Sunday, January 25, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures included 2 critical CVEs, a 92% decrease from the prior day's 26 critical vulnerabilities. High-priority vulnerabilities also declined significantly, with 39 CVEs compared to 100 the previous day, representing a 61% reduction. Ten actively exploited vulnerabilities remain on CISA's KEV catalog, affecting Microsoft Windows, Microsoft Office, Cisco Unified Communications Manager, HPE OneView, VMware vCenter Server, and Zimbra Collaboration Suite. Notable critical disclosures include CVE-2025-13374 (CVSS 9.8), an arbitrary file upload vulnerability in the Kalrav AI Agent WordPress plugin, and CVE-2026-24399 (CVSS 9.3) affecting ChatterMate. Patch availability stands at 0%, requiring organizations to implement compensating controls until vendor fixes are released.

  • 2 critical CVEs disclosed, down 92% from 26 the prior day
  • 39 high-priority CVEs, representing a 61% decrease from 100
  • 10 actively exploited vulnerabilities affecting Microsoft, Cisco, HPE, VMware, Gogs, Zimbra, Versa, and Vite
  • 0% patch availability for newly disclosed vulnerabilities
  • WordPress plugin (Kalrav AI Agent) and ChatterMate identified in critical severity disclosures

Immediate action: Organizations running Microsoft Windows, Cisco Unified Communications Manager, HPE OneView, VMware vCenter Server, or Zimbra should prioritize reviewing the actively exploited CVEs and implement available mitigations. With no patches currently available for newly disclosed critical vulnerabilities, focus on network segmentation and monitoring for exploitation attempts.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation