INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 37m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 37m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 37m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2020-37182
Redir 3.3 contains a stack overflow vulnerability in the doproxyc…
Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attac…
HIGH
7.5
Feb 11, 2026
CVE-2020-37185
Backup Key Recovery 2.2.5 contains a denial of service vulnerabil…
Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash …
HIGH
7.5
Feb 11, 2026
CVE-2020-37187
SpotDialup 1.6.7 contains a denial of service vulnerability in th…
SpotDialup 1.6.7 contains a denial of service vulnerability in the registration name input field tha…
HIGH
7.5
Feb 11, 2026
CVE-2020-37188
SpotOutlook 1.2.6 contains a denial of service vulnerability in t…
SpotOutlook 1.2.6 contains a denial of service vulnerability in the registration name input field th…
HIGH
7.5
Feb 11, 2026
CVE-2020-37189
TaskCanvas 1.4.0 contains a denial of service vulnerability in th…
TaskCanvas 1.4.0 contains a denial of service vulnerability in the registration code input field tha…
HIGH
7.5
Feb 11, 2026
CVE-2020-37190
Top Password Firefox Password Recovery 2.8 contains a denial of s…
Top Password Firefox Password Recovery 2.8 contains a denial of service vulnerability that allows at…
HIGH
7.5
Feb 11, 2026
CVE-2020-37191
Top Password Software Dialup Password Recovery 1.30 contains a de…
Top Password Software Dialup Password Recovery 1.30 contains a denial of service vulnerability that …
HIGH
7.5
Feb 11, 2026
CVE-2020-37193
ZIP Password Recovery 2.30 contains a denial of service vulnerabi…
ZIP Password Recovery 2.30 contains a denial of service vulnerability that allows attackers to crash…
HIGH
7.5
Feb 11, 2026
CVE-2020-37194
Backup Key Recovery 2.2.5 contains a denial of service vulnerabil…
Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash …
HIGH
7.5
Feb 11, 2026
CVE-2020-37195
BlueAuditor 1.7.2.0 contains a denial of service vulnerability in…
BlueAuditor 1.7.2.0 contains a denial of service vulnerability in the registration name input field …
HIGH
7.5
Feb 11, 2026
CVE-2020-37196
Dnss Domain Name Search Software contains a denial of service vul…
Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to…
HIGH
7.5
Feb 11, 2026
CVE-2020-37197
Dnss Domain Name Search Software contains a denial of service vul…
Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to…
HIGH
7.5
Feb 11, 2026
CVE-2020-37198
Duplicate Cleaner Pro 4.1.3 contains a denial of service vulnerab…
Duplicate Cleaner Pro 4.1.3 contains a denial of service vulnerability that allows attackers to cras…
HIGH
7.5
Feb 11, 2026
CVE-2020-37199
NBMonitor 1.6.6.0 contains a denial of service vulnerability in i…
NBMonitor 1.6.6.0 contains a denial of service vulnerability in its registration key input that allo…
HIGH
7.5
Feb 11, 2026
CVE-2020-37200
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability …
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that …
HIGH
7.5
Feb 11, 2026
CVE-2020-37201
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability …
NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration name input that…
HIGH
7.5
Feb 11, 2026
CVE-2020-37202
NetworkSleuth 3.0.0.0 contains a denial of service vulnerability …
NetworkSleuth 3.0.0.0 contains a denial of service vulnerability that allows attackers to crash the …
HIGH
7.5
Feb 11, 2026
CVE-2020-37203
Office Product Key Finder 1.5.4 contains a denial of service vuln…
Office Product Key Finder 1.5.4 contains a denial of service vulnerability that allows attackers to …
HIGH
7.5
Feb 11, 2026
CVE-2020-37204
RemShutdown 2.9.0.0 contains a denial of service vulnerability in…
RemShutdown 2.9.0.0 contains a denial of service vulnerability in its registration key input that al…
HIGH
7.5
Feb 11, 2026
CVE-2020-37205
RemShutdown 2.9.0.0 contains a denial of service vulnerability th…
RemShutdown 2.9.0.0 contains a denial of service vulnerability that allows attackers to crash the ap…
HIGH
7.5
Feb 11, 2026
CVE-2020-37206
ShareAlarmPro contains a denial of service vulnerability that all…
ShareAlarmPro contains a denial of service vulnerability that allows attackers to crash the applicat…
HIGH
7.5
Feb 11, 2026
CVE-2020-37207
SpotDialup 1.6.7 contains a denial of service vulnerability in th…
SpotDialup 1.6.7 contains a denial of service vulnerability in the registration key input field that…
HIGH
7.5
Feb 11, 2026
CVE-2020-37208
SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the r…
SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the registration key input field that al…
HIGH
7.5
Feb 11, 2026
CVE-2020-37209
SpotFTP 3.0.0.0 contains a denial of service vulnerability in the…
SpotFTP 3.0.0.0 contains a denial of service vulnerability in the registration name input field that…
HIGH
7.5
Feb 11, 2026
CVE-2020-37210
SpotIE 2.9.5 contains a denial of service vulnerability in the re…
SpotIE 2.9.5 contains a denial of service vulnerability in the registration key input that allows at…
HIGH
7.5
Feb 11, 2026
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.