INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 26m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 1h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 26m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 1h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h Global vulnerability Information Technology HIGH 26m Global vulnerability Cybersecurity MEDIUM 1h Global apt Multiple Sectors CRITICAL 1h Global apt Government CRITICAL 1h Global vulnerability Cross-sector / General IT Infrastructure CRITICAL 1h Global apt Critical Infrastructure, Government, Multiple Sectors HIGH 1h Global general Cybersecurity Technology LOW 1h Global vulnerability Software Development / Technology HIGH 2h Global insider Cross-sector HIGH 2h Global vulnerability Government CRITICAL 2h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2026-4535 High 8.8
A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file …
Mar 22, 2026
CVE-2026-4552 High 8.8
A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform…
Mar 22, 2026
CVE-2026-4555 High 8.8
A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the f…
Mar 22, 2026
CVE-2026-4314 High 8.8
The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all ver…
Mar 22, 2026
CVE-2019-25603 High 8.4
TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers t…
Mar 22, 2026
CVE-2019-25604 High 8.4
DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability with structured exception handling that allows local a…
Mar 22, 2026
CVE-2019-25607 High 8.4
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers t…
Mar 22, 2026
CVE-2019-25608 High 8.4
Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users to execute arbitrary …
Mar 22, 2026
CVE-2019-25609 High 8.4
JetAudio jetCast Server 2.0 contains a stack-based buffer overflow vulnerability in the Log Directory configuration fiel…
Mar 22, 2026
CVE-2019-25611 High 8.4
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to e…
Mar 22, 2026
CVE-2019-25615 High 8.4
Lavavo CD Ripper 4.20 contains a structured exception handling (SEH) buffer overflow vulnerability that allows local att…
Mar 22, 2026
CVE-2019-25619 High 8.4
FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account name to ban' field that allows local atta…
Mar 22, 2026
CVE-2019-25612 High 7.8
Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local a…
Mar 22, 2026
CVE-2019-25605 High 7.5
EquityPandit 1.0 contains an insecure logging vulnerability that allows attackers to capture sensitive user credentials …
Mar 22, 2026
CVE-2019-25613 High 7.5
Easy Chat Server 3.1 contains a denial of service vulnerability that allows remote attackers to crash the application by…
Mar 22, 2026
CVE-2026-4536 High 7.3
A vulnerability was found in Acrel Environmental Monitoring Cloud Platform 1.1.0. This issue affects some unknown proces…
Mar 22, 2026
CVE-2026-4545 High 7.0
A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affects an unknown function in the library PR…
Mar 22, 2026
CVE-2026-4546 High 7.0
A weakness has been identified in Flos Freeware Notepad2 4.2.25. This impacts an unknown function in the library TextSha…
Mar 22, 2026
CVE-2019-25600 Medium 6.5
UltraVNC Viewer 1.2.2.4 contains a denial of service vulnerability that allows attackers to crash the application by sup…
Mar 22, 2026
CVE-2019-25610 Medium 6.5
NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users…
Mar 22, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.