cisa.gov/known-exploited-vulnerabilities-catalog

Preview meta tags from the cisa.gov website.

Linked Hostnames

33

Search Engine Appearance

Google

https://cisa.gov/known-exploited-vulnerabilities-catalog

Known Exploited Vulnerabilities Catalog | CISA

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat



Bing

Known Exploited Vulnerabilities Catalog | CISA

https://cisa.gov/known-exploited-vulnerabilities-catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat



DuckDuckGo

https://cisa.gov/known-exploited-vulnerabilities-catalog

Known Exploited Vulnerabilities Catalog | CISA

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat

  • General Meta Tags

    8
    • title
      Known Exploited Vulnerabilities Catalog | CISA
    • title
      Lock
    • charset
      utf-8
    • description
      For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat
    • Generator
      Drupal 11 (https://www.drupal.org)
  • Open Graph Meta Tags

    5
    • og:site_name
      Cybersecurity and Infrastructure Security Agency CISA
    • og:type
      website
    • og:url
      https://www.cisa.gov/known-exploited-vulnerabilities-catalog
    • og:title
      Known Exploited Vulnerabilities Catalog | CISA
    • og:description
      For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:
  • Link Tags

    33
    • canonical
      https://www.cisa.gov/known-exploited-vulnerabilities-catalog
    • icon
      /profiles/cisad8_gov/themes/custom/gesso/favicon.png
    • preload
      /modules/contrib/better_social_sharing_buttons/assets/dist/sprites/social-icons--no-color.svg
    • stylesheet
      /core/misc/components/progress.module.css?t0kqjl
    • stylesheet
      /core/misc/components/ajax-progress.module.css?t0kqjl

Emails

2
  • ?subject=Known%20Exploited%20Vulnerabilities%20Catalog&body=https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  • [email protected]

Links

400