About 28,000 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains …

  2. 2023 Top Routinely Exploited Vulnerabilities - CISA

    Nov 12, 2024 · Technical Details Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them …

  3. 2024 CWE Top 25 Most Dangerous Software Weaknesses - CISA

    Nov 20, 2024 · By following CISA’s initiatives, organizations can reduce vulnerabilities and strengthen application and infrastructure security. Incorporating the 2024 CWE Top 25 into …

  4. Top Routinely Exploited Vulnerabilities Listed in Table 1 are the top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details …

  5. Critical Vulnerabilities in Microsoft Windows Operating Systems

    Jan 14, 2020 · An attacker could remotely exploit these vulnerabilities to decrypt, modify, or inject data on user connections: CryptoAPI spoofing vulnerability – CVE-2020-0601: This …

  6. CISA Adds One Known Exploited Vulnerability, CVE-2025-53770 …

    Jul 20, 2025 · CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. See CISA’s Alert Microsoft Releases …

  7. Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

    Feb 12, 2025 · This Secure by Design Alert is part of an ongoing series aimed at advancing industry-wide best practices to eliminate entire classes of vulnerabilities during the design and …

  8. CISA Adds Five Known Exploited Vulnerabilities to Catalog

    Jun 2, 2025 · CISA has added five new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.

  9. Top Routinely Exploited Vulnerabilities - CISA

    Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 …

  10. Known Exploited Vulnerabilities Catalog - CISA

    Nov 28, 2025 · Known Exploited Vulnerabilities Catalogentries per page