INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Technology and Software Development CRITICAL 9m Global ddos Technology and Social Media HIGH 31m Global phishing Financial Services, Telecommunications, General Public HIGH 56m Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 9m Global ddos Technology and Social Media HIGH 31m Global phishing Financial Services, Telecommunications, General Public HIGH 56m Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 9m Global ddos Technology and Social Media HIGH 31m Global phishing Financial Services, Telecommunications, General Public HIGH 56m Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2023-32409
Apple Multiple Products WebKit Sandbox Escape Vulnerability — App…
Apple Multiple Products WebKit Sandbox Escape Vulnerability — Apple iOS, iPadOS, macOS, tvOS, watchO…
CRITICAL
9.0
KEV AI May 22, 2023
CVE-2023-21492
Samsung Mobile Devices ASLR Bypass via Sensitive Information Logg…
Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability — Samsung mobi…
CRITICAL
9.0
KEV AI May 19, 2023
CVE-2004-1464
Cisco IOS Unspecified Denial-of-Service Vulnerability (CVE-2004-1…
Cisco IOS Denial-of-Service Vulnerability — Cisco IOS contains an unspecified vulnerability that may…
CRITICAL
9.0
KEV AI May 19, 2023
CVE-2016-6415
Cisco IOS, IOS XR, and IOS XE IKEv1 Information Disclosure Vulner…
Cisco IOS, IOS XR, and IOS XE IKEv1 Information Disclosure Vulnerability — Cisco IOS, IOS XR, and IO…
CRITICAL
9.0
KEV AI May 19, 2023
CVE-2010-3904
Linux Kernel RDS Protocol Privilege Escalation Vulnerability (CVE…
Linux Kernel Improper Input Validation Vulnerability — Linux Kernel contains an improper input valid…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2014-0196
Linux Kernel n_tty Race Condition Privilege Escalation Vulnerabil…
Linux Kernel Race Condition Vulnerability — Linux Kernel contains a race condition vulnerability wit…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2015-5317
Jenkins User Interface (UI) Information Disclosure Vulnerability …
Jenkins User Interface (UI) Information Disclosure Vulnerability — Jenkins User Interface (UI) conta…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2016-3427
Oracle Java SE and JRockit Unspecified Vulnerability — Oracle Jav…
Oracle Java SE and JRockit Unspecified Vulnerability — Oracle Java SE and JRockit contains an unspec…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2016-8735
Apache Tomcat Remote Code Execution Vulnerability — Apache Tomcat…
Apache Tomcat Remote Code Execution Vulnerability — Apache Tomcat contains an unspecified vulnerabil…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2023-25717
Multiple Ruckus Wireless Products CSRF and RCE Vulnerability — Ru…
Multiple Ruckus Wireless Products CSRF and RCE Vulnerability — Ruckus Wireless Access Point (AP) sof…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2021-3560
Red Hat Polkit Incorrect Authorization Vulnerability — Red Hat Po…
Red Hat Polkit Incorrect Authorization Vulnerability — Red Hat Polkit contains an incorrect authoriz…
CRITICAL
9.0
KEV AI May 12, 2023
CVE-2023-29336
Microsoft Win32K Privilege Escalation Vulnerability — Microsoft W…
Microsoft Win32K Privilege Escalation Vulnerability — Microsoft Win32k contains an unspecified vulne…
CRITICAL
9.0
KEV AI May 9, 2023
CVE-2023-1389
TP-Link Archer AX21 Remote Code Execution via Command Injection
TP-Link Archer AX-21 Command Injection Vulnerability — TP-Link Archer AX-21 contains a command injec…
CRITICAL
9.0
KEV AI May 1, 2023
CVE-2023-21839
Oracle WebLogic Server Remote Code Execution Vulnerability (CVE-2…
Oracle WebLogic Server Unspecified Vulnerability — Oracle WebLogic Server contains an unspecified vu…
CRITICAL
9.0
KEV AI May 1, 2023
CVE-2021-45046
Apache Log4j2 Deserialization of Untrusted Data Vulnerability — A…
Apache Log4j2 Deserialization of Untrusted Data Vulnerability — Apache Log4j2 contains a deserializa…
CRITICAL
9.0
KEV AI May 1, 2023
CVE-2023-2136
Google Chrome Skia Integer Overflow Vulnerability - Sandbox Escap…
Google Chrome Skia Integer Overflow Vulnerability — Google Chromium Skia contains an integer overflo…
CRITICAL
9.0
KEV AI Apr 21, 2023
CVE-2023-27350
PaperCut MF/NG Improper Access Control Vulnerability — PaperCut M…
PaperCut MF/NG Improper Access Control Vulnerability — PaperCut MF/NG contains an improper access co…
CRITICAL
9.0
KEV AI Apr 21, 2023
CVE-2023-28432
MinIO Information Disclosure Vulnerability — MinIO contains a vul…
MinIO Information Disclosure Vulnerability — MinIO contains a vulnerability in a cluster deployment …
CRITICAL
9.0
KEV AI Apr 21, 2023
CVE-2017-6742
Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerab…
Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability — The Simple Network Manageme…
CRITICAL
9.0
KEV AI Apr 19, 2023
CVE-2023-2033
Google Chromium V8 Type Confusion Vulnerability - Heap Corruption
Google Chromium V8 Type Confusion Vulnerability — Google Chromium V8 Engine contains a type confusio…
CRITICAL
9.0
KEV AI Apr 17, 2023
CVE-2019-8526
Apple macOS Use-After-Free Vulnerability — Apple macOS contains a…
Apple macOS Use-After-Free Vulnerability — Apple macOS contains a use-after-free vulnerability that …
CRITICAL
9.0
KEV AI Apr 17, 2023
CVE-2023-20963
Android Framework Privilege Escalation Vulnerability (CVE-2023-20…
Android Framework Privilege Escalation Vulnerability — Android Framework contains an unspecified vul…
CRITICAL
9.0
KEV AI Apr 13, 2023
CVE-2023-29492
Novi Survey Insecure Deserialization Vulnerability — Novi Survey …
Novi Survey Insecure Deserialization Vulnerability — Novi Survey contains an insecure deserializatio…
CRITICAL
9.0
KEV AI Apr 13, 2023
CVE-2023-28252
Microsoft Windows Common Log File System (CLFS) Driver Privilege …
Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability — Microsof…
CRITICAL
9.0
KEV AI Apr 11, 2023
CVE-2023-28205
Apple WebKit Use-After-Free Vulnerability Actively Exploited (CVE…
Apple Multiple Products WebKit Use-After-Free Vulnerability — Apple iOS, iPadOS, macOS, and Safari W…
CRITICAL
9.0
KEV AI Apr 10, 2023
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.