INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-0560 High 7.5
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in th…
⚡ Exploit ✅ Patch Mar 29, 2026
CVE-2026-5012 High 7.3
A flaw has been found in elecV2 elecV2P up to 3.8.3. This issue affects the function pm2run of the file /rpc. Executing …
Mar 29, 2026
CVE-2026-32979 High 7.3
OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local cod…
Mar 29, 2026
CVE-2026-32972 High 7.1
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only oper…
Mar 29, 2026
CVE-2026-5004 High 8.8
A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin…
⚡ Exploit Mar 28, 2026
CVE-2016-20037 High 8.4
xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute a…
Mar 28, 2026
CVE-2016-20038 High 8.4
yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary cod…
Mar 28, 2026
CVE-2016-20039 High 8.4
Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability in the gamma parameter handling that allo…
Mar 28, 2026
CVE-2016-20040 High 8.4
TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attacke…
Mar 28, 2026
CVE-2016-20041 High 8.4
Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute ar…
Mar 28, 2026
CVE-2016-20042 High 8.4
TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by suppl…
Mar 28, 2026
CVE-2016-20043 High 8.4
NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary …
Mar 28, 2026
CVE-2016-20044 High 8.4
PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by …
Mar 28, 2026
CVE-2016-20045 High 8.4
HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary …
Mar 28, 2026
CVE-2016-20046 High 8.4
zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connection…
Mar 28, 2026
CVE-2016-20047 High 8.4
EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local at…
Mar 28, 2026
CVE-2016-20048 High 8.4
iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code …
Mar 28, 2026
CVE-2017-20226 High 8.4
Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code…
Mar 28, 2026
CVE-2017-20228 High 8.4
Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbit…
⚡ Exploit Mar 28, 2026
CVE-2018-25222 High 8.4
SC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by s…
Mar 28, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.