get_kev_cves
Retrieve Known Exploited Vulnerabilities (KEV) from CISA to identify and address critical security threats, with customizable result limits for targeted cybersecurity research.
Instructions
Get Known Exploited Vulnerabilities (KEV) from CISA
Input Schema
Name | Required | Description | Default |
---|---|---|---|
limit | No | Maximum number of results to return (default: 10) |