📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Water and Wastewater Utilities CRITICAL 36m Global vulnerability Software Development and Technology CRITICAL 3h Global phishing Web Hosting and Website Management HIGH 10h Global malware Technology/Software CRITICAL 10h Global data_breach Education HIGH 11h Global ddos IoT and Connected Devices HIGH 11h Global vulnerability Software Development / Technology CRITICAL 13h Global ddos Telecommunications / Network Infrastructure HIGH 14h Global supply_chain Software Development and Distribution HIGH 15h Global general Technology/Software HIGH 15h Global apt Water and Wastewater Utilities CRITICAL 36m Global vulnerability Software Development and Technology CRITICAL 3h Global phishing Web Hosting and Website Management HIGH 10h Global malware Technology/Software CRITICAL 10h Global data_breach Education HIGH 11h Global ddos IoT and Connected Devices HIGH 11h Global vulnerability Software Development / Technology CRITICAL 13h Global ddos Telecommunications / Network Infrastructure HIGH 14h Global supply_chain Software Development and Distribution HIGH 15h Global general Technology/Software HIGH 15h Global apt Water and Wastewater Utilities CRITICAL 36m Global vulnerability Software Development and Technology CRITICAL 3h Global phishing Web Hosting and Website Management HIGH 10h Global malware Technology/Software CRITICAL 10h Global data_breach Education HIGH 11h Global ddos IoT and Connected Devices HIGH 11h Global vulnerability Software Development / Technology CRITICAL 13h Global ddos Telecommunications / Network Infrastructure HIGH 14h Global supply_chain Software Development and Distribution HIGH 15h Global general Technology/Software HIGH 15h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-26134 High 7.8
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-26141 High 7.8
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-27269 High 7.8
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, …
✅ Patch Mar 10, 2026
CVE-2026-27273 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
✅ Patch Mar 10, 2026
CVE-2026-27274 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
✅ Patch Mar 10, 2026
CVE-2026-27275 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
✅ Patch Mar 10, 2026
CVE-2026-27276 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi…
✅ Patch Mar 10, 2026
CVE-2026-27277 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi…
✅ Patch Mar 10, 2026
CVE-2026-27279 High 7.8
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i…
✅ Patch Mar 10, 2026
CVE-2026-27280 High 7.8
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitr…
✅ Patch Mar 10, 2026
CVE-2026-27689 High 7.7
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular us…
✅ Patch Mar 10, 2026
CVE-2026-30929 High 7.7
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-1…
✅ Patch Mar 10, 2026
CVE-2026-2339 High 7.5
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Li…
✅ Patch Mar 10, 2026
CVE-2026-23661 High 7.5
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose inform…
✅ Patch Mar 10, 2026
CVE-2026-23662 High 7.5
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose informati…
✅ Patch Mar 10, 2026
CVE-2026-23664 High 7.5
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacke…
✅ Patch Mar 10, 2026
CVE-2026-23674 High 7.5
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security fea…
✅ Patch Mar 10, 2026
CVE-2026-25181 High 7.5
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
✅ Patch Mar 10, 2026
CVE-2026-26121 High 7.5
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a netw…
✅ Patch Mar 10, 2026
CVE-2026-26127 High 7.5
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
✅ Patch Mar 10, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.