📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Government and Intelligence HIGH 2h Global vulnerability Web Services and Content Management CRITICAL 1h Global supply_chain Software Development and Technology CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global malware Information Technology / Enterprise HIGH 4h Global supply_chain Software Development / Technology HIGH 6h Global general Multiple sectors HIGH 7h Global supply_chain Software Development and Supply Chain Security LOW 7h Global vulnerability Artificial Intelligence and Technology HIGH 8h Global data_breach Retail/E-commerce HIGH 8h Global apt Government and Intelligence HIGH 2h Global vulnerability Web Services and Content Management CRITICAL 1h Global supply_chain Software Development and Technology CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global malware Information Technology / Enterprise HIGH 4h Global supply_chain Software Development / Technology HIGH 6h Global general Multiple sectors HIGH 7h Global supply_chain Software Development and Supply Chain Security LOW 7h Global vulnerability Artificial Intelligence and Technology HIGH 8h Global data_breach Retail/E-commerce HIGH 8h Global apt Government and Intelligence HIGH 2h Global vulnerability Web Services and Content Management CRITICAL 1h Global supply_chain Software Development and Technology CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global malware Information Technology / Enterprise HIGH 4h Global supply_chain Software Development / Technology HIGH 6h Global general Multiple sectors HIGH 7h Global supply_chain Software Development and Supply Chain Security LOW 7h Global vulnerability Artificial Intelligence and Technology HIGH 8h Global data_breach Retail/E-commerce HIGH 8h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-4876 Medium 6.3
A vulnerability was identified in itsourcecode Free Hotel Reservation System 1.0. The impacted element is an unknown fun…
Mar 26, 2026
CVE-2018-25214 Medium 6.2
MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplyin…
⚡ Exploit Mar 26, 2026
CVE-2018-25216 Medium 6.2
AnyBurn 4.3 contains a local buffer overflow vulnerability that allows local attackers to crash the application by suppl…
⚡ Exploit Mar 26, 2026
CVE-2019-25648 Medium 6.2
MyVideoConverter Pro 3.14 contains a local buffer overflow vulnerability that allows attackers to crash the application …
Mar 26, 2026
CVE-2026-1986 Medium 6.1
The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflect…
Mar 26, 2026
CVE-2025-41027 Medium 6.1
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaS…
Mar 26, 2026
CVE-2025-41026 Medium 6.1
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaS…
Mar 26, 2026
CVE-2026-4887 Medium 6.1
A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A re…
Mar 26, 2026
CVE-2026-28297 Medium 6.1
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when…
Mar 26, 2026
CVE-2025-55266 Medium 5.9
HCL Aftermarket DPC is affected by Session Fixation which allows attacker to takeover the user's session and use it carr…
Mar 26, 2026
CVE-2026-28298 Medium 5.9
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when…
Mar 26, 2026
CVE-2026-4830 Medium 5.6
A vulnerability was identified in kalcaddle kodbox 1.64. This issue affects the function Add of the file app/controller/…
Mar 26, 2026
CVE-2018-25215 Medium 5.5
Excel Password Recovery Professional 8.2.0.0 contains a local buffer overflow vulnerability that allows attackers to cau…
Mar 26, 2026
CVE-2019-25649 Medium 5.5
River Past Audio Converter 7.7.16 contains a local buffer overflow vulnerability in the activation code field that allow…
Mar 26, 2026
CVE-2026-4897 Medium 5.5
A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to th…
Mar 26, 2026
CVE-2026-33915 Medium 5.4
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to versio…
✅ Patch Mar 26, 2026
CVE-2026-4335 Medium 5.4
The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the attachment post…
Mar 26, 2026
CVE-2026-4900 Medium 5.3
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the fil…
Mar 26, 2026
CVE-2026-4281 Medium 5.3
The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up t…
Mar 26, 2026
CVE-2026-33017 Critical 9.8
Langflow Langflow — CVE-2026-33017 Langflow contains a code injection vulnerability that could allow building public flo…
Mar 25, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.