
cisa.gov/known-exploited-vulnerabilities-catalog
Preview meta tags from the cisa.gov website.
Linked Hostnames
33- 302 links tocisa.gov
- 20 links tonvd.nist.gov
- 20 links towww.cve.org
- 19 links tocwe.mitre.org
- 3 links tomsrc.microsoft.com
- 3 links towww.dhs.gov
- 2 links togithub.com
- 2 links topublic.govdelivery.com
Search Engine Appearance
https://cisa.gov/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerabilities Catalog | CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat
Bing
Known Exploited Vulnerabilities Catalog | CISA
https://cisa.gov/known-exploited-vulnerabilities-catalog
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat
DuckDuckGo

Known Exploited Vulnerabilities Catalog | CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat
General Meta Tags
8- titleKnown Exploited Vulnerabilities Catalog | CISA
- titleLock
- charsetutf-8
- descriptionFor the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat
- GeneratorDrupal 11 (https://www.drupal.org)
Open Graph Meta Tags
5- og:site_nameCybersecurity and Infrastructure Security Agency CISA
- og:typewebsite
- og:urlhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
- og:titleKnown Exploited Vulnerabilities Catalog | CISA
- og:descriptionFor the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:
Link Tags
33- canonicalhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
- icon/profiles/cisad8_gov/themes/custom/gesso/favicon.png
- preload/modules/contrib/better_social_sharing_buttons/assets/dist/sprites/social-icons--no-color.svg
- stylesheet/core/misc/components/progress.module.css?t0kqjl
- stylesheet/core/misc/components/ajax-progress.module.css?t0kqjl
Emails
2- ?subject=Known%20Exploited%20Vulnerabilities%20Catalog&body=https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- [email protected]
Links
400- https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
- https://cisa.gov
- https://cisa.gov/about
- https://cisa.gov/about/contact-us
- https://cisa.gov/about/contact-us/subscribe-updates-cisa