Concert Vulnerabilities

Security vulnerability tracking for Ibm Concert

Last updated: Feb 17, 2026
Total CVEs

3

Critical

0

With Exploits

0

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Concert

Severity Distribution

Critical0
0%
High1
33%
Medium2
67%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-360196.1

An attacker can inject harmful JavaScript into the IBM Concert web interface, which could lead to stealing user credentials during a logged-in session. This vulnerability can be exploited by anyone without needing to log in, making it particularly dangerous for users of the affected versions.

ibmconcert
Theoretical
about 2 months agoFeb 17, 2026
CVE-2025-360186.5

This vulnerability allows an attacker to trick a trusted user into performing harmful actions on the IBM Concert platform without their knowledge. For this to work, the user must be logged into the site while the attacker sends a malicious request, exploiting the trust the site has in the user's session.

ibmconcert
Theoretical
about 2 months agoFeb 17, 2026
CVE-2024-431787.5

An attacker can potentially decrypt sensitive information stored in IBM Concert due to the use of weak encryption methods. This vulnerability affects versions 1.0.0 to 2.1.0, meaning that any system running these versions is at risk if the attacker can access the encrypted data.

ibmconcert
Theoretical
about 2 months agoFeb 17, 2026

About Ibm Concert Security

This page provides comprehensive security vulnerability tracking for Ibm Concert. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Concert updated to the latest version
  • • Subscribe to security advisories from Ibm
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately