INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 5h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 6h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2022-27924
Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulner…
Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability — Synacor Zimbra Collaborat…
CRITICAL
9.0
KEV AI Aug 4, 2022
CVE-2022-26138
Atlassian Questions For Confluence App Hard-coded Credentials Vul…
Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability — Atlassian Questions Fo…
CRITICAL
9.0
KEV AI Jul 29, 2022
CVE-2022-22047
Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privile…
Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability — Micro…
CRITICAL
9.0
KEV AI Jul 12, 2022
CVE-2022-26925
Microsoft Windows LSA Spoofing Vulnerability — Microsoft Windows …
Microsoft Windows LSA Spoofing Vulnerability — Microsoft Windows Local Security Authority (LSA) cont…
CRITICAL
9.0
KEV AI Jul 1, 2022
CVE-2019-8605
Apple Multiple Products Use-After-Free Vulnerability — A use-afte…
Apple Multiple Products Use-After-Free Vulnerability — A use-after-free vulnerability in Apple iOS, …
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2020-3837
Apple Multiple Products Memory Corruption Vulnerability — Apple i…
Apple Multiple Products Memory Corruption Vulnerability — Apple iOS, iPadOS, macOS, tvOS, and watchO…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2020-9907
Apple Multiple Products Memory Corruption Vulnerability — Apple i…
Apple Multiple Products Memory Corruption Vulnerability — Apple iOS, iPadOS, and tvOS contain a memo…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2021-30533
Google Chromium PopupBlocker Security Bypass Vulnerability — Goog…
Google Chromium PopupBlocker Security Bypass Vulnerability — Google Chromium PopupBlocker contains a…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2021-30983
Apple iOS and iPadOS Buffer Overflow Vulnerability — Apple iOS an…
Apple iOS and iPadOS Buffer Overflow Vulnerability — Apple iOS and iPadOS contain a buffer overflow …
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2021-4034
Red Hat Polkit Out-of-Bounds Read and Write Vulnerability — The R…
Red Hat Polkit Out-of-Bounds Read and Write Vulnerability — The Red Hat polkit pkexec utility contai…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2022-29499
Mitel MiVoice Connect Data Validation Vulnerability — The Service…
Mitel MiVoice Connect Data Validation Vulnerability — The Service Appliance component in Mitel MiVoi…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2018-4344
Apple Multiple Products Memory Corruption Vulnerability — Apple i…
Apple Multiple Products Memory Corruption Vulnerability — Apple iOS, macOS, tvOS, and watchOS contai…
CRITICAL
9.0
KEV AI Jun 27, 2022
CVE-2022-30190
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Exec…
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability — A remote code…
CRITICAL
9.0
KEV AI Jun 14, 2022
CVE-2021-38163
SAP NetWeaver Unrestricted File Upload Vulnerability — SAP NetWea…
SAP NetWeaver Unrestricted File Upload Vulnerability — SAP NetWeaver contains a vulnerability that a…
CRITICAL
9.0
KEV AI Jun 9, 2022
CVE-2016-2386
SAP NetWeaver SQL Injection Vulnerability — SQL injection vulnera…
SAP NetWeaver SQL Injection Vulnerability — SQL injection vulnerability in the UDDI server in SAP Ne…
CRITICAL
9.0
KEV AI Jun 9, 2022
CVE-2016-2388
SAP NetWeaver Information Disclosure Vulnerability — The Universa…
SAP NetWeaver Information Disclosure Vulnerability — The Universal Worklist Configuration in SAP Net…
CRITICAL
9.0
KEV AI Jun 9, 2022
CVE-2006-2492
Microsoft Word Malformed Object Pointer Remote Code Execution Vul…
Microsoft Word Malformed Object Pointer Vulnerability — Microsoft Word and Microsoft Works Suites co…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2007-5659
Adobe Acrobat/Reader JavaScript Buffer Overflow Enables Remote Co…
Adobe Acrobat and Reader Buffer Overflow Vulnerability — Adobe Acrobat and Reader contain a buffer o…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2008-0655
Adobe Acrobat/Reader Silent Print Design Flaw Vulnerability (CVE-…
Adobe Acrobat and Reader Unspecified Vulnerability — Adobe Acrobat and Reader contains an unespecifi…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2009-0557
Microsoft Office Object Record Corruption Vulnerability (CVE-2009…
Microsoft Office Object Record Corruption Vulnerability — Microsoft Office contains an object record…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2009-0563
Microsoft Office Word Buffer Overflow Remote Code Execution Vulne…
Microsoft Office Buffer Overflow Vulnerability — Microsoft Office contains a buffer overflow vulnera…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2009-1862
Adobe Acrobat, Reader & Flash Player Remote Code Execution Vulner…
Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability — Adobe Acrobat and Reader and Adob…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2009-3953
Adobe Acrobat/Reader Universal 3D Array Boundary Remote Code Exec…
Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability — Adobe Acrobat and Reader…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2009-4324
Adobe Acrobat/Reader Use-After-Free Remote Code Execution Vulnera…
Adobe Acrobat and Reader Use-After-Free Vulnerability — Use-after-free vulnerability in Adobe Acroba…
CRITICAL
9.0
KEV AI Jun 8, 2022
CVE-2010-1297
Adobe Flash Player Memory Corruption Remote Code Execution Vulner…
Adobe Flash Player Memory Corruption Vulnerability — Adobe Flash Player contains a memory corruption…
CRITICAL
9.0
KEV AI Jun 8, 2022
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.