CISA Known Exploited Vulnerabilities (KEV) Catalog

TOP VENDORS

C3.js CISA Top 5 Chart

CATALOG TOTALS

C3.js CISA Donut Chart

KEV TREND

Ransomware Use


Common Weaknesses

Security Vendors

Web Code & Tech

Infrastructure

Endpoints


CVE ID Vendor / Project Date Added Short Description Ransomware Use
By using this site, you agree to our Terms & Conditions.

COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.

Terms & Privacy Policy