CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/10/2026, 9:26:16 AM
Entries
- 2022-03-31: [CVE-2022-1040] Sophos Firewall Authentication Bypass Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-31: [CVE-2021-34484] Microsoft Windows User Profile Service Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-31: [CVE-2021-28799] QNAP NAS Improper Authorization Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-31: [CVE-2021-21551] Dell dbutil Driver Insufficient Access Control Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-31: [CVE-2018-10562] Dasan GPON Routers Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-31: [CVE-2018-10561] Dasan GPON Routers Authentication Bypass Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-28: [CVE-2022-1096] Google Chromium V8 Type Confusion Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-28: [CVE-2022-0543] Debian-specific Redis Server Lua Sandbox Escape Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-28: [CVE-2021-38646] Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:09 PM - 2022-03-28: [CVE-2021-34486] Microsoft Windows Event Tracing Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:09 PM