CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/13/2026, 4:31:27 AM
Entries
- 2022-03-03: [CVE-2015-4902] Oracle Java SE Integrity Check Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-3043] Adobe Flash Player Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-2590] Oracle Java SE and Java SE Embedded Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-2545] Microsoft Office Malformed EPS File Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-2424] Microsoft PowerPoint Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-2387] Microsoft ATM Font Driver Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-1701] Microsoft Win32k Privilege Escalation Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2015-1642] Microsoft Office Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2014-4114] Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-03-03: [CVE-2014-0496] Adobe Reader and Acrobat Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:07 PM