🛡️ قاعدة بيانات الثغرات الأمنية
ثغرات CVE مع تحليل AI ثنائي اللغة خاص بالمملكة العربية السعودية
| المعرّف | العنوان / الوصف | الخطورة | CVSS | الحالة | النشر |
|---|---|---|---|---|---|
| CVE-2026-21520 |
Exposure of Sensitive Information to an Unauthorized Actor in Cop…
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticate…
|
HIGH |
7.5
|
✅ | يناير 22, 2026 |
| CVE-2026-21521 |
Improper neutralization of escape, meta, or control sequences in …
Improper neutralization of escape, meta, or control sequences in Copilot allows an unauthorized atta…
|
HIGH |
7.4
|
✅ | يناير 22, 2026 |
| CVE-2026-21524 |
Exposure of sensitive information to an unauthorized actor in Azu…
Exposure of sensitive information to an unauthorized actor in Azure Data Explorer allows an unauthor…
|
HIGH |
7.4
|
✅ | يناير 22, 2026 |
| CVE-2026-23988 |
Rufus is a utility that helps format and create bootable USB flas…
Rufus is a utility that helps format and create bootable USB flash drives. Versions 4.11 and below c…
|
HIGH |
7.3
|
⚡ ✅ | يناير 22, 2026 |
| CVE-2026-24010 |
Horilla is a free and open source Human Resource Management Syste…
Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vu…
|
HIGH |
8.0
|
⚡ ✅ | يناير 22, 2026 |
| CVE-2026-24129 |
Runtipi is a Docker-based, personal homeserver orchestrator that …
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a …
|
HIGH |
8.0
|
⚡ ✅ | يناير 22, 2026 |
| CVE-2025-10024 |
Authorization Bypass Through User-Controlled Key vulnerability in…
Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer Technologies Softwa…
|
HIGH |
7.5
|
✅ | يناير 22, 2026 |
| CVE-2025-10855 |
Authorization Bypass Through User-Controlled Key vulnerability in…
Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade In…
|
HIGH |
7.5
|
✅ | يناير 22, 2026 |
| CVE-2025-10856 |
Unrestricted Upload of File with Dangerous Type vulnerability in …
Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Software Services Trade Inc…
|
HIGH |
8.1
|
✅ | يناير 22, 2026 |
| CVE-2025-67684 |
Quick.Cart is vulnerable to Local File Inclusion and Path Travers…
Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection me…
|
HIGH |
7.2
|
✅ | يناير 22, 2026 |
| CVE-2026-0533 |
A maliciously crafted HTML payload in a design name, when display…
A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation d…
|
HIGH |
7.1
|
✅ | يناير 22, 2026 |
| CVE-2026-0534 |
A maliciously crafted HTML payload, stored in a part’s attribute …
A maliciously crafted HTML payload, stored in a part’s attribute and clicked by a user, can trigger …
|
HIGH |
7.1
|
✅ | يناير 22, 2026 |
| CVE-2026-0535 |
A maliciously crafted HTML payload, stored in a component’s descr…
A maliciously crafted HTML payload, stored in a component’s description and clicked by a user, can t…
|
HIGH |
7.1
|
✅ | يناير 22, 2026 |
| CVE-2026-1260 |
Invalid memory access in Sentencepiece versions less than 0.2.1 w…
Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file, …
|
HIGH |
7.8
|
✅ | يناير 22, 2026 |
| CVE-2026-1330 |
MeetingHub developed by HAMASTAR Technology has an Arbitrary File…
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unaut…
|
HIGH |
7.5
|
✅ | يناير 22, 2026 |
| CVE-2026-0834 |
Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1…
Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthentic…
|
HIGH |
8.8
|
✅ | يناير 21, 2026 |
| CVE-2021-47746 |
NodeBB Plugin Emoji 3.2.1 contains an arbitrary file write vulner…
NodeBB Plugin Emoji 3.2.1 contains an arbitrary file write vulnerability that allows administrative …
|
HIGH |
7.5
|
✅ | يناير 21, 2026 |
| CVE-2021-47770 |
OpenPLC v3 contains an authenticated remote code execution vulner…
OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with …
|
HIGH |
8.8
|
✅ AI | يناير 21, 2026 |
| CVE-2021-47802 |
Tenda D151 and D301 routers contain an unauthenticated configurat…
Tenda D151 and D301 routers contain an unauthenticated configuration download vulnerability that all…
|
HIGH |
7.5
|
⚡ ✅ | يناير 21, 2026 |
| CVE-2021-47846 |
Digital Crime Report Management System 1.0 contains a critical SQ…
Digital Crime Report Management System 1.0 contains a critical SQL injection vulnerability affecting…
|
HIGH |
8.2
|
✅ | يناير 21, 2026 |
| CVE-2021-47848 |
Blitar Tourism 1.0 contains an authentication bypass vulnerabilit…
Blitar Tourism 1.0 contains an authentication bypass vulnerability that allows attackers to bypass l…
|
HIGH |
8.2
|
✅ | يناير 21, 2026 |
| CVE-2021-47850 |
Mini Mouse 9.2.0 contains a path traversal vulnerability that all…
Mini Mouse 9.2.0 contains a path traversal vulnerability that allows remote attackers to access arbi…
|
HIGH |
7.5
|
⚡ ✅ | يناير 21, 2026 |
| CVE-2021-47852 |
Rockstar Games Launcher 1.0.37.349 contains a privilege escalatio…
Rockstar Games Launcher 1.0.37.349 contains a privilege escalation vulnerability that allows authent…
|
HIGH |
8.8
|
✅ AI | يناير 21, 2026 |
| CVE-2021-47855 |
Openlitespeed 1.7.9 contains a stored cross-site scripting vulner…
Openlitespeed 1.7.9 contains a stored cross-site scripting vulnerability in the dashboard's Notes pa…
|
HIGH |
7.2
|
✅ | يناير 21, 2026 |
| CVE-2021-47857 |
Moodle 3.10.3 contains a persistent cross-site scripting vulnerab…
Moodle 3.10.3 contains a persistent cross-site scripting vulnerability in the calendar event subtitl…
|
HIGH |
7.2
|
✅ | يناير 21, 2026 |
🤖 تحليل AI متاح
يتضمن تحليل الذكاء الاصطناعي: الوصف العربي، التأثير السعودي، خطوات المعالجة، خريطة الامتثال (NCA، SAMA، ISO 27001) وتقنيات MITRE ATT&CK.
🔴 الثغرات الحرجة الأخيرة
CVE-2026-20133
أبريل 20, 2026
CVE-2026-20128
أبريل 20, 2026
CVE-2026-20122
أبريل 20, 2026
CVE-2025-48700
أبريل 20, 2026
CVE-2025-32975
أبريل 20, 2026
💡 نصائح البحث
CVE-2024-12345
بحث بمعرّف محدد
apache
بحث بالمنتج
remote code execution
بحث بنوع الثغرة
log4j
بحث بالاسم المشهور
📡 مصادر البيانات
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
يتم التحديث تلقائياً يومياً