📧 info@ciso.sa | 📱 +966550939344 | الرياض، المملكة العربية السعودية
🔧 صيانة مجدولة — السبت 2:00-4:00 صباحاً. قد تكون بعض الميزات غير متاحة مؤقتاً.    ●   
💎
خطة Pro بخصم 50% احصل على جميع ميزات AI والتقارير غير المحدودة والدعم ذي الأولوية. ترقّ الآن
مركز البحث
ESC للإغلاق
Global apt القطاع الحكومي CRITICAL 2h Global apt البنية التحتية الحرجة / الطاقة النووية CRITICAL 3h Global vulnerability البنية التحتية الحرجة والحكومة والمؤسسات HIGH 7h Global ransomware قطاع أمن المنازل والخدمات الاستهلاكية HIGH 14h Global malware البنية التحتية للشبكات / الاتصالات CRITICAL 16h Global general البرمجيات / عمليات تكنولوجيا المعلومات LOW 16h Global extortion البيع بالتجزئة والضيافة HIGH 18h Global phishing التكنولوجيا/أمن المؤسسات MEDIUM 18h Global vulnerability تكنولوجيا المعلومات والبنية التحتية CRITICAL 19h Global backdoor الحكومة والبنية التحتية الحرجة CRITICAL 19h Global apt القطاع الحكومي CRITICAL 2h Global apt البنية التحتية الحرجة / الطاقة النووية CRITICAL 3h Global vulnerability البنية التحتية الحرجة والحكومة والمؤسسات HIGH 7h Global ransomware قطاع أمن المنازل والخدمات الاستهلاكية HIGH 14h Global malware البنية التحتية للشبكات / الاتصالات CRITICAL 16h Global general البرمجيات / عمليات تكنولوجيا المعلومات LOW 16h Global extortion البيع بالتجزئة والضيافة HIGH 18h Global phishing التكنولوجيا/أمن المؤسسات MEDIUM 18h Global vulnerability تكنولوجيا المعلومات والبنية التحتية CRITICAL 19h Global backdoor الحكومة والبنية التحتية الحرجة CRITICAL 19h Global apt القطاع الحكومي CRITICAL 2h Global apt البنية التحتية الحرجة / الطاقة النووية CRITICAL 3h Global vulnerability البنية التحتية الحرجة والحكومة والمؤسسات HIGH 7h Global ransomware قطاع أمن المنازل والخدمات الاستهلاكية HIGH 14h Global malware البنية التحتية للشبكات / الاتصالات CRITICAL 16h Global general البرمجيات / عمليات تكنولوجيا المعلومات LOW 16h Global extortion البيع بالتجزئة والضيافة HIGH 18h Global phishing التكنولوجيا/أمن المؤسسات MEDIUM 18h Global vulnerability تكنولوجيا المعلومات والبنية التحتية CRITICAL 19h Global backdoor الحكومة والبنية التحتية الحرجة CRITICAL 19h
📅 النشرة الأمنية اليومية — 17 Mar 2026

🇸🇦 النشرة الأمنية السعودية

جميع الثغرات الأمنية والتهديدات والأخبار المجمّعة اليوم من مصادر موثوقة — محدّث باستمرار

91 ثغرة
16 تهديد
0 خبر
1 حرجة
🛡 الثغرات الأمنية (CVE)
91 ثغرة
CVE-2026-28495
ثغرة CSRF في GetSimple CMS massiveAdmin تمكن من تنفيذ أوامر بعيدة عبر gsconfig.php
03:13 KSA
حرج CVSS 9.6 CWE-352
يحتوي المكون الإضافي massiveAdmin الإصدار 6.0.3 في GetSimple CMS على ثغرة Cross-Site Request Forgery في وحدة محرر gsconfig تسمح للمهاجمين غير المصرح لهم باستبدال ملف التكوين gsconfig.php برمز PHP تعسفي. يمكن استغلال هذه الثغرة من خلال متصفح مسؤول مسجل الدخول لتحقيق تنفيذ أوامر بع…
CVE-2026-20967
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a
03:13 KSA
عالٍ CVSS 8.8 CWE-20
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
CVE-2026-3854
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an
03:13 KSA
عالٍ CVSS 8.8 CWE-77
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were n…
CVE-2026-26118
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a networ
03:13 KSA
عالٍ CVSS 8.8 CWE-918
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26116
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized
03:13 KSA
عالٍ CVSS 8.8 CWE-89
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26114
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a ne
03:13 KSA
عالٍ CVSS 8.8 CWE-502
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-26106
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
03:13 KSA
عالٍ CVSS 8.8 CWE-20
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-25188
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an ad
03:13 KSA
عالٍ CVSS 8.8 CWE-122
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.
CVE-2026-25177
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized att
03:13 KSA
عالٍ CVSS 8.8 CWE-641
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
CVE-2026-24283
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 8.8 CWE-122
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
CVE-2026-23669
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
03:13 KSA
عالٍ CVSS 8.8 CWE-416
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
CVE-2026-23654
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to
03:13 KSA
عالٍ CVSS 8.8
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network.
CVE-2026-28513
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, th
03:13 KSA
عالٍ CVSS 8.5 CWE-863
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and ex…
CVE-2026-26113
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 8.4 CWE-822
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26110
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to exe
03:13 KSA
عالٍ CVSS 8.4 CWE-843
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26109
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 8.4 CWE-125
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26148
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate
03:13 KSA
عالٍ CVSS 8.1 CWE-454
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25172
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
عالٍ CVSS 8.0 CWE-122
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-25173
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
عالٍ CVSS 8.0 CWE-122
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-26117
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized att
03:13 KSA
عالٍ CVSS 7.8 CWE-288
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-27277
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26141
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-287
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
CVE-2026-26134
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-190
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
CVE-2026-26132
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25187
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate priv
03:13 KSA
عالٍ CVSS 7.8 CWE-59
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
CVE-2026-26131
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-276
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
CVE-2026-25189
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2026-25190
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-426
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
CVE-2026-26128
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-287
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-25176
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privil
03:13 KSA
عالٍ CVSS 7.8 CWE-284
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-23673
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-125
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
CVE-2026-23660
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally
03:13 KSA
عالٍ CVSS 7.8 CWE-284
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.
CVE-2026-26107
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26108
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-122
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-23672
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
03:13 KSA
عالٍ CVSS 7.8 CWE-125
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-27279
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
عالٍ CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26112
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-822
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-27280
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitr
03:13 KSA
عالٍ CVSS 7.8 CWE-787
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-25165
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-476
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
CVE-2026-24289
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-24290
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-284
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
CVE-2026-24291
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an a
03:13 KSA
عالٍ CVSS 7.8 CWE-732
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.
CVE-2026-24292
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locall
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
CVE-2026-24293
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privi
03:13 KSA
عالٍ CVSS 7.8 CWE-476
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-24294
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-287
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-27275
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
عالٍ CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27274
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
عالٍ CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-24287
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-73
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25166
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-502
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
CVE-2026-27273
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
عالٍ CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27269
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file,
03:13 KSA
عالٍ CVSS 7.8 CWE-125
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the …
CVE-2026-27276
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
عالٍ CVSS 7.8 CWE-416
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-23665
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-122
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
CVE-2026-25174
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-125
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
CVE-2026-25175
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.8 CWE-125
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
CVE-2026-27689
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular us
03:13 KSA
عالٍ CVSS 7.7 CWE-606
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonge…
CVE-2026-30929
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-1
03:13 KSA
عالٍ CVSS 7.7 CWE-121
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vul…
CVE-2026-25181
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
03:13 KSA
عالٍ CVSS 7.5 CWE-125
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
CVE-2026-30939
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13
03:13 KSA
عالٍ CVSS 7.5 CWE-1321
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13 and 9.5.1-alpha.2, an unauthenticated attacker can crash the Parse Server process by calling a Cloud Function endpoint with a prototype property name as the fun…
CVE-2026-30925
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-a
03:13 KSA
عالٍ CVSS 7.5 CWE-1333
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-alpha.14 and 8.6.11, a malicious client can subscribe to a LiveQuery with a crafted $regex pattern that causes catastrophic backtracking, blocking the Node.js ev…
CVE-2026-28431
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but p
03:13 KSA
عالٍ CVSS 7.5 CWE-285
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to access due to insufficient permission c…
CVE-2026-26308
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Rol
03:13 KSA
عالٍ CVSS 7.5 CWE-863
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instea…
CVE-2026-23664
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacke
03:13 KSA
عالٍ CVSS 7.5 CWE-923
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-2339
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Li
03:13 KSA
عالٍ CVSS 7.5 CWE-306
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.
CVE-2026-28432
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerabilit
03:13 KSA
عالٍ CVSS 7.5 CWE-347
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects all servers regardless of whether federa…
CVE-2026-23662
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose informati
03:13 KSA
عالٍ CVSS 7.5 CWE-306
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-26130
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service ove
03:13 KSA
عالٍ CVSS 7.5 CWE-770
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
CVE-2026-30941
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14
03:13 KSA
عالٍ CVSS 7.5 CWE-943
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14 and 9.5.2-alpha.1, NoSQL injection vulnerability allows an unauthenticated attacker to inject MongoDB query operators via the token field in the password reset …
CVE-2026-26127
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
03:13 KSA
عالٍ CVSS 7.5 CWE-125
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
CVE-2026-26121
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a netw
03:13 KSA
عالٍ CVSS 7.5 CWE-20
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-23674
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security fea
03:13 KSA
عالٍ CVSS 7.5 CWE-41
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-3585
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.
03:13 KSA
عالٍ CVSS 7.5 CWE-22
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitr…
CVE-2026-23661
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose inform
03:13 KSA
عالٍ CVSS 7.5 CWE-319
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-25573
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell co
03:13 KSA
عالٍ CVSS 7.4 CWE-73
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full sys…
CVE-2026-25167
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.4 CWE-416
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25569
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exi
03:13 KSA
عالٍ CVSS 7.4 CWE-787
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execu…
CVE-2026-25570
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform che
03:13 KSA
عالٍ CVSS 7.4 CWE-121
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service.
CVE-2026-2364
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low pr
03:13 KSA
عالٍ CVSS 7.3 CWE-367
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.
CVE-2026-30958
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal
03:13 KSA
عالٍ CVSS 7.2 CWE-22
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal in the /workflow/docs/:componentName endpoint allows reading arbitrary files from the server filesystem. The componentName route parameter is concatenated dire…
CVE-2026-1261
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions u
03:13 KSA
عالٍ CVSS 7.2 CWE-79
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary …
CVE-2026-2724
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entr
03:13 KSA
عالٍ CVSS 7.2 CWE-79
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in th…
CVE-2026-25179
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized att
03:13 KSA
عالٍ CVSS 7.0 CWE-1287
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25178
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges loca
03:13 KSA
عالٍ CVSS 7.0 CWE-416
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25171
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.0 CWE-416
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2026-25170
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.0 CWE-416
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2026-24296
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
عالٍ CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24295
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
عالٍ CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24285
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.0 CWE-416
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
CVE-2026-23671
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM P
03:13 KSA
عالٍ CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-23667
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
03:13 KSA
عالٍ CVSS 7.0 CWE-416
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
CVE-2026-23668
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Compon
03:13 KSA
عالٍ CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
⚠️ استخبارات التهديدات
16 تهديد
rss:The Hacker News
06:54 KSA
عالٍ general
<strong>الذكاء الاصطناعي في كل مكان، لكن مسؤولي أمن المعلومات لا يزالون يؤمنونه بمهارات وأدوات الأمس، وفقاً لدراسة</strong> كشف استطلاع شمل 300 من مسؤولي أمن المعلومات الأمريكيين أن قادة الأمن السيبراني يفتقرون إلى الأدوات والمهارات الكافية للدفاع عن أنظمة الذكاء الاصطناعي بفعال…
rss:The Hacker News
06:54 KSA
عالٍ apt
<strong>مجموعة كوني تنشر برمجية EndRAT عبر التصيد الاحتيالي وتستخدم كاكاو توك لنشر البرمجيات الخبيثة</strong> تقوم جهات تهديد كورية شمالية منسوبة لمجموعة كوني الإلكترونية بشن حملات تصيد احتيالي لاختراق الضحايا واستغلال تطبيق كاكاو توك لنشر البرمجيات الخبيثة. يستخدم المهاجمون منص…
rss:The Hacker News
06:54 KSA
متوسط vulnerability
<strong>وكالة الأمن السيبراني الأمريكية تحذر من ثغرة مستغلة بنشاط في Wing FTP تكشف مسارات الخادم</strong> أضافت وكالة الأمن السيبراني الأمريكية ثغرة CVE-2025-47813 متوسطة الخطورة في Wing FTP إلى قائمة الثغرات المستغلة المعروفة بسبب الاستغلال النشط. تسمح الثغرة للمهاجمين بالحصول …
rss:The Hacker News
05:48 KSA
حرج vulnerability
<strong>ثغرات في الذكاء الاصطناعي بخدمات Amazon Bedrock وLangSmith وSGLang تتيح سرقة البيانات والتنفيذ عن بعد</strong> اكتشف باحثون أمنيون ثغرات في منصات الذكاء الاصطناعي Amazon Bedrock وLangSmith وSGLang تتيح سرقة البيانات الحساسة عبر استعلامات DNS والتنفيذ عن بعد للأوامر. تشكل…
rss:The Hacker News
05:48 KSA
عالٍ ransomware
<strong>برمجية الفدية LeakNet تستخدم تقنية ClickFix عبر المواقع المخترقة وتنشر محمّل Deno في الذاكرة</strong> تبنت مجموعة برمجيات الفدية LeakNet تكتيكات الهندسة الاجتماعية ClickFix عبر المواقع المخترقة لخداع المستخدمين لتنفيذ أوامر ضارة. يستخدم الهجوم محمّل Deno في الذاكرة، مما …
rss:Dark Reading
20:02 KSA
حرج apt
<strong>قراصنة مرتبطون بالصين يتسللون إلى منظمات عسكرية في جنوب شرق آسيا لسنوات</strong> نفذت جهات تهديد متقدمة مستمرة مرتبطة بالصين حملة تجسس إلكتروني استمرت لعدة سنوات ضد منظمات عسكرية في جنوب شرق آسيا. استخدم المهاجمون أبواباً خلفية جديدة وتقنيات تهرب متطورة للحفاظ على وصول م…
rss:Dark Reading
19:00 KSA
متوسط phishing
<strong>قراصنة يستهدفون شركة الأمن السيبراني Outpost24 بهجوم تصيد متعدد المراحل</strong> نجحت شركة الأمن السيبراني Outpost24 في التصدي لهجوم تصيد احتيالي متطور من 7 مراحل استهدف أحد المسؤولين التنفيذيين. استغل المهاجمون علامات تجارية موثوقة ونطاقات شرعية لمحاولة سرقة بيانات الاع…
rss:Dark Reading
19:00 KSA
عالٍ ransomware
<strong>مجموعة برامج الفدية Warlock تعزز أنشطة ما بعد الاختراق</strong> عززت مجموعة برامج الفدية Warlock قدراتها في مرحلة ما بعد الاختراق باستخدام تقنية جديدة لإحضار برنامج تشغيل ضعيف (BYOVD) للتحرك الخفي عبر الشبكات. يتيح هذا التطور للمجموعة التهرب من الكشف أثناء التنقل الجانبي…
rss:Malwarebytes Lab
06:29 KSA
متوسط general
<strong>90% من الناس لا يثقون بالذكاء الاصطناعي مع بياناتهم</strong> كشف استطلاع للخصوصية أن 90% من المشاركين لا يثقون بأنظمة الذكاء الاصطناعي مع بياناتهم الشخصية، مما دفع الكثيرين لتقليل استخدامهم للذكاء الاصطناعي. يشكل هذا الانعدام الواسع للثقة تحديات كبيرة للمؤسسات التي تطبق …
rss:Malwarebytes Lab
06:29 KSA
عالٍ phishing
<strong>كيف يمكن أن يعني البحث عن VPN تسليم بيانات تسجيل دخولك للعمل</strong> يستخدم مجرمو الإنترنت تقنيات تسميم محركات البحث لجعل تنزيلات VPN الخبيثة تبدو شرعية في نتائج البحث، مستهدفين بيانات تسجيل الدخول المؤسسية. تواجه المؤسسات مخاطر متزايدة حيث قد يقوم الموظفون الباحثون عن …
rss:Malwarebytes Lab
06:29 KSA
متوسط malware
<strong>جوجل تشدد الرقابة على تطبيقات أندرويد التي تسيء استخدام ميزات إمكانية الوصول</strong> نفذت جوجل ضوابط أكثر صرامة على تطبيقات أندرويد التي تسيء استخدام ميزات إمكانية الوصول، والتي استغلتها البرامج الخبيثة لسنوات للحصول على صلاحيات مرتفعة والتحكم بالأجهزة. يقلل هذا التحسين…
rss:Malwarebytes Lab
06:29 KSA
متوسط phishing
<strong>موقع Pudgy World المزيف يسرق كلمات مرور العملات المشفرة</strong> يستهدف موقع تصيد احتيالي ينتحل صفة Pudgy World مستخدمي العملات المشفرة من خلال تقليد علامة Pudgy Penguins الشرعية. صُمم الموقع المزيف لسرقة كلمات مرور المحافظ الرقمية وبيانات الاعتماد من المعجبين.
rss:CISA Advisories
06:28 KSA
متوسط vulnerability
<strong>ثغرة أمنية في نظام Schneider Electric EcoStruxure Data Center Expert</strong> كشفت شركة Schneider Electric عن ثغرة أمنية تتعلق ببيانات اعتماد مشفرة في منتج EcoStruxure IT Data Center Expert تؤثر على ميزة SOCKS Proxy. تتطلب الثغرة صلاحيات المسؤول ويجب تفعيل الميزة يدوياً …
rss:CISA Advisories
06:11 KSA
عالٍ vulnerability
<strong>ثغرة أمنية في منتجات Schneider Electric SCADAPack وRemoteConnect</strong> كشفت شركة Schneider Electric عن ثغرة أمنية تؤثر على منتجات SCADAPack x70 RTU، بما في ذلك طرازات SCADAPack 47xi و47x و57x المستخدمة للمراقبة والتحكم عن بُعد في البيئات الصناعية. يجب على المؤسسات الت…
rss:CISA Advisories
06:11 KSA
عالٍ vulnerability
<strong>ثغرات أمنية متعددة في Siemens SICAM SIAPP SDK</strong> تم اكتشاف ثغرات أمنية متعددة في Siemens SICAM SIAPP SDK قد تمكن المهاجمين من تعطيل تطبيقات SIAPP المطورة من قبل العملاء أو بيئات المحاكاة الخاصة بها. تشمل التأثيرات المحتملة حجب الخدمة وتلف البيانات داخل SIAPP واستغل…
rss:CISA Advisories
06:11 KSA
متوسط vulnerability
<strong>ثغرة أمنية في CODESYS ضمن Festo Automation Suite</strong> تم تحديد ثغرات أمنية في مكونات CODESYS ضمن Festo Automation Suite في الإصدارات الأقدم من 2.8.0.138، مما يؤثر على نظام CODESYS Development System 3.0. يجب على المؤسسات التي تستخدم حلول Festo للأتمتة الترقية إلى أحد…
📰 أخبار الأمن السيبراني
0 مقال
📰 لا توجد أخبار مجمّعة اليوم حتى الآن

يتم تحديث هذه النشرة تلقائياً يومياً — آخر تحديث: 17 Mar 2026
أرشيف الثغرات · التهديدات · الأخبار

📣 وجدت هذا مفيداً؟
شاركه مع شبكة الأمن السيبراني الخاصة بك
in لينكدإن 𝕏 تويتر 💬 واتساب ✈ تليجرام
🍪 إعدادات الخصوصية
سيزو للاستشارات — متوافق مع نظام حماية البيانات الشخصية السعودي (PDPL)
نستخدم ملفات تعريف الارتباط والتقنيات المشابهة لتوفير أفضل تجربة على منصتنا. يمكنك اختيار الأنواع التي تقبلها.
🔒
ملفات ضرورية Always On
مطلوبة لعمل الموقع بشكل صحيح. لا يمكن تعطيلها.
📋 الجلسات، CSRF، المصادقة، تفضيلات اللغة
📊
ملفات التحليلات
تساعدنا في فهم كيفية استخدام الزوار للموقع وتحسين الأداء.
📋 إحصائيات الصفحات، مدة الجلسة، مصدر الزيارة
⚙️
ملفات وظيفية
تتيح ميزات محسنة مثل تخصيص المحتوى والتفضيلات.
📋 السمة المظلمة/الفاتحة، حجم الخط، لوحات التحكم المخصصة
📣
ملفات تسويقية
تُستخدم لتقديم محتوى وإعلانات ذات صلة باهتماماتك.
📋 تتبع الحملات، إعادة الاستهداف، تحليلات وسائل التواصل
سياسة الخصوصية →
مساعد CISO الذكي
اسألني أي شيء · وثائق · دعم
🔐

عرّفنا بنفسك

أدخل بياناتك للوصول إلى المساعد الكامل

معلوماتك آمنة ولن تُشارك
💬
المساعد السيبراني
متصل — يرد في ثوانٍ
5 / 5
🔐 تحقق من هويتك

أدخل بريدك الإلكتروني لإرسال رمز تحقق قبل إرسال طلب الدعم.

Enter للإرسال · / للأوامر 0 / 2000
CISO AI · مدعوم بالذكاء الاصطناعي
✦ استطلاع سريع ساعدنا في تحسين منصة سيزو للاستشارات ملاحظاتك تشكّل مستقبل منصتنا — لا تستغرق سوى دقيقتين.
⚠ يرجى الإجابة على هذا السؤال للمتابعة

كيف تقيّم تجربتك العامة مع منصتنا؟

قيّم من 1 (ضعيف) إلى 5 (ممتاز)

🎉
شكراً جزيلاً!
تم تسجيل إجابتك بنجاح.