INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 31m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 14h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h Global vulnerability Information Technology CRITICAL 31m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 14h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h Global vulnerability Information Technology CRITICAL 31m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 14h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-25570 High 7.4
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform che…
✅ Patch Mar 10, 2026
CVE-2026-25569 High 7.4
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exi…
✅ Patch Mar 10, 2026
CVE-2026-25167 High 7.4
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-2364 High 7.3
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low pr…
✅ Patch Mar 10, 2026
CVE-2026-2724 High 7.2
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entr…
✅ Patch Mar 10, 2026
CVE-2026-30958 High 7.2
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal…
⚡ Exploit ✅ Patch Mar 10, 2026
CVE-2026-1261 High 7.2
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions u…
✅ Patch Mar 10, 2026
CVE-2026-25170 High 7.0
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-23667 High 7.0
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-23668 High 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Compon…
✅ Patch Mar 10, 2026
CVE-2026-23671 High 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM P…
✅ Patch Mar 10, 2026
CVE-2026-24285 High 7.0
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-24296 High 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio…
✅ Patch Mar 10, 2026
CVE-2026-24295 High 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio…
✅ Patch Mar 10, 2026
CVE-2026-25171 High 7.0
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
✅ Patch Mar 10, 2026
CVE-2026-25178 High 7.0
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges loca…
✅ Patch Mar 10, 2026
CVE-2026-25179 High 7.0
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized att…
✅ Patch Mar 10, 2026
CVE-2025-52468 High 8.8
Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability exists when importi…
⚡ Exploit ✅ Patch Mar 2, 2026
CVE-2026-21385 High 7.8
Memory corruption while using alignments for memory allocation.
⚡ Exploit ✅ Patch Mar 2, 2026
CVE-2025-64427 High 7.1
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prio…
⚡ Exploit ✅ Patch Mar 2, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.