Search Results (8001 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-36428 1 Ibm 1 Db2 2026-02-05 5.3 Medium
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper neutralization of special elements in data query logic when the RPSCAN feature is enabled.
CVE-2025-36063 1 Ibm 2 Sterling Connect\, Sterling Connectexpress Adapter For Sterling B2b Integrator 520 2026-02-05 6.3 Medium
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system.
CVE-2025-36065 1 Ibm 2 Sterling Connect\, Sterling Connectexpress Adapter For Sterling B2b Integrator 520 2026-02-03 6.3 Medium
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
CVE-2025-36066 1 Ibm 2 Sterling Connect\, Sterling Connectexpress Adapter For Sterling B2b Integrator 520 2026-02-03 6.1 Medium
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36113 1 Ibm 2 Sterling Connect\, Sterling Connectexpress Adapter For Sterling B2b Integrator 520 2026-02-03 5.4 Medium
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36115 1 Ibm 2 Sterling Connect\, Sterling Connectexpress Adapter For Sterling B2b Integrator 520 2026-02-03 6.3 Medium
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0.00 through 5.2.0.12 does not disallow the session id after use which could allow an authenticated user to impersonate another user on the system.
CVE-2025-13925 1 Ibm 1 Aspera Console 2026-01-30 4.9 Medium
IBM Aspera Console 3.4.7 stores potentially sensitive information in log files that could be read by a local privileged user.
CVE-2025-36410 1 Ibm 1 Applinx 2026-01-26 3.1 Low
IBM ApplinX 11.1 could allow an authenticated user to perform unauthorized administrative actions on the server due to server-side enforcement of client-side security.
CVE-2025-36397 1 Ibm 1 Application Gateway 2026-01-26 5.4 Medium
IBM Application Gateway 23.10 through 25.09 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
CVE-2025-36409 1 Ibm 1 Applinx 2026-01-26 5.4 Medium
IBM ApplinX 11.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36408 1 Ibm 1 Applinx 2026-01-26 6.4 Medium
IBM ApplinX 11.1 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36411 1 Ibm 1 Applinx 2026-01-26 3.5 Low
IBM ApplinX 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVE-2025-36396 1 Ibm 1 Application Gateway 2026-01-26 5.4 Medium
IBM Application Gateway 23.10 through 25.09 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36419 1 Ibm 1 Applinx 2026-01-26 5.3 Medium
IBM ApplinX 11.1 could disclose sensitive information about server architecture that could aid in further attacks against the system.
CVE-2025-36418 1 Ibm 1 Applinx 2026-01-26 7.3 High
IBM ApplinX 11.1 is vulnerable due to a privilege escalation vulnerability due to improper verification of JWT tokens. An attacker may be able to craft or modify a JSON web token in order to impersonate another user or to elevate their privileges.
CVE-2025-1719 1 Ibm 1 Concert 2026-01-26 5.9 Medium
IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information from allocated memory due to improper clearing of heap memory.
CVE-2025-1722 1 Ibm 1 Concert 2026-01-26 5.9 Medium
IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information from allocated memory due to improper clearing of heap memory.
CVE-2025-12985 1 Ibm 1 License Metric Tool 2026-01-26 8.4 High
IBM Licensing Operator incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Licensing Operator image.
CVE-2025-36192 1 Ibm 3 Ds8900f Firmware, Ds8a00, Ds8a00 Firmware 2026-01-14 6.7 Medium
IBM DS8A00( R10.1) 10.10.106.0 and IBM DS8A00 ( R10.0) 10.1.3.010.2.45.0 and IBM DS8900F ( R9.4) 89.40.83.089.42.18.089.44.5.0 IBM System Storage DS8000 could allow a local user with authorized CCW update permissions to delete or corrupt backups due to missing authorization in IBM Safeguarded Copy / GDPS Logical corruption protection mechanisms.
CVE-2025-36228 1 Ibm 2 Aspera Faspex, Aspera Faspex 5 2025-12-29 3.8 Low
IBM Aspera Faspex 5 5.0.0 through 5.0.14.1 may allow inconsistent permissions between the user interface and backend API allowed users to access features that appeared disabled, potentially leading to misuse.