INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 20m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 20m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 20m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2025-0994 Critical 9.0
Trimble Cityworks Deserialization Vulnerability — Trimble Cityworks contains a deserialization vulnerability. This could…
⚡ Exploit ✅ Patch Feb 7, 2025
CVE-2024-21413 Critical 9.0
Microsoft Outlook Improper Input Validation Vulnerability — Microsoft Outlook contains an improper input validation vuln…
⚡ Exploit ✅ Patch Feb 6, 2025
CVE-2022-23748 Critical 9.0
Dante Discovery Process Control Vulnerability — Dante Discovery contains a process control vulnerability in mDNSResponde…
⚡ Exploit ✅ Patch Feb 6, 2025
CVE-2025-0411 Critical 9.0
7-Zip Mark of the Web Bypass Vulnerability — 7-Zip contains a protection mechanism failure vulnerability that allows rem…
⚡ Exploit ✅ Patch Feb 6, 2025
CVE-2020-15069 Critical 9.0
Sophos XG Firewall Buffer Overflow Vulnerability — Sophos XG Firewall contains a buffer overflow vulnerability that allo…
⚡ Exploit ✅ Patch Feb 6, 2025
CVE-2020-29574 Critical 9.0
CyberoamOS (CROS) SQL Injection Vulnerability — CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin…
⚡ Exploit ✅ Patch Feb 6, 2025
CVE-2024-53104 Critical 9.0
Linux Kernel Out-of-Bounds Write Vulnerability — Linux kernel contains an out-of-bounds write vulnerability in the uvc_p…
⚡ Exploit ✅ Patch Feb 5, 2025
CVE-2024-29059 Critical 9.0
Microsoft .NET Framework Information Disclosure Vulnerability — Microsoft .NET Framework contains an information disclos…
⚡ Exploit ✅ Patch Feb 4, 2025
CVE-2018-19410 Critical 9.0
Paessler PRTG Network Monitor Local File Inclusion Vulnerability — Paessler PRTG Network Monitor contains a local file i…
⚡ Exploit ✅ Patch Feb 4, 2025
CVE-2018-9276 Critical 9.0
Paessler PRTG Network Monitor OS Command Injection Vulnerability — Paessler PRTG Network Monitor contains an OS command …
⚡ Exploit ✅ Patch Feb 4, 2025
CVE-2024-45195 Critical 9.0
Apache OFBiz Forced Browsing Vulnerability — Apache OFBiz contains a forced browsing vulnerability that allows a remote …
⚡ Exploit ✅ Patch Feb 4, 2025
CVE-2025-24085 Critical 9.0
Apple Multiple Products Use-After-Free Vulnerability — Apple iOS, macOS, and other Apple products contain a user-after-f…
⚡ Exploit ✅ Patch Jan 29, 2025
CVE-2025-23006 Critical 9.0
SonicWall SMA1000 Appliances Deserialization Vulnerability — SonicWall SMA1000 Appliance Management Console (AMC) and Ce…
⚡ Exploit ✅ Patch Jan 24, 2025
CVE-2020-11023 Critical 9.0
JQuery Cross-Site Scripting (XSS) Vulnerability — JQuery contains a persistent cross-site scripting (XSS) vulnerability.…
⚡ Exploit ✅ Patch Jan 23, 2025
CVE-2024-50603 Critical 9.0
Aviatrix Controllers OS Command Injection Vulnerability — Aviatrix Controllers contain an OS command injection vulnerabi…
⚡ Exploit ✅ Patch Jan 16, 2025
CVE-2025-21333 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability — Microsoft Windows Hyper-V…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2024-55591 Critical 9.0
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability — Fortinet FortiOS and FortiProxy contain an authent…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2025-21335 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability — Microsoft Windows Hyper-V NT Kernel I…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2025-21334 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability — Microsoft Windows Hyper-V NT Kernel I…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2023-48365 Critical 9.0
Qlik Sense HTTP Tunneling Vulnerability — Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to…
⚡ Exploit ✅ Patch Jan 13, 2025
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.