CVE-2025-15395 - IBM Jazz Foundation access control violation
CVE ID : CVE-2025-15395
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : IBM Jazz Foundation 7.0.3 through 7.0.3 iFix019 and 7.1.0 through 7.1.0 iFix005 is vulnerable to access control violations that allows the users to view or access/perform actions beyond their expected capability.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-15395
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : IBM Jazz Foundation 7.0.3 through 7.0.3 iFix019 and 7.1.0 through 7.1.0 iFix005 is vulnerable to access control violations that allows the users to view or access/perform actions beyond their expected capability.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47358 - Use After Free in Secure Processor
CVE ID : CVE-2025-47358
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47358
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47359 - Use After Free in Secure Processor
CVE ID : CVE-2025-47359
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when multiple threads simultaneously access a memory free API.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47359
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when multiple threads simultaneously access a memory free API.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47363 - Integer Overflow or Wraparound in Automotive
CVE ID : CVE-2025-47363
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory corruption when calculating oversized partition sizes without proper checks.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47363
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory corruption when calculating oversized partition sizes without proper checks.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47364 - Integer Overflow or Wraparound in Automotive
CVE ID : CVE-2025-47364
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory corruption while calculating offset from partition start point.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47364
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory corruption while calculating offset from partition start point.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47366 - Exposed Dangerous Method or Function in HLOS
CVE ID : CVE-2025-47366
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47366
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47397 - Improper Release of Memory Before Removing Last Reference in Graphics
CVE ID : CVE-2025-47397
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47397
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47398 - Use After Free in Graphics
CVE ID : CVE-2025-47398
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47398
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47399 - Buffer Copy Without Checking Size of Input in Camera
CVE ID : CVE-2025-47399
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47399
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47402 - Buffer Over-read in WLAN Firmware
CVE ID : CVE-2025-47402
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Transient DOS when processing a received frame with an excessively large authentication information element.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-47402
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Transient DOS when processing a received frame with an excessively large authentication information element.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0921 - Apache HTTP Server Remote Code Execution
CVE ID : CVE-2026-0921
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-0921
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1232 - Anti-Tamper Bypass in BeyondTrust Privilege Management for Windows
CVE ID : CVE-2026-1232
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : A medium-severity vulnerability has been identified in BeyondTrust Privilege Management for Windows versions <=25.7. Under certain conditions, a local authenticated user with elevated privileges may be able to bypass the product’s anti-tamper protections, which could allow access to protected application components and the ability to modify product configuration.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-1232
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : A medium-severity vulnerability has been identified in BeyondTrust Privilege Management for Windows versions <=25.7. Under certain conditions, a local authenticated user with elevated privileges may be able to bypass the product’s anti-tamper protections, which could allow access to protected application components and the ability to modify product configuration.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1770 - Improper Control of Dynamically-Managed Code Resources in Crafter Studio
CVE ID : CVE-2026-1770
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution).
Severity: 4.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-1770
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution).
Severity: 4.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0630 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-0630
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-0630
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0631 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-0631
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-0631
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22221 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22221
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22221
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22222 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22222
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22222
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22223 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22223
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22223
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22224 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22224
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22224
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22225 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22225
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22225
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22226 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2
CVE ID : CVE-2026-22226
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-22226
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...