CISA KEV Tracker

@cisakevtracker
1,058 Followers
0 Following
425 Posts
🦅Posts new records seen from the CISA.gov Known Exploited Vulnerabilities (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
🦅Run by @cityhallin
TrueConf 8.5 for desktops OS: new interface, AI, and advanced messenger — Video Conferencing Blog

Note: we've released TrueConf 8.5.3. Feel free to download the latest update.

Video Conferencing Blog
CVE ID: CVE-2026-5281
Vendor: Google
Product: Dawn
Date Added: 2026-04-01
Notes: This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-5281
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-5281
Stable Channel Update for Desktop

The Stable channel has been updated to 146.0.7680.177/178 for Windows/Mac  and  146.0.7680.177 for Linux, which will roll out over the comin...

Chrome Releases
Loading...

CVE ID: CVE-2025-53521
Vendor: F5
Product: BIG-IP
Date Added: 2026-03-27
Notes: Please adhere to F5’s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible F5 products affected by this vulnerability. For more information please see: https://my.f5.com/manage/s/article/K000156741 ; https://my.f5.com/manage/s/article/K000160486 ; https://my.f5.com/manage/s/article/K11438344 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53521
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-53521
myF5

CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE-2026-33634 - GitHub Advisory Database

Trivy ecosystem supply chain was briefly compromised

GitHub
Unauthenticated Remote Code Execution in Langflow via Public Flow Build Endpoint

## Summary The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows without requiring authentication. When the optional `data` parameter is supplied, the endpoint...

GitHub
About the security content of iOS 18.6 and iPadOS 18.6 - Apple Support

This document describes the security content of iOS 18.6 and iPadOS 18.6.

Apple Support
About the security content of iOS 26.1 and iPadOS 26.1 - Apple Support

This document describes the security content of iOS 26.1 and iPadOS 26.1.

Apple Support
About the security content of iOS 26.1 and iPadOS 26.1 - Apple Support

This document describes the security content of iOS 26.1 and iPadOS 26.1.

Apple Support
Livewire remote command execution during property update hydration

### Impact In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property...

GitHub