JPCERT EN alerts alt
GovPing monitors JPCERT EN alerts alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.
Thursday, April 23, 2026
JPCERT Warns of Critical Vulnerabilities in Adobe Acrobat and Reader Allowing Arbitrary Code Execution
JPCERT/CC issued alert JPCERT-AT-2026-0006 on 2026-03-11 disclosing critical vulnerabilities in Adobe Acrobat DC, Adobe Acrobat Reader DC, and Adobe Acrobat 2024 Classic that could allow attackers to execute arbitrary code by tricking users into opening malicious PDF content. Affected versions include Adobe Acrobat DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat Reader DC Continuous 25.001.21265 and earlier (Windows, macOS), Adobe Acrobat 2024 Classic 2024 versions 24.001.30307 and earlier (Windows) and 24.001.30308 and earlier (macOS). JPCERT recommends updating to patched versions 25.001.21288, 25.001.21288, and 24.001.30356 respectively.
Adobe Acrobat and Reader Vulnerabilities Allow Code Execution
JPCERT/CC issued alert JPCERT-AT-2026-0011 on April 15, 2026, notifying that vulnerabilities exist in Adobe Acrobat and Adobe Acrobat Reader affecting multiple versions on Windows and macOS. Affected versions include Adobe Acrobat DC Continuous (26.001.21411) and earlier, and Adobe Acrobat 2024 Classic (24.001.30362 and earlier on Windows; 24.001.30360 and earlier on macOS). An attacker may execute arbitrary code by convincing a user to open malicious content leveraging the vulnerability. Users are advised to update to the latest versions: Adobe Acrobat DC Continuous (26.001.21431) or Adobe Acrobat 2024 Classic (24.001.30365).
Microsoft April 2026 Security Updates Fix Critical Vulnerabilities
JPCERT/CC issued alert JPCERT-AT-2026-0010 on April 15, 2026, reporting that Microsoft released April 2026 Security Updates addressing multiple vulnerabilities in Microsoft products. Attackers could exploit these vulnerabilities to perform network spoofing or execute arbitrary code remotely without authentication. Among the vulnerabilities disclosed, CVE-2026-32201 (Microsoft SharePoint Server Spoofing Vulnerability) has been confirmed as actively exploited in the wild. JPCERT recommends applying security updates via Microsoft Update, Windows Update, or the Microsoft Update Catalog.
Get daily alerts for JPCERT EN alerts alt
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source details
Activity
Browse Categories
Get JPCERT EN alerts alt alerts
We'll email you when JPCERT EN alerts alt publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.