Sunday, February 8, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Sunday's vulnerability disclosures include 5 critical CVEs (CVSS 9.0+), a 71% decrease from Saturday's 17 critical findings. High-priority vulnerabilities remain steady at 78, a modest 2% decline from the prior day's 80. All 16 actively exploited KEV entries carry CVSS 9.5 scores, affecting infrastructure from Cisco Unified Communications Manager and Broadcom VMware vCenter Server to Microsoft Office and multiple SmarterTools SmarterMail instances. Notable critical disclosures include CVE-2025-15027 targeting WordPress (CVSS 9.8) and CVE-2020-37095 affecting Cyberoam Authentication Client (CVSS 9.8). Patch availability currently stands at 0%, meaning no vendor-supplied fixes are available for these disclosures and organizations should prioritize compensating controls.

  • 5 critical CVEs disclosed, down 71% from Saturday's 17 critical findings
  • 78 high-priority CVEs (CVSS 7.0-8.9), a 2% decrease from the prior day
  • 16 actively exploited (KEV) vulnerabilities spanning Cisco, Broadcom VMware, Microsoft Office, SmarterTools SmarterMail, Zimbra, and GitLab
  • 0% patch availability across all disclosed CVEs — no vendor fixes currently released
  • Affected systems include WordPress, Cisco Unified Communications Manager, VMware vCenter Server, GNU InetUtils, Sangoma FreePBX, and Vite

Immediate action: Organizations running Cisco Unified Communications Manager, VMware vCenter Server, Microsoft Office, SmarterTools SmarterMail, Zimbra, GitLab, or Sangoma FreePBX should assess exposure immediately given active exploitation across all 16 KEV entries. With 0% patch availability, implement network segmentation, access restrictions, and monitoring for indicators of compromise as interim mitigations until vendor patches are released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation