This advisory provides details on the top 30 vulnerabilities routinely exploited by malicious cyber actors. Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private organizations. However, entities worldwide can mitigate the vulnerabilities by applying the available patches to their systems and implementing a centralized patch management system