🛡️ CVE Vulnerability Database
CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia
| CVE ID | Title / Description | Severity | CVSS | Status | Published |
|---|---|---|---|---|---|
| CVE-2026-22221 |
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.…
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent
au…
|
HIGH |
8.0
|
✅ | Feb 2, 2026 |
| CVE-2026-22222 |
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.…
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent
au…
|
HIGH |
8.0
|
✅ | Feb 2, 2026 |
| CVE-2026-22223 |
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.…
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent
au…
|
HIGH |
8.0
|
✅ | Feb 2, 2026 |
| CVE-2026-22224 |
A command injection vulnerability may be exploited after the admi…
A command injection vulnerability may be exploited after the admin's authentication in the cloud com…
|
HIGH |
7.2
|
✅ | Feb 2, 2026 |
| CVE-2026-22225 |
A command injection vulnerability may be exploited after the admi…
A command injection vulnerability may be exploited after the admin's authentication in the VPN Conne…
|
HIGH |
7.2
|
✅ | Feb 2, 2026 |
| CVE-2026-22226 |
A command injection vulnerability may be exploited after the admi…
A command injection vulnerability may be exploited after the admin's authentication in the VPN serve…
|
HIGH |
7.2
|
✅ | Feb 2, 2026 |
| CVE-2026-22227 |
A command injection vulnerability may be exploited after the admi…
A command injection vulnerability may be exploited after the admin's authentication via the configur…
|
HIGH |
7.2
|
✅ | Feb 2, 2026 |
| CVE-2026-22229 |
A command injection vulnerability may be exploited after the admi…
A command injection vulnerability may be exploited after the admin's authentication via the import o…
|
HIGH |
7.2
|
✅ | Feb 2, 2026 |
| CVE-2026-22888 |
Improper input verification issue exists in Cybozu Garoon 5.0.0 t…
Improper input verification issue exists in Cybozu Garoon 5.0.0 to 6.0.3, which may lead to unauthor…
|
HIGH |
7.5
|
✅ | Feb 2, 2026 |
| CVE-2026-25134 |
Group-Office is an enterprise customer relationship management an…
Group-Office is an enterprise customer relationship management and groupware tool. Prior to 6.8.150,…
|
HIGH |
8.8
|
⚡ ✅ | Feb 2, 2026 |
| CVE-2026-25221 |
PolarLearn is a free and open-source learning program. In 0-PRERE…
PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, the OAuth 2.0…
|
HIGH |
8.1
|
⚡ ✅ | Feb 2, 2026 |
| CVE-2026-25222 |
PolarLearn is a free and open-source learning program. In 0-PRERE…
PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, a timing atta…
|
HIGH |
7.5
|
⚡ ✅ | Feb 2, 2026 |
| CVE-2024-5386 |
In lunary-ai/lunary version 1.2.2, an account hijacking vulnerabi…
In lunary-ai/lunary version 1.2.2, an account hijacking vulnerability exists due to a password reset…
|
HIGH |
8.8
|
⚡ ✅ AI | Feb 2, 2026 |
| CVE-2025-13096 |
IBM Business Automation Workflow containers V25.0.0 through V25.0…
IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007, …
|
HIGH |
7.1
|
✅ | Feb 2, 2026 |
| CVE-2025-14914 |
IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.…
IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to …
|
HIGH |
7.6
|
✅ | Feb 2, 2026 |
| CVE-2025-47358 |
Memory Corruption when user space address is modified and passed …
Memory Corruption when user space address is modified and passed to mem_free API, causing kernel mem…
|
HIGH |
7.8
|
✅ | Feb 2, 2026 |
| CVE-2025-47359 |
Memory Corruption when multiple threads simultaneously access a m…
Memory Corruption when multiple threads simultaneously access a memory free API.
|
HIGH |
7.8
|
✅ | Feb 2, 2026 |
| CVE-2025-47366 |
Cryptographic issue when a Trusted Zone with outdated code is tri…
Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrec…
|
HIGH |
7.1
|
✅ | Feb 2, 2026 |
| CVE-2025-47397 |
Memory Corruption when initiating GPU memory mapping using scatte…
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOM…
|
HIGH |
7.8
|
✅ | Feb 2, 2026 |
| CVE-2025-47398 |
Memory Corruption while deallocating graphics processing unit mem…
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handlin…
|
HIGH |
7.8
|
✅ | Feb 2, 2026 |
| CVE-2025-47399 |
Memory Corruption while processing IOCTL call to update sensor pr…
Memory Corruption while processing IOCTL call to update sensor property settings with invalid input …
|
HIGH |
7.8
|
✅ | Feb 2, 2026 |
| CVE-2025-8587 |
Improper Neutralization of Special Elements used in an SQL Comman…
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i…
|
HIGH |
8.6
|
✅ | Feb 2, 2026 |
| CVE-2026-0630 |
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.…
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent
au…
|
HIGH |
8.0
|
✅ | Feb 2, 2026 |
| CVE-2026-0631 |
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.…
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent
…
|
HIGH |
8.0
|
✅ | Feb 2, 2026 |
| CVE-2026-1530 |
A flaw was found in fog-kubevirt. This vulnerability allows a rem…
A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-th…
|
HIGH |
8.1
|
✅ | Feb 2, 2026 |