KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 297,780 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2017-12319 Cisco CISA
CVE-2017-6627 Cisco CISA
CVE-2017-6663 Cisco CISA
CVE-2017-6736 Cisco CISA
CVE-2017-6737 Cisco CISA
CVE-2017-6738 Cisco CISA
CVE-2017-6739 Cisco CISA
CVE-2017-6740 Cisco CISA
CVE-2017-6743 Cisco CISA
CVE-2017-6744 Cisco CISA
CVE-2017-8540 Microsoft CISA
CVE-2018-0151 Cisco CISA
CVE-2018-0154 Cisco CISA
CVE-2018-0155 Cisco CISA
CVE-2018-0156 Cisco CISA
CVE-2018-0158 Cisco CISA
CVE-2018-0159 Cisco CISA
CVE-2018-0161 Cisco CISA
CVE-2018-0167 Cisco CISA
CVE-2018-0172 Cisco CISA
CVE-2018-0173 Cisco CISA
CVE-2018-0174 Cisco CISA
CVE-2018-0175 Cisco CISA
CVE-2018-0179 Cisco CISA
CVE-2018-0180 Cisco CISA
Displaying vulnerabilities 1276 - 1300 of 1853 in total