Search Vulnerabilities

Vulnerability Search

The CISA Known Exploited Vulnerabilities Catalog provides a list of vulnerabilities actively exploited in the wild. Organizations are encouraged to remediate these vulnerabilities promptly to protect their systems from potential threats.

Loading…

Examples: CVE ID (e.g., CVE-2024-50623), Product (e.g., Multiple Products), Vendor (e.g., Microsoft, Google, Ivanti, Cisco)