📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Transportation and Automotive HIGH 36m Global vulnerability Information Technology and Software CRITICAL 1h Global vulnerability Technology and Robotics CRITICAL 1h Global phishing Government HIGH 1h Global phishing Telecommunications / Financial Services HIGH 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global vulnerability Information Technology MEDIUM 2h Global supply_chain Defense, Aerospace, Government CRITICAL 3h Global vulnerability Cloud Services / Email HIGH 3h Global general Cybersecurity Technology LOW 4h Global vulnerability Transportation and Automotive HIGH 36m Global vulnerability Information Technology and Software CRITICAL 1h Global vulnerability Technology and Robotics CRITICAL 1h Global phishing Government HIGH 1h Global phishing Telecommunications / Financial Services HIGH 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global vulnerability Information Technology MEDIUM 2h Global supply_chain Defense, Aerospace, Government CRITICAL 3h Global vulnerability Cloud Services / Email HIGH 3h Global general Cybersecurity Technology LOW 4h Global vulnerability Transportation and Automotive HIGH 36m Global vulnerability Information Technology and Software CRITICAL 1h Global vulnerability Technology and Robotics CRITICAL 1h Global phishing Government HIGH 1h Global phishing Telecommunications / Financial Services HIGH 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global vulnerability Information Technology MEDIUM 2h Global supply_chain Defense, Aerospace, Government CRITICAL 3h Global vulnerability Cloud Services / Email HIGH 3h Global general Cybersecurity Technology LOW 4h
📅 Daily Security Digest — Tuesday, March 17, 2026

🇸🇦 Saudi Cyber Daily Digest

All security vulnerabilities, threats, and news aggregated today from trusted sources — continuously updated

Tuesday, March 17, 2026 Today
91 CVEs
16 Threats
0 News
1 Critical
🛡 Security Vulnerabilities (CVE)
91 vulnerabilities
CVE-2026-28495
GetSimple CMS massiveAdmin CSRF Vulnerability Enables RCE via gsconfig.php
03:13 KSA
CRITICAL CVSS 9.6 CWE-352
GetSimple CMS is a content management system. The massiveAdmin plugin (v6.0.3) bundled with GetSimpleCMS-CE v3.3.22 allows an authenticated administrator to overwrite the gsconfig.php configuration file with arbitrary PHP code via the gsconfig editor module. The form lacks CSRF p…
CVE-2026-20967
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a
03:13 KSA
HIGH CVSS 8.8 CWE-20
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
CVE-2026-3854
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an
03:13 KSA
HIGH CVSS 8.8 CWE-77
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were n…
CVE-2026-26118
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a networ
03:13 KSA
HIGH CVSS 8.8 CWE-918
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26116
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized
03:13 KSA
HIGH CVSS 8.8 CWE-89
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26114
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a ne
03:13 KSA
HIGH CVSS 8.8 CWE-502
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-26106
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
03:13 KSA
HIGH CVSS 8.8 CWE-20
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2026-25188
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an ad
03:13 KSA
HIGH CVSS 8.8 CWE-122
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.
CVE-2026-25177
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized att
03:13 KSA
HIGH CVSS 8.8 CWE-641
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
CVE-2026-24283
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 8.8 CWE-122
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
CVE-2026-23669
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
03:13 KSA
HIGH CVSS 8.8 CWE-416
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
CVE-2026-23654
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to
03:13 KSA
HIGH CVSS 8.8
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network.
CVE-2026-28513
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, th
03:13 KSA
HIGH CVSS 8.5 CWE-863
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and ex…
CVE-2026-26113
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 8.4 CWE-822
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26110
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to exe
03:13 KSA
HIGH CVSS 8.4 CWE-843
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-26109
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 8.4 CWE-125
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26148
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate
03:13 KSA
HIGH CVSS 8.1 CWE-454
External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25172
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
HIGH CVSS 8.0 CWE-122
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-25173
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to exec
03:13 KSA
HIGH CVSS 8.0 CWE-122
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2026-26117
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized att
03:13 KSA
HIGH CVSS 7.8 CWE-288
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-27277
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
HIGH CVSS 7.8 CWE-416
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26141
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-287
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
CVE-2026-26134
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-190
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
CVE-2026-26132
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-416
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25187
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate priv
03:13 KSA
HIGH CVSS 7.8 CWE-59
Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
CVE-2026-26131
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-276
Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.
CVE-2026-25189
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-416
Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2026-25190
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 7.8 CWE-426
Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
CVE-2026-26128
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-287
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-25176
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privil
03:13 KSA
HIGH CVSS 7.8 CWE-284
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-23673
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-125
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
CVE-2026-23660
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally
03:13 KSA
HIGH CVSS 7.8 CWE-284
Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.
CVE-2026-26107
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 7.8 CWE-416
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26108
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 7.8 CWE-122
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-23672
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
03:13 KSA
HIGH CVSS 7.8 CWE-125
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-27279
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
HIGH CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-26112
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 7.8 CWE-822
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-27280
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitr
03:13 KSA
HIGH CVSS 7.8 CWE-787
DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-25165
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-476
Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
CVE-2026-24289
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-416
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-24290
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-284
Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
CVE-2026-24291
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an a
03:13 KSA
HIGH CVSS 7.8 CWE-732
Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.
CVE-2026-24292
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locall
03:13 KSA
HIGH CVSS 7.8 CWE-416
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
CVE-2026-24293
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privi
03:13 KSA
HIGH CVSS 7.8 CWE-476
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-24294
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-287
Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.
CVE-2026-27275
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
HIGH CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27274
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
HIGH CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-24287
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-73
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2026-25166
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
03:13 KSA
HIGH CVSS 7.8 CWE-502
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
CVE-2026-27273
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result i
03:13 KSA
HIGH CVSS 7.8 CWE-787
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-27269
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file,
03:13 KSA
HIGH CVSS 7.8 CWE-125
Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the …
CVE-2026-27276
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbi
03:13 KSA
HIGH CVSS 7.8 CWE-416
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-23665
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-122
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
CVE-2026-25174
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-125
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
CVE-2026-25175
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.8 CWE-125
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
CVE-2026-27689
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular us
03:13 KSA
HIGH CVSS 7.7 CWE-606
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonge…
CVE-2026-30929
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-1
03:13 KSA
HIGH CVSS 7.7 CWE-121
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vul…
CVE-2026-25181
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
03:13 KSA
HIGH CVSS 7.5 CWE-125
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
CVE-2026-30939
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13
03:13 KSA
HIGH CVSS 7.5 CWE-1321
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13 and 9.5.1-alpha.2, an unauthenticated attacker can crash the Parse Server process by calling a Cloud Function endpoint with a prototype property name as the fun…
CVE-2026-30925
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-a
03:13 KSA
HIGH CVSS 7.5 CWE-1333
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-alpha.14 and 8.6.11, a malicious client can subscribe to a LiveQuery with a crafted $regex pattern that causes catastrophic backtracking, blocking the Node.js ev…
CVE-2026-28431
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but p
03:13 KSA
HIGH CVSS 7.5 CWE-285
Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to access due to insufficient permission c…
CVE-2026-26308
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Rol
03:13 KSA
HIGH CVSS 7.5 CWE-863
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instea…
CVE-2026-23664
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacke
03:13 KSA
HIGH CVSS 7.5 CWE-923
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-2339
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Li
03:13 KSA
HIGH CVSS 7.5 CWE-306
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.
CVE-2026-28432
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerabilit
03:13 KSA
HIGH CVSS 7.5 CWE-347
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects all servers regardless of whether federa…
CVE-2026-23662
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose informati
03:13 KSA
HIGH CVSS 7.5 CWE-306
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-26130
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service ove
03:13 KSA
HIGH CVSS 7.5 CWE-770
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
CVE-2026-30941
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14
03:13 KSA
HIGH CVSS 7.5 CWE-943
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14 and 9.5.2-alpha.1, NoSQL injection vulnerability allows an unauthenticated attacker to inject MongoDB query operators via the token field in the password reset …
CVE-2026-26127
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
03:13 KSA
HIGH CVSS 7.5 CWE-125
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
CVE-2026-26121
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a netw
03:13 KSA
HIGH CVSS 7.5 CWE-20
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-23674
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security fea
03:13 KSA
HIGH CVSS 7.5 CWE-41
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-3585
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.
03:13 KSA
HIGH CVSS 7.5 CWE-22
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitr…
CVE-2026-23661
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose inform
03:13 KSA
HIGH CVSS 7.5 CWE-319
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
CVE-2026-25573
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell co
03:13 KSA
HIGH CVSS 7.4 CWE-73
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full sys…
CVE-2026-25167
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.4 CWE-416
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
CVE-2026-25569
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exi
03:13 KSA
HIGH CVSS 7.4 CWE-787
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execu…
CVE-2026-25570
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform che
03:13 KSA
HIGH CVSS 7.4 CWE-121
A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service.
CVE-2026-2364
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low pr
03:13 KSA
HIGH CVSS 7.3 CWE-367
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.
CVE-2026-30958
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal
03:13 KSA
HIGH CVSS 7.2 CWE-22
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal in the /workflow/docs/:componentName endpoint allows reading arbitrary files from the server filesystem. The componentName route parameter is concatenated dire…
CVE-2026-1261
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions u
03:13 KSA
HIGH CVSS 7.2 CWE-79
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary …
CVE-2026-2724
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entr
03:13 KSA
HIGH CVSS 7.2 CWE-79
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in th…
CVE-2026-25179
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized att
03:13 KSA
HIGH CVSS 7.0 CWE-1287
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25178
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges loca
03:13 KSA
HIGH CVSS 7.0 CWE-416
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-25171
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.0 CWE-416
Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2026-25170
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.0 CWE-416
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2026-24296
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
HIGH CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24295
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Associatio
03:13 KSA
HIGH CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
CVE-2026-24285
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.0 CWE-416
Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
CVE-2026-23671
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM P
03:13 KSA
HIGH CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-23667
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
03:13 KSA
HIGH CVSS 7.0 CWE-416
Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
CVE-2026-23668
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Compon
03:13 KSA
HIGH CVSS 7.0 CWE-362
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
⚠️ Threat Intelligence
16 threats
rss:The Hacker News
06:54 KSA
HIGH general
<strong>AI is Everywhere, But CISOs are Still Securing It with Yesterday&#039;s Skills and Tools, Study Finds</strong> A survey of 300 US CISOs reveals that security leaders lack adequate tools and skills to defend AI systems effectively. The AI and Adversarial Testing Benchmark…
rss:The Hacker News
06:54 KSA
HIGH apt
<strong>Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware</strong> North Korean threat actors attributed to the Konni hacking group are conducting phishing campaigns to compromise victims and exploit KakaoTalk desktop application for malware distribution…
rss:The Hacker News
06:54 KSA
MEDIUM vulnerability
<strong>CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths</strong> CISA added CVE-2025-47813, a medium-severity information disclosure vulnerability in Wing FTP, to its Known Exploited Vulnerabilities catalog due to active exploitation. The flaw allows at…
rss:The Hacker News
05:48 KSA
CRITICAL vulnerability
<strong>AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE</strong> Security researchers discovered vulnerabilities in AI platforms Amazon Bedrock, LangSmith, and SGLang that enable data exfiltration through DNS queries and remote code execution. …
rss:The Hacker News
05:48 KSA
HIGH ransomware
<strong>LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader</strong> LeakNet ransomware group has adopted ClickFix social engineering tactics through compromised websites to trick users into executing malicious commands. The attack deploys a Deno in-…
rss:Dark Reading
20:02 KSA
CRITICAL apt
<strong>China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years</strong> Advanced persistent threat actors linked to China conducted a multi-year cyber espionage campaign against military organizations in Southeast Asia. The attackers deployed novel backdoors and so…
rss:Dark Reading
19:00 KSA
MEDIUM phishing
<strong>Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish</strong> Cybersecurity firm Outpost24 successfully defended against a sophisticated 7-stage phishing attack targeting a C-suite executive. The attackers leveraged trusted brands and legitimate domains to attemp…
rss:Dark Reading
19:00 KSA
HIGH ransomware
<strong>Warlock Ransomware Group Augments Post-Exploitation Activities</strong> The Warlock ransomware group has enhanced its post-exploitation capabilities using a new Bring Your Own Vulnerable Driver (BYOVD) technique for stealthier cross-network movement. This advancement all…
rss:Malwarebytes Lab
06:29 KSA
MEDIUM general
<strong>90% of people don’t trust AI with their data</strong> A privacy survey reveals that 90% of respondents do not trust AI systems with their personal data, leading many to reduce their AI usage. This widespread distrust poses significant challenges for organizations impleme…
rss:Malwarebytes Lab
06:29 KSA
HIGH phishing
<strong>How searching for a VPN could mean handing over your work login details</strong> Cybercriminals are using SEO poisoning techniques to make malicious VPN downloads appear legitimate in search results, specifically targeting corporate login credentials. Organizations face …
rss:Malwarebytes Lab
06:29 KSA
MEDIUM malware
<strong>Google cracks down on Android apps abusing accessibility</strong> Google has implemented stricter controls on Android apps that abuse accessibility features, which malware has exploited for years to gain elevated permissions and control devices. This security enhancement…
rss:Malwarebytes Lab
06:29 KSA
MEDIUM phishing
<strong>Fake Pudgy World site steals your crypto passwords</strong> A phishing website impersonating Pudgy World is targeting cryptocurrency users by mimicking the legitimate Pudgy Penguins brand. The fake site is designed to steal crypto wallet passwords and credentials from un…
rss:CISA Advisories
06:28 KSA
MEDIUM vulnerability
<strong>Schneider Electric EcoStruxure Data Center Expert</strong> Schneider Electric disclosed a hard-coded credentials vulnerability in EcoStruxure IT Data Center Expert (DCE) affecting the SOCKS Proxy feature. The vulnerability requires administrator credentials and the featu…
rss:CISA Advisories
06:11 KSA
HIGH vulnerability
<strong>Schneider Electric SCADAPack and RemoteConnect</strong> Schneider Electric disclosed a vulnerability affecting its SCADAPack x70 RTU products, including SCADAPack 47xi, 47x, and 57x models used for remote monitoring and control in industrial environments. Organizations u…
rss:CISA Advisories
06:11 KSA
HIGH vulnerability
<strong>Siemens SICAM SIAPP SDK</strong> Multiple vulnerabilities discovered in Siemens SICAM SIAPP SDK could enable attackers to disrupt customer-developed SIAPP applications or their simulation environments. Potential impacts include denial of service, data corruption within S…
rss:CISA Advisories
06:11 KSA
MEDIUM vulnerability
<strong>CODESYS in Festo Automation Suite</strong> Vulnerabilities identified in CODESYS components within Festo Automation Suite versions prior to 2.8.0.138, affecting the CODESYS Development System 3.0. Organizations using Festo automation solutions should upgrade to the lates…
📰 Cybersecurity News
0 articles
📰 No news aggregated today yet

This digest is updated automatically every day — Last updated: Tuesday, March 17, 2026
CVE Archive · Threats · News

📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.