Saturday, February 21, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Saturday's vulnerability disclosures include 14 critical and 100 high-priority CVEs, with three perfect CVSS 10.0 scores affecting Acronis Cyber Protect on Linux (CVE-2025-30411, CVE-2025-30412, CVE-2025-30416). Critical CVE volume dropped 42% from Friday's 24 to 14, while high-priority counts held steady at 100. Additional critical flaws affect Docker tool sandbox (CVE-2026-27002, CVSS 9.8), MLflow (CVE-2026-2635, CVSS 9.8), and Ghost CMS (CVE-2026-26980, CVSS 9.4). Twenty-one CVEs have confirmed active exploitation, spanning Microsoft Windows and Office, Apple OS, Google Chromium, GitLab, Roundcube Webmail, and Zimbra. No patches are currently available for the disclosed vulnerabilities, requiring organizations to prioritize compensating controls and monitoring.

  • Three CVSS 10.0 vulnerabilities in Acronis Cyber Protect for Linux demand immediate risk assessment (CVE-2025-30411, CVE-2025-30412, CVE-2025-30416)
  • Critical CVE count dropped to 14 from Friday's 24 (-42%), while high-priority CVEs remain unchanged at 100
  • Docker tool sandbox (CVSS 9.8), MLflow (CVSS 9.8), and Ghost CMS (CVSS 9.4) each carry critical-severity remote exploitation risks
  • Active exploitation confirmed across Microsoft Windows and Office (6 CVEs), Apple OS, Google Chromium, GitLab, and Roundcube Webmail
  • Patch availability stands at 0% — no vendor fixes are currently released for Saturday's disclosed CVEs
  • 21 actively exploited vulnerabilities identified, up 5% from Friday's 20

Immediate action: Prioritize Acronis Cyber Protect environments for immediate compensating controls given three CVSS 10.0 flaws with no patches available. Review exposure to actively exploited Microsoft Windows, Apple OS, and Chromium vulnerabilities, and apply network segmentation or access restrictions where patches have not yet been released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation