INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 37m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 37m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 37m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-5350 High 8.8
A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of t…
⚡ Exploit Apr 2, 2026
CVE-2026-5349 High 8.8
A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file…
⚡ Exploit Apr 2, 2026
CVE-2026-34794 High 8.8
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE paramet…
Apr 2, 2026
CVE-2026-34796 High 8.8
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE paramet…
Apr 2, 2026
CVE-2026-34793 High 8.8
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE paramet…
Apr 2, 2026
CVE-2026-34728 High 8.7
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handl…
⚡ Exploit Apr 2, 2026
CVE-2026-34742 High 8.1
The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does no…
✅ Patch Apr 2, 2026
CVE-2026-4347 High 8.1
The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via …
Apr 2, 2026
CVE-2026-34576 High 7.7
Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the POST /public/v1/upload-from-url endpoint acce…
⚡ Exploit Apr 2, 2026
CVE-2026-34426 High 7.6
OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment varia…
✅ Patch Apr 2, 2026
CVE-2026-33614 High 7.5
An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the getinfo endpoint du…
Apr 2, 2026
CVE-2026-34752 High 7.5
Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the H…
⚡ Exploit Apr 2, 2026
CVE-2026-5032 High 7.5
The W3 Total Cache plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.9.…
Apr 2, 2026
CVE-2026-33616 High 7.5
An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpo…
Apr 2, 2026
CVE-2026-33951 High 7.5
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the Signal…
Apr 2, 2026
CVE-2026-5346 High 7.3
A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src…
Apr 2, 2026
CVE-2026-5320 High 7.3
A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is an unknown functionality o…
Apr 2, 2026
CVE-2026-5334 High 7.3
A weakness has been identified in itsourcecode Online Enrollment System 1.0. Impacted is an unknown function of the file…
Apr 2, 2026
CVE-2026-5333 High 7.3
A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown pro…
Apr 2, 2026
CVE-2026-5322 High 7.3
A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69…
Apr 2, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.