CISA Known Exploited Vulnerabilities (KEV) Catalog

TOP VENDORS

C3.js CISA Top 5 Chart

CATALOG TOTALS

C3.js CISA Donut Chart

KEV TREND

Ransomware Use


Common Weaknesses

Security Vendors

Web Code & Tech

Infrastructure

Endpoints


CVE ID Vendor / Project Date Added Short Description Ransomware Use

CVE FAQs

The CISA Known Exploited Vulnerabilities (KEV) catalog focuses on vulnerabilities confirmed to be actively exploited in real-world attacks, making it far more valuable for patch prioritisation than the broader CVE list. While thousands of CVEs are published every year, only a smaller subset are actively targeted by threat actors, ransomware groups, and automated exploitation campaigns.

By using this site, you agree to our Terms & Conditions.

COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.

Terms & Privacy Policy