Ibm Vulnerabilities
Comprehensive security vulnerability database for Ibm products
16
0
10
7
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-13460 | 5.3 | This vulnerability allows an attacker to discover valid usernames within IBM Aspera Console by exploiting differences in system responses. The attacker needs to interact with the application in a way that reveals these discrepancies, which could lead to further attacks like password guessing. | ibmaspera console | Exploit Available | 22 days agoMar 16, 2026 |
| CVE-2025-13459 | 4.9 | This vulnerability allows a privileged user to disrupt the service by misusing the system's workflow controls, potentially causing downtime. It affects specific versions of IBM Aspera Console, so users running those versions should be cautious about how workflows are managed. | ibmaspera console | Exploit Available | 22 days agoMar 16, 2026 |
| CVE-2025-13212 | 4.3 | This vulnerability allows an authenticated user to disrupt the email service, potentially causing it to become unavailable for others. It occurs because the system doesn't properly manage how often users can interact with the email service, leading to a denial of service. | ibmaspera console | Exploit Available | 22 days agoMar 16, 2026 |
| CVE-2025-13726 | 7.5 | This vulnerability allows a remote attacker to access sensitive information from IBM Sterling Partner Engagement Manager due to detailed error messages being exposed. If an attacker can trigger these error messages, they could gather valuable information that might help them launch further attacks on the system. | ibmsterling partner engagement manager | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2025-13723 | 7.5 | An attacker can exploit this vulnerability to access sensitive user information by using an expired access token, which means they don't need valid credentials to gain this information. This issue affects specific versions of IBM Sterling Partner Engagement Manager, so organizations using these versions should take immediate action to secure their systems. | ibmsterling partner engagement manager | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2025-13718 | 7.5 | This vulnerability allows an attacker to intercept and read sensitive information being transmitted over the network in cleartext, which means it’s not encrypted and can be easily accessed by anyone monitoring the communication. It affects specific versions of IBM Sterling Partner Engagement Manager, and the attacker only needs to be able to listen to the network traffic to exploit this weakness. | ibmsterling partner engagement manager | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2025-13702 | 5.4 | This vulnerability allows an attacker, who is already logged into the IBM Sterling Partner Engagement Manager, to inject malicious JavaScript into the web interface, potentially exposing sensitive information like user credentials. This means that if an attacker can gain access to a user's account, they can manipulate the application in harmful ways. | ibmsterling partner engagement manager | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2025-13108 | 7.5 | This vulnerability allows an attacker to access sensitive information stored in memory, which could include confidential data from the database. It occurs because the system fails to properly clear memory resources, and an attacker would need access to the affected DB2 Merge Backup system to exploit this weakness. | ibmdb2 merge backup | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2023-38265 | 5.3 | This vulnerability allows an attacker without any login credentials to discover the locations of folders on the IBM Cloud Pak System, which could help them plan further attacks against the system. The attacker does not need to authenticate, making it easier for them to exploit this weakness. | ibmcloud pak system | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-36019 | 6.1 | An attacker can inject harmful JavaScript into the IBM Concert web interface, which could lead to stealing user credentials during a logged-in session. This vulnerability can be exploited by anyone without needing to log in, making it particularly dangerous for users of the affected versions. | ibmconcert | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-36018 | 6.5 | This vulnerability allows an attacker to trick a trusted user into performing harmful actions on the IBM Concert platform without their knowledge. For this to work, the user must be logged into the site while the attacker sends a malicious request, exploiting the trust the site has in the user's session. | ibmconcert | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2024-43178 | 7.5 | An attacker can potentially decrypt sensitive information stored in IBM Concert due to the use of weak encryption methods. This vulnerability affects versions 1.0.0 to 2.1.0, meaning that any system running these versions is at risk if the attacker can access the encrypted data. | ibmconcert | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-36425 | 6.5 | This vulnerability allows an authenticated user to access sensitive information from IBM Db2 databases if the High Availability Disaster Recovery (HADR) feature is configured in a certain way. To exploit this, the attacker must already have valid credentials to log into the system. | ibmdb2 | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-36247 | 8.2 | An attacker can exploit a vulnerability in IBM Db2 to access sensitive information or overload the system by sending specially crafted XML data. This can happen if the database is configured to process XML without proper security measures in place. | ibmdb2 | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2025-14689 | 6.5 | This vulnerability allows an authenticated user to crash the IBM Db2 database, leading to a denial of service, which means legitimate users can't access the database. It occurs due to flaws in how the database handles certain data queries involving federated objects, so only users with access can exploit it. | ibmdb2 | Theoretical | about 2 months agoFeb 17, 2026 |
| CVE-2025-13867 | 6.5 | This vulnerability allows an authenticated user to crash the IBM Db2 database, leading to a denial of service, which means legitimate users cannot access the database. It occurs due to flaws in how the database handles certain special characters in queries, affecting specific versions of Db2 software. | ibmdb2 | Exploit Available | about 2 months agoFeb 17, 2026 |
About Ibm Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Ibm products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.