KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 298,191 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2016-7200 Microsoft CISA
CVE-2016-7201 Microsoft CISA
CVE-2017-0037 Microsoft CISA
CVE-2017-0059 Microsoft CISA
CVE-2017-0213 Microsoft CISA
CVE-2018-8405 Microsoft CISA
CVE-2018-8406 Microsoft CISA
CVE-2018-8440 Microsoft CISA
CVE-2019-7483 SonicWall CISA
CVE-2021-20028 SonicWall CISA
CVE-2016-0151 Microsoft CISA
CVE-2012-2539 Microsoft CISA
CVE-2016-0040 Microsoft CISA
CVE-2015-2426 Microsoft CISA
CVE-2015-2419 Microsoft CISA
CVE-2015-1770 Microsoft CISA
CVE-2013-3660 Microsoft CISA
CVE-2013-2729 Adobe CISA
CVE-2013-2551 Microsoft CISA
CVE-2013-2465 Oracle CISA
CVE-2013-1690 Mozilla CISA
CVE-2012-5076 Oracle CISA
CVE-2021-34486 Microsoft CISA
CVE-2021-38646 Microsoft CISA
CVE-2022-0543 Debian CISA
Displaying vulnerabilities 1101 - 1125 of 1856 in total