CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/1/2026, 7:21:31 PM
Entries
- 2022-07-29: [CVE-2022-26138] Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-07-12: [CVE-2022-22047] Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-07-01: [CVE-2022-26925] Microsoft Windows LSA Spoofing Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2022-29499] Mitel MiVoice Connect Data Validation Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2021-30533] Google Chromium PopupBlocker Security Bypass Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2021-4034] Red Hat Polkit Out-of-Bounds Read and Write Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2021-30983] Apple iOS and iPadOS Buffer Overflow Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2020-3837] Apple Multiple Products Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2020-9907] Apple Multiple Products Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:10 PM - 2022-06-27: [CVE-2019-8605] Apple Multiple Products Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:10 PM