CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 12/29/2025, 4:32:12 PM
Entries
- 2025-07-02: [CVE-2025-6554] Google Chromium V8 Type Confusion Vulnerability
Posted at: 7/2/2025, 5:52:04 PM - 2025-07-01: [CVE-2025-48928] TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability
Posted at: 7/1/2025, 6:24:04 PM - 2025-07-01: [CVE-2025-48927] TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability
Posted at: 7/1/2025, 6:24:04 PM - 2025-06-30: [CVE-2025-6543] Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability
Posted at: 6/30/2025, 6:56:05 PM - 2025-06-25: [CVE-2019-6693] Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability
Posted at: 6/25/2025, 5:24:08 PM - 2025-06-25: [CVE-2024-0769] D-Link DIR-859 Router Path Traversal Vulnerability
Posted at: 6/25/2025, 5:24:08 PM - 2025-06-25: [CVE-2024-54085] AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability
Posted at: 6/25/2025, 5:24:08 PM - 2025-06-17: [CVE-2023-0386] Linux Kernel Improper Ownership Management Vulnerability
Posted at: 6/17/2025, 8:21:08 PM - 2025-06-16: [CVE-2023-33538] TP-Link Multiple Routers Command Injection Vulnerability
Posted at: 6/16/2025, 8:45:07 PM - 2025-06-16: [CVE-2025-43200] Apple Multiple Products Unspecified Vulnerability
Posted at: 6/16/2025, 8:45:07 PM