Wednesday, December 31, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures include 20 critical-severity vulnerabilities, marking a 122% increase from the prior day's 9 critical CVEs. High-priority vulnerabilities also increased substantially with 100 CVEs representing a 52% rise. Eight actively exploited vulnerabilities remain on the KEV list, including CVE-2025-58360 affecting OSGeo GeoServer, CVE-2025-14174 in Google Chromium, and CVE-2025-43529 impacting Apple products. Notable critical disclosures include multiple Improper Control of Filename vulnerabilities (CVE-2025-68974, CVE-2025-68987, CVE-2025-68983) with CVSS 9.8 scores affecting multiple products, plus CVE-2025-15255 targeting Tenda devices. Patch availability stands at 0%, requiring organizations to prioritize compensating controls and monitoring.

  • 20 critical CVEs disclosed (122% increase from prior day's 9)
  • 100 high-priority CVEs identified (52% increase from 66)
  • 8 actively exploited vulnerabilities including GeoServer, Chromium, Apple, and MongoDB
  • 0% patch availability for disclosed vulnerabilities
  • Multiple products affected by filename control vulnerabilities (CVSS 9.8)
  • Tenda, Sierra Wireless, ASUS, and Gladinet products among affected vendors

Immediate action: Organizations using GeoServer, Chromium, Apple products, MongoDB, Tenda devices, Sierra Wireless AirLink, ASUS Live Update, or Gladinet CentreStack should implement additional monitoring and access controls. With 0% patch availability for today's disclosures, focus on network segmentation and detection capabilities for affected systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation