2026年4月13日星期一

Adobe Acrobat 遠端執行程式碼漏洞

Adobe Acrobat 遠端執行程式碼漏洞

發佈日期: 2026年04月13日

風險: 高度風險

類型: 用戶端 - 辦公室應用

於 Adobe Acrobat 發現一個漏洞。遠端攻擊者可利用這個漏洞於目標系統觸發遠端執行任意程式碼。 

 

注意:

CVE‑2026‑34621 正在被廣泛利用。其受「物件原型屬性控制不當的修改」(“原型污染”)漏洞的影響。成功利用該漏洞可能導致在當前使用者權限下執行任意程式碼。該漏洞的利用需要用戶互動,即受害者必須打開惡意文件。因此,該漏洞的風險等級被評為高度風險。


影響

  • 遠端執行程式碼

受影響之系統或技術

  • Acrobat DC 26.001.21367 及以前版本
  • Acrobat Reader DC 26.001.21367 及以前版本
  • Acrobat 2024 24.001.30356 及以前版本

解決方案

在安裝軟體之前,請先瀏覽軟體供應商之網站,以獲得更多詳細資料。

 

更新至:

  • Acrobat DC: 26.001.21411 及之後版本

  • Acrobat Reader DC: 26.001.21411 及之後版本

  • Acrobat 2024 (for macOS): 24.001.30360 及之後版本

  • Acrobat 2024 (for Windows): 24.001.30362 及之後版本


漏洞識別碼


資料來源


相關連結

Adobe Acrobat Remote Code Execution Vulnerability

Adobe Acrobat Remote Code Execution Vulnerability

Release Date: 13 Apr 2026

RISK: High Risk

TYPE: Clients - Productivity Products

A vulnerability was identified in Adobe Acrobat. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system.

 

Note:

CVE-2026-34621 is being exploited in the wild. It was affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Hence, the risk level is rated as High Risk.


Impact

  • Remote Code Execution

System / Technologies affected

  • Acrobat DC: version 26.001.21367 and earlier
  • Acrobat Reader DC: version 26.001.21367 and earlier

  • Acrobat 2024: version 24.001.30356 and earlier


Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

 

Update to:

  • Acrobat DC: version 26.001.21411 or later

  • Acrobat Reader DC: version 26.001.21411 or later

  • Acrobat 2024 (for macOS): version 24.001.30360 or later

  • Acrobat 2024 (for Windows): version 24.001.30362 or later


Vulnerability Identifier


Source


Related Link

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年04月13日

風險: 高度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改、洩露敏感資料及彷冒。

 

注意:

CVE-2026-5281 正在被廣泛利用。該漏洞允許已經入侵渲染程序的遠端攻擊者,透過精心製作的 HTML 網頁觸發遠端執行任意程式碼。因此,該漏洞的風險等級被評為高度風險。


影響

  • 遠端執行程式碼
  • 阻斷服務
  • 資料洩露
  • 繞過保安限制
  • 篡改
  • 仿冒

受影響之系統或技術

  • Microsoft Edge 147.0.3912.60 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 147.0.3912.60 或之後版本

漏洞識別碼


資料來源


相關連結

Microsoft Edge Multiple Vulnerabilities

Microsoft Edge Multiple Vulnerabilities

Release Date: 13 Apr 2026

RISK: High Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation, sensitive information disclosure and spoofing on the targeted system.

 

Note:

CVE-2026-5281 is being exploited in the wild.  The vulnerability allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Hence, the risk level is rated as High Risk.


Impact

  • Remote Code Execution
  • Denial of Service
  • Information Disclosure
  • Security Restriction Bypass
  • Data Manipulation
  • Spoofing

System / Technologies affected

  • Microsoft Edge version prior to 147.0.3912.60

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 147.0.3912.60 or later

Vulnerability Identifier


Source


Related Link

2026年4月10日星期五

GitLab 多個漏洞

GitLab 多個漏洞

發佈日期: 2026年04月10日

風險: 中度風險

類型: 伺服器 - 其他伺服器

於 GitLab 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 跨網站指令碼
  • 篡改
  • 資料洩露

受影響之系統或技術

  • GitLab Community Edition (CE) 18.10.3, 18.9.5, 18.8.9 以前的版本
  • GitLab Enterprise Edition (EE) 18.10.3, 18.9.5, 18.8.9 以前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

GitLab Multiple Vulnerabilities

GitLab Multiple Vulnerabilities

Release Date: 10 Apr 2026

RISK: Medium Risk

TYPE: Servers - Other Servers

Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Cross-Site Scripting
  • Data Manipulation
  • Information Disclosure

System / Technologies affected

  • GitLab Community Edition (CE) versions prior to 18.10.3, 18.9.5, 18.8.9
  • GitLab Enterprise Edition (EE) versions prior to 18.10.3, 18.9.5, 18.8.9

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

F5 產品阻斷服務漏洞

F5 產品阻斷服務漏洞

發佈日期: 2026年04月10日

風險: 高度風險

類型: 操作系統 - Network

於 F5 產品發現一個漏洞。遠端攻擊者可利用這漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。

 

注意:

受影響之系統或技術暫無可修補 CVE-2025-54410 的修補程式或臨時處理方法。因此,風險等級評為高度風險。

 

影響

  • 阻斷服務
  • 資料洩露

受影響之系統或技術

BIG-IP Next SPK

 

  • 2.0.0 - 2.0.3
  • 1.7.0 - 1.9.2

 

BIG-IP Next CNF

 

  • 2.0.0 - 2.2.1
  • 1.1.0 - 1.4.1

 

BIG-IP Next for Kubernetes

 

  • 2.0.0 - 2.2.1
 

解決方案

  • 到目前為此,也沒有相關漏洞的修補程式

漏洞識別碼


資料來源


相關連結

https://my.f5.com/manage/s/article/K000160663

F5 Products Denial of Service Vulnerability

F5 Products Denial of Service Vulnerability

Release Date: 10 Apr 2026

RISK: High Risk

TYPE: Operating Systems - Networks OS

A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger denial of service condition and sensitive information disclosure on the targeted system.

 

Note:

No patch or mitigation is currently available for CVE-2025-54410 of the affected products. Hence, the risk level is rated as High Risk.


Impact

  • Denial of Service
  • Information Disclosure

System / Technologies affected

BIG-IP Next SPK

 

  • 2.0.0 - 2.0.3
  • 1.7.0 - 1.9.2

 

BIG-IP Next CNF

 

  • 2.0.0 - 2.2.1
  • 1.1.0 - 1.4.1

 

BIG-IP Next for Kubernetes

 

  • 2.0.0 - 2.2.1
 

Solutions

  • No solution was available at the time of this vulnerability

Vulnerability Identifier


Source


Related Link

https://my.f5.com/manage/s/article/K000160663

Juniper Junos OS 多個漏洞

Juniper Junos OS 多個漏洞

發佈日期: 2026年04月10日

風險: 中度風險

類型: 操作系統 - Network

於 Juniper Junos OS 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發彷冒、資料篡改、遠端執行程式碼、阻斷服務狀況、洩露敏感資料、權限提升及繞過保安限制。


影響

  • 阻斷服務
  • 資料洩露
  • 繞過保安限制
  • 權限提升
  • 遠端執行程式碼
  • 仿冒
  • 篡改

受影響之系統或技術

  • Junos OS
  • Junos OS Evolved

詳情請參閱以下連結﹕

https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_articletype=Security%20Advisories&numberOfResults=25


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

請參閱 2026-04 安全公告


漏洞識別碼


資料來源


相關連結

Juniper Junos OS Multiple Vulnerabilities

Juniper Junos OS Multiple Vulnerabilities

Release Date: 10 Apr 2026

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger spoofing, data manipulation, remote code execution, denial of service condition, sensitive information disclosure, elevation of privilege and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Information Disclosure
  • Security Restriction Bypass
  • Elevation of Privilege
  • Remote Code Execution
  • Spoofing
  • Data Manipulation

System / Technologies affected

  • Junos OS
  • Junos OS Evolved

Please refer to the link below for detail:

https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_articletype=Security%20Advisories&numberOfResults=25


Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Please refer to 2026-04 Security Bulletin.


Vulnerability Identifier


Source


Related Link

Adobe Acrobat 遠端執行程式碼漏洞

Adobe Acrobat 遠端執行程式碼漏洞 發佈日期: 2026年04月13日 風險: 高度風險 類型: 用戶端 - 辦公室應用 於 Ado...