CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2025-5086
9.0
CRITICAL
KEV
NUCLEI
EPSS 0.44
DELMIA Apriso <2025 - Code Injection
A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.
CWE-502
Jun 02, 2025
CVE-2025-9377
7.2
HIGH
KEV
EPSS 0.22
TP-Link Archer C7(EU) V2 & TL-WR841N/ND(MS) V9 - Authenticated RCE
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.
This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108.
Both products have reached the status of EOL (end-of-life).
It's recommending to
purchase the new
product to ensure better performance and security. If replacement is not
an option in the short term, please use the second reference link to
download and install the patch(es).
CWE-78
Aug 29, 2025
CVE-2025-54948
9.4
CRITICAL
KEV
EPSS 0.10
Trendmicro Apex One - OS Command Injection
A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.
CWE-78
Aug 05, 2025
CVE-2025-8876
8.8
HIGH
KEV
EPSS 0.09
N-able N-central < 2025.3.1 - OS Command Injection
Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.
CWE-78
Aug 14, 2025
CVE-2025-20337
10.0
CRITICAL
KEV
EPSS 0.01
Cisco ISE - RCE
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CWE-74
Jul 16, 2025
CVE-2025-49704
8.8
HIGH
KEV
RANSOMWARE
EPSS 0.60
Microsoft Sharepoint Server - Code Injection
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-94
Jul 08, 2025
CVE-2025-48928
4.0
MEDIUM
KEV
EPSS 0.08
TeleMessage <2025-05-05 - Info Disclosure
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
CWE-528
May 28, 2025
CVE-2025-48927
5.3
MEDIUM
KEV
EPSS 0.09
TeleMessage - Info Disclosure
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
CWE-1188
May 28, 2025
CVE-2025-43200
4.2
MEDIUM
KEV
EPSS 0.01
Apple - Info Disclosure
This issue was addressed with improved checks. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, visionOS 2.3.1, watchOS 11.3.1. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Jun 16, 2025
CVE-2025-27038
7.5
HIGH
KEV
EPSS 0.01
Chrome - Memory Corruption
Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.
CWE-416
Jun 03, 2025
CVE-2025-21480
8.6
HIGH
KEV
EPSS 0.02
Qualcomm Aqt1000 Firmware - Incorrect Authorization
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.
CWE-863
Jun 03, 2025
CVE-2025-35939
5.3
MEDIUM
KEV
EPSS 0.33
Craft CMS - RCE
Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.
CWE-472
May 07, 2025
CVE-2025-3935
8.1
HIGH
KEV
EPSS 0.16
ScreenConnect <25.2.3 - Code Injection
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.
It is important to note that to obtain these machine keys, privileged system level access must be obtained.
If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.
The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior. This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
CWE-502
Apr 25, 2025
CVE-2025-27920
7.2
HIGH
KEV
EPSS 0.50
Srimax Output Messenger < 2.0.63 - Path Traversal
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
CWE-24
May 05, 2025
CVE-2025-32706
7.8
HIGH
KEV
EPSS 0.01
Microsoft Windows 10 1507 - Improper Input Validation
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-20
May 13, 2025
CVE-2025-32701
7.8
HIGH
KEV
EPSS 0.02
Microsoft Windows 10 1507 < 10.0.10240.21014 - Use After Free
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-416
May 13, 2025
CVE-2025-47729
1.9
LOW
KEV
EPSS 0.04
TeleMessage <2025-05-05 - Info Disclosure
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
CWE-912
May 08, 2025
CVE-2025-3928
8.8
HIGH
KEV
EPSS 0.16
Commvault Web Server <11.36.46, <11.32.89, <11.28.141, <11.20.217 -...
Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.
Apr 25, 2025
CVE-2025-1976
6.7
MEDIUM
KEV
EPSS 0.01
Brocade Fabric OS <9.1.1d6 - Privilege Escalation
Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.
CWE-78
Apr 24, 2025
CVE-2025-42599
9.8
CRITICAL
KEV
EPSS 0.01
Qualitia Active! Mail < 6.60.05008562 - Stack Buffer Overflow
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
CWE-121
Apr 18, 2025