KEVIntel

Known Exploited Vulnerabilities

Focus on What Matters

There are 297,496 vulnerabilities in the CVE database. Whilst only 0.6% are ever actively exploited.

This list contains the vulnerabilities that are actively exploited by malware and threat actors that you should prioritize first.

0.6% Exploited

This table displays known exploited vulnerabilities (KEVs) that have been cataloged from over 60 public sources, including CISA, and our own private sensors. Each entry links to a CVE identifier, where the CVE details are enriched with EPSS scores, online mentions, scanner inclusion, exploitation, tags, and other metadata. The goal is to be an early warning system, even before being published by CISA. More data and features coming soon!

CVE ID Vendor Source
CVE-2019-17049 NETGEAR CVE
CVE-2018-18472 Western Digital CVE
CVE-2018-18852 Cerio CVE
CVE-2019-6703 Calmar Webmedia Wordfence
CVE-2018-19207 Van Ons CVE
CVE-2018-18956 Suricata CVE
CVE-2018-11687 Bitcoin Red CVE
CVE-2018-11529 VideoLAN CVE
CVE-2018-11329 n/a CVE
CVE-2018-11239 n/a CVE
CVE-2018-10831 n/a CVE
CVE-2018-10657 Matrix.org CVE
CVE-2018-10468 n/a CVE
CVE-2018-10376 SmartMesh CVE
CVE-2018-10299 Beauty Chain CVE
CVE-2017-2404 Apple CVE
CVE-2016-6195 vBulletin CVE
CVE-2016-1409 Cisco CVE
CVE-2015-8562 Joomla! CVE
CVE-2015-2945 Hajime Fujimoto CVE
CVE-2015-1494 WordPress CVE
CVE-2014-7235 FreePBX CVE
CVE-2014-6293 TYPO3 CVE
CVE-2014-1815 Microsoft CVE
CVE-2014-1809 Microsoft CVE
Displaying vulnerabilities 1726 - 1750 of 1850 in total