CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 12/30/2025, 10:51:12 AM
Entries
- 2025-02-11: [CVE-2025-21391] Microsoft Windows Storage Link Following Vulnerability
Posted at: 2/11/2025, 7:18:02 PM - 2025-02-07: [CVE-2025-0994] Trimble Cityworks Deserialization Vulnerability
Posted at: 2/7/2025, 9:02:08 PM - 2025-02-06: [CVE-2020-15069] Sophos XG Firewall Buffer Overflow Vulnerability
Posted at: 2/6/2025, 6:36:01 PM - 2025-02-06: [CVE-2020-29574] CyberoamOS (CROS) SQL Injection Vulnerability
Posted at: 2/6/2025, 6:36:01 PM - 2025-02-06: [CVE-2024-21413] Microsoft Outlook Improper Input Validation Vulnerability
Posted at: 2/6/2025, 6:36:01 PM - 2025-02-06: [CVE-2022-23748] Dante Discovery Process Control Vulnerability
Posted at: 2/6/2025, 6:36:01 PM - 2025-02-06: [CVE-2025-0411] 7-Zip Mark of the Web Bypass Vulnerability
Posted at: 2/6/2025, 6:36:01 PM - 2025-02-05: [CVE-2024-53104] Linux Kernel Out-of-Bounds Write Vulnerability
Posted at: 2/5/2025, 4:10:14 PM - 2025-02-04: [CVE-2018-19410] Paessler PRTG Network Monitor Local File Inclusion Vulnerability
Posted at: 2/4/2025, 5:33:05 PM - 2025-02-04: [CVE-2018-9276] Paessler PRTG Network Monitor OS Command Injection Vulnerability
Posted at: 2/4/2025, 5:33:05 PM