






I looked at VulnCheck KEV. This is an analogue of CISA KEV (Know Exploited Vulnerabilities) by VulnCheck.
Unlike the public CISA KEV, only registered users have access to VulnCheck KEV. The VulnCheck website is accessible from Russian IPs
, but when registering they write that “account is currently under review” (in fact requests are simply blocked
). Requests from non-Russian IPs are registered automatically.
There are ~2 times more CVEs in the database than in CISA KEV.
There are no standard tools for downloading all these CVEs via web-gui.
There are links to exploits for CVEs that look good.
There are signs of exploitation in the wild. Sometimes it’s clear, like “Outbreak Alerts 2023” pdf report. Sometimes it’s strange, like a link to a Shadowserver dashboard or a non-related blog post.
The selection of CVEs is quite interesting, but the rationale for exploitation in the wild needs to be improved.