KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 297,631 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2024-3273 D-Link CISA
CVE-2024-3272 D-Link CISA
CVE-2024-26234 Microsoft Microsoft CVRF
CVE-2024-26745 Linux CVE
CVE-2024-29745 Google CISA
CVE-2024-29748 Google CISA
CVE-2023-24955 Microsoft CISA
CVE-2021-44529 Ivanti CISA
CVE-2019-7256 Linear CISA
CVE-2023-48788 Fortinet CISA
CVE-2024-27198 JetBrains CISA
CVE-2024-23296 Apple CISA
CVE-2024-23225 Apple CISA
CVE-2021-36380 n/a CISA
CVE-2023-21237 n/a CISA
CVE-2024-21338 Microsoft CISA
CVE-2023-52499 Linux CVE
CVE-2023-29360 Microsoft CISA
CVE-2024-1709 ConnectWise CISA
CVE-2020-3259 Cisco CISA
CVE-2024-21410 Microsoft CISA
CVE-2024-21351 Microsoft CISA
CVE-2024-21412 Microsoft CISA
CVE-2023-43770 n/a CISA
CVE-2024-21762 Fortinet CISA
Displaying vulnerabilities 551 - 575 of 1852 in total