INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2026-2071
A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impact…
A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy o…
HIGH
8.8
AI Feb 7, 2026
CVE-2026-2080
A vulnerability has been found in UTT HiPER 810 1.7.4-141218. Thi…
A vulnerability has been found in UTT HiPER 810 1.7.4-141218. This issue affects the function setSys…
HIGH
7.2
Feb 7, 2026
CVE-2026-2084
A weakness has been identified in D-Link DIR-823X 250416. This im…
A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknown function of the fi…
HIGH
7.2
Feb 7, 2026
CVE-2026-2085
A security vulnerability has been detected in D-Link DWR-M921 1.1…
A security vulnerability has been detected in D-Link DWR-M921 1.1.50. Affected is the function sub_4…
HIGH
7.2
Feb 7, 2026
CVE-2026-2086
A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114…
A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is…
HIGH
8.8
AI Feb 7, 2026
CVE-2026-2113
A security vulnerability has been detected in yuan1994 tpadmin up…
A security vulnerability has been detected in yuan1994 tpadmin up to 1.3.12. This affects an unknown…
HIGH
7.3
Feb 7, 2026
CVE-2026-25561
WeKan versions prior to 8.19 contain an authorization weakness in…
WeKan versions prior to 8.19 contain an authorization weakness in the attachment upload API. The API…
HIGH
7.5
Feb 7, 2026
CVE-2026-25563
WeKan versions prior to 8.19 contain an insecure direct object re…
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in checklist creatio…
HIGH
7.5
Feb 7, 2026
CVE-2026-25564
WeKan versions prior to 8.19 contain an insecure direct object re…
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in checklist creatio…
HIGH
7.5
Feb 7, 2026
CVE-2026-25859
Wekan versions prior to 8.20 allow non-administrative users to ac…
Wekan versions prior to 8.20 allow non-administrative users to access migration functionality due to…
HIGH
8.8
Feb 7, 2026
CVE-2020-37107
Core FTP LE 2.2 contains a denial of service vulnerability that a…
Core FTP LE 2.2 contains a denial of service vulnerability that allows attackers to crash the applic…
HIGH
7.5
Feb 7, 2026
CVE-2020-37109
aSc TimeTables 2020.11.4 contains a denial of service vulnerabili…
aSc TimeTables 2020.11.4 contains a denial of service vulnerability that allows attackers to crash t…
HIGH
7.5
Feb 7, 2026
CVE-2020-37122
SpotFTP-FTP Password Recover 2.4.8 contains a denial of service v…
SpotFTP-FTP Password Recover 2.4.8 contains a denial of service vulnerability that allows attackers …
HIGH
7.5
Feb 7, 2026
CVE-2020-37135
AMSS++ 4.7 contains an authentication bypass vulnerability that a…
AMSS++ 4.7 contains an authentication bypass vulnerability that allows attackers to access administr…
HIGH
7.5
Feb 7, 2026
CVE-2020-37141
AMSS++ version 4.31 contains a SQL injection vulnerability in the…
AMSS++ version 4.31 contains a SQL injection vulnerability in the mail module's maildetail.php scrip…
HIGH
8.2
Feb 7, 2026
CVE-2020-37146
ACE Security WiP-90113 HD Camera contains a configuration disclos…
ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability that allows unaut…
HIGH
7.5
Feb 7, 2026
CVE-2020-37147
ATutor 2.2.4 contains a SQL injection vulnerability in the admin …
ATutor 2.2.4 contains a SQL injection vulnerability in the admin user deletion page that allows auth…
HIGH
7.1
Feb 7, 2026
CVE-2020-37154
eLection 2.0 contains an authenticated SQL injection vulnerabilit…
eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpo…
HIGH
7.1
Feb 7, 2026
CVE-2020-37155
Core FTP Lite 1.3 contains a buffer overflow vulnerability in the…
Core FTP Lite 1.3 contains a buffer overflow vulnerability in the username input field that allows a…
HIGH
7.5
Feb 7, 2026
CVE-2020-37157
DBPower C300 HD Camera contains a configuration disclosure vulner…
DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated…
HIGH
7.5
Feb 7, 2026
CVE-2020-37163
QuickDate 1.3.2 contains a SQL injection vulnerability that allow…
QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate da…
HIGH
8.2
Feb 7, 2026
CVE-2019-25266
Wondershare Application Framework Service 2.4.3.231 contains an u…
Wondershare Application Framework Service 2.4.3.231 contains an unquoted service path vulnerability …
HIGH
7.8
Feb 6, 2026
CVE-2019-25292
Alps HID Monitor Service 8.1.0.10 contains an unquoted service pa…
Alps HID Monitor Service 8.1.0.10 contains an unquoted service path vulnerability that allows local …
HIGH
7.8
Feb 6, 2026
CVE-2019-25293
BlueStacks App Player 2.4.44.62.57 contains an unquoted service p…
BlueStacks App Player 2.4.44.62.57 contains an unquoted service path vulnerability in the BstHdLogRo…
HIGH
7.8
Feb 6, 2026
CVE-2019-25299
RimbaLinux AhadPOS 1.11 contains a SQL injection vulnerability in…
RimbaLinux AhadPOS 1.11 contains a SQL injection vulnerability in the 'alamatCustomer' parameter tha…
HIGH
7.1
Feb 6, 2026
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.