INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 34m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 15h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h Global vulnerability Information Technology CRITICAL 34m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 15h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h Global vulnerability Information Technology CRITICAL 34m Global vulnerability Mobile Devices / Consumer Electronics HIGH 11h Global ransomware Multiple sectors CRITICAL 11h Global malware Networking / Infrastructure CRITICAL 12h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 13h Global supply_chain Software Development and DevOps CRITICAL 14h Global supply_chain Software Development and Technology CRITICAL 15h Global apt Multiple sectors HIGH 17h Global general Digital Content & Intellectual Property MEDIUM 17h Global malware Technology and Software Development CRITICAL 17h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2019-25660 Medium 6.2
LanHelper 1.74 contains a local buffer overflow vulnerability that allows attackers to crash the application by sending …
Apr 5, 2026
CVE-2019-25661 Medium 6.2
Remote Process Explorer 1.0.0.16 contains a local buffer overflow vulnerability that allows attackers to cause a denial …
Apr 5, 2026
CVE-2019-25665 Medium 6.2
River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash t…
Apr 5, 2026
CVE-2019-25666 Medium 6.2
SpotAuditor 3.6.7 contains a local buffer overflow vulnerability in the Base64 Password Decoder component that allows at…
Apr 5, 2026
CVE-2019-25667 Medium 6.2
TaskInfo 8.2.0.280 contains a local buffer overflow vulnerability that allows attackers to crash the application by supp…
Apr 5, 2026
CVE-2019-25677 Medium 6.2
WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a…
Apr 5, 2026
CVE-2019-25683 Medium 6.2
FileZilla 3.40.0 contains a denial of service vulnerability in the local search functionality that allows local attacker…
Apr 5, 2026
CVE-2018-25256 Medium 5.5
IP TOOLS 2.50 contains a local buffer overflow vulnerability in the SNMP Scanner component that allows local attackers t…
Apr 5, 2026
CVE-2019-25657 Medium 5.5
AnyBurn 4.3 x86 contains a denial of service vulnerability that allows local attackers to crash the application by suppl…
Apr 5, 2026
CVE-2019-25658 Medium 5.5
a-Mac Address Change 5.4 contains a local buffer overflow vulnerability that allows local attackers to crash the applica…
Apr 5, 2026
CVE-2026-5549 Medium 5.3
A vulnerability was determined in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this issue is some unknown functionali…
Apr 5, 2026
CVE-2026-5571 Medium 5.3
A vulnerability was identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The impacted element is an unknown funct…
Apr 5, 2026
CVE-2026-5531 Medium 5.3
A vulnerability has been found in SourceCodester Student Result Management System 1.0. Impacted is an unknown function o…
Apr 5, 2026
CVE-2026-5527 Medium 5.3
A weakness has been identified in Tenda 4G03 Pro 1.0/1.0re/01.bin/04.03.01.53. Affected by this issue is some unknown fu…
Apr 5, 2026
CVE-2026-5603 Medium 5.3
A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMag…
Apr 5, 2026
CVE-2026-5602 Medium 5.3
A vulnerability was determined in Nor2-io heim-mcp up to 0.1.3. Impacted is the function registerTools of the file src/t…
Apr 5, 2026
CVE-2026-5585 Medium 5.3
A vulnerability was found in Tencent AI-Infra-Guard 4.0. The affected element is an unknown function of the file common/…
Apr 5, 2026
CVE-2026-5601 Medium 5.3
A vulnerability was found in Acrel Electrical Prepaid Cloud Platform 1.0. This issue affects some unknown processing of …
Apr 5, 2026
CVE-2026-5542 None
Apr 5, 2026
CVE-2026-5541 None
Apr 5, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.