Multiple Vulnerabilities are affected in IBM Business Automation Workflow 23.0.2
Vulnerability Name Multiple Vulnerabilities are affected in IBM Business Automation Workflow 23.0.2
Severity Moderate
Exploits Not available
CVE ID CVE-2020-27216,CVE-2022-42920,CVE-2023-24998,CVE-2021-37533,CVE-2021-23450,CVE-2023-36479,CVE-2023-40167,CVE-2023-22081,CVE-2023-22067,CVE-2023-5678,CVE-2023-5676,CVE-2024-20952,CVE-2024-20918,CVE-2024-20919,CVE-2024-20921,CVE-2024-20926,CVE-2024-20945,CVE-2023-6129,CVE-2023-6237,CVE-2024-0727,CVE-2024-24806,CVE-2023-33850,CVE-2023-46809,CVE-2024-21890,CVE-2024-21891,CVE-2024-21892,CVE-2024-21896,CVE-2024-22017,CVE-2024-22019,CVE-2024-25710,CVE-2024-26308,CVE-2023-52425,CVE-2023-38709,CVE-2024-24795,CVE-2024-21011,CVE-2024-21085,CVE-2024-21094,CVE-2024-27982,CVE-2024-27983,CVE-2024-35195,CVE-2023-38264,CVE-2024-21147,CVE-2024-21145,CVE-2024-21144,CVE-2024-21140,CVE-2024-21138,CVE-2024-21131,CVE-2024-40725,CVE-2024-36138,CVE-2024-27980,CVE-2024-22020,CVE-2024-37372,CVE-2024-36137,CVE-2024-22018,CVE-2024-1135,CVE-2024-22262,CVE-2024-27267,CVE-2024-40898,CVE-2024-47554,CVE-2024-28168,CVE-2024-21538,CVE-2024-3933,CVE-2022-25869,CVE-2023-26116,CVE-2023-26117,CVE-2023-26118,CVE-2024-22354,CVE-2023-50313,CVE-2024-25026,CVE-2024-22329,CVE-2023-51775,CVE-2023-50315,CVE-2024-35154,CVE-2024-35153,CVE-2024-37532,CVE-2024-45087,CVE-2024-45086,CVE-2024-45073,CVE-2024-45072,CVE-2024-45071,CVE-2024-45085,CVE-2024-22353,CVE-2024-27268,CVE-2024-27270,CVE-2023-50312,CVE-2021-28165,CVE-2024-29041,CVE-2024-43796,CVE-2023-43642,CVE-2024-38809,CVE-2023-6481,CVE-2023-31582,CVE-2023-33008,CVE-2025-36038,CVE-2023-44270,CVE-2024-21501,CVE-2024-28849,CVE-2024-39338,CVE-2023-50947,CVE-2024-38321,CVE-2024-43188,CVE-2023-40684,CVE-2023-50959,CVE-2024-31033,CVE-2024-37528,CVE-2024-49348,CVE-2024-52364,CVE-2024-24762,CVE-2024-52365
Solution
Published Date 23/10/2020
Updated Date 20/01/2026

Disclaimer: This webpage is intended to provide you information about vulnerability announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.