91
ثغرة
16
تهديد
0
خبر
1
حرجة
🛡 الثغرات الأمنية (CVE)
CVE-2026-28495
ثغرة CSRF في GetSimple CMS massiveAdmin تمكن من تنفيذ أوامر بعيدة عبر gsconfig.php
03:13 KSA
يحتوي المكون الإضافي massiveAdmin الإصدار 6.0.3 في GetSimple CMS على ثغرة Cross-Site Request Forgery في وحدة محرر gsconfig تسمح للمهاجمين غير المصرح لهم باستبدال ملف التكوين gsconfig.php برمز PHP تعسفي. يمكن استغلال هذه الثغرة من خلال متصفح مسؤول مسجل الدخول لتحقيق تنفيذ أوامر بع…
CVE-2026-20967
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a
03:13 KSA
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
CVE-2026-3854
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an
03:13 KSA
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were n…
CVE-2026-26118
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a networ
03:13 KSA
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26116
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized
03:13 KSA
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26114
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a ne
03:13 KSA
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-26106
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
03:13 KSA
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-25188
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an ad
03:13 KSA
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.
CVE-2026-25177
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized att
03:13 KSA
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
CVE-2026-24283
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
CVE-2026-23669
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
03:13 KSA
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
CVE-2026-23654
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to
03:13 KSA
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network.
CVE-2026-28513
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, th
03:13 KSA
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and ex…
CVE-2026-26113
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
03:13 KSA
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26110
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to exe
03:13 KSA
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26109
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26148
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate
03:13 KSA
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25172
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-25173
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-26117
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized att
03:13 KSA
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-27277
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26141
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
03:13 KSA
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
CVE-2026-26134
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
03:13 KSA
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
CVE-2026-26132
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25187
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate priv
03:13 KSA
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
CVE-2026-26131
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
03:13 KSA
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
CVE-2026-25189
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2026-25190
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
03:13 KSA
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
CVE-2026-26128
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-25176
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privil
03:13 KSA
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-23673
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
03:13 KSA
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
CVE-2026-23660
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally
03:13 KSA
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.
CVE-2026-26107
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26108
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-23672
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
03:13 KSA
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-27279
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26112
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-27280
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitr
03:13 KSA
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-25165
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
03:13 KSA
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
CVE-2026-24289
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-24290
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
03:13 KSA
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
CVE-2026-24291
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an a
03:13 KSA
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.
CVE-2026-24292
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locall
03:13 KSA
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
CVE-2026-24293
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privi
03:13 KSA
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-24294
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-27275
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27274
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-24287
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25166
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
03:13 KSA
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
CVE-2026-27273
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27269
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file,
03:13 KSA
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the …
CVE-2026-27276
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-23665
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
03:13 KSA
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
CVE-2026-25174
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
03:13 KSA
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
CVE-2026-25175
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
03:13 KSA
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
CVE-2026-27689
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular us
03:13 KSA
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonge…
CVE-2026-30929
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-1
03:13 KSA
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vul…
CVE-2026-25181
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
03:13 KSA
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
CVE-2026-30939
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13
03:13 KSA
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13 and 9.5.1-alpha.2, an unauthenticated attacker can crash the Parse Server process by calling a Cloud Function endpoint with a prototype property name as the fun…
CVE-2026-30925
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-a
03:13 KSA
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-alpha.14 and 8.6.11, a malicious client can subscribe to a LiveQuery with a crafted $regex pattern that causes catastrophic backtracking, blocking the Node.js ev…
CVE-2026-28431
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but p
03:13 KSA
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to access due to insufficient permission c…
CVE-2026-26308
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Rol
03:13 KSA
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instea…
CVE-2026-23664
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacke
03:13 KSA
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-2339
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Li
03:13 KSA
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.
CVE-2026-28432
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerabilit
03:13 KSA
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects all servers regardless of whether federa…
CVE-2026-23662
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose informati
03:13 KSA
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-26130
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service ove
03:13 KSA
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
CVE-2026-30941
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14
03:13 KSA
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14 and 9.5.2-alpha.1, NoSQL injection vulnerability allows an unauthenticated attacker to inject MongoDB query operators via the token field in the password reset …
CVE-2026-26127
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
03:13 KSA
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
CVE-2026-26121
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a netw
03:13 KSA
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-23674
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security fea
03:13 KSA
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-3585
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.
03:13 KSA
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitr…
CVE-2026-23661
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose inform
03:13 KSA
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-25573
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell co
03:13 KSA
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full sys…
CVE-2026-25167
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25569
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exi
03:13 KSA
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execu…
CVE-2026-25570
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform che
03:13 KSA
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service.
CVE-2026-2364
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low pr
03:13 KSA
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.
CVE-2026-30958
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal
03:13 KSA
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal in the /workflow/docs/:componentName endpoint allows reading arbitrary files from the server filesystem. The componentName route parameter is concatenated dire…
CVE-2026-1261
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions u
03:13 KSA
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary …
CVE-2026-2724
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entr
03:13 KSA
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in th…
CVE-2026-25179
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized att
03:13 KSA
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25178
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges loca
03:13 KSA
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25171
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2026-25170
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2026-24296
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24295
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24285
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
CVE-2026-23671
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM P
03:13 KSA
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-23667
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
03:13 KSA
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
CVE-2026-23668
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Compon
03:13 KSA
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
⚠️ استخبارات التهديدات
16 تهديد
rss:The Hacker News
—
06:54 KSA
<strong>الذكاء الاصطناعي في كل مكان، لكن مسؤولي أمن المعلومات لا يزالون يؤمنونه بمهارات وأدوات الأمس، وفقاً لدراسة</strong>
كشف استطلاع شمل 300 من مسؤولي أمن المعلومات الأمريكيين أن قادة الأمن السيبراني يفتقرون إلى الأدوات والمهارات الكافية للدفاع عن أنظمة الذكاء الاصطناعي بفعال…
rss:The Hacker News
—
06:54 KSA
<strong>مجموعة كوني تنشر برمجية EndRAT عبر التصيد الاحتيالي وتستخدم كاكاو توك لنشر البرمجيات الخبيثة</strong>
تقوم جهات تهديد كورية شمالية منسوبة لمجموعة كوني الإلكترونية بشن حملات تصيد احتيالي لاختراق الضحايا واستغلال تطبيق كاكاو توك لنشر البرمجيات الخبيثة. يستخدم المهاجمون منص…
rss:The Hacker News
—
06:54 KSA
<strong>وكالة الأمن السيبراني الأمريكية تحذر من ثغرة مستغلة بنشاط في Wing FTP تكشف مسارات الخادم</strong>
أضافت وكالة الأمن السيبراني الأمريكية ثغرة CVE-2025-47813 متوسطة الخطورة في Wing FTP إلى قائمة الثغرات المستغلة المعروفة بسبب الاستغلال النشط. تسمح الثغرة للمهاجمين بالحصول …
rss:The Hacker News
—
05:48 KSA
<strong>ثغرات في الذكاء الاصطناعي بخدمات Amazon Bedrock وLangSmith وSGLang تتيح سرقة البيانات والتنفيذ عن بعد</strong>
اكتشف باحثون أمنيون ثغرات في منصات الذكاء الاصطناعي Amazon Bedrock وLangSmith وSGLang تتيح سرقة البيانات الحساسة عبر استعلامات DNS والتنفيذ عن بعد للأوامر. تشكل…
rss:The Hacker News
—
05:48 KSA
<strong>برمجية الفدية LeakNet تستخدم تقنية ClickFix عبر المواقع المخترقة وتنشر محمّل Deno في الذاكرة</strong>
تبنت مجموعة برمجيات الفدية LeakNet تكتيكات الهندسة الاجتماعية ClickFix عبر المواقع المخترقة لخداع المستخدمين لتنفيذ أوامر ضارة. يستخدم الهجوم محمّل Deno في الذاكرة، مما …
rss:Dark Reading
—
20:02 KSA
<strong>قراصنة مرتبطون بالصين يتسللون إلى منظمات عسكرية في جنوب شرق آسيا لسنوات</strong>
نفذت جهات تهديد متقدمة مستمرة مرتبطة بالصين حملة تجسس إلكتروني استمرت لعدة سنوات ضد منظمات عسكرية في جنوب شرق آسيا. استخدم المهاجمون أبواباً خلفية جديدة وتقنيات تهرب متطورة للحفاظ على وصول م…
rss:Dark Reading
—
19:00 KSA
<strong>قراصنة يستهدفون شركة الأمن السيبراني Outpost24 بهجوم تصيد متعدد المراحل</strong>
نجحت شركة الأمن السيبراني Outpost24 في التصدي لهجوم تصيد احتيالي متطور من 7 مراحل استهدف أحد المسؤولين التنفيذيين. استغل المهاجمون علامات تجارية موثوقة ونطاقات شرعية لمحاولة سرقة بيانات الاع…
rss:Dark Reading
—
19:00 KSA
<strong>مجموعة برامج الفدية Warlock تعزز أنشطة ما بعد الاختراق</strong>
عززت مجموعة برامج الفدية Warlock قدراتها في مرحلة ما بعد الاختراق باستخدام تقنية جديدة لإحضار برنامج تشغيل ضعيف (BYOVD) للتحرك الخفي عبر الشبكات. يتيح هذا التطور للمجموعة التهرب من الكشف أثناء التنقل الجانبي…
rss:Malwarebytes Lab
—
06:29 KSA
<strong>90% من الناس لا يثقون بالذكاء الاصطناعي مع بياناتهم</strong>
كشف استطلاع للخصوصية أن 90% من المشاركين لا يثقون بأنظمة الذكاء الاصطناعي مع بياناتهم الشخصية، مما دفع الكثيرين لتقليل استخدامهم للذكاء الاصطناعي. يشكل هذا الانعدام الواسع للثقة تحديات كبيرة للمؤسسات التي تطبق …
rss:Malwarebytes Lab
—
06:29 KSA
<strong>كيف يمكن أن يعني البحث عن VPN تسليم بيانات تسجيل دخولك للعمل</strong>
يستخدم مجرمو الإنترنت تقنيات تسميم محركات البحث لجعل تنزيلات VPN الخبيثة تبدو شرعية في نتائج البحث، مستهدفين بيانات تسجيل الدخول المؤسسية. تواجه المؤسسات مخاطر متزايدة حيث قد يقوم الموظفون الباحثون عن …
rss:Malwarebytes Lab
—
06:29 KSA
<strong>جوجل تشدد الرقابة على تطبيقات أندرويد التي تسيء استخدام ميزات إمكانية الوصول</strong>
نفذت جوجل ضوابط أكثر صرامة على تطبيقات أندرويد التي تسيء استخدام ميزات إمكانية الوصول، والتي استغلتها البرامج الخبيثة لسنوات للحصول على صلاحيات مرتفعة والتحكم بالأجهزة. يقلل هذا التحسين…
rss:Malwarebytes Lab
—
06:29 KSA
<strong>موقع Pudgy World المزيف يسرق كلمات مرور العملات المشفرة</strong>
يستهدف موقع تصيد احتيالي ينتحل صفة Pudgy World مستخدمي العملات المشفرة من خلال تقليد علامة Pudgy Penguins الشرعية. صُمم الموقع المزيف لسرقة كلمات مرور المحافظ الرقمية وبيانات الاعتماد من المعجبين.
rss:CISA Advisories
—
06:28 KSA
<strong>ثغرة أمنية في نظام Schneider Electric EcoStruxure Data Center Expert</strong>
كشفت شركة Schneider Electric عن ثغرة أمنية تتعلق ببيانات اعتماد مشفرة في منتج EcoStruxure IT Data Center Expert تؤثر على ميزة SOCKS Proxy. تتطلب الثغرة صلاحيات المسؤول ويجب تفعيل الميزة يدوياً …
rss:CISA Advisories
—
06:11 KSA
<strong>ثغرة أمنية في منتجات Schneider Electric SCADAPack وRemoteConnect</strong>
كشفت شركة Schneider Electric عن ثغرة أمنية تؤثر على منتجات SCADAPack x70 RTU، بما في ذلك طرازات SCADAPack 47xi و47x و57x المستخدمة للمراقبة والتحكم عن بُعد في البيئات الصناعية. يجب على المؤسسات الت…
rss:CISA Advisories
—
06:11 KSA
<strong>ثغرات أمنية متعددة في Siemens SICAM SIAPP SDK</strong>
تم اكتشاف ثغرات أمنية متعددة في Siemens SICAM SIAPP SDK قد تمكن المهاجمين من تعطيل تطبيقات SIAPP المطورة من قبل العملاء أو بيئات المحاكاة الخاصة بها. تشمل التأثيرات المحتملة حجب الخدمة وتلف البيانات داخل SIAPP واستغل…
rss:CISA Advisories
—
06:11 KSA
<strong>ثغرة أمنية في CODESYS ضمن Festo Automation Suite</strong>
تم تحديد ثغرات أمنية في مكونات CODESYS ضمن Festo Automation Suite في الإصدارات الأقدم من 2.8.0.138، مما يؤثر على نظام CODESYS Development System 3.0. يجب على المؤسسات التي تستخدم حلول Festo للأتمتة الترقية إلى أحد…
📰 أخبار الأمن السيبراني
0 مقال
لا توجد أخبار مجمّعة اليوم حتى الآن
يتم تحديث هذه النشرة تلقائياً يومياً — آخر تحديث: 17 Mar 2026
أرشيف الثغرات ·
التهديدات ·
الأخبار