tools.cisa_kev_tools module

Search CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Uses the official JSON feed from https://www.cisa.gov/known-exploited-vulnerabilities

async tools.cisa_kev_tools.run(cve_id='', vendor_project='', product='', vulnerability_name='', short_description='', required_action='', notes='', known_ransomware_campaign_use='', cwe='', date_added_on_or_after='', date_added_on_or_before='', due_on_or_after='', due_on_or_before='', field_filters=None, limit=50, force_refresh=False, ctx=None)[source]

Search the KEV catalog and return JSON results.

Return type:

str

Parameters:
  • cve_id (str)

  • vendor_project (str)

  • product (str)

  • vulnerability_name (str)

  • short_description (str)

  • required_action (str)

  • notes (str)

  • known_ransomware_campaign_use (str)

  • cwe (str)

  • date_added_on_or_after (str)

  • date_added_on_or_before (str)

  • due_on_or_after (str)

  • due_on_or_before (str)

  • field_filters (dict[str, Any] | None)

  • limit (int)

  • force_refresh (bool)

  • ctx (ToolContext | None)