INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2021-20124
Draytek VigorConnect Path Traversal Vulnerability — Draytek Vigo…
Draytek VigorConnect Path Traversal Vulnerability — Draytek VigorConnect contains a path traversal …
CRITICAL
9.0
KEV AI Sep 3, 2024
CVE-2024-7965
Google Chromium V8 Heap Corruption Vulnerability (CVE-2024-7965)
Google Chromium V8 Inappropriate Implementation Vulnerability — Google Chromium V8 contains an inapp…
CRITICAL
9.0
KEV AI Aug 28, 2024
CVE-2024-38856
Apache OFBiz Incorrect Authorization Vulnerability — Apache OFBiz…
Apache OFBiz Incorrect Authorization Vulnerability — Apache OFBiz contains an incorrect authorizatio…
CRITICAL
9.0
KEV AI Aug 27, 2024
CVE-2024-7971
Google Chromium V8 Type Confusion Vulnerability - Heap Corruption
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 contains a type confusion vulne…
CRITICAL
9.0
KEV AI Aug 26, 2024
CVE-2024-39717
Versa Director Dangerous File Type Upload Vulnerability — The Ver…
Versa Director Dangerous File Type Upload Vulnerability — The Versa Director GUI contains an unrestr…
CRITICAL
9.0
KEV AI Aug 23, 2024
CVE-2021-31196
Microsoft Exchange Server Information Disclosure Vulnerability — …
Microsoft Exchange Server Information Disclosure Vulnerability — Microsoft Exchange Server contains …
CRITICAL
9.0
KEV AI Aug 21, 2024
CVE-2021-33044
Dahua IP Camera Authentication Bypass Vulnerability — Dahua IP ca…
Dahua IP Camera Authentication Bypass Vulnerability — Dahua IP cameras and related products contain …
CRITICAL
9.0
KEV AI Aug 21, 2024
CVE-2021-33045
Dahua IP Camera Authentication Bypass Vulnerability — Dahua IP ca…
Dahua IP Camera Authentication Bypass Vulnerability — Dahua IP cameras and related products contain …
CRITICAL
9.0
KEV AI Aug 21, 2024
CVE-2022-0185
Linux Kernel Heap-Based Buffer Overflow Vulnerability — Linux ker…
Linux Kernel Heap-Based Buffer Overflow Vulnerability — Linux kernel contains a heap-based buffer ov…
CRITICAL
9.0
KEV AI Aug 21, 2024
CVE-2024-23897
Jenkins Command Line Interface (CLI) Path Traversal Vulnerability…
Jenkins Command Line Interface (CLI) Path Traversal Vulnerability — Jenkins Command Line Interface (…
CRITICAL
9.0
KEV AI Aug 19, 2024
CVE-2024-28986
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulner…
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability — SolarWinds Web Help Desk …
CRITICAL
9.0
KEV AI Aug 15, 2024
CVE-2024-38106
Microsoft Windows Kernel Privilege Escalation Vulnerability — Mic…
Microsoft Windows Kernel Privilege Escalation Vulnerability — Microsoft Windows Kernel contains an u…
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-38107
Microsoft Windows Power Dependency Coordinator Privilege Escalati…
Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability — Microsoft Window…
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-38178
Microsoft Windows Scripting Engine Memory Corruption Vulnerabilit…
Microsoft Windows Scripting Engine Memory Corruption Vulnerability — Microsoft Windows Scripting Eng…
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability — Microsof…
Microsoft Project Remote Code Execution Vulnerability — Microsoft Project contains an unspecified v…
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-38193
Microsoft Windows Ancillary Function Driver for WinSock Privilege…
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability — Microso…
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-38213
Microsoft Windows SmartScreen Security Feature Bypass Vulnerabili…
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability — Microsoft Windows SmartScreen …
CRITICAL
9.0
KEV AI Aug 13, 2024
CVE-2024-32113
Apache OFBiz Path Traversal Vulnerability — Apache OFBiz contains…
Apache OFBiz Path Traversal Vulnerability — Apache OFBiz contains a path traversal vulnerability tha…
CRITICAL
9.0
KEV AI Aug 7, 2024
CVE-2024-36971
Android Kernel Remote Code Execution Vulnerability — Android cont…
Android Kernel Remote Code Execution Vulnerability — Android contains an unspecified vulnerability i…
CRITICAL
9.0
KEV AI Aug 7, 2024
CVE-2018-0824
Microsoft COM for Windows Deserialization of Untrusted Data Vulne…
Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability — Microsoft COM for Window…
CRITICAL
9.0
KEV AI Aug 5, 2024
CVE-2024-37085
VMware ESXi Authentication Bypass Vulnerability — VMware ESXi con…
VMware ESXi Authentication Bypass Vulnerability — VMware ESXi contains an authentication bypass vuln…
CRITICAL
9.0
KEV AI Jul 30, 2024
CVE-2023-45249
Acronis Cyber Infrastructure (ACI) Insecure Default Password Vuln…
Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability — Acronis Cyber Infrastru…
CRITICAL
9.0
KEV AI Jul 29, 2024
CVE-2024-4879
ServiceNow Improper Input Validation Vulnerability — ServiceNow U…
ServiceNow Improper Input Validation Vulnerability — ServiceNow Utah, Vancouver, and Washington DC N…
CRITICAL
9.0
KEV AI Jul 29, 2024
CVE-2024-5217
ServiceNow Incomplete List of Disallowed Inputs Vulnerability — S…
ServiceNow Incomplete List of Disallowed Inputs Vulnerability — ServiceNow Washington DC, Vancouver,…
CRITICAL
9.0
KEV AI Jul 29, 2024
CVE-2024-39891
Twilio Authy Information Disclosure Vulnerability — Twilio Authy …
Twilio Authy Information Disclosure Vulnerability — Twilio Authy contains an information disclosure …
CRITICAL
9.0
KEV AI Jul 23, 2024
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.