Known Exploited Vulnerabilities Catalog (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Active
Org. type: Government / public sector
Project type: Database
Last modified: Jan 28, 2026 Added: Dec 3, 2025
Back to Top