§ Library · Vulnerabilities
Known exploits · published bulletins

Vulnerabilities,
cross-linked.

The CISA Known Exploited Vulnerabilities catalog stitched to whatever IAVM, CTO, and CVE references survive in the public STIG and SCAP corpus. Pivot from a CVE to the 800-53 controls that govern its remediation, or from a STIG rule to the bulletin it cites.

CISA KEV 1,587 known exploited CVEs catalog v2026.05.01
Ransomware 317 CVEs flagged for ransomware campaign use
Last 30 days 30 CVEs added to KEV in the last 30 days
Active deadlines 14 entries with a BOD 22-01 deadline still in the future
This year 103 CVEs added to KEV since 1 January
From STIG/SCAP 4 distinct IAVM/CTO IDs found 710 more rules mention IAVA in prose

CISA Known Exploited Vulnerabilities

1,587 entries

The full KEV catalog as published by CISA. Each entry carries a CVE, vendor, product, BOD 22-01 due date, and a short narrative. Federal civilian agencies must remediate by the listed due date; everyone else uses it as a "patch this first" priority queue.

Catalog released · latest CVE added 1 May 2026.

IAVM & CTO references in the corpus

From 757 rules

Specific bulletin IDs (IAVA-format YYYY-A-NNNN and Cyber Tasking Orders CTOnnnn) that DISA chose to embed in published STIG XML. The list is small — almost all DoD bulletin distribution happens behind CAC — but every reference here links back to the rule that cites it.

3 IAVMs · 1 CTOs · 3 CVEs · 710 prose mentions

Where this fits in the 800-53 stack

Vulnerability data is the trigger for the controls below. A KEV entry is what an assessor checks against RA-5 Vulnerability Monitoring and Scanning output and SI-2 Flaw Remediation patch evidence. Detail pages for each CVE, IAVM, and KEV entry deep-link straight into the 800-53 r5 catalog so you can read the control text without leaving the site.

STIG/SCAP scan last refreshed . KEV catalog refreshed via app:kev:refresh; corpus scan via app:vulns:rebuild-toc.