KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 297,721 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2023-49897 FXC Inc. CISA
CVE-2023-6448 Unitronics CISA
CVE-2023-50428 n/a CVE
CVE-2023-41266 n/a CISA
CVE-2023-41265 n/a CISA
CVE-2022-22071 Qualcomm, Inc. CISA
CVE-2023-33063 Qualcomm, Inc. CISA
CVE-2023-33106 Qualcomm, Inc. CISA
CVE-2023-33107 Qualcomm, Inc. CISA
CVE-2023-42917 Apple CISA
CVE-2023-42916 Apple CISA
CVE-2023-6345 Google CISA
CVE-2023-49103 n/a CISA
CVE-2023-4911 , Red Hat CISA
CVE-2023-36584 Microsoft CISA
CVE-2020-2551 Oracle Corporation CISA
CVE-2023-1671 Sophos CISA
CVE-2023-47630 kyverno CVE
CVE-2023-36033 Microsoft CISA
CVE-2023-36036 Microsoft CISA
CVE-2023-36025 Microsoft CISA
CVE-2023-42813 kyverno CVE
CVE-2023-42814 kyverno CVE
CVE-2023-42815 kyverno CVE
CVE-2023-42816 kyverno CVE
Displaying vulnerabilities 601 - 625 of 1853 in total