CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2025-5086 9.0 CRITICAL KEV NUCLEI EPSS 0.44
DELMIA Apriso <2025 - Code Injection
A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.
CWE-502 Jun 02, 2025
CVE-2025-9377 7.2 HIGH KEV EPSS 0.22
TP-Link Archer C7(EU) V2 & TL-WR841N/ND(MS) V9 - Authenticated RCE
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
CWE-78 Aug 29, 2025
CVE-2025-54948 9.4 CRITICAL KEV EPSS 0.10
Trendmicro Apex One - OS Command Injection
A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.
CWE-78 Aug 05, 2025
CVE-2025-8876 8.8 HIGH KEV EPSS 0.09
N-able N-central < 2025.3.1 - OS Command Injection
Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.
CWE-78 Aug 14, 2025
CVE-2025-20337 10.0 CRITICAL KEV EPSS 0.01
Cisco ISE - RCE
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CWE-74 Jul 16, 2025
CVE-2025-49704 8.8 HIGH KEV RANSOMWARE EPSS 0.60
Microsoft Sharepoint Server - Code Injection
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-94 Jul 08, 2025
CVE-2025-48928 4.0 MEDIUM KEV EPSS 0.08
TeleMessage <2025-05-05 - Info Disclosure
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
CWE-528 May 28, 2025
CVE-2025-48927 5.3 MEDIUM KEV EPSS 0.09
TeleMessage - Info Disclosure
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
CWE-1188 May 28, 2025
CVE-2025-43200 4.2 MEDIUM KEV EPSS 0.01
Apple - Info Disclosure
This issue was addressed with improved checks. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, visionOS 2.3.1, watchOS 11.3.1. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Jun 16, 2025
CVE-2025-27038 7.5 HIGH KEV EPSS 0.01
Chrome - Memory Corruption
Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.
CWE-416 Jun 03, 2025
CVE-2025-21480 8.6 HIGH KEV EPSS 0.02
Qualcomm Aqt1000 Firmware - Incorrect Authorization
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.
CWE-863 Jun 03, 2025
CVE-2025-35939 5.3 MEDIUM KEV EPSS 0.33
Craft CMS - RCE
Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.
CWE-472 May 07, 2025
CVE-2025-3935 8.1 HIGH KEV EPSS 0.16
ScreenConnect <25.2.3 - Code Injection
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
CWE-502 Apr 25, 2025
CVE-2025-27920 7.2 HIGH KEV EPSS 0.50
Srimax Output Messenger < 2.0.63 - Path Traversal
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
CWE-24 May 05, 2025
CVE-2025-32706 7.8 HIGH KEV EPSS 0.01
Microsoft Windows 10 1507 - Improper Input Validation
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-20 May 13, 2025
CVE-2025-32701 7.8 HIGH KEV EPSS 0.02
Microsoft Windows 10 1507 < 10.0.10240.21014 - Use After Free
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-416 May 13, 2025
CVE-2025-47729 1.9 LOW KEV EPSS 0.04
TeleMessage <2025-05-05 - Info Disclosure
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
CWE-912 May 08, 2025
CVE-2025-3928 8.8 HIGH KEV EPSS 0.16
Commvault Web Server <11.36.46, <11.32.89, <11.28.141, <11.20.217 -...
Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.
Apr 25, 2025
CVE-2025-1976 6.7 MEDIUM KEV EPSS 0.01
Brocade Fabric OS <9.1.1d6 - Privilege Escalation
Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.
CWE-78 Apr 24, 2025
CVE-2025-42599 9.8 CRITICAL KEV EPSS 0.01
Qualitia Active! Mail < 6.60.05008562 - Stack Buffer Overflow
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
CWE-121 Apr 18, 2025