Sunday, January 11, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Sunday's disclosure activity reveals 4 critical vulnerabilities (CVSS 9.0+), representing a 64% decrease from the prior day's 11 critical issues. High-priority vulnerabilities also declined substantially, with 34 disclosed compared to 71 previously, a 52% reduction. Four actively exploited vulnerabilities (KEV) require attention, including legacy threats targeting Microsoft Office (CVE-2009-0556), MongoDB Server (CVE-2025-14847), and HPE OneView (CVE-2025-37164). Notable critical disclosures include CVE-2025-65091 affecting XWiki Full Calendar Macro with a maximum CVSS 10 score, CVE-2026-22688 in WeKnora with CVSS 9.9, and CVE-2026-61686 impacting React Router. With 0% patch availability currently reported, organizations should prioritize compensating controls and monitoring until vendor patches are released.

  • 4 critical vulnerabilities disclosed, 64% decrease from prior day
  • 34 high-priority vulnerabilities, 52% reduction from previous 71
  • 4 actively exploited vulnerabilities targeting Microsoft Office, MongoDB, HPE OneView, and Digiever systems
  • 0% patch availability indicates compensating controls needed
  • XWiki, React Router, WeKnora, and OpenProject among affected products

Immediate action: Organizations using Microsoft Office, MongoDB Server, HPE OneView, or Digiever DS-2105 Pro should prioritize review of the four actively exploited vulnerabilities. With no patches currently available for Sunday's disclosures, implement network segmentation, enhanced monitoring, and access restrictions for affected systems until vendor remediation guidance is released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation