🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-25728 |
ClipBucket v5 is an open source video sharing platform. Prior to …
ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #40, a Time-of-Check to Tim…
|
HIGH |
7.5
|
⚡ ✅ | فبراير 10, 2026 |
| CVE-2025-40587 |
A vulnerability has been identified in Polarion V2404 (All versio…
A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), Polarion V2410 (All …
|
HIGH |
7.6
|
✅ | فبراير 10, 2026 |
| CVE-2025-6967 |
Execution After Redirect (EAR) vulnerability in Sarman Soft Softw…
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industr…
|
HIGH |
8.7
|
✅ | فبراير 10, 2026 |
| CVE-2025-7347 |
Authorization Bypass Through User-Controlled Key vulnerability in…
Authorization Bypass Through User-Controlled Key vulnerability in Dinibh Puzzle Software Solutions D…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2025-7636 |
Improper Neutralization of Special Elements used in an SQL Comman…
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-0485 |
SAP BusinessObjects BI Platform allows an unauthenticated attacke…
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted request…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
| CVE-2026-0490 |
SAP BusinessObjects BI Platform allows an unauthenticated attacke…
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network reque…
|
HIGH |
7.5
|
✅ | فبراير 10, 2026 |
| CVE-2026-0508 |
The SAP BusinessObjects Business Intelligence Platform allows an …
The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high pr…
|
HIGH |
7.3
|
✅ | فبراير 10, 2026 |
| CVE-2026-0651 |
On TP-Link Tapo C260 v1, path traversal is possible due to improp…
On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request…
|
HIGH |
7.8
|
✅ | فبراير 10, 2026 |
| CVE-2026-0652 |
On TP-Link Tapo C260 v1, command injection vulnerability exists d…
On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in cert…
|
HIGH |
8.8
|
✅ AI | فبراير 10, 2026 |
| CVE-2026-0845 |
The WCFM – Frontend Manager for WooCommerce along with Bookings S…
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plu…
|
HIGH |
7.2
|
✅ | فبراير 10, 2026 |
| CVE-2025-10463 |
Improper Authentication vulnerability in Birtech Information Tech…
Improper Authentication vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co…
|
HIGH |
7.3
|
✅ | فبراير 9, 2026 |
| CVE-2025-10465 |
Unrestricted Upload of File with Dangerous Type vulnerability in …
Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies In…
|
HIGH |
8.8
|
✅ AI | فبراير 9, 2026 |
| CVE-2025-7799 |
Improper Neutralization of Input During Web Page Generation (XSS …
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerab…
|
HIGH |
8.6
|
✅ | فبراير 9, 2026 |
| CVE-2026-0870 |
MacroHub developed by GIGABYTE has a Local Privilege Escalation v…
MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub a…
|
HIGH |
7.8
|
✅ | فبراير 9, 2026 |
| CVE-2026-2210 |
A vulnerability has been found in D-Link DIR-823X 250416. This af…
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of th…
|
HIGH |
7.2
|
⚡ ✅ | فبراير 9, 2026 |
| CVE-2026-2236 |
C&Cm@il developed by HGiga has a SQL Injection vulnerability, al…
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attac…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-22905 |
An unauthenticated remote attacker can bypass authentication by e…
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validati…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-23948 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, a NULL pointer der…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24491 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can se…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24675 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interfa…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24676 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, AUDIN format reneg…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24678 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread s…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24680 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, sdl_Pointer_New fr…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
| CVE-2026-24681 |
FreeRDP is a free implementation of the Remote Desktop Protocol. …
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk…
|
HIGH |
7.5
|
✅ | فبراير 9, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً