INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-25221 High 8.1
PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, the OAuth 2.0 implementation for …
⚡ Exploit ✅ Patch Feb 2, 2026
CVE-2026-0630 High 8.0
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attack…
✅ Patch Feb 2, 2026
CVE-2026-0631 High 8.0
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated att…
✅ Patch Feb 2, 2026
CVE-2026-22221 High 8.0
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attack…
✅ Patch Feb 2, 2026
CVE-2026-22222 High 8.0
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attack…
✅ Patch Feb 2, 2026
CVE-2026-22223 High 8.0
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attack…
✅ Patch Feb 2, 2026
CVE-2025-47358 High 7.8
Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inad…
✅ Patch Feb 2, 2026
CVE-2025-47359 High 7.8
Memory Corruption when multiple threads simultaneously access a memory free API.
✅ Patch Feb 2, 2026
CVE-2025-47397 High 7.8
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
✅ Patch Feb 2, 2026
CVE-2025-47398 High 7.8
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers…
✅ Patch Feb 2, 2026
CVE-2025-47399 High 7.8
Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.
✅ Patch Feb 2, 2026
CVE-2022-50976 High 7.7
A local attacker could cause a full device reset by resetting the device passwords using an invalid reset file via USB.
✅ Patch Feb 2, 2026
CVE-2025-14914 High 7.6
IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive…
✅ Patch Feb 2, 2026
CVE-2022-50977 High 7.5
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration pres…
✅ Patch Feb 2, 2026
CVE-2022-50978 High 7.5
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration pres…
✅ Patch Feb 2, 2026
CVE-2026-20401 High 7.5
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if…
✅ Patch Feb 2, 2026
CVE-2026-22888 High 7.5
Improper input verification issue exists in Cybozu Garoon 5.0.0 to 6.0.3, which may lead to unauthorized alteration of p…
✅ Patch Feb 2, 2026
CVE-2026-25222 High 7.5
PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, a timing attack vulnerability in …
⚡ Exploit ✅ Patch Feb 2, 2026
CVE-2026-1740 High 7.3
A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file …
✅ Patch Feb 2, 2026
CVE-2026-22224 High 7.2
A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface…
✅ Patch Feb 2, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.