CVE-2024-41783
19.01.2025, 15:15
IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.
Vendor | Product | Version |
---|---|---|
ibm | sterling_secure_proxy | 6.0.0.0 ≤ 𝑥 < 6.0.3.1 |
ibm | sterling_secure_proxy | 6.1.0.0 |
ibm | sterling_secure_proxy | 6.2.0.0 |
𝑥
= Vulnerable software versions