INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2022-36804
Critical Command Injection in Atlassian Bitbucket Server and Data…
Atlassian Bitbucket Server and Data Center Command Injection Vulnerability — Multiple API endpoints …
CRITICAL
9.0
KEV AI Sep 30, 2022
CVE-2022-41040
Microsoft Exchange Server Server-Side Request Forgery Vulnerabili…
Microsoft Exchange Server Server-Side Request Forgery Vulnerability — Microsoft Exchange Server allo…
CRITICAL
9.0
KEV AI Sep 30, 2022
CVE-2022-41082
Microsoft Exchange Server Remote Code Execution Vulnerability — M…
Microsoft Exchange Server Remote Code Execution Vulnerability — Microsoft Exchange Server contains a…
CRITICAL
9.0
KEV AI Sep 30, 2022
CVE-2022-3236
Sophos Firewall Code Injection Vulnerability — A code injection v…
Sophos Firewall Code Injection Vulnerability — A code injection vulnerability in the User Portal and…
CRITICAL
9.0
KEV AI Sep 23, 2022
CVE-2022-35405
Zoho ManageEngine Multiple Products Remote Code Execution Vulnera…
Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability — Zoho ManageEngine PAM360, …
CRITICAL
9.0
KEV AI Sep 22, 2022
CVE-2022-40139
Trend Micro Apex One and Apex One as a Service Improper Validatio…
Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability — Trend Micro Apex …
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2010-2568
Microsoft Windows LNK Remote Code Execution Vulnerability (Stuxne…
Microsoft Windows Remote Code Execution Vulnerability — Microsoft Windows incorrectly parses shortcu…
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2013-2094
Linux Kernel perf_swevent Privilege Escalation Vulnerability (CVE…
Linux Kernel Privilege Escalation Vulnerability — Linux kernel fails to check all 64 bits of attr.co…
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2013-2596
Linux Kernel fb_mmap Integer Overflow Privilege Escalation Vulner…
Linux Kernel Integer Overflow Vulnerability — Linux kernel fb_mmap function in drivers/video/fbmem.c…
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2013-2597
Code Aurora ACDB Audio Driver Stack-Based Buffer Overflow Privile…
Code Aurora ACDB Audio Driver Stack-based Buffer Overflow Vulnerability — The Code Aurora audio cali…
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2013-6282
Linux Kernel ARM Memory Access Validation Bypass Leading to Privi…
Linux Kernel Improper Input Validation Vulnerability — The get_user and put_user API functions of th…
CRITICAL
9.0
KEV AI Sep 15, 2022
CVE-2022-32917
Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability …
Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability — Apple kernel, which is included i…
CRITICAL
9.0
KEV AI Sep 14, 2022
CVE-2022-37969
Microsoft Windows Common Log File System (CLFS) Driver Privilege …
Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability — Microsof…
CRITICAL
9.0
KEV AI Sep 14, 2022
CVE-2020-9934
Apple iOS, iPadOS, and macOS Input Validation Vulnerability — App…
Apple iOS, iPadOS, and macOS Input Validation Vulnerability — Apple iOS, iPadOS, and macOS contain a…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2022-26258
D-Link DIR-820L Remote Code Execution Vulnerability — D-Link DIR-…
D-Link DIR-820L Remote Code Execution Vulnerability — D-Link DIR-820L contains an unspecified vulner…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2022-27593
QNAP Photo Station Externally Controlled Reference Vulnerability …
QNAP Photo Station Externally Controlled Reference Vulnerability — Certain QNAP NAS running Photo St…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2022-3075
Google Chromium Mojo Insufficient Data Validation Vulnerability —…
Google Chromium Mojo Insufficient Data Validation Vulnerability — Google Chromium Mojo contains an i…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2011-1823
Android vold Daemon Privilege Escalation via Netlink Socket Explo…
Android OS Privilege Escalation Vulnerability — The vold volume manager daemon in Android kernel tru…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2011-4723
D-Link DIR-300 Router Cleartext Password Storage Vulnerability (C…
D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability — The D-Link DIR-300 router stor…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2017-5521
NETGEAR Multiple Devices Exposure of Sensitive Information Vulner…
NETGEAR Multiple Devices Exposure of Sensitive Information Vulnerability — Multiple NETGEAR devices …
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2018-13374
Fortinet FortiOS and FortiADC Improper Access Control Vulnerabili…
Fortinet FortiOS and FortiADC Improper Access Control Vulnerability — Fortinet FortiOS and FortiADC …
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2018-2628
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogi…
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogic Server contains an unspecified vu…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2018-6530
D-Link Multiple Routers OS Command Injection Vulnerability — Mult…
D-Link Multiple Routers OS Command Injection Vulnerability — Multiple D-Link routers contain an unsp…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2018-7445
MikroTik RouterOS Stack-Based Buffer Overflow Vulnerability — In …
MikroTik RouterOS Stack-Based Buffer Overflow Vulnerability — In MikroTik RouterOS, a stack-based bu…
CRITICAL
9.0
KEV AI Sep 8, 2022
CVE-2020-28949
PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability …
PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability — PEAR Archive_Tar allows an unseri…
CRITICAL
9.0
KEV AI Aug 25, 2022
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.