📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h Global vulnerability Critical Infrastructure, Government, Enterprise HIGH 3h Global ransomware Home Security and Consumer Services HIGH 10h Global malware Network Infrastructure / Telecommunications CRITICAL 12h Global general Software / IT Operations LOW 12h Global extortion Retail and Hospitality HIGH 14h Global phishing Technology/Enterprise Security MEDIUM 14h Global vulnerability Information Technology / Infrastructure CRITICAL 15h Global backdoor Government and Critical Infrastructure CRITICAL 16h Global phishing Financial Services HIGH 16h Global supply_chain Technology and Software Development HIGH 18h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-21382 High 7.8
Memory Corruption when handling power management requests with improperly sized input/output buffers.
Apr 6, 2026
CVE-2026-34588 High 7.8
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the …
⚡ Exploit Apr 6, 2026
CVE-2024-14032 High 7.8
Twitch Studio version 0.114.8 and prior contain a privilege escalation vulnerability in its privileged helper tool that …
Apr 6, 2026
CVE-2025-47391 High 7.8
Memory corruption while processing a frame request from user.
✅ Patch Apr 6, 2026
CVE-2026-21371 High 7.8
Memory Corruption when retrieving output buffer with insufficient size validation.
Apr 6, 2026
CVE-2026-21378 High 7.8
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor…
Apr 6, 2026
CVE-2026-21376 High 7.8
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor…
Apr 6, 2026
CVE-2026-21375 High 7.8
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
Apr 6, 2026
CVE-2026-21374 High 7.8
Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validatio…
Apr 6, 2026
CVE-2026-21373 High 7.8
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
Apr 6, 2026
CVE-2026-21372 High 7.8
Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.
Apr 6, 2026
CVE-2026-21367 High 7.6
Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.
Apr 6, 2026
CVE-2026-21381 High 7.6
Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood aware…
Apr 6, 2026
CVE-2026-26027 High 7.5
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store…
Apr 6, 2026
CVE-2026-35389 High 7.5
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification…
Apr 6, 2026
CVE-2026-35391 High 7.5
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in…
Apr 6, 2026
CVE-2026-5616 High 7.3
A security vulnerability has been detected in JeecgBoot 3.9.0/3.9.1. The impacted element is an unknown function of the …
Apr 6, 2026
CVE-2026-5632 High 7.3
A vulnerability was found in assafelovic gpt-researcher up to 3.4.3. This impacts an unknown function of the component H…
Apr 6, 2026
CVE-2026-5631 High 7.3
A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data…
Apr 6, 2026
CVE-2026-5634 High 7.3
A vulnerability was identified in projectworlds Car Rental Project 1.0. Affected by this vulnerability is an unknown fun…
Apr 6, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.