2
0
0
0
Vulnerability Timeline
2 vulnerabilities discovered over time for Concert
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-36019 | 6.1 | An attacker can inject harmful JavaScript into the IBM Concert web interface, which could lead to stealing user credentials during a logged-in session. This vulnerability can be exploited by anyone without needing to log in, making it particularly dangerous for users of the affected versions. | ibmconcert | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-36018 | 6.5 | This vulnerability allows an attacker to trick a trusted user into performing harmful actions on the IBM Concert platform without their knowledge. For this to work, the user must be logged into the site while the attacker sends a malicious request, exploiting the trust the site has in the user's session. | ibmconcert | Theoretical | about 2 months agoFeb 17, 2026 |
About Ibm Concert Security
This page provides comprehensive security vulnerability tracking for Ibm Concert. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Concert updated to the latest version
- • Subscribe to security advisories from Ibm
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately