CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 12/31/2025, 5:38:24 AM
Entries
- 2023-10-03: [CVE-2023-4211] Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-10-02: [CVE-2023-5217] Google Chromium libvpx Heap Buffer Overflow Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-28: [CVE-2018-14667] Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-25: [CVE-2023-41991] Apple Multiple Products Improper Certificate Validation Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-25: [CVE-2023-41992] Apple Multiple Products Kernel Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-25: [CVE-2023-41993] Apple Multiple Products WebKit Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-21: [CVE-2023-41179] Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-19: [CVE-2023-28434] MinIO Security Feature Bypass Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-18: [CVE-2022-22265] Samsung Mobile Devices Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:11 PM - 2023-09-18: [CVE-2014-8361] Realtek SDK Improper Input Validation Vulnerability
Posted at: 12/24/2024, 8:21:11 PM