KEV Hub

Everything KEV in one place: live exploited vulnerabilities, exposure matching, and enterprise API access.

KEV Dashboard

Real-time metrics for CISA Known Exploited Vulnerabilities

total KEVs
new (7d)
modified (7d)
EPSS avg: · ≥0.50: · ≥0.70:
Top vendor:
Last refresh:
New by Day (14d)
Top Vendors (30d)
Severity Buckets
EPSS Distribution
MITRE ATT&CK Top Techniques
ATT&CK Quadrant Heatmap

Executive Exports

Board-ready intelligence reports with customizable branding and date ranges.

Download CSV Summary

High-level KPIs & metrics

Download PDF Brief

Executive summary with charts

Download PowerPoint

Board presentation deck

Advanced Export Options

Customize with URL parameters:

  • ?brand=Your%20Company - Add your brand name
  • &customer=Client%20Name - Client identifier
  • &range=2025-10-01..2025-10-31 - Date range label
  • ?mode=detail&cols=cve_id,vendor_project,product - CSV detailed export with custom columns

Example:

/threats/kev-brief.pdf?brand=AI%20PQ&customer=Acme%20Corp&range=2025-10-01..2025-10-31

KEV Watch

Monitor CISA Known Exploited Vulnerabilities with real-time tracking, filters, and intelligent alerting.

Open KEV Watch

  • Daily updates with new & modified KEVs from CISA catalog
  • Risk context with CVSS scores and EPSS probability data
  • Advanced filtering by vendor, product, date range, and tags
  • Email & webhook alerts for new critical vulnerabilities
  • Export to CSV for offline analysis and reporting

KEV Exposure Match

Upload your SBOM, asset inventory, or vulnerability scan and instantly identify matches against active KEVs.

Run Exposure Match

  • Bulk CSV, JSON, and SBOM file ingestion (CycloneDX, SPDX)
  • Intelligent matching with confidence scores and remediation hints
  • Cross-reference with CVSS severity and EPSS exploit likelihood
  • Downloadable CSV reports for team collaboration
  • Session-based tracking with secure file handling

Enterprise KEV API

Programmatic access for bulk SBOM & inventory processing with secure token authentication and enterprise features.

Open KEV API Docs

  • RESTful endpoints for SBOM ingestion, inventory uploads, and result retrieval
  • AES-256 encryption at rest with bearer token authentication
  • Optional HMAC signature validation for enhanced security
  • Rate limiting and automated retention controls
  • JSON responses with detailed match metadata and confidence scores

© 2025 AI PQC Audit. Advanced multi-AI powered post-quantum cryptography security platform.

Powered by Proprietary Multi-AI Technology