🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-25177 |
Improper restriction of names for files and other resources in Ac…
Improper restriction of names for files and other resources in Active Directory Domain Services allo…
|
HIGH |
8.8
|
✅ AI | مارس 10, 2026 |
| CVE-2026-25178 |
Use after free in Windows Ancillary Function Driver for WinSock a…
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to ele…
|
HIGH |
7.0
|
✅ | مارس 10, 2026 |
| CVE-2026-25179 |
Improper validation of specified type of input in Windows Ancilla…
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allo…
|
HIGH |
7.0
|
✅ | مارس 10, 2026 |
| CVE-2026-25181 |
Out-of-bounds read in Windows GDI+ allows an unauthorized attacke…
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a ne…
|
HIGH |
7.5
|
✅ | مارس 10, 2026 |
| CVE-2026-25187 |
Improper link resolution before file access ('link following') in…
Improper link resolution before file access ('link following') in Winlogon allows an authorized atta…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-25188 |
Heap-based buffer overflow in Windows Telephony Service allows an…
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate p…
|
HIGH |
8.8
|
✅ AI | مارس 10, 2026 |
| CVE-2026-25189 |
Use after free in Windows DWM Core Library allows an authorized a…
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges local…
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-25190 |
Untrusted search path in Windows GDI allows an unauthorized attac…
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
|
HIGH |
7.8
|
✅ | مارس 10, 2026 |
| CVE-2026-21385 |
Memory corruption while using alignments for memory allocation.
Memory corruption while using alignments for memory allocation.
|
HIGH |
7.8
|
⚡ ✅ KEV | مارس 2, 2026 |
| CVE-2025-52468 |
Chamilo is a learning management system. Prior to version 1.11.30…
Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability…
|
HIGH |
8.8
|
⚡ ✅ AI | مارس 2, 2026 |
| CVE-2025-64427 |
ZimaOS is a fork of CasaOS, an operating system for Zima devices …
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In ve…
|
HIGH |
7.1
|
⚡ ✅ | مارس 2, 2026 |
| CVE-2025-10990 |
A flaw was found in REXML. A remote attacker could exploit ineffi…
A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) pa…
|
HIGH |
7.5
|
✅ | فبراير 27, 2026 |
| CVE-2025-69437 |
PublicCMS v5.202506.d and earlier is vulnerable to stored XSS. Up…
PublicCMS v5.202506.d and earlier is vulnerable to stored XSS. Uploaded PDFs can contain JavaScript …
|
HIGH |
8.7
|
✅ | فبراير 27, 2026 |
| CVE-2026-0980 |
A flaw was found in rubyipmi, a gem used in the Baseboard Managem…
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of R…
|
HIGH |
8.3
|
✅ | فبراير 27, 2026 |
| CVE-2026-1442 |
Since the encryption algorithm used to protect firmware updates i…
Since the encryption algorithm used to protect firmware updates is itself encrypted using key materi…
|
HIGH |
7.8
|
✅ | فبراير 27, 2026 |
| CVE-2026-20764 |
An OS command injection
vulnerability exists in XWEB Pro version…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
aut…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-2252 |
An XML External Entity (XXE) vulnerability allows malicious user …
An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forg…
|
HIGH |
7.5
|
✅ | فبراير 27, 2026 |
| CVE-2026-23702 |
An OS command injection
vulnerability exists in XWEB Pro version…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
aut…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-2428 |
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerab…
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of …
|
HIGH |
7.5
|
✅ | فبراير 27, 2026 |
| CVE-2026-24452 |
An OS command injection
vulnerability exists in XWEB Pro versio…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
au…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-25037 |
An OS command injection
vulnerability exists in XWEB Pro versio…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
au…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-25105 |
An OS command injection
vulnerability exists in XWEB Pro ve…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-25147 |
OpenEMR is a free and open source electronic health records and m…
OpenEMR is a free and open source electronic health records and medical practice management applicat…
|
HIGH |
7.1
|
✅ | فبراير 27, 2026 |
| CVE-2026-25196 |
An OS command injection
vulnerability exists in XWEB Pro version…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
aut…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
| CVE-2026-25721 |
An OS command injection
vulnerability exists in XWEB Pro version…
An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
aut…
|
HIGH |
8.0
|
✅ | فبراير 27, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً