Ibm Vulnerabilities

Comprehensive security vulnerability database for Ibm products

Last updated: Mar 13, 2026
Total CVEs

6

Critical

0

With Exploits

10

Last 30 Days

7

Severity Distribution

Critical0
0%
High6
100%
Medium10
167%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-137267.5

This vulnerability allows a remote attacker to access sensitive information from IBM Sterling Partner Engagement Manager due to detailed error messages being exposed. If an attacker can trigger these error messages, they could gather valuable information that might help them launch further attacks on the system.

ibmsterling partner engagement manager
Exploit Available
25 days agoMar 13, 2026
CVE-2025-137237.5

An attacker can exploit this vulnerability to access sensitive user information by using an expired access token, which means they don't need valid credentials to gain this information. This issue affects specific versions of IBM Sterling Partner Engagement Manager, so organizations using these versions should take immediate action to secure their systems.

ibmsterling partner engagement manager
Exploit Available
25 days agoMar 13, 2026
CVE-2025-137187.5

This vulnerability allows an attacker to intercept and read sensitive information being transmitted over the network in cleartext, which means it’s not encrypted and can be easily accessed by anyone monitoring the communication. It affects specific versions of IBM Sterling Partner Engagement Manager, and the attacker only needs to be able to listen to the network traffic to exploit this weakness.

ibmsterling partner engagement manager
Exploit Available
25 days agoMar 13, 2026
CVE-2025-131087.5

This vulnerability allows an attacker to access sensitive information stored in memory, which could include confidential data from the database. It occurs because the system fails to properly clear memory resources, and an attacker would need access to the affected DB2 Merge Backup system to exploit this weakness.

ibmdb2 merge backup
Exploit Available
about 2 months agoFeb 17, 2026
CVE-2024-431787.5

An attacker can potentially decrypt sensitive information stored in IBM Concert due to the use of weak encryption methods. This vulnerability affects versions 1.0.0 to 2.1.0, meaning that any system running these versions is at risk if the attacker can access the encrypted data.

ibmconcert
Theoretical
about 2 months agoFeb 17, 2026
CVE-2025-362478.2

An attacker can exploit a vulnerability in IBM Db2 to access sensitive information or overload the system by sending specially crafted XML data. This can happen if the database is configured to process XML without proper security measures in place.

ibmdb2
Exploit Available
about 2 months agoFeb 17, 2026

About Ibm Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Ibm products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.