KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 297,779 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2023-3079 Google CISA
CVE-2023-33009 Zyxel CISA
CVE-2023-33010 Zyxel CISA
CVE-2023-34362 n/a CISA
CVE-2023-27640 n/a CVE
CVE-2023-27639 n/a CVE
CVE-2023-28771 Zyxel CISA
CVE-2023-2868 Barracuda CISA
CVE-2023-32373 Apple CISA
CVE-2023-28204 Apple CISA
CVE-2023-32409 Apple CISA
CVE-2023-33297 n/a CVE
CVE-2004-1464 Cisco CISA
CVE-2023-21492 Samsung Mobile CISA
CVE-2016-6415 Cisco CISA
CVE-2023-32243 WPDeveloper Wordfence
CVE-2023-25717 n/a CISA
CVE-2015-5317 Jenkins CISA
CVE-2010-3904 Linux CISA
CVE-2016-3427 Oracle CISA
CVE-2014-0196 Linux CISA
CVE-2016-8735 Apache Software Foundation CISA
CVE-2021-3560 n/a CISA
CVE-2023-24932 Microsoft CVE
CVE-2023-29336 Microsoft CISA
Displaying vulnerabilities 726 - 750 of 1853 in total