INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Financial Services / Cybersecurity CRITICAL 30m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 30m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 30m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2025-49706
Microsoft SharePoint Improper Authentication Vulnerability (CVE-2…
Microsoft SharePoint Improper Authentication Vulnerability — Microsoft SharePoint contains an improp…
CRITICAL
9.0
KEV AI Jul 22, 2025
CVE-2025-54309
CrushFTP Unprotected Alternate Channel Vulnerability - Remote Adm…
CrushFTP Unprotected Alternate Channel Vulnerability — CrushFTP contains an unprotected alternate c…
CRITICAL
9.0
KEV AI Jul 22, 2025
CVE-2025-6558
Google Chromium ANGLE and GPU Improper Input Validation Vulnerabi…
Google Chromium ANGLE and GPU Improper Input Validation Vulnerability — Google Chromium contains an …
CRITICAL
9.0
KEV AI Jul 22, 2025
CVE-2025-53770
Microsoft SharePoint Deserialization of Untrusted Data Remote Cod…
Microsoft SharePoint Deserialization of Untrusted Data Vulnerability — Microsoft SharePoint Server o…
CRITICAL
9.0
KEV AI Jul 20, 2025
CVE-2025-25257
Fortinet FortiWeb SQL Injection Vulnerability (CVE-2025-25257)
Fortinet FortiWeb SQL Injection Vulnerability — Fortinet FortiWeb contains a SQL injection vulnerabi…
CRITICAL
9.0
KEV AI Jul 18, 2025
CVE-2025-47812
Wing FTP Server Null Byte Injection Leading to Arbitrary Code Exe…
Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability — Wing FTP Serve…
CRITICAL
9.0
KEV AI Jul 14, 2025
CVE-2025-5777
Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability…
Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability — Citrix NetScaler ADC and Gateway…
CRITICAL
9.0
KEV AI Jul 10, 2025
CVE-2019-9621
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forg…
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability — Synacor …
CRITICAL
9.0
KEV AI Jul 7, 2025
CVE-2014-3931
Multi-Router Looking Glass (MRLG) Critical Buffer Overflow Vulner…
Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability — Multi-Router Looking Glass (MRLG) …
CRITICAL
9.0
KEV AI Jul 7, 2025
CVE-2016-10033
PHPMailer Command Injection Vulnerability — PHPMailer contains a …
PHPMailer Command Injection Vulnerability — PHPMailer contains a command injection vulnerability bec…
CRITICAL
9.0
KEV AI Jul 7, 2025
CVE-2019-5418
Rails Ruby on Rails Path Traversal Vulnerability — Rails Ruby on …
Rails Ruby on Rails Path Traversal Vulnerability — Rails Ruby on Rails contains a path traversal vul…
CRITICAL
9.0
KEV AI Jul 7, 2025
CVE-2025-6554
Google Chromium V8 Type Confusion Vulnerability — Google Chromium…
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 contains a type confusion vulne…
CRITICAL
9.0
KEV AI Jul 2, 2025
CVE-2025-48927
TeleMessage TM SGNL Initialization of a Resource with an Insecure…
TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability — TeleMessag…
CRITICAL
9.0
KEV AI Jul 1, 2025
CVE-2025-48928
TeleMessage TM SGNL Core Dump File Exposure Vulnerability
TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability — Tel…
CRITICAL
9.0
KEV AI Jul 1, 2025
CVE-2025-6543
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability — …
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability — Citrix NetScaler ADC and Gateway co…
CRITICAL
9.0
KEV AI Jun 30, 2025
CVE-2024-0769
D-Link DIR-859 Router Path Traversal Vulnerability — D-Link DIR-…
D-Link DIR-859 Router Path Traversal Vulnerability — D-Link DIR-859 routers contain a path traversa…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2024-54085
AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability —…
AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability — AMI MegaRAC SPx contains an authen…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2019-6693
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fo…
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fortinet FortiOS contains a use of ha…
CRITICAL
9.0
KEV AI Jun 25, 2025
CVE-2023-0386
Linux Kernel OverlayFS Privilege Escalation via Improper Ownershi…
Linux Kernel Improper Ownership Management Vulnerability — Linux Kernel contains an improper ownersh…
CRITICAL
9.0
KEV AI Jun 17, 2025
CVE-2023-33538
TP-Link Multiple Routers Command Injection Vulnerability — TP-Lin…
TP-Link Multiple Routers Command Injection Vulnerability — TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10…
CRITICAL
9.0
KEV AI Jun 16, 2025
CVE-2025-43200
Apple Multiple Products Unspecified Vulnerability in iCloud Link …
Apple Multiple Products Unspecified Vulnerability — Apple iOS, iPadOS, macOS, watchOS, and visionOS,…
CRITICAL
9.0
KEV AI Jun 16, 2025
CVE-2025-24016
Wazuh Server Remote Code Execution via Unsafe Deserialization
Wazuh Server Deserialization of Untrusted Data Vulnerability — Wazuh contains a deserialization of u…
CRITICAL
9.0
KEV AI Jun 10, 2025
CVE-2025-33053
Microsoft Windows WebDAV Remote Code Execution via Internet Short…
Microsoft Windows External Control of File Name or Path Vulnerability — Microsoft Windows contains …
CRITICAL
9.0
KEV AI Jun 10, 2025
CVE-2024-42009
RoundCube Webmail Cross-Site Scripting Vulnerability — RoundCube …
RoundCube Webmail Cross-Site Scripting Vulnerability — RoundCube Webmail contains a cross-site scrip…
CRITICAL
9.0
KEV AI Jun 9, 2025
CVE-2025-32433
Erlang/OTP SSH Server Missing Authentication for Critical Functio…
Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability — Erlang Erl…
CRITICAL
9.0
KEV AI Jun 9, 2025
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.