Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.
This advisory provides details on the top 30 vulnerabilities routinely exploited by malicious cyber actors. Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private organizations. However, entities worldwide can mitigate the vulnerabilities by applying the available patches to their systems and implementing a centralized patch management system
Author(s):
U.S. Cybersecurity and Infrastructure Security Agency