CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2025-47813
4.3
MEDIUM
KEV
1 Writeup
NUCLEI
EPSS 0.23
Wftpserver Wing FTP Server < 7.4.4 - Error Information Exposure
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
CWE-209
Jul 10, 2025
CVE-2025-34026
7.5
HIGH
KEV
NUCLEI
EPSS 0.72
Versa Concerto <12.2.0 - Auth Bypass
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
CWE-288
May 21, 2025
CVE-2025-59374
9.8
CRITICAL
KEV
EPSS 0.35
ASUS Live Update - Unintended Actions
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
CWE-506
Dec 17, 2025
CVE-2025-66644
7.2
HIGH
KEV
EPSS 0.03
Array Networks ArrayOS AG <9.4.5.9 - Command Injection
Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.
CWE-78
Dec 05, 2025
CVE-2025-48633
5.5
MEDIUM
KEV
EPSS 0.00
Android - Privilege Escalation
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Dec 08, 2025
CVE-2025-48572
7.8
HIGH
KEV
EPSS 0.00
Android - Privilege Escalation
In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-306
Dec 08, 2025
CVE-2025-13223
8.8
HIGH
KEV
EPSS 0.03
Google Chrome < 142.0.7444.175 - Type Confusion
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Nov 17, 2025
CVE-2025-12480
9.1
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.78
Gladinet Triofox < 16.7.10368.56560 - Improper Access Control
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
CWE-284
Nov 10, 2025
CVE-2025-6205
9.1
CRITICAL
KEV
NUCLEI
EPSS 0.78
DELMIA Apriso <2025 - Privilege Escalation
A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.
CWE-862
Aug 04, 2025
CVE-2025-6204
8.0
HIGH
KEV
NUCLEI
EPSS 0.08
DELMIA Apriso <2025 - Code Injection
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
CWE-94
Aug 04, 2025
CVE-2025-61932
9.8
CRITICAL
KEV
EPSS 0.01
Lanscope Endpoint Manager - SSRF
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
CWE-940
Oct 20, 2025
CVE-2025-2747
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.89
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0006)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.
CWE-288
Mar 24, 2025
CVE-2025-2746
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.84
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0011)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
CWE-288
Mar 24, 2025
CVE-2025-59230
7.8
HIGH
KEV
EPSS 0.04
Microsoft Windows 10 1507 < 10.0.10240.21161 - Improper Access Control
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CWE-284
Oct 14, 2025
CVE-2025-27915
5.4
MEDIUM
KEV
NUCLEI
EPSS 0.26
Zimbra - Cross-Site Scripting via ICS Files
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
CWE-79
Mar 12, 2025
CVE-2025-21043
8.8
HIGH
KEV
EPSS 0.05
Samsung Android - Out-of-Bounds Write
Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code.
CWE-787
Sep 12, 2025
CVE-2025-4008
8.8
HIGH
KEV
NUCLEI
EPSS 0.44
Smartbedded Meteobridge VM < 6.2 - Command Injection
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.
This web interface exposes an endpoint that is vulnerable to command injection.
Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
CWE-306
May 21, 2025
CVE-2025-59689
6.1
MEDIUM
KEV
EPSS 0.06
Libraesva Email Security Gateway < 5.0.31 - Command Injection
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
CWE-77
Sep 19, 2025
CVE-2025-20362
6.5
MEDIUM
KEV
NUCLEI
EPSS 0.51
Cisco Secure ASA/FDT - DoS
Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory.
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.
This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
CWE-862
Sep 25, 2025
CVE-2025-20333
9.9
CRITICAL
KEV
EPSS 0.41
Cisco Secure Firewall ASA/FTD - RCE
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device.
This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.
CWE-120
Sep 25, 2025