🛡️ مركز معلومات الثغرات
قاعدة بيانات الثغرات والتهديدات الأمنية المحدّثة
| المعرّف | الخطورة | CVSS | الوصف | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-34630 | مرتفع | 7.8 |
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result …
|
— | أبريل 14, 2026 |
| CVE-2026-34631 | مرتفع | 7.8 |
InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbit…
|
— | أبريل 14, 2026 |
| CVE-2026-32198 | مرتفع | 7.8 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
— | أبريل 14, 2026 |
| CVE-2026-32200 | مرتفع | 7.8 |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
|
— | أبريل 14, 2026 |
| CVE-2026-32197 | مرتفع | 7.8 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
— | أبريل 14, 2026 |
| CVE-2026-32192 | مرتفع | 7.8 |
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
|
— | أبريل 14, 2026 |
| CVE-2026-32189 | مرتفع | 7.8 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
— | أبريل 14, 2026 |
| CVE-2026-32184 | مرتفع | 7.8 |
Deserialization of untrusted data in Microsoft High Performance Compute Pack (HPC) allows an authorized attacker to elev…
|
— | أبريل 14, 2026 |
| CVE-2026-34628 | مرتفع | 7.8 |
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could…
|
— | أبريل 14, 2026 |
| CVE-2026-32199 | مرتفع | 7.8 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
— | أبريل 14, 2026 |
| CVE-2026-27283 | مرتفع | 7.8 |
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability that could result in a…
|
— | أبريل 14, 2026 |
| CVE-2026-34619 | مرتفع | 7.7 |
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Dir…
|
— | أبريل 14, 2026 |
| CVE-2026-27913 | مرتفع | 7.7 |
Improper input validation in Windows BitLocker allows an unauthorized attacker to bypass a security feature locally.
|
— | أبريل 14, 2026 |
| CVE-2026-4352 | مرتفع | 7.5 |
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endp…
|
— | أبريل 14, 2026 |
| CVE-2026-26171 | مرتفع | 7.5 |
Uncontrolled resource consumption in .NET allows an unauthorized attacker to deny service over a network.
|
— | أبريل 14, 2026 |
| CVE-2026-26154 | مرتفع | 7.5 |
Improper input validation in Windows Server Update Service allows an unauthorized attacker to perform tampering over a n…
|
— | أبريل 14, 2026 |
| CVE-2026-32203 | مرتفع | 7.5 |
Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized attacker to deny service over a network.
|
— | أبريل 14, 2026 |
| CVE-2026-27282 | مرتفع | 7.5 |
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could re…
|
— | أبريل 14, 2026 |
| CVE-2026-32178 | مرتفع | 7.5 |
Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.
|
— | أبريل 14, 2026 |
| CVE-2026-24032 | مرتفع | 7.3 |
A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3 with UMC). The affected application contains a…
|
— | أبريل 14, 2026 |