🛡️ مركز معلومات الثغرات
قاعدة بيانات الثغرات والتهديدات الأمنية المحدّثة
| المعرّف | الخطورة | CVSS | الوصف | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-26134 | مرتفع | 7.8 |
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-26131 | مرتفع | 7.8 |
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-26132 | مرتفع | 7.8 |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27269 | مرتفع | 7.8 |
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, …
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27277 | مرتفع | 7.8 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27279 | مرتفع | 7.8 |
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27276 | مرتفع | 7.8 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27275 | مرتفع | 7.8 |
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-27689 | مرتفع | 7.7 |
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular us…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-30929 | مرتفع | 7.7 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-1…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-25181 | مرتفع | 7.5 |
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-23664 | مرتفع | 7.5 |
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacke…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-23662 | مرتفع | 7.5 |
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose informati…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-23661 | مرتفع | 7.5 |
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose inform…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-3585 | مرتفع | 7.5 |
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-2339 | مرتفع | 7.5 |
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Li…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-26121 | مرتفع | 7.5 |
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a netw…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-23674 | مرتفع | 7.5 |
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security fea…
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-26127 | مرتفع | 7.5 |
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
|
✅ Patch | مارس 10, 2026 |
| CVE-2026-26130 | مرتفع | 7.5 |
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service ove…
|
✅ Patch | مارس 10, 2026 |