Thursday, January 29, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures included 16 critical-severity CVEs, a 27% decrease from the prior day's 22 critical vulnerabilities. High-priority vulnerabilities increased 14% to 96 entries, indicating sustained disclosure volume in the 7.0-8.9 CVSS range. Fourteen actively exploited vulnerabilities appear on the KEV list, including CVE-2026-20805 affecting Microsoft Windows, CVE-2026-20045 in Cisco Unified Communications Manager, and CVE-2025-68645 targeting Zimbra Collaboration Suite. Critical entries include three CVSS 10.0 vulnerabilities: CVE-2026-23830 in SandboxJS, CVE-2025-57792 in Explorance Blue, and CVE-2026-24897 in Erugo, alongside two SolarWinds Web Help Desk deserialization flaws (CVE-2025-40551 and CVE-2025-40553). Patch availability stands at 0%, requiring organizations to implement compensating controls and enhanced monitoring until vendor remediation becomes available.

  • 16 critical-severity CVEs disclosed, down 27% from 22 the prior day
  • 96 high-priority vulnerabilities (CVSS 7.0-8.9), up 14% from 84
  • 14 actively exploited KEV entries affecting Microsoft Windows, Cisco, Zimbra, and VMware vCenter
  • 0% patch availability across disclosed vulnerabilities requires compensating controls
  • SolarWinds Web Help Desk, Explorance Blue, and DNN Dokploy among affected enterprise products

Immediate action: Organizations running Microsoft Windows, Cisco Unified Communications Manager, Zimbra Collaboration Suite, SolarWinds Web Help Desk, or VMware vCenter should implement network segmentation and enhanced monitoring for the actively exploited vulnerabilities. With no patches currently available, prioritize applying compensating controls such as access restrictions and increased logging for affected systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation