Wednesday, November 12, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Wednesday's security landscape remains stable with 5 critical vulnerabilities (CVSS 9.0+) and 35 high-priority issues, unchanged from Tuesday's disclosure activity. The threat environment continues to be dominated by authentication bypass flaws in EIP Plus (CVE-2025-12866) and New Site Server (CVE-2025-12868), both rated CVSS 9.8, along with critical issues affecting JetBrains YouTrack, Triofox, and Soft Serve. Vendor patches remain available for 13% of disclosed vulnerabilities. Ten vulnerabilities are being actively exploited in the wild, with one urgent deadline passing today (November 12) for Motex LANSCOPE (CVE-2025-61932), while Adobe Commerce and Microsoft Windows patches have deadlines approaching November 13.

  • Critical vulnerabilities: 5 CVSS 9.0+ issues (unchanged from Tuesday)
  • Disclosure activity: 35 high-priority CVEs (stable trend)
  • Patch availability: 13% of new disclosures have vendor patches
  • Actively exploited: 10 vulnerabilities requiring priority attention
  • Urgent deadline TODAY: Motex LANSCOPE CVE-2025-61932 (CVSS 9.5)
  • Key products affected: JetBrains YouTrack, EIP Plus, New Site Server, Triofox, Soft Serve

Immediate action: URGENT: Motex LANSCOPE CVE-2025-61932 deadline passed today (November 12). Organizations must patch immediately. Priority patching also required for Adobe Commerce (CVE-2025-54236) and Microsoft Windows (CVE-2025-59287) with deadlines November 13. For critical vulnerabilities CVE-2025-12866 (EIP Plus) and CVE-2025-12868 (New Site Server), both CVSS 9.8, organizations should review vendor advisories and implement patches immediately. Given limited patch availability (13%), security teams should implement network segmentation, enhanced monitoring, and access controls for unpatched vulnerabilities.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation