INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2023-50224
TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability…
TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability — TP-Link TL-WR841N contains an au…
CRITICAL
9.0
KEV AI Sep 3, 2025
CVE-2025-9377
TP-Link Router OS Command Injection in Parental Control
TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability — TP-Link Archer C7(EU…
CRITICAL
9.0
KEV AI Sep 3, 2025
CVE-2025-55177
WhatsApp Incorrect Authorization in Linked Device Synchronization
Meta Platforms WhatsApp Incorrect Authorization Vulnerability — Meta Platforms WhatsApp contains an …
CRITICAL
9.0
KEV AI Sep 2, 2025
CVE-2020-24363
TP-link TL-WA855RE Missing Authentication for Critical Function V…
TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability — TP-link TL-WA855RE c…
CRITICAL
9.0
KEV AI Sep 2, 2025
CVE-2025-57819
Sangoma FreePBX Authentication Bypass Vulnerability (CVE-2025-578…
Sangoma FreePBX Authentication Bypass Vulnerability — Sangoma FreePBX contains an authentication byp…
CRITICAL
9.0
KEV AI Aug 29, 2025
CVE-2025-7775
Citrix NetScaler Memory Overflow Remote Code Execution Vulnerabil…
Citrix NetScaler Memory Overflow Vulnerability — Citrix NetScaler ADC and NetScaler Gateway contain …
CRITICAL
9.0
KEV AI Aug 26, 2025
CVE-2024-8068
Citrix Session Recording Privilege Escalation to NetworkService A…
Citrix Session Recording Improper Privilege Management Vulnerability — Citrix Session Recording cont…
CRITICAL
9.0
KEV AI Aug 25, 2025
CVE-2024-8069
Citrix Session Recording Deserialization of Untrusted Data Remote…
Citrix Session Recording Deserialization of Untrusted Data Vulnerability — Citrix Session Recording …
CRITICAL
9.0
KEV AI Aug 25, 2025
CVE-2025-48384
Git Link Following Vulnerability - Carriage Return Handling in Co…
Git Link Following Vulnerability — Git contains a link following vulnerability that stems from Git’s…
CRITICAL
9.0
KEV AI Aug 25, 2025
CVE-2025-43300
Apple iOS, iPadOS, and macOS Image I/O Out-of-Bounds Write Vulner…
Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability — Apple iOS, iPadOS, and macOS contai…
CRITICAL
9.0
KEV AI Aug 21, 2025
CVE-2025-54948
Trend Micro Apex One OS Command Injection Vulnerability (CVE-2025…
Trend Micro Apex One OS Command Injection Vulnerability — Trend Micro Apex One Management Console (o…
CRITICAL
9.0
KEV AI Aug 18, 2025
CVE-2025-8875
N-able N-Central Insecure Deserialization Vulnerability — N-able …
N-able N-Central Insecure Deserialization Vulnerability — N-able N-Central contains an insecure dese…
CRITICAL
9.0
KEV AI Aug 13, 2025
CVE-2025-8876
N-able N-Central Command Injection Vulnerability (CVE-2025-8876)
N-able N-Central Command Injection Vulnerability — N-able N-Central contains a command injection vul…
CRITICAL
9.0
KEV AI Aug 13, 2025
CVE-2025-8088
RARLAB WinRAR Path Traversal Remote Code Execution Vulnerability
RARLAB WinRAR Path Traversal Vulnerability — RARLAB WinRAR contains a path traversal vulnerability a…
CRITICAL
9.0
KEV AI Aug 12, 2025
CVE-2007-0671
Microsoft Office Excel Remote Code Execution Vulnerability (CVE-2…
Microsoft Office Excel Remote Code Execution Vulnerability — Microsoft Office Excel contains a remot…
CRITICAL
9.0
KEV AI Aug 12, 2025
CVE-2013-3893
Microsoft Internet Explorer Memory Corruption Remote Code Executi…
Microsoft Internet Explorer Resource Management Errors Vulnerability — Microsoft Internet Explorer c…
CRITICAL
9.0
KEV AI Aug 12, 2025
CVE-2020-25078
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability …
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability — D-Link DCS-2530L and DCS-2670L de…
CRITICAL
9.0
KEV AI Aug 5, 2025
CVE-2020-25079
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability — …
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability — D-Link DCS-2530L and DCS-2670L devi…
CRITICAL
9.0
KEV AI Aug 5, 2025
CVE-2022-40799
D-Link DNR-322L Download of Code Without Integrity Check Vulnerab…
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability — D-Link DNR-322L contains a …
CRITICAL
9.0
KEV AI Aug 5, 2025
CVE-2023-2533
PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability — …
PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability — PaperCut NG/MF contains a cross-sit…
CRITICAL
9.0
KEV AI Jul 28, 2025
CVE-2025-20281
Cisco Identity Services Engine API Injection Vulnerability - Remo…
Cisco Identity Services Engine Injection Vulnerability — Cisco Identity Services Engine contains an …
CRITICAL
9.0
KEV AI Jul 28, 2025
CVE-2025-20337
Cisco Identity Services Engine API Injection Vulnerability - Remo…
Cisco Identity Services Engine Injection Vulnerability — Cisco Identity Services Engine contains an …
CRITICAL
9.0
KEV AI Jul 28, 2025
CVE-2025-2775
SysAid On-Prem XXE Vulnerability Enabling Administrator Account T…
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability — SysAid On-Prem …
CRITICAL
9.0
KEV AI Jul 22, 2025
CVE-2025-2776
SysAid On-Prem XXE Vulnerability Enabling Administrator Account T…
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability — SysAid On-Prem …
CRITICAL
9.0
KEV AI Jul 22, 2025
CVE-2025-49704
Microsoft SharePoint Code Injection Vulnerability (CVE-2025-49704…
Microsoft SharePoint Code Injection Vulnerability — Microsoft SharePoint contains a code injection v…
CRITICAL
9.0
KEV AI Jul 22, 2025
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.