Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...
Loading...
Zombie hands

CVE = Common Vulnerability and Exposure

CVE OF THE WEEK:

Palo Alto Networks

PAN-OS
Patch deadline: a year ago on 01/20/2025

CVE-2024-3393

Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability

Learn more about this CVE: paloaltonetworks.com

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.malwarebytes.comFeb 20

Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets

Before delivering the malware, the fake page checks who you are. If you connect from a data center IP address—often used by security researchers and ....

https://www.yahoo.comFeb 20

House Dems Raise National Security Alarms Over Trump Family's Crypto Bank Charter Request

House Dems Raise National Security Alarms Over Trump Family's Crypto Bank Charter Request. Sander Lutz. Fri, February 20, 2026 at 8:13 AM PST. 2 min ....

https://www.heraldtribune.comFeb 20

Ethereum Price and the Rising Influence of Staking - Sarasota Herald-Tribune

Security and price movements always connect in crypto. When a network performs well, confidence grows. When investors feel protected, they tend to ...

https://www.theverge.comFeb 20

The AI security nightmare is here and it looks suspiciously like lobster | The Verge

A hacker tricked Cline's Claude-powered workflow into installing OpenClaw on computers.

https://thehackernews.comFeb 20

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025 - The Hacker News

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of ...

https://puck.newsFeb 20

Why the Former Sony Head Blames Himself for the Infamous Hack - Puck

... hack. Michael walks us through the unique scenario that led to him greenlighting the film, what he should have done differently, and highlights .....

https://variety.comFeb 20

Ex Sony Pictures Boss Regrets Seth Rogen's 'The Interview' - Variety

Lynton says he spoke to President Obama eight months after the hack, when it was clear that North Korea had hacked Sony. Obama asked Lynton, “What ...

https://www.bloomberg.comFeb 19

How Private Equity Debt Left a Leading VPN Open to Chinese Hackers - Bloomberg.com

Chinese spies had hacked the code and infiltrated nearly two dozen organizations. The directive applied to all civilian federal agencies, but given .....


Updated daily