📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2025-24085 Critical 9.0
Apple Multiple Products Use-After-Free Vulnerability — Apple iOS, macOS, and other Apple products contain a user-after-f…
⚡ Exploit ✅ Patch Jan 29, 2025
CVE-2025-23006 Critical 9.0
SonicWall SMA1000 Appliances Deserialization Vulnerability — SonicWall SMA1000 Appliance Management Console (AMC) and Ce…
⚡ Exploit ✅ Patch Jan 24, 2025
CVE-2020-11023 Critical 9.0
JQuery Cross-Site Scripting (XSS) Vulnerability — JQuery contains a persistent cross-site scripting (XSS) vulnerability.…
⚡ Exploit ✅ Patch Jan 23, 2025
CVE-2024-50603 Critical 9.0
Aviatrix Controllers OS Command Injection Vulnerability — Aviatrix Controllers contain an OS command injection vulnerabi…
⚡ Exploit ✅ Patch Jan 16, 2025
CVE-2024-55591 Critical 9.0
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability — Fortinet FortiOS and FortiProxy contain an authent…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2025-21333 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability — Microsoft Windows Hyper-V…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2025-21334 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability — Microsoft Windows Hyper-V NT Kernel I…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2025-21335 Critical 9.0
Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability — Microsoft Windows Hyper-V NT Kernel I…
⚡ Exploit ✅ Patch Jan 14, 2025
CVE-2023-48365 Critical 9.0
Qlik Sense HTTP Tunneling Vulnerability — Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to…
⚡ Exploit ✅ Patch Jan 13, 2025
CVE-2024-12686 Critical 9.0
BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability — BeyondTrust Priv…
⚡ Exploit ✅ Patch Jan 13, 2025
CVE-2025-0282 Critical 9.0
Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability — Ivanti Connect Secure…
⚡ Exploit ✅ Patch Jan 8, 2025
CVE-2020-2883 Critical 9.0
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogic Server, a product within the Fusion Middleware suite,…
⚡ Exploit ✅ Patch Jan 7, 2025
CVE-2024-41713 Critical 9.0
Mitel MiCollab Path Traversal Vulnerability — Mitel MiCollab contains a path traversal vulnerability that could allow an…
⚡ Exploit ✅ Patch Jan 7, 2025
CVE-2024-55550 Critical 9.0
Mitel MiCollab Path Traversal Vulnerability — Mitel MiCollab contains a path traversal vulnerability that could allow an…
⚡ Exploit ✅ Patch Jan 7, 2025
CVE-2024-3393 Critical 9.0
Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability — Palo Alto Networks PAN-OS contains a vulnerability in par…
⚡ Exploit ✅ Patch Dec 30, 2024
CVE-2021-44207 Critical 9.0
Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability — Acclaim Systems USAHERDS contains a hard-coded c…
⚡ Exploit ✅ Patch Dec 23, 2024
CVE-2024-12356 Critical 9.0
BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability — BeyondTrust Privil…
⚡ Exploit ✅ Patch Dec 19, 2024
CVE-2018-14933 Critical 9.0
NUUO NVRmini Devices OS Command Injection Vulnerability — NUUO NVRmini devices contain an OS command injection vulnerab…
⚡ Exploit ✅ Patch Dec 18, 2024
CVE-2019-11001 Critical 9.0
Reolink Multiple IP Cameras OS Command Injection Vulnerability — Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511…
⚡ Exploit ✅ Patch Dec 18, 2024
CVE-2021-40407 Critical 9.0
Reolink RLC-410W IP Camera OS Command Injection Vulnerability — Reolink RLC-410W IP cameras contain an authenticated OS…
⚡ Exploit ✅ Patch Dec 18, 2024
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.