Saturday, January 17, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Saturday's security landscape reveals 22 critical vulnerabilities, a 24% decrease from Friday's 29 critical disclosures. High-priority vulnerabilities held steady at 100 issues requiring attention. Five actively exploited vulnerabilities demand immediate focus, including CVE-2025-14847 affecting MongoDB, CVE-2026-20805 targeting Microsoft Windows, and CVE-2025-37164 impacting HPE OneView. Canon printer firmware vulnerabilities dominate today's critical disclosures with multiple buffer overflow issues (CVE-2025-14231, CVE-2025-14232, CVE-2025-14234, CVE-2025-14235, CVE-2025-14236, CVE-2025-14237) affecting Small Office Multifunction Printers. Current patch availability stands at 0%, requiring organizations to implement compensating controls until vendor remediation becomes available.

  • 22 critical vulnerabilities disclosed, down 24% from prior day's 29
  • 100 high-priority vulnerabilities, unchanged from previous day
  • 5 actively exploited CVEs affecting MongoDB, Microsoft Windows, HPE OneView, and Gogs
  • 0% patch availability requires compensating controls and enhanced monitoring
  • Canon printer firmware affected by 7 buffer overflow vulnerabilities requiring network segmentation

Immediate action: Organizations using MongoDB, Microsoft Windows, HPE OneView, Gogs, or Canon multifunction printers should prioritize threat hunting and implement network segmentation for affected systems. With no patches currently available, deploy compensating controls including enhanced logging, access restrictions, and intrusion detection signatures for the actively exploited vulnerabilities.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation