🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2025-57707 |
An improper neutralization of directives in statically saved code…
An improper neutralization of directives in statically saved code ('Static Code Injection') vulnerab…
|
HIGH |
8.8
|
✅ AI | فبراير 11, 2026 |
| CVE-2025-57709 |
A buffer overflow vulnerability has been reported to affect Qsync…
A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gain…
|
HIGH |
8.1
|
✅ | فبراير 11, 2026 |
| CVE-2025-57713 |
A weak authentication vulnerability has been reported to affect F…
A weak authentication vulnerability has been reported to affect File Station 5. The remote attackers…
|
HIGH |
7.5
|
✅ | فبراير 11, 2026 |
| CVE-2025-9986 |
Exposure of Sensitive System Information to an Unauthorized Contr…
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Cor…
|
HIGH |
8.2
|
✅ | فبراير 11, 2026 |
| CVE-2026-0910 |
The wpForo Forum plugin for WordPress is vulnerable to PHP Object…
The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, a…
|
HIGH |
8.8
|
✅ AI | فبراير 11, 2026 |
| CVE-2025-40587 |
A vulnerability has been identified in Polarion V2404 (All versio…
A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), Polarion V2410 (All …
|
HIGH |
7.6
|
✅ | فبراير 10, 2026 |
| CVE-2025-6967 |
Execution After Redirect (EAR) vulnerability in Sarman Soft Softw…
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industr…
|
HIGH |
8.7
|
✅ | فبراير 10, 2026 |
| CVE-2025-7347 |
Authorization Bypass Through User-Controlled Key vulnerability in…
Authorization Bypass Through User-Controlled Key vulnerability in Dinibh Puzzle Software Solutions D…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2025-7636 |
Improper Neutralization of Special Elements used in an SQL Comman…
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-0485 |
SAP BusinessObjects BI Platform allows an unauthenticated attacke…
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted request…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
| CVE-2026-0490 |
SAP BusinessObjects BI Platform allows an unauthenticated attacke…
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network reque…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
| CVE-2026-0508 |
The SAP BusinessObjects Business Intelligence Platform allows an …
The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high pr…
|
HIGH |
7.3
|
✅ | فبراير 10, 2026 |
| CVE-2026-0651 |
On TP-Link Tapo C260 v1, path traversal is possible due to improp…
On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request…
|
HIGH |
7.8
|
✅ | فبراير 10, 2026 |
| CVE-2026-0652 |
On TP-Link Tapo C260 v1, command injection vulnerability exists d…
On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in cert…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-0845 |
The WCFM – Frontend Manager for WooCommerce along with Bookings S…
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plu…
|
HIGH |
7.2
|
✅ | فبراير 10, 2026 |
| CVE-2026-25646 |
LIBPNG is a reference library for use in applications that read, …
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portabl…
|
HIGH |
8.1
|
⚡ ✅ | فبراير 10, 2026 |
| CVE-2026-25655 |
A vulnerability has been identified in SINEC NMS (All versions < …
A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The affected application…
|
HIGH |
7.8
|
✅ | فبراير 10, 2026 |
| CVE-2026-25656 |
A vulnerability has been identified in SINEC NMS (All versions), …
A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (Al…
|
HIGH |
7.8
|
✅ | فبراير 10, 2026 |
| CVE-2026-25728 |
ClipBucket v5 is an open source video sharing platform. Prior to …
ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #40, a Time-of-Check to Tim…
|
HIGH |
7.5
|
⚡ ✅ | فبراير 10, 2026 |
| CVE-2026-1603 |
An authentication bypass in Ivanti Endpoint Manager before versio…
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen…
|
HIGH |
8.6
|
✅ KEV | فبراير 10, 2026 |
| CVE-2026-1866 |
The Name Directory plugin for WordPress is vulnerable to Stored C…
The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via double HTML…
|
HIGH |
7.2
|
✅ | فبراير 10, 2026 |
| CVE-2026-2093 |
Docpedia developed by Flowring has a SQL Injection vulnerability,…
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote at…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
| CVE-2026-2094 |
Docpedia developed by Flowring has a SQL Injection vulnerability,…
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote atta…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-2097 |
Agentflow developed by Flowring has an Arbitrary File Upload vuln…
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated r…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-21218 |
Improper handling of missing special element in .NET allows an un…
Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoo…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً