Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Commonly exploited software vulnerabilities targeting critical networks

Introduction

  1. This product provides an overview of the most common application vulnerabilities that were exploited to target critical infrastructure organisations and networks of national importance.
  2. This assessment was developed in collaboration with our partners in the United States, United Kingdom, Canada, and New Zealand. The prioritised vulnerabilities and corresponding mitigation measures outlined in this document represent the shared judgement of all participating entities.

 

Date
June 1st, 2015