📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global extortion Retail and Hospitality HIGH 1h Global phishing Technology/Enterprise Security MEDIUM 1h Global vulnerability Information Technology / Infrastructure CRITICAL 2h Global backdoor Government and Critical Infrastructure CRITICAL 2h Global supply_chain Technology and Software Development HIGH 4h Global malware Critical Infrastructure / Industrial Control Systems CRITICAL 4h Global data_breach Multiple Sectors MEDIUM 5h Global phishing Aerospace and Defense CRITICAL 5h Global vulnerability Financial Services HIGH 5h Global vulnerability Information Technology, Email Services, Enterprise Collaboration HIGH 6h Global extortion Retail and Hospitality HIGH 1h Global phishing Technology/Enterprise Security MEDIUM 1h Global vulnerability Information Technology / Infrastructure CRITICAL 2h Global backdoor Government and Critical Infrastructure CRITICAL 2h Global supply_chain Technology and Software Development HIGH 4h Global malware Critical Infrastructure / Industrial Control Systems CRITICAL 4h Global data_breach Multiple Sectors MEDIUM 5h Global phishing Aerospace and Defense CRITICAL 5h Global vulnerability Financial Services HIGH 5h Global vulnerability Information Technology, Email Services, Enterprise Collaboration HIGH 6h Global extortion Retail and Hospitality HIGH 1h Global phishing Technology/Enterprise Security MEDIUM 1h Global vulnerability Information Technology / Infrastructure CRITICAL 2h Global backdoor Government and Critical Infrastructure CRITICAL 2h Global supply_chain Technology and Software Development HIGH 4h Global malware Critical Infrastructure / Industrial Control Systems CRITICAL 4h Global data_breach Multiple Sectors MEDIUM 5h Global phishing Aerospace and Defense CRITICAL 5h Global vulnerability Financial Services HIGH 5h Global vulnerability Information Technology, Email Services, Enterprise Collaboration HIGH 6h

🛡️ CVE Intelligence Center

Common Vulnerabilities & Exposures — Security Intelligence Database

CVE ID Severity CVSS Description Status Published
CVE-2019-25624 Medium 6.2
Liquid Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by pr…
Mar 23, 2026
CVE-2019-25625 Medium 6.2
Blob Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by prov…
Mar 23, 2026
CVE-2026-4603 Medium 5.9
Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsi…
⚡ Exploit ✅ Patch Mar 23, 2026
CVE-2025-10734 Medium 5.3
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for…
Mar 23, 2026
CVE-2025-10731 Medium 5.3
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for…
Mar 23, 2026
CVE-2025-13997 Medium 5.3
The King Addons for Elementor – 4,000+ ready Elementor sections, 650+ templates, 70+ FREE widgets for Elementor plugin f…
Mar 23, 2026
CVE-2026-4583 Medium 5.0
A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this issue is some unknown fun…
Mar 23, 2026
CVE-2026-4582 Medium 5.0
A security vulnerability has been detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this vulnerabili…
Mar 23, 2026
CVE-2026-4314 High 8.8
The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all ver…
Mar 22, 2026
CVE-2026-4555 High 8.8
A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the f…
Mar 22, 2026
CVE-2026-4534 High 8.8
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet.…
Mar 22, 2026
CVE-2026-4551 High 8.8
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the fil…
Mar 22, 2026
CVE-2026-4553 High 8.8
A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit…
Mar 22, 2026
CVE-2026-4558 High 8.8
A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartCo…
Mar 22, 2026
CVE-2026-4552 High 8.8
A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform…
Mar 22, 2026
CVE-2026-4535 High 8.8
A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file …
Mar 22, 2026
CVE-2019-25603 High 8.4
TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers t…
Mar 22, 2026
CVE-2019-25604 High 8.4
DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability with structured exception handling that allows local a…
Mar 22, 2026
CVE-2019-25607 High 8.4
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers t…
Mar 22, 2026
CVE-2019-25608 High 8.4
Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users to execute arbitrary …
Mar 22, 2026
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.