Ibm Security Vulnerabilities (CVEs)
Track 865 security vulnerabilities affecting Ibm products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability in IBM Db2 allows a local user to cause a denial of service by exploiting improper neutralization of special elements in data query...
Jan 30, 2026This CVE describes an authorization bypass vulnerability in IBM Db2 where authenticated users can execute unauthorized commands by exploiting cataloge...
Jan 30, 2026IBM Db2 databases are vulnerable to denial of service attacks when users execute queries containing the JSON_Object scalar function, which can trigger...
Jan 30, 2026This vulnerability allows a local user with filesystem access to escalate privileges on IBM Db2 for Windows systems due to an unquoted search path ele...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to cause denial of service by submitting specially crafted queries. It affects Db2 versions 1...
Jan 30, 2026This vulnerability in IBM Db2 allows a local user to cause a denial of service by exploiting improper neutralization of special elements in data query...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to execute specially crafted SQL statements with XML that trigger uncontrolled recursion, lea...
Jan 30, 2026IBM Db2 databases running vulnerable versions can experience denial of service when specific SELECT queries are executed against certain table types, ...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to cause denial of service by exploiting improper resource allocation. It affects Db2 version...
Jan 30, 2026This vulnerability in IBM Db2 allows a local user to cause a denial of service by copying large tables containing XML data, due to improper system res...
Jan 30, 2026This CVE describes a local privilege escalation vulnerability in IBM Db2 where an instance owner can execute malicious code to gain root privileges. T...
Jan 30, 2026This vulnerability in IBM Db2 allows a local user to cause a denial of service by exploiting improper neutralization of special elements in data query...
Jan 30, 2026This vulnerability in IBM Db2 allows authenticated users to cause a denial of service by excessively using a global variable. It affects IBM Db2 for L...
Jan 30, 2026IBM Db2 database servers running versions 11.5.0 through 11.5.9 are vulnerable to denial of service attacks. An authenticated user can crash the serve...
Jan 30, 2026IBM Application Gateway versions 23.10 through 25.09 are vulnerable to HTML injection, allowing attackers to inject malicious HTML that executes in us...
Jan 20, 2026IBM ApplinX 11.1 contains a stored cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the we...
Jan 20, 2026IBM ApplinX 11.1 contains a cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the web inter...
Jan 20, 2026IBM ApplinX 11.1 has a client-side security enforcement vulnerability that allows authenticated users to perform unauthorized administrative actions o...
Jan 20, 2026IBM ApplinX 11.1 contains a cross-site request forgery (CSRF) vulnerability that allows attackers to trick authenticated users into performing unautho...
Jan 20, 2026IBM ApplinX 11.1 has a privilege escalation vulnerability where attackers can craft or modify JWT tokens to impersonate users or gain elevated privile...
Jan 20, 2026IBM ApplinX 11.1 can disclose sensitive server architecture information through an unspecified vulnerability. This information disclosure could help a...
Jan 20, 2026IBM Sterling Connect:Express Adapter for Sterling B2B Integrator fails to properly invalidate user sessions after logout, allowing authenticated users...
Jan 20, 2026IBM Sterling Connect:Express Adapter for Sterling B2B Integrator versions 5.2.0.00 through 5.2.0.12 fails to properly invalidate user sessions when a ...
Jan 20, 2026This CVE describes a cross-site scripting (XSS) vulnerability in IBM Sterling Connect:Express Adapter for Sterling B2B Integrator. Unauthenticated att...
Jan 20, 2026This cross-site scripting vulnerability in IBM Sterling Connect:Express Adapter allows authenticated users to inject malicious JavaScript into the web...
Jan 20, 2026IBM Sterling Connect:Express Adapter for Sterling B2B Integrator versions 5.2.0.00 through 5.2.0.12 fails to properly invalidate session IDs after use...
Jan 20, 2026IBM Application Gateway versions 23.10 through 25.09 contain a cross-site scripting (XSS) vulnerability that allows authenticated users to inject mali...
Jan 20, 2026IBM Concert versions 1.0.0 through 2.1.0 contain an unrestricted file upload vulnerability that allows attackers to upload malicious files to the web ...
Jan 20, 2026This vulnerability in IBM Business Automation Workflow containers allows attackers to access sensitive configuration information stored in config maps...
Jan 20, 2026This vulnerability in IBM Business Automation Workflow containers allows local users with container access to execute arbitrary operating system comma...
Jan 20, 2026IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory disclosure vulnerability where sensitive information from previously allocated memory c...
Jan 20, 2026IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory disclosure vulnerability where sensitive information from previously allocated memory c...
Jan 20, 2026IBM Aspera Console 3.4.7 stores sensitive information in log files that could be accessed by local privileged users. This vulnerability allows attacke...
Jan 20, 2026A local privilege escalation vulnerability exists in IBM Concert due to a race condition involving symbolic link handling. This allows authenticated l...
Dec 26, 2025IBM Aspera Faspex 5 versions 5.0.0 through 5.0.14.1 have inconsistent permissions between the user interface and backend API, allowing users to access...
Dec 26, 2025This vulnerability in IBM Aspera Faspex 5 allows authenticated users to enumerate sensitive information by discovering package identifiers. It affects...
Dec 26, 2025IBM Aspera Faspex 5 versions 5.0.0 through 5.0.14.1 contain an HTML injection vulnerability that allows attackers to inject malicious HTML code. When ...
Dec 26, 2025This authentication bypass vulnerability in IBM API Connect allows remote attackers to gain unauthorized access without valid credentials. It affects ...
Dec 26, 2025IBM Db2 Intelligence Center versions 1.1.0 through 1.1.2 contain a client-side enforcement vulnerability where security mechanisms that should be enfo...
Dec 26, 2025This vulnerability in IBM DS8000 storage systems allows local users with authorized CCW update permissions to delete or corrupt backups due to missing...
Dec 26, 2025IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory clearing vulnerability that could allow remote attackers to read sensitive information ...
Dec 26, 2025CVE-2025-12771 is a stack-based buffer overflow vulnerability in IBM Concert versions 1.0.0 through 2.1.0. A local authenticated user could exploit th...
Dec 26, 2025IBM Concert versions 1.0.0 through 2.1.0 store sensitive information in cleartext during recursive Docker builds, allowing local users to access crede...
Dec 24, 2025This CVE describes a race condition vulnerability in IBM UrbanCode Deploy and DevOps Deploy where HTTP session client-IP binding enforcement can be by...
Dec 15, 2025IBM UrbanCode Deploy versions 8.1 through 8.1.2.3 contain an information disclosure vulnerability where authenticated users with LLM integration confi...
Dec 15, 2025IBM DevOps Deploy versions 8.1 through 8.1.2.3 transmit sensitive data in unencrypted plain text, allowing attackers to intercept and read confidentia...
Dec 15, 2025CVE-2025-13214 is a SQL injection vulnerability in IBM Aspera Orchestrator that allows remote attackers to execute arbitrary SQL commands. This could ...
Dec 11, 2025This vulnerability allows authenticated users of IBM Aspera Orchestrator to execute arbitrary commands with elevated system privileges due to improper...
Dec 11, 2025This vulnerability in IBM Aspera Orchestrator allows authenticated users to change other users' passwords without knowing their current passwords. Thi...
Dec 11, 2025This vulnerability in IBM Aspera Orchestrator allows authenticated users to cause denial of service in the email service by sending requests at a freq...
Dec 11, 2025Why Monitor Ibm Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 865+ known vulnerabilities affecting Ibm products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Ibm packages in under 60 seconds. No agents required - completely agentless scanning that works across Ibm deployments.
Free vulnerability database: Access detailed information about every Ibm CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Ibm CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions