KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 304,048 vulnerabilities in the CVE database. Whilst only 0.7% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.7% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2016-10174 NETGEAR CISA
CVE-2016-0752 Ruby on Rails CISA
CVE-2019-0903 Microsoft CISA
CVE-2015-3035 TP-LINK CISA
CVE-2015-1427 Elastic CISA
CVE-2015-1187 ["D-Link", "TRENDnet"] CISA
CVE-2015-0666 Cisco CISA
CVE-2014-6332 Microsoft CISA
CVE-2014-6324 Microsoft CISA
CVE-2014-6287 Rejetto CISA
CVE-2014-3120 Elastic CISA
CVE-2014-0130 Ruby on Rails CISA
CVE-2013-5223 D-Link CISA
CVE-2013-4810 HP CISA
CVE-2013-2251 Apache Software Foundation CISA
CVE-2012-1823 PHP CISA
CVE-2010-4345 Exim CISA
CVE-2010-4344 Exim CISA
CVE-2010-3035 Cisco CISA
CVE-2010-2861 Adobe CISA
CVE-2009-2055 Cisco CISA
CVE-2009-1151 phpMyAdmin CISA
CVE-2009-0927 Adobe CISA
CVE-2005-2773 HP CISA
CVE-2019-6340 Drupal CISA
Displaying vulnerabilities 1301 - 1325 of 2008 in total