INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 1h Global data_breach Technology and Social Networks CRITICAL 2h Global vulnerability Information Technology HIGH 2h Global malware Information Technology CRITICAL 2h Global vulnerability Technology/Cloud Services CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global vulnerability Enterprise Software and Database Management CRITICAL 4h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 1h Global data_breach Technology and Social Networks CRITICAL 2h Global vulnerability Information Technology HIGH 2h Global malware Information Technology CRITICAL 2h Global vulnerability Technology/Cloud Services CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global vulnerability Enterprise Software and Database Management CRITICAL 4h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 1h Global data_breach Technology and Social Networks CRITICAL 2h Global vulnerability Information Technology HIGH 2h Global malware Information Technology CRITICAL 2h Global vulnerability Technology/Cloud Services CRITICAL 2h Global vulnerability Information Technology CRITICAL 3h Global vulnerability Enterprise Software and Database Management CRITICAL 4h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2022-29303
SolarView Compact Command Injection Vulnerability — SolarView Com…
SolarView Compact Command Injection Vulnerability — SolarView Compact contains a command injection v…
CRITICAL
9.0
KEV AI Jul 13, 2023
CVE-2022-31199
Netwrix Auditor Insecure Object Deserialization Vulnerability — N…
Netwrix Auditor Insecure Object Deserialization Vulnerability — Netwrix Auditor User Activity Video …
CRITICAL
9.0
KEV AI Jul 11, 2023
CVE-2023-32046
Microsoft Windows MSHTML Platform Privilege Escalation Vulnerabil…
Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability — Microsoft Windows MSHTML Plat…
CRITICAL
9.0
KEV AI Jul 11, 2023
CVE-2023-32049
Microsoft Windows Defender SmartScreen Security Feature Bypass Vu…
Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability — Microsoft Windows Def…
CRITICAL
9.0
KEV AI Jul 11, 2023
CVE-2023-35311
Microsoft Outlook Security Feature Bypass Vulnerability — Microso…
Microsoft Outlook Security Feature Bypass Vulnerability — Microsoft Outlook contains a security feat…
CRITICAL
9.0
KEV AI Jul 11, 2023
CVE-2023-36874
Microsoft Windows Error Reporting Service Privilege Escalation Vu…
Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability — Microsoft Windows Err…
CRITICAL
9.0
KEV AI Jul 11, 2023
CVE-2021-29256
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability — Arm Mal…
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability — Arm Mali GPU Kernel Driver contains a use-…
CRITICAL
9.0
KEV AI Jul 7, 2023
CVE-2021-25371
Samsung Mobile Devices Unspecified Vulnerability — Samsung mobile…
Samsung Mobile Devices Unspecified Vulnerability — Samsung mobile devices contain an unspecified vul…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2021-25372
Samsung Mobile Devices Improper Boundary Check Vulnerability — Sa…
Samsung Mobile Devices Improper Boundary Check Vulnerability — Samsung mobile devices contain an imp…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2021-25394
Samsung Mobile Devices Race Condition Vulnerability — Samsung mob…
Samsung Mobile Devices Race Condition Vulnerability — Samsung mobile devices contain a race conditio…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2021-25395
Samsung Mobile Devices Race Condition Vulnerability — Samsung mob…
Samsung Mobile Devices Race Condition Vulnerability — Samsung mobile devices contain a race conditio…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2021-25487
Samsung Mobile Devices Out-of-Bounds Read Vulnerability — Samsung…
Samsung Mobile Devices Out-of-Bounds Read Vulnerability — Samsung mobile devices contain an out-of-b…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2021-25489
Samsung Mobile Devices Improper Input Validation Vulnerability — …
Samsung Mobile Devices Improper Input Validation Vulnerability — Samsung mobile devices contain an i…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2019-17621
D-Link DIR-859 Router Command Execution Vulnerability — D-Link DI…
D-Link DIR-859 Router Command Execution Vulnerability — D-Link DIR-859 router contains a command exe…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2019-20500
D-Link DWL-2600AP Access Point Command Injection Vulnerability — …
D-Link DWL-2600AP Access Point Command Injection Vulnerability — D-Link DWL-2600AP access point cont…
CRITICAL
9.0
KEV AI Jun 29, 2023
CVE-2023-20867
VMware Tools Authentication Bypass Vulnerability (CVE-2023-20867)
VMware Tools Authentication Bypass Vulnerability — VMware Tools contains an authentication bypass vu…
CRITICAL
9.0
KEV AI Jun 23, 2023
CVE-2023-27992
Zyxel Multiple NAS Devices Command Injection Vulnerability — Mult…
Zyxel Multiple NAS Devices Command Injection Vulnerability — Multiple Zyxel network-attached storage…
CRITICAL
9.0
KEV AI Jun 23, 2023
CVE-2023-32434
Apple Multiple Products Integer Overflow Vulnerability — Apple iO…
Apple Multiple Products Integer Overflow Vulnerability — Apple iOS. iPadOS, macOS, and watchOS conta…
CRITICAL
9.0
KEV AI Jun 23, 2023
CVE-2023-32435
Apple Multiple Products WebKit Memory Corruption Vulnerability — …
Apple Multiple Products WebKit Memory Corruption Vulnerability — Apple iOS, iPadOS, macOS, and Safar…
CRITICAL
9.0
KEV AI Jun 23, 2023
CVE-2023-32439
Apple Multiple Products WebKit Type Confusion Vulnerability — App…
Apple Multiple Products WebKit Type Confusion Vulnerability — Apple iOS, iPadOS, macOS, and Safari W…
CRITICAL
9.0
KEV AI Jun 23, 2023
CVE-2023-20887
VMware Aria Operations for Networks Command Injection Remote Code…
Vmware Aria Operations for Networks Command Injection Vulnerability — VMware Aria Operations for Net…
CRITICAL
9.0
KEV AI Jun 22, 2023
CVE-2020-12641
Roundcube Webmail Remote Code Execution Vulnerability — Roundcube…
Roundcube Webmail Remote Code Execution Vulnerability — Roundcube Webmail contains an remote code ex…
CRITICAL
9.0
KEV AI Jun 22, 2023
CVE-2020-35730
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability — Roun…
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability — Roundcube Webmail contains a cross-site…
CRITICAL
9.0
KEV AI Jun 22, 2023
CVE-2021-44026
Roundcube Webmail SQL Injection Vulnerability — Roundcube Webmail…
Roundcube Webmail SQL Injection Vulnerability — Roundcube Webmail is vulnerable to SQL injection via…
CRITICAL
9.0
KEV AI Jun 22, 2023
CVE-2016-0165
Microsoft Win32k Privilege Escalation Vulnerability — Microsoft W…
Microsoft Win32k Privilege Escalation Vulnerability — Microsoft Win32k contains an unspecified vulne…
CRITICAL
9.0
KEV AI Jun 22, 2023
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.