INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Technology and Software Development CRITICAL 23m Global ddos Technology and Social Media HIGH 45m Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 23m Global ddos Technology and Social Media HIGH 45m Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 23m Global ddos Technology and Social Media HIGH 45m Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2017-0148
Microsoft SMBv1 Server Remote Code Execution Vulnerability — The …
Microsoft SMBv1 Server Remote Code Execution Vulnerability — The SMBv1 server in Microsoft allows re…
CRITICAL
9.0
KEV AI Apr 6, 2022
CVE-2021-45382
D-Link Multiple Routers Remote Code Execution Vulnerability — A r…
D-Link Multiple Routers Remote Code Execution Vulnerability — A remote code execution vulnerability …
CRITICAL
9.0
KEV AI Apr 4, 2022
CVE-2022-22674
Apple macOS Out-of-Bounds Read Vulnerability — macOS Monterey con…
Apple macOS Out-of-Bounds Read Vulnerability — macOS Monterey contains an out-of-bounds read vulnera…
CRITICAL
9.0
KEV AI Apr 4, 2022
CVE-2022-22675
Apple macOS Out-of-Bounds Write Vulnerability — macOS Monterey co…
Apple macOS Out-of-Bounds Write Vulnerability — macOS Monterey contains an out-of-bounds write vulne…
CRITICAL
9.0
KEV AI Apr 4, 2022
CVE-2022-22965
Spring Framework JDK 9+ Remote Code Execution Vulnerability — Spr…
Spring Framework JDK 9+ Remote Code Execution Vulnerability — Spring MVC or Spring WebFlux applicati…
CRITICAL
9.0
KEV AI Apr 4, 2022
CVE-2021-21551
Dell dbutil Driver Insufficient Access Control Vulnerability — De…
Dell dbutil Driver Insufficient Access Control Vulnerability — Dell dbutil driver contains an insuff…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2021-28799
QNAP NAS Improper Authorization Vulnerability — QNAP NAS running …
QNAP NAS Improper Authorization Vulnerability — QNAP NAS running HBS 3 contains an improper authoriz…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2021-34484
Microsoft Windows User Profile Service Privilege Escalation Vulne…
Microsoft Windows User Profile Service Privilege Escalation Vulnerability — Microsoft Windows User P…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2022-1040
Sophos Firewall Authentication Bypass Vulnerability — An authenti…
Sophos Firewall Authentication Bypass Vulnerability — An authentication bypass vulnerability in User…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2022-26871
Trend Micro Apex Central Arbitrary File Upload Vulnerability — An…
Trend Micro Apex Central Arbitrary File Upload Vulnerability — An arbitrary file upload vulnerabilit…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2018-10561
Dasan GPON Routers Authentication Bypass Vulnerability — Dasan GP…
Dasan GPON Routers Authentication Bypass Vulnerability — Dasan GPON Routers contain an authenticatio…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2018-10562
Dasan GPON Routers Command Injection Vulnerability — Dasan GPON R…
Dasan GPON Routers Command Injection Vulnerability — Dasan GPON Routers contain an authentication by…
CRITICAL
9.0
KEV AI Mar 31, 2022
CVE-2010-4398
Microsoft Windows Kernel Stack-Based Buffer Overflow Privilege Es…
Microsoft Windows Kernel Stack-Based Buffer Overflow Vulnerability — Stack-based buffer overflow in …
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2011-2005
Microsoft Ancillary Function Driver Privilege Escalation Vulnerab…
Microsoft Ancillary Function Driver (afd.sys) Improper Input Validation Vulnerability — afd.sys in t…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2012-0518
Oracle Fusion Middleware SSO Remote Integrity Compromise
Oracle Fusion Middleware Unspecified Vulnerability — Unspecified vulnerability in the Oracle Applica…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2012-2034
Adobe Flash Player Critical Memory Corruption Vulnerability (CVE-…
Adobe Flash Player Memory Corruption Vulnerability — Adobe Flash Player contains a memory corruption…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2012-2539
Microsoft Word RTF Remote Code Execution Vulnerability (CVE-2012-…
Microsoft Word Remote Code Execution Vulnerability — Microsoft Word allows attackers to execute remo…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2012-5076
Oracle Java SE Sandbox Bypass via Unrestricted Package Access (CV…
Oracle Java SE Sandbox Bypass Vulnerability — The default Java security properties configuration did…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2013-1690
Mozilla Firefox/Thunderbird onreadystatechange Event Handling Rem…
Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability — Mozilla Firefox and Thunderbird do…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2013-2465
Oracle Java SE 2D Component Remote Code Execution Vulnerability (…
Oracle Java SE Unspecified Vulnerability — Unspecified vulnerability in the Java Runtime Environment…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2013-2551
Microsoft Internet Explorer Use-After-Free Remote Code Execution …
Microsoft Internet Explorer Use-After-Free Vulnerability — Use-after-free vulnerability in Microsoft…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2013-2729
Adobe Reader/Acrobat Integer Overflow Remote Code Execution (CVE-…
Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability — Integer overflow vulnerability i…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2013-3660
Microsoft Win32k Privilege Escalation Vulnerability (CVE-2013-366…
Microsoft Win32k Privilege Escalation Vulnerability — The EPATHOBJ::pprFlattenRec function in win32k…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2015-1770
Microsoft Office Uninitialized Memory Use Vulnerability — Microso…
Microsoft Office Uninitialized Memory Use Vulnerability — Microsoft Office allows remote attackers t…
CRITICAL
9.0
KEV AI Mar 28, 2022
CVE-2015-2419
Microsoft Internet Explorer Memory Corruption Vulnerability — JSc…
Microsoft Internet Explorer Memory Corruption Vulnerability — JScript in Microsoft Internet Explorer…
CRITICAL
9.0
KEV AI Mar 28, 2022
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.