KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 298,222 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2021-30883 Apple CISA
CVE-2021-0920 n/a CISA
CVE-2021-1048 n/a CISA
CVE-2022-20821 Cisco CISA
CVE-2019-13720 Google CISA
CVE-2019-11708 Mozilla CISA
CVE-2019-8720 WebKit CISA
CVE-2019-18426 Facebook CISA
CVE-2019-1385 Microsoft CISA
CVE-2019-1130 Microsoft CISA
CVE-2018-5002 Adobe CISA
CVE-2022-30525 Zyxel CISA
CVE-2022-22947 n/a CISA
CVE-2022-1388 F5 CISA
CVE-2021-1789 Apple CISA
CVE-2014-0160 OpenSSL CISA
CVE-2014-0322 Microsoft CISA
CVE-2014-4113 Microsoft CISA
CVE-2019-8506 Apple CISA
CVE-2022-26904 Microsoft CISA
CVE-2022-29464 n/a CISA
CVE-2019-1003029 Jenkins project CISA
CVE-2021-40450 Microsoft CISA
CVE-2021-41357 Microsoft CISA
CVE-2022-0847 n/a CISA
Displaying vulnerabilities 1026 - 1050 of 1857 in total