INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services CRITICAL 57m Global general Software/Technology LOW 1h Global malware Energy CRITICAL 1h Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h Global malware Financial Services CRITICAL 57m Global general Software/Technology LOW 1h Global malware Energy CRITICAL 1h Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h Global malware Financial Services CRITICAL 57m Global general Software/Technology LOW 1h Global malware Energy CRITICAL 1h Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2018-25211 High 7.8
Allok Video Splitter 3.1.1217 contains a buffer overflow vulnerability that allows local attackers to cause a denial of …
⚡ Exploit Mar 26, 2026
CVE-2025-41359 High 7.8
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable lo…
Mar 26, 2026
CVE-2026-34056 High 7.7
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access…
⚡ Exploit Mar 26, 2026
CVE-2026-33932 High 7.6
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to versio…
✅ Patch Mar 26, 2026
CVE-2026-33526 High 7.5
Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of…
✅ Patch Mar 26, 2026
CVE-2026-27828 High 7.5
EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2…
Mar 26, 2026
CVE-2026-27664 High 7.5
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base syst…
Mar 26, 2026
CVE-2023-7338 High 7.5
Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authen…
Mar 26, 2026
CVE-2026-32846 High 7.5
OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allow…
⚡ Exploit ✅ Patch Mar 26, 2026
CVE-2026-26008 High 7.5
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that le…
Mar 26, 2026
CVE-2026-33182 High 7.5
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building…
Mar 26, 2026
CVE-2026-32748 High 7.5
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetim…
✅ Patch Mar 26, 2026
CVE-2026-3622 High 7.5
The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-boun…
Mar 26, 2026
CVE-2026-2511 High 7.5
The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `mu…
Mar 26, 2026
CVE-2026-4860 High 7.3
A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. This affects the function GenericFastJsonR…
Mar 26, 2026
CVE-2025-55263 High 7.3
HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or i…
Mar 26, 2026
CVE-2026-4850 High 7.3
A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the f…
Mar 26, 2026
CVE-2026-4841 High 7.3
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the fil…
Mar 26, 2026
CVE-2026-4839 High 7.3
A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file …
Mar 26, 2026
CVE-2026-4329 High 7.2
The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP hea…
Mar 26, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.