Friday, January 9, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosure activity identified 43 critical-severity CVEs, representing a 139% increase compared to the prior day's 18 critical findings. High-priority vulnerabilities remained relatively stable at 100, showing only a 3% increase from the previous 97. Four actively exploited vulnerabilities require immediate attention, including CVE-2023-52163 affecting Digiever DS-2105 Pro devices, CVE-2025-14847 impacting MongoDB Server, CVE-2009-0556 targeting Microsoft Office, and CVE-2025-37164 affecting HP OneView. Notable critical disclosures include CVE-2019-25296 in the WP Cost Estimation WordPress plugin enabling arbitrary file uploads, CVE-2025-66913 in JimuReport, and CVE-2017-20216 affecting FLIR thermal cameras. Patch availability currently stands at 0%, indicating organizations should prioritize compensating controls and monitoring until vendor remediation becomes available.

  • 43 critical CVEs disclosed, up 139% from prior day's 18 critical findings
  • 100 high-priority CVEs identified, a 3% increase from 97 the previous day
  • 4 actively exploited vulnerabilities affecting Digiever, MongoDB, Microsoft Office, and HP OneView
  • 0% patch availability requires compensating controls and enhanced monitoring
  • WordPress plugins, JimuReport, FLIR cameras, and file handling components among affected systems

Immediate action: Organizations running MongoDB Server, HP OneView, Microsoft Office, or Digiever surveillance devices should prioritize review and implement network segmentation or access restrictions for affected systems. With no patches currently available for disclosed vulnerabilities, focus on detection capabilities, logging, and compensating controls until vendor updates are released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation