CVE tracker
251 subscribers
3.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-47397 - Improper Release of Memory Before Removing Last Reference in Graphics

CVE ID : CVE-2025-47397
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47398 - Use After Free in Graphics

CVE ID : CVE-2025-47398
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47399 - Buffer Copy Without Checking Size of Input in Camera

CVE ID : CVE-2025-47399
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47402 - Buffer Over-read in WLAN Firmware

CVE ID : CVE-2025-47402
Published : Feb. 2, 2026, 4:16 p.m. | 2 hours, 24 minutes ago
Description : Transient DOS when processing a received frame with an excessively large authentication information element.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0921 - Apache HTTP Server Remote Code Execution

CVE ID : CVE-2026-0921
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1232 - Anti-Tamper Bypass in BeyondTrust Privilege Management for Windows

CVE ID : CVE-2026-1232
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : A medium-severity vulnerability has been identified in BeyondTrust Privilege Management for Windows versions <=25.7. Under certain conditions, a local authenticated user with elevated privileges may be able to bypass the product’s anti-tamper protections, which could allow access to protected application components and the ability to modify product configuration.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1770 - Improper Control of Dynamically-Managed Code Resources in Crafter Studio

CVE ID : CVE-2026-1770
Published : Feb. 2, 2026, 5:16 p.m. | 1 hour, 24 minutes ago
Description : Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution).
Severity: 4.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0630 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-0630
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0631 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-0631
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22221 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22221
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22222 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22222
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22223 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22223
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22224 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22224
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22225 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22225
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22226 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22226
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22227 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22227
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restoration function of the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22229 - Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVE ID : CVE-2026-22229
Published : Feb. 2, 2026, 6:16 p.m. | 24 minutes ago
Description : A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61648 - Stored XSS through system messages in CheckUser

CVE ID : CVE-2025-61648
Published : Feb. 3, 2026, 1:15 a.m. | 1 hour, 27 minutes ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program files modules/ext.CheckUser.TempAccounts/components/ShowIPButton.Vue, modules/ext.CheckUser.TempAccounts/SpecialBlock.Js. This issue affects CheckUser: from * before 1.44.1.
Severity: 0.0 | NONE
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61649 - UserInfoCard: Check that performing user has permission to view log entries for number of past blocks

CVE ID : CVE-2025-61649
Published : Feb. 3, 2026, 1:15 a.m. | 1 hour, 27 minutes ago
Description : Vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program files src/Services/CheckUserUserInfoCardService.Php. This issue affects CheckUser: from 7cedd58781d261f110651b6af4f41d2d11ae7309.
Severity: 1.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61650 - UserInfoCard is vulnerable to message key stored XSS

CVE ID : CVE-2025-61650
Published : Feb. 3, 2026, 1:15 a.m. | 1 hour, 27 minutes ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program files src/Services/CheckUserUserInfoCardService.Php. This issue affects CheckUser: from * before 795bf333272206a0189050d975e94b70eb7dc507.
Severity: 1.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12774 - SQL queries with sensitive information printed in logs with Brocade SANnav before 3.0

CVE ID : CVE-2025-12774
Published : Feb. 3, 2026, 2:16 a.m. | 27 minutes ago
Description : A vulnerability in the migration script for Brocade SANnav before 3.0 could allow the collection of database sql queries in the SANnav support save file. An attacker with access to Brocade SANnav supportsave file, could open the file and then obtain sensitive information such as details of database tables and encrypted passwords.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...