CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2026-20133 6.5 MEDIUM KEV EPSS 0.01
Cisco Catalyst SD-WAN Manager - Info Disclosure
A vulnerability in Cisco Catalyst SD-WAN Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system restrictions. An authenticated attacker with netadmin privileges could exploit this vulnerability by accessing the vshell of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system.
CWE-200 Feb 25, 2026
CVE-2026-20128 7.5 HIGH KEV EPSS 0.00
Cisco Catalyst SD-WAN Manager - Privilege Escalation
A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain DCA user privileges on an affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.
CWE-257 Feb 25, 2026
CVE-2026-20122 5.4 MEDIUM KEV EPSS 0.01
Cisco Catalyst SD-WAN Manager - Path Traversal
A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.
CWE-648 Feb 25, 2026
CVE-2026-3910 8.8 HIGH KEV EPSS 0.01
Google Chrome <146.0.7680.75 - RCE
Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE-94 Mar 13, 2026
CVE-2026-1603 8.6 HIGH KEV NUCLEI EPSS 0.55
Ivanti Endpoint Manager < 2024 - Authentication Bypass
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.
CWE-306 Feb 10, 2026
CVE-2026-22719 8.1 HIGH KEV EPSS 0.02
VMware Aria Operations - Command Injection
VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001
CWE-77 Feb 25, 2026
CVE-2026-25108 8.8 HIGH KEV EPSS 0.08
FileZen - Command Injection
FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.
CWE-78 Feb 13, 2026
CVE-2026-22769 10.0 CRITICAL KEV EPSS 0.21
Dell RecoverPoint <6.0.3.1 HF1 - Auth Bypass
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.
CWE-798 Feb 17, 2026
CVE-2026-21525 6.2 MEDIUM KEV EPSS 0.09
Microsoft Windows 10 1607 < 10.0.14393.8868 - NULL Pointer Dereference
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
CWE-476 Feb 10, 2026
CVE-2026-21519 7.8 HIGH KEV EPSS 0.05
Microsoft Windows 10 1607 < 10.0.14393.8868 - Type Confusion
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
CWE-843 Feb 10, 2026
CVE-2026-21514 7.8 HIGH KEV EPSS 0.05
Microsoft Office Word - Info Disclosure
Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.
CWE-807 Feb 10, 2026
CVE-2026-21513 8.8 HIGH KEV EPSS 0.28
MSHTML Framework - Auth Bypass
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
CWE-693 Feb 10, 2026
CVE-2025-29635 7.2 HIGH KEV EPSS 0.01
Dlink Dir-823x Firmware - Command Injection
A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.
CWE-77 Mar 25, 2025
CVE-2025-32975 10.0 CRITICAL KEV EPSS 0.47
Quest KACE SMA <14.1.101 - Auth Bypass
Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover.
CWE-287 Jun 24, 2025
CVE-2025-48700 6.1 MEDIUM KEV EPSS 0.20
Zimbra Collaboration <10.1 - XSS
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction.
CWE-79 Jun 23, 2025
CVE-2025-2749 7.2 HIGH KEV EPSS 0.05
Kentico Xperience < 13.0.178 - Path Traversal
An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. This results in path traversal and arbitrary file upload, including content that can be executed server side leading to remote code execution.This issue affects Kentico Xperience through 13.0.178.
CWE-22 Mar 24, 2025
CVE-2025-53521 9.8 CRITICAL KEV EPSS 0.07
BIG-IP APM - DoS
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-121 Oct 15, 2025
CVE-2025-43520 5.5 MEDIUM KEV EPSS 0.00
Apple - Memory Corruption
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.
CWE-120 Dec 12, 2025
CVE-2025-43510 7.8 HIGH KEV EPSS 0.00
Apple - Memory Corruption
A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.
CWE-667 Dec 12, 2025
CVE-2025-66376 7.2 HIGH KEV EPSS 0.11
Zimbra Collaboration <10.0.18, <10.1.13 - XSS
Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.
CWE-79 Jan 05, 2026