Favicon for www.jpcert.or.jp

JPCERT EN alerts alt

RSS

GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.

Thursday, April 23, 2026

JPCERT EN alerts alt
Favicon for www.jpcert.or.jp

JPCERT Warns of Critical Vulnerabilities in Adobe Acrobat and Reader Allowing Arbitrary Code Execution

JPCERT/CC issued alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical vulnerabilities in Adobe Acrobat DC, Adobe Acrobat Reader DC, and Adobe Acrobat 2024 Classic that could allow attackers to execute arbitrary code by tricking users into opening malicious PDF content. Affected versions include Adobe Acrobat DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat Reader DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). JPCERT recommends updating to patched versions 25.001.21288, 25.001.21288, and 24.001.30356 respectively.

Priority review Notice Cybersecurity
Favicon for www.jpcert.or.jp

Adobe Acrobat and Reader Vulnerabilities Allow Code Execution

JPCERT/CC issued alert JPCERT-AT-2026-0011 on April 15, 2026, notifying that vulnerabilities exist in Adobe Acrobat and Adobe Acrobat Reader affecting multiple versions on Windows and macOS. Affected versions include Adobe Acrobat DC Continuous (26.001.21411) and earlier, and Adobe Acrobat 2024 Classic (24.001.30362 and earlier on Windows; 24.001.30360 and earlier on macOS). An attacker may execute arbitrary code by convincing a user to open malicious content leveraging the vulnerability. Users are advised to update to the latest versions: Adobe Acrobat DC Continuous (26.001.21431) or Adobe Acrobat 2024 Classic (24.001.30365).

Priority review Notice Cybersecurity
JPCERT EN alerts alt
Favicon for www.jpcert.or.jp

Microsoft April 2026 Security Updates Fix Critical Vulnerabilities

JPCERT/CC issued alert JPCERT-AT-2026-0010 on April 15, 2026, reporting that Microsoft released April 2026 Security Updates addressing multiple vulnerabilities in Microsoft products. Attackers could exploit these vulnerabilities to perform network spoofing or execute arbitrary code remotely without authentication. Among the vulnerabilities disclosed, CVE-2026-32201 (Microsoft SharePoint Server Spoofing Vulnerability) has been confirmed as actively exploited in the wild. JPCERT recommends applying security updates via Microsoft Update, Windows Update, or the Microsoft Update Catalog.

Priority review Notice Cybersecurity

Get daily alerts for JPCERT EN alerts alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

Source details

Country
Japan

Activity

Changes tracked
3
Changes in last month
3
Last change detected
4h ago

Filters

Get JPCERT EN alerts alt alerts

We'll email you when JPCERT EN alerts alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!