CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/1/2026, 12:25:01 PM
Entries
- 2022-09-15: [CVE-2013-2597] Code Aurora ACDB Audio Driver Stack-based Buffer Overflow Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-15: [CVE-2013-2596] Linux Kernel Integer Overflow Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-15: [CVE-2013-2094] Linux Kernel Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-15: [CVE-2010-2568] Microsoft Windows Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-14: [CVE-2022-37969] Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-14: [CVE-2022-32917] Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-08: [CVE-2022-3075] Google Chromium Mojo Insufficient Data Validation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-08: [CVE-2022-27593] QNAP Photo Station Externally Controlled Reference Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-08: [CVE-2022-26258] D-Link DIR-820L Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-09-08: [CVE-2020-9934] Apple iOS, iPadOS, and macOS Input Validation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM