CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/12/2026, 12:16:22 AM
Entries
- 2022-03-25: [CVE-2020-1956] Apache Kylin OS Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2020-1631] Juniper Junos OS Path Traversal Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-6340] Drupal Core Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-2616] Oracle BI Publisher Unauthorized Access Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-16920] D-Link Multiple Routers Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-15107] Webmin Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-12991] Citrix SD-WAN and NetScaler Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-12989] Citrix SD-WAN and NetScaler SQL Injection Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-11043] PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability
Posted at: 12/24/2024, 8:21:08 PM - 2022-03-25: [CVE-2019-10068] Kentico Xperience Deserialization of Untrusted Data Vulnerability
Posted at: 12/24/2024, 8:21:08 PM