INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 40m Global vulnerability Government and Critical Infrastructure CRITICAL 47m Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h Global data_breach Multiple sectors HIGH 40m Global vulnerability Government and Critical Infrastructure CRITICAL 47m Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h Global data_breach Multiple sectors HIGH 40m Global vulnerability Government and Critical Infrastructure CRITICAL 47m Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2023-3634 High 8.8
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of u…
Apr 16, 2026
CVE-2026-3614 High 8.8
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11.0 up to, and includi…
Apr 16, 2026
CVE-2026-33084 High 8.8
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection…
⚡ Exploit Apr 16, 2026
CVE-2026-3599 High 7.5
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter keys within…
Apr 16, 2026
CVE-2026-3489 High 7.5
The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection vi…
Apr 16, 2026
CVE-2026-6351 High 7.5
MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthenticated remote attackers …
Apr 16, 2026
CVE-2026-5050 High 7.5
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptog…
Apr 16, 2026
CVE-2026-3876 High 7.2
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_encoded' pseudo-short…
Apr 16, 2026
CVE-2026-5617 High 8.8
The Login as User plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3…
Apr 15, 2026
CVE-2026-34632 High 8.2
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in …
Apr 15, 2026
CVE-2026-22676 High 7.8
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gai…
Apr 15, 2026
CVE-2026-4145 High 7.8
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix that could allow…
Apr 15, 2026
CVE-2026-6384 High 7.3
A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` funct…
Apr 15, 2026
CVE-2026-4134 High 7.3
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix, that during ins…
Apr 15, 2026
CVE-2026-2834 High 7.2
The Age Verification & Identity Verification by Token of Trust plugin for WordPress is vulnerable to Stored Cross-Site S…
Apr 15, 2026
CVE-2026-3643 High 7.2
The Accessibly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API in all versions up to,…
Apr 15, 2026
CVE-2026-5694 High 7.2
The Quick Interest Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'loan-amount' and 'l…
Apr 15, 2026
CVE-2026-20205 High 7.2
In Splunk MCP Server app versions below 1.0.3 , a user who holds a role with access to the Splunk `_internal` index or p…
Apr 15, 2026
CVE-2026-20204 High 7.1
In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.26…
Apr 15, 2026
CVE-2026-0827 High 7.1
During an internal security assessment, a potential vulnerability was discovered in Lenovo Diagnostics and the HardwareS…
Apr 15, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.