INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 38m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 38m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 38m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h

🛡️ CVE Vulnerability Database

CVE vulnerabilities with bilingual AI analysis tailored for Saudi Arabia

CVE ID Title / Description Severity CVSS Status Published
CVE-2026-33493
WWBN AVideo is an open source video platform. In versions up to a…
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/imp…
HIGH
7.1
Mar 23, 2026
CVE-2026-33513
WWBN AVideo is an open source video platform. In versions up to a…
WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticat…
HIGH
8.6
Mar 23, 2026
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor us…
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi…
HIGH
8.8
KEV Mar 23, 2026
CVE-2026-33649
WWBN AVideo is an open source video platform. In versions up to a…
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Perm…
HIGH
8.1
Mar 23, 2026
CVE-2026-33651
WWBN AVideo is an open source video platform. In versions up to a…
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.js…
HIGH
8.1
Mar 23, 2026
CVE-2026-4314
The 'The Ultimate WordPress Toolkit – WP Extended' plugin for Wor…
The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege E…
HIGH
8.8
Mar 22, 2026
CVE-2026-4534
A flaw has been found in Tenda FH451 1.0.0.9. This affects the fu…
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file …
HIGH
8.8
Mar 22, 2026
CVE-2026-4535
A vulnerability has been found in Tenda FH451 1.0.0.9. This vulne…
A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function Wrlcl…
HIGH
8.8
Mar 22, 2026
CVE-2026-4536
A vulnerability was found in Acrel Environmental Monitoring Cloud…
A vulnerability was found in Acrel Environmental Monitoring Cloud Platform 1.1.0. This issue affects…
HIGH
7.3
Mar 22, 2026
CVE-2026-4545
A security flaw has been discovered in Flos Freeware Notepad2 4.2…
A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affects an unknown functi…
HIGH
7.0
Mar 22, 2026
CVE-2026-4546
A weakness has been identified in Flos Freeware Notepad2 4.2.25. …
A weakness has been identified in Flos Freeware Notepad2 4.2.25. This impacts an unknown function in…
HIGH
7.0
Mar 22, 2026
CVE-2026-4551
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerabili…
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeCli…
HIGH
8.8
Mar 22, 2026
CVE-2026-4552
A vulnerability was determined in Tenda F453 1.0.0.3. This issue …
A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer…
HIGH
8.8
Mar 22, 2026
CVE-2026-4553
A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is…
A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the f…
HIGH
8.8
Mar 22, 2026
CVE-2026-4555
A weakness has been identified in D-Link DIR-513 1.10. The impact…
A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasy…
HIGH
8.8
Mar 22, 2026
CVE-2026-4558
A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is…
A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure…
HIGH
8.8
Mar 22, 2026
CVE-2019-25603
TuneClone 2.20 contains a structured exception handler (SEH) buff…
TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allo…
HIGH
8.4
Mar 22, 2026
CVE-2019-25604
DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability…
DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability with structured exception handling…
HIGH
8.4
Mar 22, 2026
CVE-2019-25605
EquityPandit 1.0 contains an insecure logging vulnerability that …
EquityPandit 1.0 contains an insecure logging vulnerability that allows attackers to capture sensiti…
HIGH
7.5
Mar 22, 2026
CVE-2019-25607
Axessh 4.2 contains a stack-based buffer overflow vulnerability i…
Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allo…
HIGH
8.4
Mar 22, 2026
CVE-2019-25608
Iperius Backup 6.1.0 contains a privilege escalation vulnerabilit…
Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users t…
HIGH
8.4
Mar 22, 2026
CVE-2019-25609
JetAudio jetCast Server 2.0 contains a stack-based buffer overflo…
JetAudio jetCast Server 2.0 contains a stack-based buffer overflow vulnerability in the Log Director…
HIGH
8.4
Mar 22, 2026
CVE-2019-25611
MiniFtp contains a buffer overflow vulnerability in the parseconf…
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows …
HIGH
8.4
Mar 22, 2026
CVE-2019-25612
Admin Express 1.2.5.485 contains a local structured exception han…
Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability…
HIGH
7.8
Mar 22, 2026
CVE-2019-25613
Easy Chat Server 3.1 contains a denial of service vulnerability t…
Easy Chat Server 3.1 contains a denial of service vulnerability that allows remote attackers to cras…
HIGH
7.5
Mar 22, 2026
🤖 AI Analysis Active
AI analysis includes: Arabic description, Saudi impact assessment, remediation steps, compliance mapping (NCA ECC, SAMA CSF, ISO 27001) and MITRE ATT&CK techniques.
💡 Search Tips
CVE-2024-12345 Search by exact ID
apache Search by product name
remote code execution Search by vulnerability type
log4j Search by common name
📡 Data Sources
NVD (NIST) · CIRCL
CISA KEV · ThreatFox
Feodo Tracker · AlienVault OTX
Auto-updated daily via cron
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.