CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/1/2026, 10:41:29 AM
Entries
- 2022-10-20: [CVE-2021-3493] Linux Kernel Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-10-11: [CVE-2022-40684] Fortinet Multiple Products Authentication Bypass Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-10-11: [CVE-2022-41033] Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-30: [CVE-2022-41082] Microsoft Exchange Server Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-30: [CVE-2022-41040] Microsoft Exchange Server Server-Side Request Forgery Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-30: [CVE-2022-36804] Atlassian Bitbucket Server and Data Center Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-23: [CVE-2022-3236] Sophos Firewall Code Injection Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-22: [CVE-2022-35405] Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-15: [CVE-2022-40139] Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-15: [CVE-2013-6282] Linux Kernel Improper Input Validation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM