Tuesday, December 30, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures included 9 critical-severity CVEs, a 200% increase from the prior day's 3. High-priority vulnerabilities also rose substantially to 66 from 26, representing a 154% increase. Eight actively exploited vulnerabilities were added to CISA's Known Exploited Vulnerabilities catalog, including issues affecting GeoServer, Google Chromium, Apple products, MongoDB, and ASUS Live Update. Notable critical vulnerabilities include CVE-2025-52691 (CVSS 10) enabling unauthenticated arbitrary file uploads, CVE-2025-68860 affecting Mobile Builder with authentication bypass, and CVE-2025-68897 involving code generation control issues. Patch availability stands at 0%, requiring organizations to prioritize compensating controls and monitoring.

  • 9 critical CVEs disclosed, up 200% from prior day's 3
  • 66 high-priority CVEs, a 154% increase from 26
  • 8 actively exploited vulnerabilities including GeoServer, Chromium, Apple, MongoDB, and ASUS
  • 0% patch availability for newly disclosed vulnerabilities
  • Multiple file upload vulnerabilities affecting MapSVG, WMPro, and BPMFlowWebkit systems

Immediate action: Organizations using GeoServer, Apple products, MongoDB, ASUS Live Update, Chromium, or Gladinet CentreStack should review KEV entries immediately. With no patches currently available for newly disclosed critical issues, implement network segmentation and enhanced monitoring for affected systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation