General-Purpose System Vulnerabilities
Vulnerabilities related to traditional IT systems, servers, and desktop applications.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2025-36059 | IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 00… | Medium (4.7) | 2026-01-20 | General-Purpose |
| CVE-2025-36058 | IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 00… | Medium (5.5) | 2026-01-20 | General-Purpose |
| CVE-2025-33015 | IBM Concert 1.0.0 through 2.1.0 is vulnerable to malicious file upload by not validating the content of the file upload… | High (8.8) | 2026-01-20 | General-Purpose |
| CVE-2025-14883 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-68016. Reason: This candidate is a… | Unknown | 2026-01-20 | General-Purpose |
| CVE-2026-0726 | The Nexter Extension – Site Enhancements Toolkit plugin for WordPress is vulnerable to PHP Object Injection in all vers… | High (8.1) | 2026-01-20 | General-Purpose |