Wednesday, January 14, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's vulnerability disclosures included 37 critical-severity CVEs, a 147% increase from the prior day's 15 critical issues. High-priority vulnerabilities saw substantial growth with 100 CVEs in the CVSS 7.0-8.9 range, up 355% from 22. Five actively exploited vulnerabilities were added to the KEV catalog, including CVE-2025-14847 affecting MongoDB, CVE-2026-20805 targeting Microsoft Windows, and CVE-2025-37164 impacting HPE OneView. Notable critical disclosures include CVE-2026-0881 (CVSS 10.0), a sandbox escape in the Messaging System, CVE-2025-14301 affecting the Opvius AI WooCommerce plugin, and CVE-2025-14502 impacting the News and Blog Designer Bundle WordPress plugin. Patch availability currently stands at 0%, requiring organizations to implement compensating controls and monitor for vendor updates.

  • 37 critical CVEs disclosed (CVSS 9.0+), up 147% from prior day's 15
  • 100 high-priority CVEs (CVSS 7.0-8.9), representing a 355% increase
  • 5 actively exploited vulnerabilities including MongoDB, Microsoft Windows, and HPE OneView
  • 0% patch availability requires compensating controls and vendor monitoring
  • WordPress plugins, VIAVIWEB applications, and enterprise systems among affected products

Immediate action: Organizations using MongoDB, Microsoft Windows, HPE OneView, Gogs, and WordPress plugins should prioritize assessment of exposure to actively exploited vulnerabilities. With no patches currently available for disclosed issues, implement network segmentation, enhanced monitoring, and access restrictions while tracking vendor security advisories.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation