Saturday, February 14, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Saturday's vulnerability disclosures center on Microsoft products, with multiple Windows and Office CVEs carrying active exploitation status alongside critical flaws in WordPress plugins, Milvus vector database, and MojoPortal CMS. The day's 5 critical CVEs represent a 72% decrease from the prior day's 18, while 72 high-priority vulnerabilities reflect a 28% drop from 100. CVE-2025-69770 in MojoPortal CMS received the maximum CVSS 10.0 score, and CVE-2026-26190 targeting Milvus vector database and CVE-2026-1306 affecting WordPress both scored 9.8. SmarterTools SmarterMail appears three times among actively exploited vulnerabilities, and Microsoft Windows and Office account for seven KEV entries, indicating sustained attacker focus on enterprise infrastructure. Patch availability stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor fixes are released.

  • MojoPortal CMS CVE-2025-69770 scores maximum CVSS 10.0; Milvus vector database and two WordPress vulnerabilities also rated 9.8
  • 5 critical CVEs disclosed, down 72% from prior day's 18 critical vulnerabilities
  • 72 high-priority CVEs reported, a 28% decrease from the previous day's 100
  • Microsoft Windows and Office account for 7 actively exploited CVEs, with SmarterTools SmarterMail contributing 3 additional KEV entries
  • 0% patch availability across all disclosed CVEs — no vendor-supplied fixes currently available
  • 21 CVEs flagged as actively exploited, including legacy issues in Linux kernel (2018) and FreePBX (2019)

Immediate action: Prioritize compensating controls for Microsoft Windows, Office, and SmarterTools SmarterMail environments, as these products represent the largest concentration of actively exploited vulnerabilities. With 0% patch availability, deploy network segmentation, enhanced monitoring, and access restrictions for affected systems — particularly MojoPortal CMS, Milvus, and WordPress instances — until vendor patches are released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation