KEV Compare

Compare Known Exploited Vulnerabilities catalogs across publishers (CISA, ENISA, CIRCL, and future sources). Explore overlap, unique coverage, and who listed a vulnerability first.

Unique vulns (union)
1,565
Sources
3
Avg sources/vuln
1.02
Top overlap
CISA & ENISA18 (1.2%)

KEVs added (cumulative)

3 sources
Loading chart...

Coverage overview

CISA
1,558
1,533
Excl: 1,533 Shared: 25
ENISA
23
Excl: 4 Shared: 19
CIRCL
11
Excl: 2 Shared: 9

KEV catalogs tracked by CveMate

3 catalogs
CatalogPublisherKEVsAvg/moExclusiveSharedSinceScope
CISA
Cybersecurity and Infrastructure Security Agency (US)1,55828.851,533252021-11-03US federal / global
ENISA
European Union Agency for Cybersecurity (EU)231.774192025-01-17EU member states
CIRCL
Computer Incident Response Center Luxembourg110.69292025-01-01EU / international
Union (all catalogs) 1,565
Avg/mo: average new KEVs per month. Exclusive: listed by that source only. Shared: also in at least one other source.

Pairwise overlap

Coverage
CISAvsENISA
18
1.2%
CISA:1.2%
ENISA:78.3%
CISA:17
ENISA:0
Tie:1
CIRCLvsCISA
8
0.5%
CIRCL:72.7%
CISA:0.5%
CIRCL:0
CISA:5
Tie:3
CIRCLvsENISA
2
6.3%
CIRCL:18.2%
ENISA:8.7%
CIRCL:0
ENISA:2
Jaccard: shared / (A + B - shared) (similarity).
Coverage: % of source's KEVs that are shared with the other.
Listed first: among shared CVEs, how many each source listed before the other.

Latest 50 vulnerabilities added to KEV catalogs

1,565 total
Vuln IDSeverityVendor / ProductFixCVE PublishedKEV SourcesKEV Added
CVE-2026-356169.8 CRITICALfortinet/forticlientems2026-04-04
CISA
CIRCL
2026-04-06
CVE-2026-35027.8 HIGHtrueconf/trueconf2026-03-30
CISA
2026-04-02
CVE-2026-52818.8 HIGHGoogle/Chrome2026-04-01
CISA
2026-04-01
CVE-2026-30559.8 CRITICALcitrix/netscaler_application_delivery_controller2026-03-23
CISA
2026-03-30
CVE-2025-535219.8 CRITICALF5/BIG-IP2025-10-15
CISA
2026-03-27
CVE-2026-336349.4 CRITICALaquasec/setup-trivy2026-03-23
CISA
2026-03-26
CVE-2026-330179.8 CRITICALlangflow-ai/langflow2026-03-20
CISA
2026-03-25
CVE-2025-312778.8 HIGHApple/iOS and iPadOS2025-07-29
CISA
2026-03-20
CVE-2025-435107.8 HIGHApple/iOS and iPadOS2025-12-12
CISA
2026-03-20
CVE-2025-3243210 CRITICALcraftcms/cms2025-04-25
CISA
2026-03-20
CVE-2025-540689.8 CRITICALLaravel/Livewire2025-07-17
CISA
2026-03-20
CVE-2025-435205.5 MEDIUMApple/iOS and iPadOS2025-12-12
CISA
2026-03-20
CVE-2026-2013110 CRITICALcisco/cisco secure firewall management center (fmc)2026-03-04
CISA
2026-03-19
CVE-2026-209639.8 CRITICALmicrosoft/microsoft sharepoint enterprise server 20162026-01-13
CISA
2026-03-18
CVE-2025-663767.2 HIGHSynacor/Zimbra Collaboration Suite2026-01-05
CISA
2026-03-18
CVE-2025-478134.3 MEDIUMwftpserver/wing ftp server2025-07-10
CISA
2026-03-16
CVE-2026-39098.8 HIGHGoogle/Chrome2026-03-12
CISA
2026-03-13
CVE-2026-39108.8 HIGHGoogle/Chrome2026-03-12
CISA
2026-03-13
CVE-2021-3539410 HIGHrealtek/rtl819x_jungle_software_development_kit2021-08-16
CIRCL
CISA
2021-12-10
CVE-2024-130309.8 CRITICALd-link/dir-823g2024-12-30
CIRCL
2026-03-12
CVE-2014-836110 HIGHaterm/w1200ex_firmware2015-05-01
CIRCL
CISA
2023-09-18
CVE-2017-172158.8 HIGHhuawei technologies co., ltd./hg5322018-03-20
CIRCL
2026-03-12
CVE-2025-6861310 CRITICALn8n-io/n8n2025-12-19
CISA
2026-03-11
CVE-2026-16038.6 HIGHivanti/endpoint_manager2026-02-10
CISA
2026-03-09
CVE-2021-220547.5 HIGHvmware/workspace_one_uem_console2021-12-17
CISA
2026-03-09
CVE-2025-263999.8 CRITICALSolarWinds/Web Help Desk2025-09-23
CISA
2026-03-09
CVE-2023-419747.8 HIGHApple/iOS and iPadOS2024-01-10
CISA
2026-03-05
CVE-2023-430008.8 HIGHApple/iOS and iPadOS2025-11-05
CISA
2026-03-05
CVE-2017-792110 CRITICALhikvision/ds-2cd2032-i_firmware2017-05-06
CISA
2026-03-05
CVE-2021-226819.8 CRITICALrockwellautomation/factorytalk_services_platform2021-03-03
CISA
2026-03-05
CVE-2021-309528.8 HIGHApple/iOS and iPadOS2021-08-24
CISA
2026-03-05
CVE-2026-227198.1 HIGHvmware/aria_operations2026-02-25
CISA
2026-03-03
CVE-2026-213857.8 HIGHqualcomm, inc./snapdragon2026-03-02
CISA
2026-03-03
CVE-2026-251088.8 HIGHSoliton Systems K.K/FileZen2026-02-13
CIRCL
CISA
2026-02-24
CVE-2026-2012710 CRITICALcisco/catalyst_sd-wan_manager2026-02-25
CISA
2026-02-25
CVE-2022-207757.8 HIGHcisco/catalyst_sd-wan_manager2022-09-30
CISA
2026-02-25
CVE-2025-684617.2 HIGHRoundcube/Webmail2025-12-18
CISA
2026-02-20
CVE-2025-491139.9 CRITICALdebian/debian_linux2025-06-02
CISA
2026-02-20
CVE-2026-2276910 CRITICALdell/recoverpoint for virtual machines2026-02-17
CISA
2026-02-18
CVE-2021-221759.8 CRITICALgitlab/gitlab2021-06-11
CISA
2026-02-18
CVE-2024-76947.2 HIGHTeamT5/ThreatSonar Anti-Ransomware2024-08-12
CISA
2026-02-17
CVE-2008-00159.3 HIGHmicrosoft/windows_2003_server2009-07-07
CISA
2026-02-17
CVE-2026-24418.8 HIGHGoogle/Chrome2026-02-13
CISA
2026-02-17
CVE-2020-77969.8 CRITICALSynacor/Zimbra Collaboration Suite2020-02-18
CISA
2026-02-17
CVE-2026-17319.9 CRITICALbeyondtrust/privileged remote access2026-02-06
CISA
2026-02-13
CVE-2024-434689.8 CRITICALMicrosoft/Configuration Manager2024-10-08
CISA
2026-02-12
CVE-2025-155567.7 HIGHnotepad-plus-plus/notepad\+\+2026-02-03
CISA
2026-02-12
CVE-2026-207007.8 HIGHApple/iOS and iPadOS2026-02-11
CISA
2026-02-12
CVE-2025-405369.8 CRITICALSolarWinds/Web Help Desk2026-01-28
CISA
2026-02-12
CVE-2026-215337.8 HIGHmicrosoft/windows_10_16072026-02-10
CISA
2026-02-10

What are Known Exploited Vulnerabilities (KEV) catalogs?

Known Exploited Vulnerabilities (KEV) catalogs are curated lists of CVEs that have been observed being actively exploited in the wild. Unlike the full NVD database, which contains over 250,000 vulnerabilities, KEV catalogs focus exclusively on threats that pose a real, demonstrated risk to organizations. This makes them essential for vulnerability prioritization and patch management.

Who publishes KEV catalogs?

Several organizations maintain their own KEV catalogs, each with different criteria, geographic focus, and update cadence:

  • CISA (Cybersecurity and Infrastructure Security Agency) — the original and most widely adopted KEV catalog, mandated for US federal agencies under BOD 22-01.
  • ENISA (European Union Agency for Cybersecurity) — the EU equivalent, contributing a European perspective on actively exploited vulnerabilities.
  • CIRCL (Computer Incident Response Center Luxembourg) — a CERT-based catalog with a focus on European and international threat intelligence.

Why compare KEV catalogs?

No single catalog captures every actively exploited vulnerability. Each publisher has different intelligence sources, geographic priorities, and inclusion criteria. By comparing catalogs side-by-side, security teams can identify coverage gaps, discover which source lists a CVE first, and build a more comprehensive view of the threat landscape. The overlap analysis (Jaccard similarity and pairwise coverage) quantifies how much agreement exists between publishers, while the "listed first" metric reveals which source tends to react fastest to emerging threats.

How is this data computed?

CveMate aggregates KEV entries from all supported publishers into a unified graph database. Each vulnerability is linked to every catalog that lists it, along with the date it was added. Statistics such as exclusive counts, overlap intersections, Jaccard similarity scores, and first-lister analysis are computed in real time from this unified dataset. The cumulative chart tracks how each catalog has grown over time, providing a historical view of their respective coverage trajectories.