
CISA Known Exploited Vulnerabilities Catalog
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Fediverse URL: Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 2025-04-29T04:22:02.463487Z
Entries
-
2025-04-28: [CVE-2025-1976] Broadcom Brocade Fabric OS Code Injection Vulnerability
Posted at: 2025-04-29 00:28 -
2025-04-28: [CVE-2025-42599] Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability
Posted at: 2025-04-29 00:28 -
2025-04-28: [CVE-2025-3928] Commvault Web Server Unspecified Vulnerability
Posted at: 2025-04-29 00:28 -
2025-04-17: [CVE-2025-24054] Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability
Posted at: 2025-04-17 21:19 -
2025-04-17: [CVE-2025-31201] Apple Multiple Products Arbitrary Read and Write Vulnerability
Posted at: 2025-04-17 21:19 -
2025-04-17: [CVE-2025-31200] Apple Multiple Products Memory Corruption Vulnerability
Posted at: 2025-04-17 21:19 -
2025-04-16: [CVE-2021-20035] SonicWall SMA100 Appliances OS Command Injection Vulnerability
Posted at: 2025-04-16 18:02 -
2025-04-09: [CVE-2024-53150] Linux Kernel Out-of-Bounds Read Vulnerability
Posted at: 2025-04-09 20:38 -
2025-04-09: [CVE-2024-53197] Linux Kernel Out-of-Bounds Access Vulnerability
Posted at: 2025-04-09 20:38 -
2025-04-08: [CVE-2025-29824] Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability
Posted at: 2025-04-08 21:30