CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 12/29/2025, 5:54:09 AM
Entries
- 2025-10-30: [CVE-2025-41244] Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability
Posted at: 10/30/2025, 7:33:04 PM - 2025-10-30: [CVE-2025-24893] XWiki Platform Eval Injection Vulnerability
Posted at: 10/30/2025, 7:33:04 PM - 2025-10-28: [CVE-2025-6204] Dassault Systèmes DELMIA Apriso Code Injection Vulnerability
Posted at: 10/28/2025, 7:28:08 PM - 2025-10-28: [CVE-2025-6205] Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability
Posted at: 10/28/2025, 7:28:08 PM - 2025-10-24: [CVE-2025-54236] Adobe Commerce and Magento Improper Input Validation Vulnerability
Posted at: 10/24/2025, 7:37:03 PM - 2025-10-24: [CVE-2025-59287] Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability
Posted at: 10/24/2025, 7:37:03 PM - 2025-10-22: [CVE-2025-61932] Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
Posted at: 10/22/2025, 7:56:02 PM - 2025-10-20: [CVE-2022-48503] Apple Multiple Products Unspecified Vulnerability
Posted at: 10/20/2025, 4:19:06 PM - 2025-10-20: [CVE-2025-2746] Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability
Posted at: 10/20/2025, 4:19:06 PM - 2025-10-20: [CVE-2025-2747] Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability
Posted at: 10/20/2025, 4:19:06 PM