📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global supply_chain Software Development and Technology CRITICAL 40m Global general Cloud Security and Technology LOW 1h Global vulnerability Technology and Software Development HIGH 1h Global apt Critical Infrastructure, Telecommunications HIGH 7h Global apt Government and Intelligence HIGH 7h Global vulnerability Web Services and Content Management CRITICAL 11h Global apt Multiple sectors HIGH 11h Global supply_chain Software Development and Technology CRITICAL 13h Global ransomware Multiple sectors CRITICAL 13h Global malware Information Technology / Enterprise HIGH 14h Global supply_chain Software Development and Technology CRITICAL 40m Global general Cloud Security and Technology LOW 1h Global vulnerability Technology and Software Development HIGH 1h Global apt Critical Infrastructure, Telecommunications HIGH 7h Global apt Government and Intelligence HIGH 7h Global vulnerability Web Services and Content Management CRITICAL 11h Global apt Multiple sectors HIGH 11h Global supply_chain Software Development and Technology CRITICAL 13h Global ransomware Multiple sectors CRITICAL 13h Global malware Information Technology / Enterprise HIGH 14h Global supply_chain Software Development and Technology CRITICAL 40m Global general Cloud Security and Technology LOW 1h Global vulnerability Technology and Software Development HIGH 1h Global apt Critical Infrastructure, Telecommunications HIGH 7h Global apt Government and Intelligence HIGH 7h Global vulnerability Web Services and Content Management CRITICAL 11h Global apt Multiple sectors HIGH 11h Global supply_chain Software Development and Technology CRITICAL 13h Global ransomware Multiple sectors CRITICAL 13h Global malware Information Technology / Enterprise HIGH 14h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-35665 Medium 5.3
OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request…
Apr 10, 2026
CVE-2026-35661 Medium 5.3
OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows…
Apr 10, 2026
CVE-2026-35647 Medium 5.3
OpenClaw before 2026.3.25 contains an access control vulnerability where verification notices bypass DM policy checks an…
Apr 10, 2026
CVE-2026-4326 High 8.8
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and in…
Apr 9, 2026
CVE-2026-5815 High 8.8
A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-…
Apr 9, 2026
CVE-2026-5984 High 8.8
A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formS…
Apr 9, 2026
CVE-2026-5983 High 8.8
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /gofo…
Apr 9, 2026
CVE-2026-5982 High 8.8
A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file…
Apr 9, 2026
CVE-2026-5981 High 8.8
A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform…
Apr 9, 2026
CVE-2026-5980 High 8.8
A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the function formSetMACFilter of the file /g…
Apr 9, 2026
CVE-2026-5979 High 8.8
A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ …
Apr 9, 2026
CVE-2026-35639 High 8.8
OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the device.pair.approve method that allows an…
Apr 9, 2026
CVE-2026-35638 High 8.8
OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated se…
Apr 9, 2026
CVE-2026-5830 High 8.8
A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the function websGetVar of the file /goform/SysTo…
Apr 9, 2026
CVE-2026-33785 High 8.8
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated…
Apr 9, 2026
CVE-2026-5988 High 8.8
A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function formWrlsafeset of the file /goform/AdvSetW…
Apr 9, 2026
CVE-2026-39911 High 8.8
Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic …
Apr 9, 2026
CVE-2025-13914 High 8.7
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a…
Apr 9, 2026
CVE-2026-39942 High 8.5
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id}…
Apr 9, 2026
CVE-2023-54359 High 8.2
WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated …
Apr 9, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.