Latest Cyber Threat Data

CISA Known Exploited Vulnerabilities (Top 10)

CVE-2026-34197

Vendor: Apache

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

Details

CVE-2009-0238

Vendor: Microsoft

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

Details

CVE-2026-32201

Vendor: Microsoft

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Details

CVE-2012-1854

Vendor: Microsoft

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

Details

CVE-2025-60710

Vendor: Microsoft

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

Details

CVE-2023-21529

Vendor: Microsoft

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

Details

CVE-2023-36424

Vendor: Microsoft

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

Details

CVE-2020-9715

Vendor: Adobe

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

Details

CVE-2026-21643

Vendor: Fortinet

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Details

CVE-2026-34621

Vendor: Adobe

Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.

Details

MITRE ATT&CK Techniques (Top 10)

Last updated: April 20, 2026, 3:58 p.m.