INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Financial Services / Cybersecurity CRITICAL 35m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 35m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 35m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2017-8540
Microsoft Malware Protection Engine Improper Restriction of Opera…
Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability — The Microsoft…
CRITICAL
9.0
KEV AI Mar 3, 2022
CVE-2018-0151
Cisco IOS Software and Cisco IOS XE Software Quality of Service R…
Cisco IOS Software and Cisco IOS XE Software Quality of Service Remote Code Execution Vulnerability …
CRITICAL
9.0
KEV AI Mar 3, 2022
CVE-2018-8298
ChakraCore Scripting Engine Type Confusion Vulnerability — The Ch…
ChakraCore Scripting Engine Type Confusion Vulnerability — The ChakraCore scripting engine contains …
CRITICAL
9.0
KEV AI Mar 3, 2022
CVE-2019-1297
Microsoft Excel Remote Code Execution Vulnerability — A remote co…
Microsoft Excel Remote Code Execution Vulnerability — A remote code execution vulnerability exists i…
CRITICAL
9.0
KEV AI Mar 3, 2022
CVE-2019-16928
Exim Out-of-bounds Write Vulnerability — Exim contains an out-of-…
Exim Out-of-bounds Write Vulnerability — Exim contains an out-of-bounds write vulnerability which ca…
CRITICAL
9.0
KEV AI Mar 3, 2022
CVE-2017-0222
Microsoft Internet Explorer Remote Code Execution Vulnerability —…
Microsoft Internet Explorer Remote Code Execution Vulnerability — A remote code execution vulnerabil…
CRITICAL
9.0
KEV AI Feb 25, 2022
CVE-2017-8570
Microsoft Office Remote Code Execution Vulnerability — A remote c…
Microsoft Office Remote Code Execution Vulnerability — A remote code execution vulnerability exists …
CRITICAL
9.0
KEV AI Feb 25, 2022
CVE-2013-3906
Microsoft Graphics Component Memory Corruption Vulnerability (CVE…
Microsoft Graphics Component Memory Corruption Vulnerability — Microsoft Graphics Component contains…
CRITICAL
9.0
KEV AI Feb 15, 2022
CVE-2014-1761
Microsoft Word Memory Corruption Vulnerability Enabling Remote Co…
Microsoft Word Memory Corruption Vulnerability — Microsoft Word contains a memory corruption vulnera…
CRITICAL
9.0
KEV AI Feb 15, 2022
CVE-2018-20250
WinRAR Absolute Path Traversal Vulnerability — WinRAR Absolute Pa…
WinRAR Absolute Path Traversal Vulnerability — WinRAR Absolute Path Traversal vulnerability leads to…
CRITICAL
9.0
KEV AI Feb 15, 2022
CVE-2018-8174
Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerabili…
Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerability — A remote code execution vulner…
CRITICAL
9.0
KEV AI Feb 15, 2022
CVE-2019-0752
Microsoft Internet Explorer Type Confusion Vulnerability — A remo…
Microsoft Internet Explorer Type Confusion Vulnerability — A remote code execution vulnerability exi…
CRITICAL
9.0
KEV AI Feb 15, 2022
CVE-2015-1635
Microsoft HTTP.sys Remote Code Execution Vulnerability — Microsof…
Microsoft HTTP.sys Remote Code Execution Vulnerability — Microsoft HTTP protocol stack (HTTP.sys) co…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2015-2051
D-Link DIR-645 Router Remote Code Execution Vulnerability — D-Lin…
D-Link DIR-645 Router Remote Code Execution Vulnerability — D-Link DIR-645 Wired/Wireless Router all…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-0144
Microsoft SMBv1 Remote Code Execution Vulnerability — The SMBv1 s…
Microsoft SMBv1 Remote Code Execution Vulnerability — The SMBv1 server in multiple Microsoft Windows…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-0145
Microsoft SMBv1 Remote Code Execution Vulnerability — The SMBv1 s…
Microsoft SMBv1 Remote Code Execution Vulnerability — The SMBv1 server in multiple Microsoft Windows…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-0262
Microsoft Office Remote Code Execution Vulnerability — A remote c…
Microsoft Office Remote Code Execution Vulnerability — A remote code execution vulnerability exists …
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-10271
Oracle Corporation WebLogic Server Remote Code Execution Vulnerab…
Oracle Corporation WebLogic Server Remote Code Execution Vulnerability — Oracle Corporation WebLogic…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-8464
Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerabilit…
Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability — Windows Shell in multiple versi…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2017-9791
Apache Struts 1 Improper Input Validation Vulnerability — The Str…
Apache Struts 1 Improper Input Validation Vulnerability — The Struts 1 plugin in Apache Struts might…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2020-0796
Microsoft SMBv3 Remote Code Execution Vulnerability — A remote co…
Microsoft SMBv3 Remote Code Execution Vulnerability — A remote code execution vulnerability exists i…
CRITICAL
9.0
KEV AI Feb 10, 2022
CVE-2014-1776
Microsoft Internet Explorer Memory Corruption Remote Code Executi…
Microsoft Internet Explorer Memory Corruption Vulnerability — Microsoft Internet Explorer contains a…
CRITICAL
9.0
KEV AI Jan 28, 2022
CVE-2012-0391
Apache Struts 2 ExceptionDelegator Remote Code Execution Vulnerab…
Apache Struts 2 Improper Input Validation Vulnerability — The ExceptionDelegator component in Apache…
CRITICAL
9.0
KEV AI Jan 21, 2022
CVE-2013-3900
Microsoft WinVerifyTrust Authenticode Signature Verification Remo…
Microsoft WinVerifyTrust function Remote Code Execution — A remote code execution vulnerability exis…
CRITICAL
9.0
KEV AI Jan 10, 2022
CVE-2017-1000486
Primetek Primefaces Remote Code Execution Vulnerability — Primete…
Primetek Primefaces Remote Code Execution Vulnerability — Primetek Primefaces is vulnerable to a wea…
CRITICAL
9.0
KEV AI Jan 10, 2022
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.