Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Total 7557 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-49808 3 Ibm, Linux, Microsoft 4 Aix, Sterling Connect Direct Web Services, Linux Kernel and 1 more 2025-07-18 N/A 6.3 MEDIUM
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 could allow an authenticated user to spoof the identity of another user due to improper authorization which could allow the user to bypass access restrictions.
CVE-2024-41757 1 Ibm 1 Concert 2025-07-18 N/A 5.9 MEDIUM
IBM Concert Software 1.0.0 and 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
CVE-2024-52893 1 Ibm 1 Concert 2025-07-18 N/A 5.3 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3  could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
CVE-2024-52891 1 Ibm 1 Concert 2025-07-18 N/A 5.4 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could allow an authenticated user to inject malicious information or obtain information from log files due to improper log neutralization.
CVE-2024-52367 1 Ibm 1 Concert 2025-07-18 N/A 5.3 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system.
CVE-2024-52366 1 Ibm 1 Concert 2025-07-18 N/A 5.9 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
CVE-2024-52360 1 Ibm 1 Concert 2025-07-18 N/A 7.6 HIGH
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
CVE-2024-52359 1 Ibm 1 Concert 2025-07-18 N/A 4.3 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to perform unauthorized actions that should be reserved to administrator used due to improper access controls.
CVE-2024-37070 2 Ibm, Linux 2 Concert, Linux Kernel 2025-07-18 N/A 4.3 MEDIUM
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system.
CVE-2024-41785 1 Ibm 1 Concert 2025-07-18 N/A 6.1 MEDIUM
IBM Concert Software 1.0.0 through 1.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2024-43189 1 Ibm 1 Concert 2025-07-18 N/A 5.9 MEDIUM
IBM Concert Software 1.0.0 through 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
CVE-2024-31890 1 Ibm 1 I 2025-07-17 N/A 7.8 HIGH
IBM i 7.3, 7.4, and 7.5 product IBM TCP/IP Connectivity Utilities for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 288171.
CVE-2022-43847 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-07-17 N/A 5.4 MEDIUM
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVE-2022-43850 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-07-17 N/A 5.4 MEDIUM
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2022-43851 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-07-17 N/A 5.9 MEDIUM
IBM Aspera Console 3.4.0 through 3.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2022-43852 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-07-17 N/A 5.3 MEDIUM
IBM Aspera Console 3.4.0 through 3.4.4 could disclose sensitive information in HTTP headers that could be used in further attacks against the system.
CVE-2023-27272 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-07-17 N/A 3.1 LOW
IBM Aspera Console 3.4.0 through 3.4.4 allows passwords to be reused when a new user logs into the system.
CVE-2025-2947 1 Ibm 1 I 2025-07-17 N/A 7.2 HIGH
IBM i 7.6  contains a privilege escalation vulnerability due to incorrect profile swapping in an OS command.  A malicious actor can use the command to elevate privileges to gain root access to the host operating system.
CVE-2024-56474 2 Ibm, Linux 3 Aix, Txseries For Multiplatforms, Linux Kernel 2025-07-16 N/A 4.3 MEDIUM
IBM TXSeries for Multiplatforms 9.1 and 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVE-2024-55909 2 Ibm, Linux 2 Concert, Linux Kernel 2025-07-16 N/A 6.5 MEDIUM
IBM Concert Software 1.0.0 through 1.0.5 could allow an authenticated user to cause a denial of service due to the expansion of archive files without controlling resource consumption.