IBM Concert 1.0.0 through 2.0.0 could allow a local user to forge log files to impersonate other users or hide their identity due to improper neutralization of output.
History

Fri, 21 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:*

Thu, 20 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description IBM Concert 1.0.0 through 2.0.0 could allow a local user to forge log files to impersonate other users or hide their identity due to improper neutralization of output.
Title IBM Concert Improper Log Neutralization
First Time appeared Ibm
Ibm concert
Weaknesses CWE-117
CPEs cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:concert:2.0.0:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm concert
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published: 2025-11-20T21:17:47.926Z

Updated: 2025-11-20T21:36:49.144Z

Reserved: 2025-04-15T21:16:20.814Z

Link: CVE-2025-36159

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2025-11-20T22:15:57.340

Modified: 2025-11-21T19:49:32.697

Link: CVE-2025-36159

cve-icon Redhat

No data.