KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 304,517 vulnerabilities in the CVE database. Whilst only 0.7% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.7% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2017-0037 Microsoft Corporation CISA
CVE-2016-7201 Microsoft CISA
CVE-2016-7200 Microsoft CISA
CVE-2016-0189 Microsoft CISA
CVE-2016-0151 Microsoft CISA
CVE-2016-0040 Microsoft CISA
CVE-2015-2426 Microsoft CISA
CVE-2015-2419 Microsoft CISA
CVE-2015-1770 Microsoft CISA
CVE-2013-3660 Microsoft CISA
CVE-2013-2729 Adobe CISA
CVE-2013-2551 Microsoft CISA
CVE-2013-2465 Oracle CISA
CVE-2013-1690 Mozilla CISA
CVE-2012-5076 Oracle CISA
CVE-2012-2539 Microsoft CISA
CVE-2012-2034 Adobe CISA
CVE-2012-0518 Oracle CISA
CVE-2011-2005 Microsoft CISA
CVE-2018-8405 Microsoft CISA
CVE-2010-4398 Microsoft CISA
CVE-2017-0213 Microsoft Corporation CISA
CVE-2022-1096 Google CISA
CVE-2022-0543 Debian CISA
CVE-2021-38646 Microsoft CISA
Displaying vulnerabilities 1251 - 1275 of 2010 in total