KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 298,186 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2020-2021 Palo Alto Networks CISA
CVE-2020-2506 QNAP Systems Inc. CISA
CVE-2020-25223 n/a CISA
CVE-2020-5410 Spring by VMware CISA
CVE-2020-7247 n/a CISA
CVE-2020-9054 ZyXEL CISA
CVE-2020-9377 n/a CISA
CVE-2021-22941 n/a CISA
CVE-2021-42237 n/a CISA
CVE-2019-6340 Drupal CISA
CVE-2005-2773 HP CISA
CVE-2009-0927 Adobe CISA
CVE-2009-1151 phpMyAdmin CISA
CVE-2009-2055 Cisco CISA
CVE-2010-2861 Adobe CISA
CVE-2010-3035 Cisco CISA
CVE-2010-4344 Exim CISA
CVE-2010-4345 Exim CISA
CVE-2012-1823 PHP CISA
CVE-2013-2251 Apache Software Foundation CISA
CVE-2013-4810 HP CISA
CVE-2013-5223 D-Link CISA
CVE-2014-0130 Ruby on Rails CISA
CVE-2014-3120 Elastic CISA
CVE-2014-6287 Rejetto CISA
Displaying vulnerabilities 1151 - 1175 of 1857 in total