KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 298,222 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2017-0022 Microsoft CISA
CVE-2017-0147 Microsoft CISA
CVE-2018-19943 QNAP Systems Inc. CISA
CVE-2018-19949 QNAP Systems Inc. CISA
CVE-2018-19953 QNAP Systems Inc. CISA
CVE-2018-8611 Microsoft CISA
CVE-2016-3298 Microsoft CISA
CVE-2016-6367 Cisco CISA
CVE-2016-6366 Cisco CISA
CVE-2016-4657 Apple CISA
CVE-2016-4656 Apple CISA
CVE-2016-4655 Apple CISA
CVE-2016-3351 Microsoft CISA
CVE-2016-0162 Microsoft CISA
CVE-2019-13720 Google CISA
CVE-2019-0703 Microsoft CISA
CVE-2019-5786 Google CISA
CVE-2019-0676 Microsoft CISA
CVE-2019-7287 Apple CISA
CVE-2019-7286 Apple CISA
CVE-2020-0638 Microsoft CISA
CVE-2020-1027 Microsoft CISA
CVE-2021-30883 Apple CISA
CVE-2021-0920 n/a CISA
CVE-2021-1048 n/a CISA
Displaying vulnerabilities 1001 - 1025 of 1856 in total