Sunday, February 15, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Sunday's disclosure activity centers on Microsoft Windows and Office products, with six actively exploited vulnerabilities targeting core enterprise infrastructure. The brief includes 3 critical CVEs (down 40% from Saturday) and 27 high-priority vulnerabilities (down 62%), reflecting typical weekend reduction in disclosure volume. Three WordPress critical vulnerabilities (CVE-2026-1490, CVE-2026-1306, CVE-2025-8572) each scored CVSS 9.8, while SmarterTools SmarterMail accounts for three separate actively exploited flaws. Attack patterns span remote code execution, privilege escalation, and authentication bypass across diverse targets including BeyondTrust, Linux kernel, GitLab, and Sangoma FreePBX. No patches are currently available for disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network segmentation.

  • Microsoft dominates active exploitation with 7 vulnerabilities across Windows (5) and Office (2), all scored CVSS 9.5
  • 3 critical CVEs disclosed (down 40% from prior day), all WordPress vulnerabilities at CVSS 9.8
  • 27 high-priority CVEs disclosed (down 62% from prior day), consistent with weekend volume patterns
  • SmarterTools SmarterMail has 3 actively exploited flaws; BeyondTrust Remote Support and GNU InetUtils also under active exploitation
  • 0% patch availability across all 30 disclosed CVEs β€” compensating controls and monitoring are essential
  • 20 vulnerabilities confirmed actively exploited, including legacy CVEs from 2018, 2019, 2021, and 2024

Immediate action: Prioritize Microsoft Windows and Office systems for compensating controls given five actively exploited Windows vulnerabilities and two Office flaws with no patches yet available. Review SmarterMail, BeyondTrust, and FreePBX deployments for indicators of compromise, and apply network segmentation to WordPress installations pending patch release.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation