CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.

Fediverse name:
Fediverse URL:
Feed URL: https://rud.is/cisa-kev.rss
Website: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 2025-04-29T04:22:02.463487Z

Entries