Ibm Sterling External Authentication Server Vulnerabilidad
3.4.3.2 | 3 |
---|
6.0.2.0 | 3 |
---|
6.0.3.0 | 3 |
---|
6.0.3 | 1 |
---|
6.1.0 | 1 |
---|
Official Fix | 5 |
---|
Temporary Fix | 0 |
---|
Workaround | 0 |
---|
Unavailable | 0 |
---|
Not Defined | 1 |
---|
High | 0 |
---|
Functional | 0 |
---|
Proof-of-Concept | 0 |
---|
Unproven | 0 |
---|
Not Defined | 6 |
---|
Not Defined | 0 |
---|
Physical | 0 |
---|
Local | 1 |
---|
Adjacent | 1 |
---|
Network | 4 |
---|
Not Defined | 0 |
---|
High | 1 |
---|
Low | 2 |
---|
None | 3 |
---|
Not Defined | 0 |
---|
Required | 0 |
---|
None | 6 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 0 |
---|
≤4 | 1 |
---|
≤5 | 1 |
---|
≤6 | 2 |
---|
≤7 | 1 |
---|
≤8 | 1 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 0 |
---|
≤4 | 1 |
---|
≤5 | 1 |
---|
≤6 | 2 |
---|
≤7 | 1 |
---|
≤8 | 1 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 2 |
---|
≤4 | 0 |
---|
≤5 | 1 |
---|
≤6 | 1 |
---|
≤7 | 1 |
---|
≤8 | 1 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 0 |
---|
≤4 | 0 |
---|
≤5 | 0 |
---|
≤6 | 2 |
---|
≤7 | 0 |
---|
≤8 | 0 |
---|
≤9 | 1 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 1 |
---|
≤4 | 0 |
---|
≤5 | 1 |
---|
≤6 | 1 |
---|
≤7 | 1 |
---|
≤8 | 1 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 0 |
---|
≤4 | 0 |
---|
≤5 | 0 |
---|
≤6 | 0 |
---|
≤7 | 0 |
---|
≤8 | 0 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
≤1 | 0 |
---|
≤2 | 0 |
---|
≤3 | 0 |
---|
≤4 | 0 |
---|
≤5 | 0 |
---|
≤6 | 0 |
---|
≤7 | 0 |
---|
≤8 | 0 |
---|
≤9 | 0 |
---|
≤10 | 0 |
---|
<1k | 0 |
---|
<2k | 0 |
---|
<5k | 1 |
---|
<10k | 2 |
---|
<25k | 3 |
---|
<50k | 0 |
---|
<100k | 0 |
---|
≥100k | 0 |
---|
<1k | 4 |
---|
<2k | 1 |
---|
<5k | 0 |
---|
<10k | 1 |
---|
<25k | 0 |
---|
<50k | 0 |
---|
<100k | 0 |
---|
≥100k | 0 |
---|
Affected Versions (4): 3.4.3.2, 6.0.2, 6.0.3, 6.1
Link to Product Website: https://www.ibm.com/
Tipo de software: Business Process Management Software
más entradas por Ibm