🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2020-11652 |
SaltStack Salt Path Traversal Vulnerability — SaltStack Salt cont…
SaltStack Salt Path Traversal Vulnerability — SaltStack Salt contains a path traversal vulnerability…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-11738 |
WordPress Snap Creek Duplicator Plugin File Download Vulnerabilit…
WordPress Snap Creek Duplicator Plugin File Download Vulnerability — WordPress Snap Creek Duplicator…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-12271 |
Sophos SFOS SQL Injection Vulnerability — Sophos Firewall operati…
Sophos SFOS SQL Injection Vulnerability — Sophos Firewall operating system (SFOS) firmware contains …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-12812 |
Fortinet FortiOS SSL VPN Improper Authentication Vulnerability — …
Fortinet FortiOS SSL VPN Improper Authentication Vulnerability — Fortinet FortiOS SSL VPN contains a…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-1350 |
Microsoft Windows DNS Server Remote Code Execution Vulnerability …
Microsoft Windows DNS Server Remote Code Execution Vulnerability — Microsoft Windows DNS Servers fai…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-1380 |
Microsoft Internet Explorer Scripting Engine Memory Corruption Vu…
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Ex…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-1464 |
Microsoft Windows Spoofing Vulnerability — Microsoft Windows cont…
Microsoft Windows Spoofing Vulnerability — Microsoft Windows contains a spoofing vulnerability when …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-1472 |
Microsoft Netlogon Privilege Escalation Vulnerability — Microsoft…
Microsoft Netlogon Privilege Escalation Vulnerability — Microsoft's Netlogon Remote Protocol (MS-NRP…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-14750 |
Oracle WebLogic Server Remote Code Execution Vulnerability — Orac…
Oracle WebLogic Server Remote Code Execution Vulnerability — Oracle WebLogic Server contains an unsp…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-14871 |
Oracle Solaris and Zettabyte File System (ZFS) Unspecified Vulner…
Oracle Solaris and Zettabyte File System (ZFS) Unspecified Vulnerability — Oracle Solaris and Oracle…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-14882 |
Oracle WebLogic Server Remote Code Execution Vulnerability — Orac…
Oracle WebLogic Server Remote Code Execution Vulnerability — Oracle WebLogic Server contains an unsp…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-14883 |
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogi…
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogic Server contains an unspecified vu…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-15505 |
Ivanti MobileIron Multiple Products Remote Code Execution Vulnera…
Ivanti MobileIron Multiple Products Remote Code Execution Vulnerability — Ivanti MobileIron's Core &…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-15999 |
Google Chrome FreeType Heap Buffer Overflow Vulnerability — Googl…
Google Chrome FreeType Heap Buffer Overflow Vulnerability — Google Chrome uses FreeType, an open-sou…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-16009 |
Google Chromium V8 Type Confusion Vulnerability — Google Chromium…
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 Engine contains a type confusio…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-16010 |
Google Chrome for Android UI Heap Buffer Overflow Vulnerability —…
Google Chrome for Android UI Heap Buffer Overflow Vulnerability — Google Chrome for Android UI conta…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-16013 |
Google Chromium V8 Incorrect Implementation Vulnerabililty — Goog…
Google Chromium V8 Incorrect Implementation Vulnerabililty — Google Chromium V8 Engine contains an i…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-16017 |
Google Chrome Use-After-Free Vulnerability — Google Chrome contai…
Google Chrome Use-After-Free Vulnerability — Google Chrome contains a use-after-free vulnerability t…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-16846 |
SaltStack Salt Shell Injection Vulnerability — SaltStack Salt all…
SaltStack Salt Shell Injection Vulnerability — SaltStack Salt allows an unauthenticated user with ne…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-17087 |
Microsoft Windows Kernel Privilege Escalation Vulnerability — Mic…
Microsoft Windows Kernel Privilege Escalation Vulnerability — Microsoft Windows kernel contains an u…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-17144 |
Microsoft Exchange Server Remote Code Execution Vulnerability — M…
Microsoft Exchange Server Remote Code Execution Vulnerability — Microsoft Exchange Server improperly…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-17496 |
vBulletin PHP Module Remote Code Execution Vulnerability — The PH…
vBulletin PHP Module Remote Code Execution Vulnerability — The PHP module within vBulletin contains …
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-17530 |
Apache Struts Remote Code Execution Vulnerability — Forced Object…
Apache Struts Remote Code Execution Vulnerability — Forced Object-Graph Navigation Language (OGNL) e…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-24557 |
Trend Micro Multiple Products Improper Access Control Vulnerabili…
Trend Micro Multiple Products Improper Access Control Vulnerability — Trend Micro Apex One, OfficeSc…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
| CVE-2020-25213 |
WordPress File Manager Plugin Remote Code Execution Vulnerability…
WordPress File Manager Plugin Remote Code Execution Vulnerability — WordPress File Manager plugin co…
|
CRITICAL |
9.0
|
⚡ ✅ KEV AI | نوفمبر 3, 2021 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً