KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 298,176 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2014-6324 Microsoft CISA
CVE-2014-6332 Microsoft CISA
CVE-2015-0666 Cisco CISA
CVE-2015-1187 ["D-Link", "TRENDnet"] CISA
CVE-2015-1427 Elastic CISA
CVE-2015-3035 TP-LINK CISA
CVE-2015-4068 Arcserve CISA
CVE-2016-0752 Ruby on Rails CISA
CVE-2016-10174 NETGEAR CISA
CVE-2016-11021 D-Link CISA
CVE-2016-1555 NETGEAR CISA
CVE-2016-4171 Adobe CISA
CVE-2016-7892 Adobe CISA
CVE-2017-0146 Microsoft CISA
CVE-2017-12615 Apache Software Foundation CISA
CVE-2017-12617 Apache Software Foundation CISA
CVE-2017-3881 Cisco CISA
CVE-2022-21999 Microsoft CISA
CVE-2022-26143 n/a CISA
CVE-2022-26318 n/a CISA
CVE-2019-1322 Microsoft CISA
CVE-2019-1253 Microsoft CISA
CVE-2019-1132 Microsoft CISA
CVE-2019-1129 Microsoft CISA
CVE-2019-1069 Microsoft CISA
Displaying vulnerabilities 1176 - 1200 of 1857 in total