INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 1h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 2h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 12h Global vulnerability Information Technology / Cybersecurity CRITICAL 14h Global malware Energy and Utilities CRITICAL 15h Global ransomware Multiple sectors CRITICAL 15h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-5983 High 8.8
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /gofo…
Apr 9, 2026
CVE-2026-5984 High 8.8
A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formS…
Apr 9, 2026
CVE-2025-13914 High 8.7
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a…
Apr 9, 2026
CVE-2026-39942 High 8.5
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id}…
Apr 9, 2026
CVE-2023-54359 High 8.2
WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated …
Apr 9, 2026
CVE-2026-34512 High 8.1
OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route…
Apr 9, 2026
CVE-2026-35645 High 8.1
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSe…
Apr 9, 2026
CVE-2026-33788 High 7.8
A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Network…
Apr 9, 2026
CVE-2026-33793 High 7.8
An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos…
Apr 9, 2026
CVE-2026-35625 High 7.8
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-a…
Apr 9, 2026
CVE-2026-33778 High 7.5
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Jun…
Apr 9, 2026
CVE-2026-33790 High 7.5
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Jun…
Apr 9, 2026
CVE-2026-1584 High 7.5
A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially cra…
Apr 9, 2026
CVE-2026-33771 High 7.4
A Weak Password Requirements vulnerability in the password management function of Juniper Networks CTP OS might allow an…
Apr 9, 2026
CVE-2026-33797 High 7.4
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, …
Apr 9, 2026
CVE-2026-35629 High 7.4
OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail …
Apr 9, 2026
CVE-2026-5828 High 7.3
A vulnerability was found in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function o…
Apr 9, 2026
CVE-2026-5829 High 7.3
A vulnerability was determined in code-projects Simple IT Discussion Forum 1.0. The impacted element is an unknown funct…
Apr 9, 2026
CVE-2026-5827 High 7.3
A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknown function of the f…
Apr 9, 2026
CVE-2026-5814 High 7.3
A security vulnerability has been detected in PHPGurukul Online Course Registration 3.1. This issue affects some unknown…
Apr 9, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.