🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-2383 |
The Simple Download Monitor plugin for WordPress is vulnerable to…
The Simple Download Monitor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via cu…
|
MEDIUM |
6.4
|
— | فبراير 27, 2026 |
| CVE-2026-24350 |
PluXml CMS is vulnerable to Stored XSS in file uploading function…
PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker ca…
|
MEDIUM |
5.4
|
— | فبراير 27, 2026 |
| CVE-2026-24351 |
PluXml CMS is vulnerable to Stored XSS in Static Pages editing fu…
PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing …
|
MEDIUM |
5.4
|
— | فبراير 27, 2026 |
| CVE-2026-24488 |
OpenEMR is a free and open source electronic health records and m…
OpenEMR is a free and open source electronic health records and medical practice management applicat…
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
| CVE-2026-24497 |
Stack-based Buffer Overflow vulnerability in SimTech Systems, Inc…
Stack-based Buffer Overflow vulnerability in SimTech Systems, Inc. ThinkWise allows Remote Code Incl…
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-24498 |
Exposure of Sensitive Information to an Unauthorized Actor vulner…
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIM…
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-25774 |
Charging station authentication identifiers are publicly accessib…
Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
| CVE-2026-26997 |
ClipBucket v5 is an open source video sharing platform. Prior to …
ClipBucket v5 is an open source video sharing platform. Prior to version 5.5.3 #59, a normal authent…
|
MEDIUM |
5.4
|
⚡ | فبراير 27, 2026 |
| CVE-2026-27200 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27201 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27500 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27501 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27573 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27580 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27581 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27582 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27583 |
Rejected reason: Further research determined the situation descri…
Rejected reason: Further research determined the situation described is not a vulnerability.
|
MEDIUM | — | — | فبراير 27, 2026 |
| CVE-2026-27653 |
The installers for multiple products provided by Soliton Systems …
The installers for multiple products provided by Soliton Systems K.K. contain an issue with incorrec…
|
MEDIUM |
6.7
|
— | فبراير 27, 2026 |
| CVE-2026-27734 |
Beszel is a server monitoring platform. Prior to version 0.18.2, …
Beszel is a server monitoring platform. Prior to version 0.18.2, the hub's authenticated API endpoin…
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
| CVE-2026-27752 |
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transm…
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over …
|
MEDIUM |
5.9
|
— | فبراير 27, 2026 |
| CVE-2026-27753 |
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contai…
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnerab…
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
| CVE-2026-27754 |
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use th…
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash…
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
| CVE-2026-27756 |
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contai…
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a reflected cross-site scripting …
|
MEDIUM |
6.1
|
— | فبراير 27, 2026 |
| CVE-2026-27758 |
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contai…
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vuln…
|
MEDIUM |
4.3
|
— | فبراير 27, 2026 |
| CVE-2026-27773 |
Charging station authentication identifiers are publicly accessib…
Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
|
MEDIUM |
6.5
|
— | فبراير 27, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً