INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h Global vulnerability Information Technology HIGH 1h Global malware Information Technology CRITICAL 1h Global vulnerability Technology/Cloud Services CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global malware Financial Services HIGH 3h Global vulnerability Technology/Software CRITICAL 4h Global vulnerability Information Technology HIGH 4h Global data_breach Government CRITICAL 13h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-22225 High 7.2
A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the…
✅ Patch Feb 2, 2026
CVE-2026-22226 High 7.2
A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration modu…
✅ Patch Feb 2, 2026
CVE-2026-22227 High 7.2
A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restora…
✅ Patch Feb 2, 2026
CVE-2026-22229 High 7.2
A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN clie…
✅ Patch Feb 2, 2026
CVE-2025-13096 High 7.1
IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007, V24.0.0 - V24.0.0-IF…
✅ Patch Feb 2, 2026
CVE-2025-47366 High 7.1
Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
✅ Patch Feb 2, 2026
CVE-2021-47915 High 8.1
PHP Melody version 3.0 contains a remote SQL injection vulnerability in the video edit module that allows authenticated …
⚡ Exploit ✅ Patch Feb 1, 2026
CVE-2021-47918 High 8.1
Simple CMS 2.1 contains a remote SQL injection vulnerability that allows privileged attackers to inject unfiltered SQL c…
⚡ Exploit ✅ Patch Feb 1, 2026
CVE-2020-37037 High 7.8
Avast SecureLine 5.5.522.0 contains an unquoted service path vulnerability that allows local users to potentially execut…
✅ Patch Feb 1, 2026
CVE-2020-37045 High 7.8
Veritas NetBackup 7.0 contains an unquoted service path vulnerability in the NetBackup INET Daemon service that allows l…
✅ Patch Feb 1, 2026
CVE-2020-37047 High 7.8
Deep Instinct Windows Agent 1.2.29.0 contains an unquoted service path vulnerability in the DeepMgmtService that allows …
✅ Patch Feb 1, 2026
CVE-2020-37048 High 7.8
Iskysoft Application Framework Service 2.4.3.241 contains an unquoted service path vulnerability that allows local users…
✅ Patch Feb 1, 2026
CVE-2020-37055 High 7.8
SpyHunter 4 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary cod…
✅ Patch Feb 1, 2026
CVE-2020-37061 High 7.8
BOOTP Turbo 2.0.1214 contains an unquoted service path vulnerability that allows local attackers to potentially execute …
✅ Patch Feb 1, 2026
CVE-2020-37062 High 7.8
DHCP Turbo 4.61298 contains an unquoted service path vulnerability that allows local attackers to potentially execute ar…
✅ Patch Feb 1, 2026
CVE-2020-37063 High 7.8
TFTP Turbo 4.6.1273 contains an unquoted service path vulnerability that allows local attackers to potentially execute a…
✅ Patch Feb 1, 2026
CVE-2020-37064 High 7.8
EPSON EasyMP Network Projection 2.81 contains an unquoted service path vulnerability in the EMP_NSWLSV service that allo…
✅ Patch Feb 1, 2026
CVE-2025-14554 High 7.2
The Sell BTC - Cryptocurrency Selling Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via t…
✅ Patch Jan 31, 2026
CVE-2020-37023 High 8.8
Koken CMS 0.22.24 contains a file upload vulnerability that allows authenticated attackers to bypass file extension rest…
✅ Patch Jan 30, 2026
CVE-2020-37032 High 8.8
Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authentica…
⚡ Exploit ✅ Patch Jan 30, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.