CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/13/2026, 10:54:28 AM
Entries
- 2022-02-22: [CVE-2022-23134] Zabbix Frontend Improper Access Control Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2022-24086] Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2022-0609] Google Chromium Animation Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2019-0752] Microsoft Internet Explorer Type Confusion Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2018-8174] Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2018-20250] WinRAR Absolute Path Traversal Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2018-15982] Adobe Flash Player Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2017-9841] PHPUnit Command Injection Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2014-1761] Microsoft Word Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-02-15: [CVE-2013-3906] Microsoft Graphics Component Memory Corruption Vulnerability
Posted at: 12/24/2024, 8:21:07 PM