INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2018-14634
Linux Kernel Integer Overflow Privilege Escalation Vulnerability …
Linux Kernel Integer Overflow Vulnerability — Linux Kernel contains an integer overflow vulnerabilit…
CRITICAL
9.0
KEV AI Jan 26, 2026
CVE-2024-37079
Broadcom VMware vCenter Server Out-of-Bounds Write Vulnerability …
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability — Broadcom VMware vCenter Server co…
CRITICAL
9.0
KEV AI Jan 23, 2026
CVE-2025-68645
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusio…
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability — Synacor Zimbra Co…
CRITICAL
9.0
KEV AI Jan 22, 2026
CVE-2025-54313
Prettier eslint-config-prettier Embedded Malicious Code Vulnerabi…
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability — Prettier eslint-config-prett…
CRITICAL
9.0
KEV AI Jan 22, 2026
CVE-2025-34026
Versa Concerto SD-WAN Improper Authentication Vulnerability (CVE-…
Versa Concerto Improper Authentication Vulnerability — Versa Concerto SD-WAN orchestration platform …
CRITICAL
9.0
KEV AI Jan 22, 2026
CVE-2025-31125
Vite Vitejs Improper Access Control Vulnerability (CVE-2025-31125…
Vite Vitejs Improper Access Control Vulnerability — Vite Vitejs contains an improper access control …
CRITICAL
9.0
KEV AI Jan 22, 2026
CVE-2026-20045
Cisco Unified Communications Products Critical Code Injection Vul…
Cisco Unified Communications Products Code Injection Vulnerability — Cisco Unified Communications Ma…
CRITICAL
9.0
KEV AI Jan 21, 2026
CVE-2026-20805
CVE-2026-20805: Microsoft Windows Desktop Window Manager Critical…
Microsoft Windows Information Disclosure Vulnerability — Microsoft Windows Desktop Windows Manager c…
CRITICAL
9.0
KEV AI Jan 13, 2026
CVE-2025-8110
Gogs Path Traversal Vulnerability Leading to Remote Code Executio…
Gogs Path Traversal Vulnerability — Gogs contains a path traversal vulnerability affecting improper …
CRITICAL
9.0
KEV AI Jan 12, 2026
CVE-2025-37164
HPE OneView Critical Code Injection Vulnerability Enabling Remote…
Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability — Hewlett Packard Enterprise (…
CRITICAL
9.0
KEV AI Jan 7, 2026
CVE-2009-0556
Microsoft PowerPoint Remote Code Execution via OutlineTextRefAtom…
Microsoft Office PowerPoint Code Injection Vulnerability — Microsoft Office PowerPoint contains a co…
CRITICAL
9.0
KEV AI Jan 7, 2026
CVE-2025-14847
MongoDB Server Improper Handling of Length Parameter Inconsistenc…
MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability — Mongo…
CRITICAL
9.0
KEV AI Dec 29, 2025
CVE-2023-52163
Digiever DS-2105 Pro Missing Authorization Vulnerability Enables …
Digiever DS-2105 Pro Missing Authorization Vulnerability — Digiever DS-2105 Pro contains a missing a…
CRITICAL
9.0
KEV AI Dec 22, 2025
CVE-2025-14733
WatchGuard Firebox Out of Bounds Write Vulnerability (CVE-2025-14…
WatchGuard Firebox Out of Bounds Write Vulnerability — WatchGuard Fireware OS iked process contains …
CRITICAL
9.0
KEV AI Dec 19, 2025
CVE-2025-59374
ASUS Live Update Embedded Malicious Code Vulnerability (CVE-2025-…
ASUS Live Update Embedded Malicious Code Vulnerability — ASUS Live Update contains an embedded malic…
CRITICAL
9.0
KEV AI Dec 17, 2025
CVE-2025-40602
SonicWall SMA1000 Missing Authorization Vulnerability Enabling Pr…
SonicWall SMA1000 Missing Authorization Vulnerability — SonicWall SMA1000 contains a missing authori…
CRITICAL
9.0
KEV AI Dec 17, 2025
CVE-2025-20393
Cisco Multiple Products Improper Input Validation Vulnerability (…
Cisco Multiple Products Improper Input Validation Vulnerability — Cisco Secure Email Gateway, Secure…
CRITICAL
9.0
KEV AI Dec 17, 2025
CVE-2025-59718
Fortinet Multiple Products Improper Verification of Cryptographic…
Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability — Fortinet…
CRITICAL
9.0
KEV AI Dec 16, 2025
CVE-2025-43529
Apple Multiple Products Use-After-Free WebKit Vulnerability (CVE-…
Apple Multiple Products Use-After-Free WebKit Vulnerability — Apple iOS, iPadOS, macOS, and other Ap…
CRITICAL
9.0
KEV AI Dec 15, 2025
CVE-2025-14611
Gladinet CentreStack and Triofox Hard Coded Cryptographic Keys Vu…
Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability — Gladinet CentreStack and T…
CRITICAL
9.0
KEV AI Dec 15, 2025
CVE-2025-14174
Critical Out of Bounds Memory Access Vulnerability in Google Chro…
Google Chromium Out of Bounds Memory Access Vulnerability — Google Chromium contains an out of bound…
CRITICAL
9.0
KEV AI Dec 12, 2025
CVE-2018-4063
Sierra Wireless AirLink ALEOS Unrestricted File Upload Vulnerabil…
Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability — Sierra…
CRITICAL
9.0
KEV AI Dec 12, 2025
CVE-2025-58360
OSGeo GeoServer XML External Entity (XXE) Injection Vulnerability…
OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability — OSGeo GeoServe…
CRITICAL
9.0
KEV AI Dec 11, 2025
CVE-2025-62221
Microsoft Windows Cloud Files Mini Filter Driver Use After Free V…
Microsoft Windows Use After Free Vulnerability — Microsoft Windows Cloud Files Mini Filter Driver co…
CRITICAL
9.0
KEV AI Dec 9, 2025
CVE-2025-6218
RARLAB WinRAR Critical Path Traversal Vulnerability Enabling Code…
RARLAB WinRAR Path Traversal Vulnerability — RARLAB WinRAR contains a path traversal vulnerability a…
CRITICAL
9.0
KEV AI Dec 9, 2025
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.