Known Exploited Vulnerabilities

Focus on weaknesses with real-world exploitation evidence.

This view surfaces the subset of tracked issues that deserve attention first when patch time is limited.

Use this view when patch time is limited and exploitation evidence matters most.