INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 21m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 21m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 21m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 7h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2022-41049 Critical 9.0
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability — Microsoft Windows Mark of the Web (MOTW…
⚡ Exploit ✅ Patch Nov 14, 2022
CVE-2021-25337 Critical 9.0
Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices contain an improper access control…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2022-41073 Critical 9.0
Microsoft Windows Print Spooler Privilege Escalation Vulnerability — Microsoft Windows Print Spooler contains an unspeci…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2022-41091 Critical 9.0
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability — Microsoft Windows Mark of the Web (MOTW…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2022-41125 Critical 9.0
Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability — Microsoft Windows Cryptographic Next Ge…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2022-41128 Critical 9.0
Microsoft Windows Scripting Languages Remote Code Execution Vulnerability — Microsoft Windows contains an unspecified vu…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2021-25369 Critical 9.0
Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices using Mali GPU contains an imprope…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2021-25370 Critical 9.0
Samsung Mobile Devices Memory Corruption Vulnerability — Samsung mobile devices using Mali GPU contain an incorrect impl…
⚡ Exploit ✅ Patch Nov 8, 2022
CVE-2022-3723 Critical 9.0
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 Engine contains a type confusion vulnerability that…
⚡ Exploit ✅ Patch Oct 28, 2022
CVE-2022-42827 Critical 9.0
Apple iOS and iPadOS Out-of-Bounds Write Vulnerability — Apple iOS and iPadOS kernel contain an out-of-bounds write vuln…
⚡ Exploit ✅ Patch Oct 25, 2022
CVE-2020-3433 Critical 9.0
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability — Cisco AnyConnect Secure Mobility Clien…
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2020-3153 Critical 9.0
Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability — Cisco AnyConnect Secure Mob…
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2018-19323 Critical 9.0
GIGABYTE Multiple Products Privilege Escalation Vulnerability — The GPCIDrv and GDrv low-level drivers in GIGABYTE App C…
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2018-19322 Critical 9.0
GIGABYTE Multiple Products Code Execution Vulnerability — The GPCIDrv and GDrv low-level drivers in GIGABYTE App Center,…
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2018-19321 Critical 9.0
GIGABYTE Multiple Products Privilege Escalation Vulnerability — The GPCIDrv and GDrv low-level drivers in GIGABYTE App C…
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2018-19320 Critical 9.0
GIGABYTE Multiple Products Unspecified Vulnerability — The GDrv low-level driver in GIGABYTE App Center, AORUS Graphics …
⚡ Exploit ✅ Patch Oct 24, 2022
CVE-2022-41352 Critical 9.0
Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability — Synacor Zimbra Collaboration Suite (ZCS) …
⚡ Exploit ✅ Patch Oct 20, 2022
CVE-2021-3493 Critical 9.0
Linux Kernel Privilege Escalation Vulnerability — The overlayfs stacking file system in Linux kernel does not properly v…
⚡ Exploit ✅ Patch Oct 20, 2022
CVE-2022-41033 Critical 9.0
Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability — Microsoft Windows COM+ Event System Ser…
⚡ Exploit ✅ Patch Oct 11, 2022
CVE-2022-40684 Critical 9.0
Fortinet Multiple Products Authentication Bypass Vulnerability — Fortinet FortiOS, FortiProxy, and FortiSwitchManager co…
⚡ Exploit ✅ Patch Oct 11, 2022
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.