INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2019-16920 Critical 9.0
D-Link Multiple Routers Command Injection Vulnerability — Multiple D-Link routers contain a command injection vulnerabil…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2019-2616 Critical 9.0
Oracle BI Publisher Unauthorized Access Vulnerability — Oracle BI Publisher, formerly XML Publisher, contains an unspeci…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2019-6340 Critical 9.0
Drupal Core Remote Code Execution Vulnerability — In Drupal Core, some field types do not properly sanitize data from no…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-1631 Critical 9.0
Juniper Junos OS Path Traversal Vulnerability — A path traversal vulnerability in the HTTP/HTTPS service used by J-Web, …
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-1956 Critical 9.0
Apache Kylin OS Command Injection Vulnerability — Apache Kylin contains an OS command injection vulnerability which coul…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-2021 Critical 9.0
Palo Alto Networks PAN-OS Authentication Bypass Vulnerability — Palo Alto Networks PAN-OS contains a vulnerability in SA…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-2506 Critical 9.0
QNAP Helpdesk Improper Access Control Vulnerability — QNAP Helpdesk contains an improper access control vulnerability wh…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-25223 Critical 9.0
Sophos SG UTM Remote Code Execution Vulnerability — A remote code execution vulnerability exists in the WebAdmin of Soph…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-5410 Critical 9.0
VMware Tanzu Spring Cloud Config Directory Traversal Vulnerability — Spring, by VMware Tanzu, Cloud Config contains a pa…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-7247 Critical 9.0
OpenSMTPD Remote Code Execution Vulnerability — smtp_mailaddr in smtp_session.c in OpenSMTPD, as used in OpenBSD and oth…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-9054 Critical 9.0
Zyxel Multiple NAS Devices OS Command Injection Vulnerability — Multiple Zyxel network-attached storage (NAS) devices co…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2020-9377 Critical 9.0
D-Link DIR-610 Devices Remote Command Execution — D-Link DIR-610 devices allow remote code execution via the cmd paramet…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2021-22941 Critical 9.0
Citrix ShareFile Improper Access Control Vulnerability — Improper Access Control in Citrix ShareFile storage zones contr…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2021-42237 Critical 9.0
Sitecore XP Remote Command Execution Vulnerability — Sitcore XP contains an insecure deserialization vulnerability which…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2022-21999 Critical 9.0
Microsoft Windows Print Spooler Privilege Escalation Vulnerability — Microsoft Windows Print Spooler contains an unspeci…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2022-26143 Critical 9.0
MiCollab, MiVoice Business Express Access Control Vulnerability — A vulnerability has been identified in MiCollab and Mi…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2022-26318 Critical 9.0
WatchGuard Firebox and XTM Appliances Arbitrary Code Execution — On WatchGuard Firebox and XTM appliances, an unauthenti…
⚡ Exploit ✅ Patch Mar 25, 2022
CVE-2015-2546 Critical 9.0
Microsoft Win32k Memory Corruption Vulnerability — The kernel-mode driver in Microsoft Windows OS and Server allows loca…
⚡ Exploit ✅ Patch Mar 15, 2022
CVE-2016-3309 Critical 9.0
Microsoft Windows Kernel Privilege Escalation Vulnerability — A privilege escalation vulnerability exists when the Windo…
⚡ Exploit ✅ Patch Mar 15, 2022
CVE-2017-0101 Critical 9.0
Microsoft Windows Transaction Manager Privilege Escalation Vulnerability — A privilege escalation vulnerability exists w…
⚡ Exploit ✅ Patch Mar 15, 2022
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.