INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2026-4708
Incorrect boundary conditions in the Graphics component. This vul…
Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, F…
HIGH
7.5
Mar 24, 2026
CVE-2026-4709
Incorrect boundary conditions in the Audio/Video: GMP component. …
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox …
HIGH
7.5
Mar 24, 2026
CVE-2026-4712
Information disclosure in the Widget: Cocoa component. This vulne…
Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Fir…
HIGH
7.5
Mar 24, 2026
CVE-2026-4713
Incorrect boundary conditions in the Graphics component. This vul…
Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, F…
HIGH
7.5
Mar 24, 2026
CVE-2026-4714
Incorrect boundary conditions in the Audio/Video component. This …
Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149…
HIGH
7.5
Mar 24, 2026
CVE-2026-4718
Undefined behavior in the WebRTC: Signaling component. This vulne…
Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Fir…
HIGH
8.1
Mar 24, 2026
CVE-2026-4719
Incorrect boundary conditions in the Graphics: Text component. Th…
Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < …
HIGH
7.5
Mar 24, 2026
CVE-2026-4726
Denial-of-service in the XML component. This vulnerability affect…
Denial-of-service in the XML component. This vulnerability affects Firefox < 149 and Thunderbird < 1…
HIGH
7.5
Mar 24, 2026
CVE-2026-4727
Denial-of-service in the Libraries component in NSS. This vulnera…
Denial-of-service in the Libraries component in NSS. This vulnerability affects Firefox < 149 and Th…
HIGH
7.5
Mar 24, 2026
CVE-2026-4775
A flaw was found in the libtiff library. A remote attacker could …
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow v…
HIGH
7.8
Mar 24, 2026
CVE-2019-25626
River Past Cam Do 3.7.6 contains a local buffer overflow vulnerab…
River Past Cam Do 3.7.6 contains a local buffer overflow vulnerability in the activation code input …
HIGH
8.4
Mar 24, 2026
CVE-2019-25627
FlexHEX 2.71 contains a local buffer overflow vulnerability in th…
FlexHEX 2.71 contains a local buffer overflow vulnerability in the Stream Name field that allows loc…
HIGH
8.4
Mar 24, 2026
CVE-2019-25629
AIDA64 Extreme 5.99.4900 contains a structured exception handler …
AIDA64 Extreme 5.99.4900 contains a structured exception handler buffer overflow vulnerability in th…
HIGH
8.4
Mar 24, 2026
CVE-2019-25631
AIDA64 Business 5.99.4900 contains a structured exception handlin…
AIDA64 Business 5.99.4900 contains a structured exception handling buffer overflow vulnerability tha…
HIGH
8.4
Mar 24, 2026
CVE-2019-25633
AIDA64 Extreme 5.99.4900 contains a structured exception handling…
AIDA64 Extreme 5.99.4900 contains a structured exception handling buffer overflow vulnerability that…
HIGH
8.4
Mar 24, 2026
CVE-2019-25634
Base64 Decoder 1.1.2 contains a stack-based buffer overflow vulne…
Base64 Decoder 1.1.2 contains a stack-based buffer overflow vulnerability that allows local attacker…
HIGH
8.4
Mar 24, 2026
CVE-2019-25635
Zeeways Matrimony CMS contains multiple SQL injection vulnerabili…
Zeeways Matrimony CMS contains multiple SQL injection vulnerabilities that allow unauthenticated att…
HIGH
8.2
Mar 24, 2026
CVE-2019-25636
Zeeways Jobsite CMS contains an SQL injection vulnerability that …
Zeeways Jobsite CMS contains an SQL injection vulnerability that allows unauthenticated attackers to…
HIGH
8.2
Mar 24, 2026
CVE-2019-25637
X-NetStat Pro 5.63 contains a local buffer overflow vulnerability…
X-NetStat Pro 5.63 contains a local buffer overflow vulnerability that allows local attackers to exe…
HIGH
8.4
Mar 24, 2026
CVE-2019-25638
Meeplace Business Review Script contains an SQL injection vulnera…
Meeplace Business Review Script contains an SQL injection vulnerability that allows unauthenticated …
HIGH
7.1
Mar 24, 2026
CVE-2019-25639
Matrimony Website Script M-Plus contains multiple SQL injection v…
Matrimony Website Script M-Plus contains multiple SQL injection vulnerabilities that allow unauthent…
HIGH
8.2
Mar 24, 2026
CVE-2019-25640
Inout Article Base CMS contains SQL injection vulnerabilities tha…
Inout Article Base CMS contains SQL injection vulnerabilities that allow unauthenticated attackers t…
HIGH
8.2
Mar 24, 2026
CVE-2019-25641
Netartmedia Vlog System contains an SQL injection vulnerability t…
Netartmedia Vlog System contains an SQL injection vulnerability that allows unauthenticated attacker…
HIGH
8.2
Mar 24, 2026
CVE-2019-25642
Bootstrapy CMS contains multiple SQL injection vulnerabilities th…
Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers …
HIGH
8.2
Mar 24, 2026
CVE-2019-25643
eNdonesia Portal v8.7 contains multiple SQL injection vulnerabili…
eNdonesia Portal v8.7 contains multiple SQL injection vulnerabilities that allow unauthenticated att…
HIGH
8.2
Mar 24, 2026
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.