IBM Concert 1.0.0 through 2.0.0 could allow a local user to forge log files to impersonate other users or hide their identity due to improper neutralization of output.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7252019 |
|
History
Fri, 21 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:* |
Thu, 20 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Concert 1.0.0 through 2.0.0 could allow a local user to forge log files to impersonate other users or hide their identity due to improper neutralization of output. | |
| Title | IBM Concert Improper Log Neutralization | |
| First Time appeared |
Ibm
Ibm concert |
|
| Weaknesses | CWE-117 | |
| CPEs | cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:concert:2.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm concert |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2025-11-20T21:17:47.926Z
Updated: 2025-11-20T21:36:49.144Z
Reserved: 2025-04-15T21:16:20.814Z
Link: CVE-2025-36159
No data.
Status : Analyzed
Published: 2025-11-20T22:15:57.340
Modified: 2025-11-21T19:49:32.697
Link: CVE-2025-36159
No data.