CISAKevBot
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
Fediverse name: Text copied!
Fediverse URL: Text copied!
Feed URL: https://rud.is/cisa-kev.rssWebsite: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Refreshed at: 1/13/2026, 9:44:59 PM
Entries
- 2022-01-10: [CVE-2018-13383] Fortinet FortiOS and FortiProxy Out-of-bounds Write
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2019-1579] Palo Alto Networks PAN-OS Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2019-10149] Exim Mail Transfer Agent (MTA) Improper Input Validation
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2015-7450] IBM WebSphere Application Server and Server Hypervisor Edition Code Injection.
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2017-1000486] Primetek Primefaces Remote Code Execution Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2019-7609] Kibana Arbitrary Code Execution
Posted at: 12/24/2024, 8:21:07 PM - 2022-01-10: [CVE-2021-27860] FatPipe WARP, IPVPN, and MPVPN Configuration Upload exploit
Posted at: 12/24/2024, 8:21:07 PM - 2021-12-15: [CVE-2021-43890] Microsoft Windows AppX Installer Spoofing Vulnerability
Posted at: 12/24/2024, 8:21:07 PM - 2021-12-15: [CVE-2021-4102] Google Chromium V8 Use-After-Free Vulnerability
Posted at: 12/24/2024, 8:21:06 PM - 2021-12-10: [CVE-2021-44515] Zoho Desktop Central Authentication Bypass Vulnerability
Posted at: 12/24/2024, 8:21:06 PM