INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2022-36537
ZK Framework AuUploader Unspecified Vulnerability — ZK Framework …
ZK Framework AuUploader Unspecified Vulnerability — ZK Framework AuUploader servlets contain an unsp…
CRITICAL
9.0
KEV AI Feb 27, 2023
CVE-2022-40765
Mitel MiVoice Connect Command Injection Vulnerability — The Mitel…
Mitel MiVoice Connect Command Injection Vulnerability — The Mitel Edge Gateway component of MiVoice …
CRITICAL
9.0
KEV AI Feb 21, 2023
CVE-2022-41223
Mitel MiVoice Connect Code Injection Vulnerability — The Director…
Mitel MiVoice Connect Code Injection Vulnerability — The Director component in Mitel MiVoice Connect…
CRITICAL
9.0
KEV AI Feb 21, 2023
CVE-2022-47986
Critical RCE in IBM Aspera Faspex via YAML Deserialization
IBM Aspera Faspex Code Execution Vulnerability — IBM Aspera Faspex could allow a remote attacker to …
CRITICAL
9.0
KEV AI Feb 21, 2023
CVE-2022-46169
Cacti Command Injection Vulnerability — Cacti contains a command …
Cacti Command Injection Vulnerability — Cacti contains a command injection vulnerability that allows…
CRITICAL
9.0
KEV AI Feb 16, 2023
CVE-2023-21715
Microsoft Office Publisher Security Feature Bypass Vulnerability …
Microsoft Office Publisher Security Feature Bypass Vulnerability — Microsoft Office Publisher contai…
CRITICAL
9.0
KEV AI Feb 14, 2023
CVE-2023-21823
Microsoft Windows Graphics Component Privilege Escalation Vulnera…
Microsoft Windows Graphic Component Privilege Escalation Vulnerability — Microsoft Windows Graphic C…
CRITICAL
9.0
KEV AI Feb 14, 2023
CVE-2023-23376
Microsoft Windows Common Log File System (CLFS) Driver Privilege …
Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability — Microsof…
CRITICAL
9.0
KEV AI Feb 14, 2023
CVE-2023-23529
Apple Multiple Products WebKit Type Confusion Vulnerability — App…
Apple Multiple Products WebKit Type Confusion Vulnerability — Apple iOS, MacOS, Safari and iPadOS We…
CRITICAL
9.0
KEV AI Feb 14, 2023
CVE-2023-0669
Fortra GoAnywhere MFT Pre-Authentication Remote Code Execution (C…
Fortra GoAnywhere MFT Remote Code Execution Vulnerability — Fortra (formerly, HelpSystems) GoAnywher…
CRITICAL
9.0
KEV AI Feb 10, 2023
CVE-2022-24990
TerraMaster OS Remote Command Execution Vulnerability — TerraMast…
TerraMaster OS Remote Command Execution Vulnerability — TerraMaster OS contains a remote command exe…
CRITICAL
9.0
KEV AI Feb 10, 2023
CVE-2015-2291
Intel Ethernet Diagnostics Driver for Windows Denial-of-Service V…
Intel Ethernet Diagnostics Driver for Windows Denial-of-Service Vulnerability — Intel ethernet diagn…
CRITICAL
9.0
KEV AI Feb 10, 2023
CVE-2023-22952
Critical RCE Vulnerability in SugarCRM Products via EmailTemplate…
Multiple SugarCRM Products Remote Code Execution Vulnerability — Multiple SugarCRM products contain …
CRITICAL
9.0
KEV AI Feb 2, 2023
CVE-2022-21587
Oracle E-Business Suite Unspecified Vulnerability — Oracle E-Busi…
Oracle E-Business Suite Unspecified Vulnerability — Oracle E-Business Suite contains an unspecified …
CRITICAL
9.0
KEV AI Feb 2, 2023
CVE-2017-11357
Telerik UI for ASP.NET AJAX Insecure Direct Object Reference Vuln…
Telerik UI for ASP.NET AJAX Insecure Direct Object Reference Vulnerability — Telerik UI for ASP.NET …
CRITICAL
9.0
KEV AI Jan 26, 2023
CVE-2022-47966
Zoho ManageEngine Multiple Products Remote Code Execution Vulnera…
Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability — Multiple Zoho ManageEngine…
CRITICAL
9.0
KEV AI Jan 23, 2023
CVE-2022-44877
CWP Control Web Panel OS Command Injection Vulnerability — CWP Co…
CWP Control Web Panel OS Command Injection Vulnerability — CWP Control Web Panel (formerly CentOS We…
CRITICAL
9.0
KEV AI Jan 17, 2023
CVE-2023-21674
Microsoft Windows ALPC Privilege Escalation Vulnerability (CVE-20…
Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability — Microsof…
CRITICAL
9.0
KEV AI Jan 10, 2023
CVE-2022-41080
Microsoft Exchange Server Privilege Escalation Vulnerability — Mi…
Microsoft Exchange Server Privilege Escalation Vulnerability — Microsoft Exchange Server contains an…
CRITICAL
9.0
KEV AI Jan 10, 2023
CVE-2018-18809
TIBCO JasperReports Library Directory Traversal Vulnerability — T…
TIBCO JasperReports Library Directory Traversal Vulnerability — TIBCO JasperReports Library contains…
CRITICAL
9.0
KEV AI Dec 29, 2022
CVE-2018-5430
TIBCO JasperReports Server Information Disclosure Vulnerability —…
TIBCO JasperReports Server Information Disclosure Vulnerability — TIBCO JasperReports Server contain…
CRITICAL
9.0
KEV AI Dec 29, 2022
CVE-2022-42856
Apple iOS Type Confusion Vulnerability — Apple iOS contains a typ…
Apple iOS Type Confusion Vulnerability — Apple iOS contains a type confusion vulnerability when proc…
CRITICAL
9.0
KEV AI Dec 14, 2022
CVE-2022-42475
Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability — Multi…
Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability — Multiple versions of Fortinet FortiOS SS…
CRITICAL
9.0
KEV AI Dec 13, 2022
CVE-2022-44698
Microsoft Defender SmartScreen Security Feature Bypass Vulnerabil…
Microsoft Defender SmartScreen Security Feature Bypass Vulnerability — Microsoft Defender SmartScree…
CRITICAL
9.0
KEV AI Dec 13, 2022
CVE-2022-26500
Veeam Backup & Replication Remote Code Execution Vulnerability — …
Veeam Backup & Replication Remote Code Execution Vulnerability — The Veeam Distribution Service in t…
CRITICAL
9.0
KEV AI Dec 13, 2022
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.