Sunday, March 8, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Sunday's disclosures highlight near-maximum severity vulnerabilities in PostgreSQL array expressions (CVE-2026-30860, CVSS 9.9) and the WeKnora LLM Framework (CVE-2026-30861, CVSS 9.9), both enabling remote code execution. Critical CVE volume dropped 62% from the prior day to 5, while high-priority disclosures fell 19% to 81. Additional critical flaws affect the Wavlink NU516U1 router (CVE-2026-3703, CVSS 9.8), Soft Serve Git Server (CVE-2026-29191, CVSS 9.1), and Zitadel identity management (CVE-2026-29191, CVSS 9.3). Fifteen vulnerabilities have confirmed active exploitation, spanning legacy flaws in Zimbra, GitLab, Hikvision, and Apple products alongside newer issues in VMware Aria Operations and Google Chromium. No patches are currently available for Sunday's disclosed CVEs, requiring organizations to prioritize compensating controls and network segmentation.

  • PostgreSQL array expression flaw (CVE-2026-30860, CVSS 9.9) and WeKnora LLM Framework vulnerability (CVE-2026-30861, CVSS 9.9) represent the highest-severity disclosures
  • Critical CVEs dropped to 5, a 62% decrease from Saturday's 13 critical disclosures
  • High-priority CVEs totaled 81, down 19% from the prior day's 100
  • Remote code execution and authentication bypass patterns dominate critical findings across database, router, and identity management products
  • Patch availability stands at 0% for Sunday's disclosures — compensating controls and monitoring are essential
  • 15 actively exploited vulnerabilities include legacy flaws in Zimbra, Hikvision, and Apple alongside recent issues in VMware Aria Operations and Chromium

Immediate action: Prioritize PostgreSQL, Wavlink router, Soft Serve Git Server, and Zitadel deployments for immediate risk assessment and apply network segmentation where direct patches are unavailable. Monitor vendor advisories for incoming patches on all five critical CVEs, and verify that signatures or mitigations exist for the 15 actively exploited vulnerabilities affecting Zimbra, GitLab, VMware, Chromium, and Apple products.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation