Recorded Future

Criminal Underground Continues to Target Microsoft Products in Top 2019 Exploited Vulnerabilities List

Published by Recorded Future

This report provides insight into which vulnerabilities in 2019, across multiple CVE years, were most exploited on criminal underground sources. Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or remote access trojans impact Microsoft products. Four of these vulnerabilities impact Internet Explorer. Despite experiencing a drop in browser usage, Internet Explorer is still running in many enterprise environments, making it a top target for threat actors.

Many vulnerability and patch management teams face the challenge of keeping up with countless product patch updates without having visibility into which vulnerabilities are actively exploited by cybercriminals.

Download Now


Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email

Related Categories IT Security & Cybersecurity , Authentication & Access Systems, IT Threats & Vulnerabilities, Data recovery, Data Loss Prevention (DLP), Disaster Recovery, Mobile Security, Email Security, Firewall, Log Management, Event Management, VPN, Malware, Endpoint Security, Network Security, Security Solutions, Security Management, Microsoft Office, SAN, AIM