🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2022-26501 |
Veeam Backup & Replication Remote Code Execution Vulnerability — …
Veeam Backup & Replication Remote Code Execution Vulnerability — The Veeam Distribution Service in t…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | ديسمبر 13, 2022 |
| CVE-2022-27518 |
Citrix Application Delivery Controller (ADC) and Gateway Authenti…
Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability — Citri…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | ديسمبر 13, 2022 |
| CVE-2022-4262 |
Google Chromium V8 Type Confusion Vulnerability — Google Chromium…
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 Engine contains a type confusio…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | ديسمبر 5, 2022 |
| CVE-2022-4135 |
Google Chromium GPU Heap Buffer Overflow Vulnerability — Google C…
Google Chromium GPU Heap Buffer Overflow Vulnerability — Google Chromium GPU contains a heap buffer …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 28, 2022 |
| CVE-2021-35587 |
Oracle Fusion Middleware Unspecified Vulnerability — Oracle Fusio…
Oracle Fusion Middleware Unspecified Vulnerability — Oracle Fusion Middleware Access Manager allows …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 28, 2022 |
| CVE-2022-41049 |
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass …
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability — Microsoft Windows M…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 14, 2022 |
| CVE-2021-25337 |
Samsung Mobile Devices Improper Access Control Vulnerability — Sa…
Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices contain an imp…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2021-25369 |
Samsung Mobile Devices Improper Access Control Vulnerability — Sa…
Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices using Mali GPU…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2021-25370 |
Samsung Mobile Devices Memory Corruption Vulnerability — Samsung …
Samsung Mobile Devices Memory Corruption Vulnerability — Samsung mobile devices using Mali GPU conta…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2022-41073 |
Microsoft Windows Print Spooler Privilege Escalation Vulnerabilit…
Microsoft Windows Print Spooler Privilege Escalation Vulnerability — Microsoft Windows Print Spooler…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2022-41091 |
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass …
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability — Microsoft Windows M…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2022-41125 |
Microsoft Windows CNG Key Isolation Service Privilege Escalation …
Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability — Microsoft Windows C…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2022-41128 |
Microsoft Windows Scripting Languages Remote Code Execution Vulne…
Microsoft Windows Scripting Languages Remote Code Execution Vulnerability — Microsoft Windows contai…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 8, 2022 |
| CVE-2022-3723 |
Google Chromium V8 Type Confusion Vulnerability — Google Chromium…
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 Engine contains a type confusio…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 28, 2022 |
| CVE-2022-42827 |
Apple iOS and iPadOS Out-of-Bounds Write Vulnerability — Apple iO…
Apple iOS and iPadOS Out-of-Bounds Write Vulnerability — Apple iOS and iPadOS kernel contain an out-…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 25, 2022 |
| CVE-2018-19320 |
GIGABYTE Multiple Products Unspecified Vulnerability — The GDrv l…
GIGABYTE Multiple Products Unspecified Vulnerability — The GDrv low-level driver in GIGABYTE App Cen…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2018-19321 |
GIGABYTE Multiple Products Privilege Escalation Vulnerability — T…
GIGABYTE Multiple Products Privilege Escalation Vulnerability — The GPCIDrv and GDrv low-level drive…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2018-19322 |
GIGABYTE Multiple Products Code Execution Vulnerability — The GPC…
GIGABYTE Multiple Products Code Execution Vulnerability — The GPCIDrv and GDrv low-level drivers in …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2018-19323 |
GIGABYTE Multiple Products Privilege Escalation Vulnerability — T…
GIGABYTE Multiple Products Privilege Escalation Vulnerability — The GPCIDrv and GDrv low-level drive…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2020-3153 |
Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled …
Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability — Cisco A…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2020-3433 |
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking…
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability — Cisco AnyConnect S…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 24, 2022 |
| CVE-2021-3493 |
Linux Kernel Privilege Escalation Vulnerability — The overlayfs s…
Linux Kernel Privilege Escalation Vulnerability — The overlayfs stacking file system in Linux kernel…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 20, 2022 |
| CVE-2022-41352 |
Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vu…
Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability — Synacor Zimbra Collab…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 20, 2022 |
| CVE-2022-40684 |
Fortinet Multiple Products Authentication Bypass Vulnerability — …
Fortinet Multiple Products Authentication Bypass Vulnerability — Fortinet FortiOS, FortiProxy, and F…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 11, 2022 |
| CVE-2022-41033 |
Microsoft Windows COM+ Event System Service Privilege Escalation …
Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability — Microsoft Windows C…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | أكتوبر 11, 2022 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً