🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-26112 |
Untrusted pointer dereference in Microsoft Office Excel allows an…
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute c…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26113 |
Untrusted pointer dereference in Microsoft Office allows an unaut…
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code lo…
|
HIGH |
8.4
|
✅ | مارس 10, 2026 |
| CVE-2026-26114 |
Deserialization of untrusted data in Microsoft Office SharePoint …
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex…
|
HIGH |
8.8
|
✅ AI | مارس 10, 2026 |
| CVE-2026-26116 |
Improper neutralization of special elements used in an sql comman…
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server a…
|
HIGH |
8.8
|
✅ AI | مارس 10, 2026 |
| CVE-2026-26117 |
Authentication bypass using an alternate path or channel in Azure…
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allo…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26118 |
Server-side request forgery (ssrf) in Azure MCP Server allows an …
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate priv…
|
HIGH |
8.8
|
✅ AI | مارس 10, 2026 |
| CVE-2026-26121 |
Server-side request forgery (ssrf) in Azure IoT Explorer allows a…
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform …
|
HIGH |
7.5
|
✅ | مارس 10, 2026 |
| CVE-2026-26127 |
Out-of-bounds read in .NET allows an unauthorized attacker to den…
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
|
HIGH |
7.5
|
✅ | مارس 10, 2026 |
| CVE-2026-26128 |
Improper authentication in Windows SMB Server allows an authorize…
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges lo…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26130 |
Allocation of resources without limits or throttling in ASP.NET C…
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker…
|
HIGH |
7.5
|
✅ | مارس 10, 2026 |
| CVE-2026-26131 |
Incorrect default permissions in .NET allows an authorized attack…
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26132 |
Use after free in Windows Kernel allows an authorized attacker to…
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26134 |
Integer overflow or wraparound in Microsoft Office allows an auth…
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileg…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26141 |
Improper authentication in Azure Arc allows an authorized attacke…
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-26148 |
External initialization of trusted variables or data stores in Az…
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized…
|
HIGH |
8.1
|
✅ | مارس 10, 2026 |
| CVE-2026-26308 |
Envoy is a high-performance edge/middle/service proxy. Prior to 1…
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,…
|
HIGH |
7.5
|
⚡ ✅ | مارس 10, 2026 |
| CVE-2026-2724 |
The Unlimited Elements for Elementor plugin for WordPress is vuln…
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripti…
|
HIGH |
7.2
|
✅ | مارس 10, 2026 |
| CVE-2026-27269 |
Premiere Pro versions 25.5 and earlier are affected by an out-of-…
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when pars…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27273 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27274 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27275 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27276 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that …
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27277 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that …
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27279 |
Substance3D - Stager versions 3.1.7 and earlier are affected by a…
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-27280 |
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of…
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that co…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً