e IBM Sterling Secure Proxy versiones 6.0.1, 6.0.0, 3.4.3 y 3.4.... • https://exchange.xforce.ibmcloud.com/vulnerabilities/181482 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2016-6023
https://notcve.org/view.php?id=CVE-2016-6023
06 Oct 2016 — Directory traversal vulnerability in the Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to read arbitrary files via a crafted URL. Vulnerabilidad de salto de directorio en el Configuration Manager en IBM Sterling Secure Proxy (SSP) 3.4.2 en versiones anteriores a 3.4.2.0 iFix 8 y 3.4.3 en versiones anteriores a 3.4.3.0 iFix 1 permite a atacantes remotos leer archivos arbitrarios a través de una URL manipulada. • http://www-01.ibm.com/support/docview.wss?uid=swg21991278 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2016-6025
https://notcve.org/view.php?id=CVE-2016-6025
06 Oct 2016 — The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL. El Configuration Manager en IBM Sterling Secure Proxy (SSP) 3.4.2 en versiones anteriores a 3.4.2.0 iFix 8 y 3.4.3 en versiones anteriores a 3.4.3.0 iFix 1 permite a atacantes remotos obtener acceso mediante el aprovechamiento de una esta... • http://www-01.ibm.com/support/docview.wss?uid=swg21991278 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-6027
https://notcve.org/view.php?id=CVE-2016-6027
06 Oct 2016 — The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 does not enable the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information or modify data by leveraging use of HTTP. El Configuration Manager en IBM Sterling Secure Proxy (SSP) 3.4.2 en versiones anteriores a 3.4.2.0 iFix 8 y 3.4.3 en versiones anteriores a 3.4.3.0 iFix 1 no habilita el mecanismo de protección HSTS, lo que facilita a atacante... • http://www-01.ibm.com/support/docview.wss?uid=swg21991278 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2016-6026
https://notcve.org/view.php?id=CVE-2016-6026
06 Oct 2016 — The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows man-in-the-middle attackers to obtain sensitive information via an HTTP method that is neither GET nor POST. El Configuration Manager en IBM Sterling Secure Proxy (SSP) 3.4.2 en versiones anteriores a 3.4.2.0 iFix 8 y 3.4.3 en versiones anteriores a 3.4.3.0 iFix 1 permite a atacantes man-in-the-middle obtener información sensible a través de un método HTTP que no es ni GET ni POST. • http://www-01.ibm.com/support/docview.wss?uid=swg21991278 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-0519
https://notcve.org/view.php?id=CVE-2013-0519
10 May 2013 — IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote attackers to obtain potentially sensitive information by reading a version string. IBM Sterling Secure Proxy v3.2.0 y v3.3.01 anterior a v3.3.01.23 Interim Fix 1, v3.4.0 anterior a v3.4.0.6 Interim Fix 1, y v3.4.1 anterior a v3.4.1.7 proporciona da... • http://www-01.ibm.com/support/docview.wss?uid=swg21636369 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-0518
https://notcve.org/view.php?id=CVE-2013-0518
10 May 2013 — IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 does not refuse to be rendered in different-origin frames, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. IBM Sterling Secure Proxy v3.2.0 y v3.3.01 anterior a v3.3.01.23 Interim Fix 1, v3.4.0 anterior a v3.4.0.6 Interim Fix 1, y v3.4.1 anterior a v3.4.1.7 no rechaza ser mostrada en marcos de diferentes orígenes, lo que ha... • http://www-01.ibm.com/support/docview.wss?uid=swg21636369 • CWE-20: Improper Input Validation •

CVE-2013-0520
https://notcve.org/view.php?id=CVE-2013-0520
10 May 2013 — IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data. IBM Sterling Secure Proxy v3.2.0 y v3.3.01 anterior a v3.3.01.23 Interim Fix 1, v3.4.0 anterior a v3.4.0.6 Interim Fix 1, y v3.4.1 anterior a v3.4.1.7 permite a atacantes remotos autenticados obtener información sensible de la pila de Java ("Java stack-trace")... • http://www-01.ibm.com/support/docview.wss?uid=swg21636369 • CWE-20: Improper Input Validation •