INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 1h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 4h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 5h Global insider Cybersecurity Services CRITICAL 5h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 1h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 4h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 5h Global insider Cybersecurity Services CRITICAL 5h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h Global vulnerability Information Technology / Cybersecurity CRITICAL 1h Global malware Energy and Utilities CRITICAL 1h Global ransomware Multiple sectors CRITICAL 2h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 4h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 5h Global insider Cybersecurity Services CRITICAL 5h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 6h Global malware Technology and Cloud Services HIGH 6h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2024-54085
AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability —…
AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability — AMI MegaRAC SPx contains an authen…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2024-0769
D-Link DIR-859 Router Path Traversal Vulnerability — D-Link DIR-…
D-Link DIR-859 Router Path Traversal Vulnerability — D-Link DIR-859 routers contain a path traversa…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2019-6693
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fo…
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fortinet FortiOS contains a use of ha…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2023-0386
Linux Kernel OverlayFS Privilege Escalation via Improper Ownershi…
Linux Kernel Improper Ownership Management Vulnerability — Linux Kernel contains an improper ownersh…
CRITICAL
9.0
KEV AI Jun 17, 2025
CVE-2025-43200
Apple Multiple Products Unspecified Vulnerability in iCloud Link …
Apple Multiple Products Unspecified Vulnerability — Apple iOS, iPadOS, macOS, watchOS, and visionOS,…
CRITICAL
9.0
KEV AI Jun 16, 2025
CVE-2023-33538
TP-Link Multiple Routers Command Injection Vulnerability — TP-Lin…
TP-Link Multiple Routers Command Injection Vulnerability — TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10…
CRITICAL
9.0
KEV AI Jun 16, 2025
CVE-2025-33053
Microsoft Windows WebDAV Remote Code Execution via Internet Short…
Microsoft Windows External Control of File Name or Path Vulnerability — Microsoft Windows contains …
CRITICAL
9.0
KEV AI Jun 10, 2025
CVE-2025-24016
Wazuh Server Remote Code Execution via Unsafe Deserialization
Wazuh Server Deserialization of Untrusted Data Vulnerability — Wazuh contains a deserialization of u…
CRITICAL
9.0
KEV AI Jun 10, 2025
CVE-2025-32433
Erlang/OTP SSH Server Missing Authentication for Critical Functio…
Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability — Erlang Erl…
CRITICAL
9.0
KEV AI Jun 9, 2025
CVE-2024-42009
RoundCube Webmail Cross-Site Scripting Vulnerability — RoundCube …
RoundCube Webmail Cross-Site Scripting Vulnerability — RoundCube Webmail contains a cross-site scrip…
CRITICAL
9.0
KEV AI Jun 9, 2025
CVE-2025-5419
Google Chromium V8 Out-of-Bounds Read/Write Vulnerability (CVE-20…
Google Chromium V8 Out-of-Bounds Read and Write Vulnerability — Google Chromium V8 contains an out-o…
CRITICAL
9.0
KEV AI Jun 5, 2025
CVE-2025-27038
Qualcomm Adreno GPU Use-After-Free Vulnerability in Multiple Chip…
Qualcomm Multiple Chipsets Use-After-Free Vulnerability — Multiple Qualcomm chipsets contain a use-a…
CRITICAL
9.0
KEV AI Jun 3, 2025
CVE-2025-21480
Qualcomm Multiple Chipsets GPU Micronode Unauthorized Command Exe…
Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability — Multiple Qualcomm chipsets contai…
CRITICAL
9.0
KEV AI Jun 3, 2025
CVE-2025-21479
Qualcomm Multiple Chipsets GPU Micronode Unauthorized Command Exe…
Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability — Multiple Qualcomm chipsets contai…
CRITICAL
9.0
KEV AI Jun 3, 2025
CVE-2025-3935
ConnectWise ScreenConnect Improper Authentication and ViewState C…
ConnectWise ScreenConnect Improper Authentication Vulnerability — ConnectWise ScreenConnect contains…
CRITICAL
9.0
KEV AI Jun 2, 2025
CVE-2025-35939
Craft CMS External Control of Assumed-Immutable Web Parameter Vul…
Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability — Craft CMS contains an …
CRITICAL
9.0
KEV AI Jun 2, 2025
CVE-2023-39780
ASUS RT-AX55 Routers OS Command Injection Vulnerability — ASUS RT…
ASUS RT-AX55 Routers OS Command Injection Vulnerability — ASUS RT-AX55 devices contain an OS command…
CRITICAL
9.0
KEV AI Jun 2, 2025
CVE-2024-56145
Craft CMS Code Injection Vulnerability — Craft CMS contains a cod…
Craft CMS Code Injection Vulnerability — Craft CMS contains a code injection vulnerability. Users wi…
CRITICAL
9.0
KEV AI Jun 2, 2025
CVE-2021-32030
ASUS Routers Improper Authentication Vulnerability — ASUS Lyra Mi…
ASUS Routers Improper Authentication Vulnerability — ASUS Lyra Mini and ASUS GT-AC2900 devices conta…
CRITICAL
9.0
KEV AI Jun 2, 2025
CVE-2025-4632
Samsung MagicINFO 9 Server Path Traversal - Arbitrary File Write …
Samsung MagicINFO 9 Server Path Traversal Vulnerability — Samsung MagicINFO 9 Server contains a path…
CRITICAL
9.0
KEV AI May 22, 2025
CVE-2025-4428
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerabilit…
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability — Ivanti Endpoint Manager Mobile …
CRITICAL
9.0
KEV AI May 19, 2025
CVE-2025-4427
Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulne…
Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability — Ivanti Endpoint Manager …
CRITICAL
9.0
KEV AI May 19, 2025
CVE-2025-27920
Srimax Output Messenger Directory Traversal Vulnerability (CVE-20…
Srimax Output Messenger Directory Traversal Vulnerability — Srimax Output Messenger contains a direc…
CRITICAL
9.0
KEV AI May 19, 2025
CVE-2023-38950
ZKTeco BioTime Path Traversal Vulnerability — ZKTeco BioTime cont…
ZKTeco BioTime Path Traversal Vulnerability — ZKTeco BioTime contains a path traversal vulnerability…
CRITICAL
9.0
KEV AI May 19, 2025
CVE-2024-11182
MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability — M…
MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability — MDaemon Email Server contains a cros…
CRITICAL
9.0
KEV AI May 19, 2025
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.