
Known Exploited Vulnerabilities Catalog - CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative …
The KEV Catalog - CISA
A list of Known Exploited Vulnerabilities.
CISA Adds One Known Exploited Vulnerability to Catalog
Jul 10, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
Reducing the Significant Risk of Known Exploited Vulnerabilities - CISA
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.
Key Cyber Initiatives from CISA: KEV Catalog, CPGs, and PRNI
Jan 7, 2025 · The KEV Catalog, CPGs, and PRNI exemplify CISA’s commitment to fostering collaboration across public and private sectors. These initiatives have helped to reshape …
CISA Adds One Known Exploited Vulnerability to Catalog
Jun 17, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
KEV Catalog Reaches 1000, What Does That Mean and What Have We …
Sep 18, 2023 · The KEV should be easy to use – ideally incorporated into tools already being used to prioritize vulnerability management. Federal agencies are able to see their open KEVs in their …
CISA Mitigation Instructions for CVE-2025-0282
This page contains the mitigation instructions that correspond to the CISA KEV catalog entry CVE-2025-0282 – Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow …
CISA Adds One Vulnerability to the KEV Catalog
Apr 4, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
Ransomware Vulnerability Warning Pilot updates: Now a One-stop
Oct 12, 2023 · Ransomware Vulnerability Warning Pilot updates: Now a One-stop Resource for Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware Known exploited …