About 50 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative …

  2. CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Feb 3, 2026 · These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing …

  3. CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Mar 4, 2025 · CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

  4. 2023 Top Routinely Exploited Vulnerabilities - CISA

    Nov 12, 2024 · Technical Details Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber …

  5. 2021 Top Routinely Exploited Vulnerabilities - CISA

    Apr 28, 2022 · These vulnerabilities include multiple vulnerabilities affecting internet-facing systems, including Accellion File Transfer Appliance (FTA), Windows Print Spooler, and Pulse Secure Pulse …

  6. Critical Vulnerabilities in Microsoft Windows Operating Systems

    Jan 14, 2020 · An attacker could remotely exploit these vulnerabilities to decrypt, modify, or inject data on user connections: CryptoAPI spoofing vulnerability – CVE-2020-0601: This vulnerability affects all …

  7. 2025 CWE Top 25 Most Dangerous Software Weaknesses - CISA

    Dec 11, 2025 · By shining a light on the most dangerous software weaknesses, CISA and MITRE reinforce collective efforts to reduce vulnerabilities at the source, strengthen national cybersecurity, …

  8. Overview Over the past decade, the Common Vulnerabilities and Exposures (CVE) Program has established itself as the global standard for vulnerability identification. This period represents the …

  9. Top Routinely Exploited Vulnerabilities - CISA

    Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 and …

  10. Reducing the Significant Risk of Known Exploited Vulnerabilities

    Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.