INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 30m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 30m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 30m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 2h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-5322 High 7.3
A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69…
Apr 2, 2026
CVE-2026-5333 High 7.3
A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown pro…
Apr 2, 2026
CVE-2026-5244 High 7.3
A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the function mg_tls_recv_cert of the file mo…
Apr 2, 2026
CVE-2026-33613 High 7.2
Due to the improper neutralisation of special elements used in an OS command, a remote attacker can exploit an RCE vulne…
Apr 2, 2026
CVE-2026-0686 High 7.2
The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5…
Apr 2, 2026
CVE-2026-29782 High 7.2
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, th…
⚡ Exploit ✅ Patch Apr 2, 2026
CVE-2026-34790 High 7.1
Endian Firewall version 3.3.25 and prior allow authenticated users to delete arbitrary files via directory traversal in …
Apr 2, 2026
CVE-2026-5330 Medium 6.5
A vulnerability was found in SourceCodester/mayuri_k Best Courier Management System 1.0. Affected by this issue is some …
Apr 2, 2026
CVE-2026-0688 Medium 6.4
The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5…
Apr 2, 2026
CVE-2026-34809 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/zo…
Apr 2, 2026
CVE-2026-34808 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/ou…
Apr 2, 2026
CVE-2026-34805 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/dn…
Apr 2, 2026
CVE-2026-34804 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the dscp parameter to /manage/qos/r…
Apr 2, 2026
CVE-2026-34803 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the name parameter to /manage/qos/c…
Apr 2, 2026
CVE-2026-34802 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark user ham spam parameter …
Apr 2, 2026
CVE-2026-34801 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dhc…
Apr 2, 2026
CVE-2026-34800 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/upli…
Apr 2, 2026
CVE-2026-34799 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dns…
Apr 2, 2026
CVE-2026-34798 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/ro…
Apr 2, 2026
CVE-2026-34806 Medium 6.4
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/sn…
Apr 2, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.