Start with free access to CISA KEV intelligence, then upgrade for complete vulnerability coverage, automated remediation, and seamless integrations with your existing security tools.
Complete CISA KEV intelligence with action plans
1300+ KEVs with full descriptions, analysis, vendor and product information for technical and business audiences
Full history from reservation to publication and every update since, rechecked for material changes
Continuous updates on CISA-KEV status, available exploit code
Provided by and updated by CISA and CVE Numbering Authorities
Detailed scripts and instructions to: discover vulnerable assets, draft detection/blocking rules, hunt for exploitation, and mitigate risks
Browse, search, filter and sort all CISA KEV entries with stats, graphs and charts for leadership
Complete CVE coverage with advanced features
10% discount when billed annually
Descriptions, analysis, vendor and product information
Input your vendors receive proactive alerts for new vulns and material updates that could increases risk
Custom risk scores calculated in real-time based on latest threat intelligence and exploitation trends
Easily ingest our discovery, detection, mitigation and hunting reports in markdown for confidential exploitation in your own enterprise LLM
* Some older CVE analyses may require a refresh. Request an update with one click for republishing within 12-24 hours.
Expanded features, direct database access and more!
Custom pricing based on your organization size and needs
Custom risk scores calculated in real-time based on latest threat intelligence and exploitation trends
Upload your full (sanitized) scan reports from common tools like Tenable, Qualys and Rapid7 for AI recommendations on priority, sequencing and action plans.
Have your scan results automatically turned into continuous monitoring for material changes like updates access methods or exploit code that could shift your risk in an instant
Dedicated customer success manager, implementation support
The CISA Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities that have been actively exploited by threat actors in real-world attacks. These often represent the highest priority vulnerabilities for many organizations. Whenever possible, they should be patched immediately. Sometimes that isn't achievable, which is why our ACTION PLANS for detection, threat hunting and crafting mitigating controls are all included for free for all CISA KEVs.
There are three huge benefits to a Pro account. The obvious one is expanded coverage to 300 CVEs per month. Even more important, though, is the ability to receive proactive notification about updates that apply specifically to your environment. Many CVEs are updated between two and ten times after publication, but only a detailed review of each and every update can assess whether something important, like being remotely exploitable, has changed. We screen them all, and can tell you when there's actually something you need to know. Finally, if you want to download our ACTION REPORTS in standard markdown format, you can feed them into any enterprise or local LLM where you can ask confidential questions or “chat” with your findings without revealing anything sensitive to us, or any other outside party.
Yes, just to prevent scraping or copying of our database. Pro tier provides access to 300 CVE reports per month, while Enterprise tier provides access to 5,000 CVE reports per month. If you have a valid need for more, you can contact our support team. Our Enterprise tier allows large-scale prioritization, remediation planning and resource allocation. Contact our sales team to learn more.
Absolutely! You can start with free CISA KEV access and upgrade to a Pro or Enterprise account at any time. Our support team will work with you to ensure a smooth transition help you take full advantage of all the additional features.
Yes, RadicalNotion.AI is a Wyoming Corporation with offices in Massachusetts.