Saturday, April 18, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Saturday's disclosures center on enterprise infrastructure and developer platforms, with critical vulnerabilities in Kubernetes, HP products, MongoDB, and WordPress dominating the landscape. Critical CVEs rose 42% to 17, while high-priority disclosures declined 22% to 78. Notable entries include CVE-2026-37749 (CVSS 9.8) in HP Multiple Products, CVE-2026-40324 (CVSS 9.1) in Kubernetes, and CVE-2026-40351 (CVSS 9.8) in a MongoDB query operator. Attack patterns skew toward remote code execution and authentication bypass affecting container orchestration, database, and CMS environments. Patches are not yet available for any of today's disclosures, requiring defenders to prioritize compensating controls and monitoring until vendor fixes ship.

  • Kubernetes, HP, and MongoDB lead today's critical disclosures with high-severity RCE and privilege escalation issues
  • Critical CVEs increased 42% day-over-day to 17 disclosures
  • High-priority CVEs decreased 22% to 78 disclosures
  • Remote code execution and authentication bypass dominate, affecting container platforms, databases, and WordPress
  • 0% patch availability across today's disclosures — mitigations and monitoring required
  • 9 actively exploited vulnerabilities tracked across Microsoft, Adobe, and Apache ActiveMQ

Immediate action: Prioritize Kubernetes clusters, HP endpoints, MongoDB deployments, and WordPress installations for immediate risk assessment and network-level isolation where feasible. With no patches currently available, apply compensating controls, restrict exposed management interfaces, and monitor for exploitation indicators while tracking vendor advisories for upcoming fixes.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation