
Known Exploited Vulnerabilities Catalog - CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative …
The KEV Catalog - CISA
A list of Known Exploited Vulnerabilities.
Reducing the Significant Risk of Known Exploited Vulnerabilities - CISA
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.
Key Cyber Initiatives from CISA: KEV Catalog, CPGs, and PRNI
Jan 7, 2025 · The KEV Catalog, CPGs, and PRNI exemplify CISA’s commitment to fostering collaboration across public and private sectors. These initiatives have helped to reshape …
CISA Adds One Known Exploited Vulnerability to Catalog
Jul 10, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
CISA Adds One Known Exploited Vulnerability to Catalog
Jun 17, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
KEV Catalog Reaches 1000, What Does That Mean and What Have We …
Sep 18, 2023 · The KEV should be easy to use – ideally incorporated into tools already being used to prioritize vulnerability management. Federal agencies are able to see their open KEVs in their …
UPDATE: Microsoft Releases Guidance on Exploitation of ... - CISA
Aug 6, 2025 · . For more information see MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities and CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities. …
CISA Adds One Known Exploited Vulnerability to Catalog
Dec 9, 2025 · Meta React Server Components Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the …
CISA Adds One Vulnerability to the KEV Catalog
Jan 8, 2025 · Ivanti Connect Secure Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. CISA urges …