📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Critical Infrastructure, Telecommunications HIGH 4h Global apt Government and Intelligence HIGH 4h Global vulnerability Web Services and Content Management CRITICAL 7h Global apt Multiple sectors HIGH 8h Global supply_chain Software Development and Technology CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global malware Information Technology / Enterprise HIGH 11h Global supply_chain Software Development / Technology HIGH 13h Global general Multiple sectors HIGH 13h Global supply_chain Software Development and Supply Chain Security LOW 14h Global apt Critical Infrastructure, Telecommunications HIGH 4h Global apt Government and Intelligence HIGH 4h Global vulnerability Web Services and Content Management CRITICAL 7h Global apt Multiple sectors HIGH 8h Global supply_chain Software Development and Technology CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global malware Information Technology / Enterprise HIGH 11h Global supply_chain Software Development / Technology HIGH 13h Global general Multiple sectors HIGH 13h Global supply_chain Software Development and Supply Chain Security LOW 14h Global apt Critical Infrastructure, Telecommunications HIGH 4h Global apt Government and Intelligence HIGH 4h Global vulnerability Web Services and Content Management CRITICAL 7h Global apt Multiple sectors HIGH 8h Global supply_chain Software Development and Technology CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global malware Information Technology / Enterprise HIGH 11h Global supply_chain Software Development / Technology HIGH 13h Global general Multiple sectors HIGH 13h Global supply_chain Software Development and Supply Chain Security LOW 14h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-5012 High 7.3
A flaw has been found in elecV2 elecV2P up to 3.8.3. This issue affects the function pm2run of the file /rpc. Executing …
Mar 29, 2026
CVE-2026-32972 High 7.1
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only oper…
Mar 29, 2026
CVE-2026-2602 Medium 6.4
The Twentig plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'featuredImageSizeWidth' parameter…
Mar 29, 2026
CVE-2026-5020 Medium 6.3
A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNotice…
Mar 29, 2026
CVE-2026-5030 Medium 6.3
A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHos…
Mar 29, 2026
CVE-2026-33574 Medium 6.2
OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the too…
Mar 29, 2026
CVE-2026-32919 Medium 6.1
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing write-scoped callers to reach admin-on…
Mar 29, 2026
CVE-2026-32923 Medium 5.4
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in Discord guild reaction ingestion that fails …
Mar 29, 2026
CVE-2026-5023 Medium 5.3
A vulnerability has been found in DeDeveloper23 codebase-mcp up to 3ec749d237dd8eabbeef48657cf917275792fde6. This vulner…
Mar 29, 2026
CVE-2025-15604 None
Mar 29, 2026
CVE-2026-3256 None
Mar 29, 2026
CVE-2026-5004 High 8.8
A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin…
⚡ Exploit Mar 28, 2026
CVE-2016-20037 High 8.4
xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute a…
Mar 28, 2026
CVE-2016-20038 High 8.4
yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary cod…
Mar 28, 2026
CVE-2016-20039 High 8.4
Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability in the gamma parameter handling that allo…
Mar 28, 2026
CVE-2016-20040 High 8.4
TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attacke…
Mar 28, 2026
CVE-2016-20041 High 8.4
Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute ar…
Mar 28, 2026
CVE-2016-20042 High 8.4
TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by suppl…
Mar 28, 2026
CVE-2016-20043 High 8.4
NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary …
Mar 28, 2026
CVE-2016-20044 High 8.4
PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by …
Mar 28, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.