Skip to main content
CISA tools

CISA KEV catalog

Search CISA's Known Exploited Vulnerabilities (KEV) catalog. Filter the known exploited vulnerabilities list by vendor, product, CWE, vulnerability type, ransomware use, and due dates.

Data refreshed5 hours ago
Total CVEs
1602
Vendors
260
Ransomware Use Known
323
Upcoming (Due)
11

Search known exploited vulnerabilities and exploited CVEs

This CISA KEV list helps security teams review actively exploited CVEs, affected vendors and products, ransomware use, common weakness entries, and required remediation due dates from the Known Exploited Vulnerabilities catalog.

Recent CISA KEV catalog entries

A crawlable snapshot of recent known exploited vulnerabilities from the CISA KEV catalog.

View all
  • CVE-2026-9082 - Drupal Core SQL Injection Vulnerability

    May 21, 2026

  • CVE-2025-34291 - Langflow Origin Validation Error Vulnerability

    May 20, 2026

  • CVE-2026-34926 - Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability

    May 20, 2026

  • CVE-2008-4250 - Microsoft Windows Buffer Overflow Vulnerability

    May 19, 2026

  • CVE-2009-1537 - Microsoft DirectX NULL Byte Overwrite Vulnerability

    May 19, 2026

Showing 25 of 1602 vulnerabilities
Vendor:Drupal
Product:Core
Description:

Drupal Core contains a SQL injection vulnerability that could allow for privilege escalation and remote code execution via specially crafted requests sent with the database abstraction API. Vendor: Drupal Product: Core Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-27

Vulnerability Type:Remote Code Execution
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 21, 2026 (1 day ago)
CVE ID:CVE-2026-9082
CWE:CWE-89
Due Date:May 26, 2026 (in 3 days)
Vendor:Langflow
Product:Langflow
Description:

Langflow contains an origin validation error vulnerability in which an overly permissive CORS configuration combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. This could allow the attacker to execute arbitrary code and achieve full system compromise via obtained tokens that permit access to authenticated endpoints. Vendor: Langflow Product: Langflow Ac

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vendor:Trend Micro
Product:Apex One
Description:

Trend Micro Apex One (on-premise) contains a directory traversal vulnerability that could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. Vendor: Trend Micro Product: Apex One Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-04

Vulnerability Type:Directory Traversal
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 20, 2026 (2 days ago)
CVE ID:CVE-2026-34926
CWE:CWE-23
Due Date:June 3, 2026 (in 11 days)
Vendor:Microsoft
Product:Windows
Description:

Microsoft Windows contains a buffer overflow vulnerability in the Windows Server Service that allows remote attackers to execute arbitrary code via a crafted RPC request that triggers an overflow during path canonicalization. Vendor: Microsoft Product: Windows Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-03

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2008-4250
CWE:CWE-94
Due Date:June 2, 2026 (in 10 days)
Vendor:Microsoft
Product:DirectX
Description:

Microsoft DirectX contains a NULL byte overwrite vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow which could allow remote attackers to execute arbitrary code via a crafted QuickTime media file. Vendor: Microsoft Product: DirectX Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-03

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2009-1537
Due Date:June 2, 2026 (in 10 days)
Vendor:Adobe
Product:Acrobat and Reader
Description:

Adobe Acrobat and Reader contain a heap-based buffer overflow vulnerability which could allow remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption. Vendor: Adobe Product: Acrobat and Reader Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-03

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vendor:Microsoft
Product:Internet Explorer
Description:

Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. Vendor: Microsoft Product: Internet Explorer Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2010-0249
CWE:CWE-416
Due Date:June 2, 2026 (in 10 days)
Vendor:Microsoft
Product:Internet Explorer
Description:

Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. Vendor: Microsoft Product: Internet Explorer Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2010-0806
CWE:CWE-399
Due Date:June 2, 2026 (in 10 days)
Vendor:Microsoft
Product:Defender
Description:

Microsoft Defender contains a link following vulnerability that allows an authorized attacker to elevate privileges locally. Vendor: Microsoft Product: Defender Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-03

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2026-41091
CWE:CWE-59
Due Date:June 2, 2026 (in 10 days)
Vendor:Microsoft
Product:Defender
Description:

Microsoft Defender contains an unspecified vulnerability that allows for denial of service. Vendor: Microsoft Product: Defender Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-06-03

Vulnerability Type:Denial of Service
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 19, 2026 (3 days ago)
CVE ID:CVE-2026-45498
Due Date:June 2, 2026 (in 10 days)
Vendor:Microsoft
Product:Microsoft
Description:

Microsoft Exchange Server contains a cross-site scripting vulnerability during web page generation in Outlook Web Access and when certain interaction conditions are met, arbitrary JavaScript can be executed in the browser context. Vendor: Microsoft Product: Microsoft Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-29

Vulnerability Type:Cross Site Scripting (XSS)
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vendor:Cisco
Product:Catalyst SD-WAN
Description:

Cisco Catalyst SD-WAN Controller & Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. Vendor: Cisco Product: Catalyst SD-WAN Action Required: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlined in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s Hunt & Hardening Guid

Vulnerability Type:Authentication Bypass
Required Action:

Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlined in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Vendor:BerriAI
Product:LiteLLM
Description:

BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorized access to the proxy and the credentials it manages. Vendor: BerriAI Product: LiteLLM Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-11

Vulnerability Type:SQL Injection
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 7, 2026 (15 days ago)
CVE ID:CVE-2026-42208
CWE:CWE-89
Due Date:May 10, 2026 (13 days ago)
Vendor:Ivanti
Product:Endpoint Manager Mobile (EPMM)
Description:

Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution. Vendor: Ivanti Product: Endpoint Manager Mobile (EPMM) Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-10

Vulnerability Type:Remote Code Execution
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:May 6, 2026 (16 days ago)
CVE ID:CVE-2026-6973
CWE:CWE-20
Due Date:May 9, 2026 (14 days ago)
Vendor:Palo Alto Networks
Product:PAN-OS
Description:

Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. Vendor: Palo Alto Networks Product: PAN-OS Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the prod

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required. 5/13/2026: Palo Alto has released a variety of patches. If these are relevant to your environment, please apply the designated patch.

Details

Date Added:May 5, 2026 (17 days ago)
CVE ID:CVE-2026-0300
CWE:CWE-787
Due Date:May 8, 2026 (15 days ago)
Vendor:Linux
Product:Kernel
Description:

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation. Vendor: Linux Product: Kernel Action Required: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-15

Vulnerability Type:Remote Code Execution
Required Action:

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vendor:WebPros
Product:cPanel & WHM and WP2 (WordPress Squared)
Description:

WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel. Vendor: WebPros Product: cPanel & WHM and WP2 (WordPress Squared) Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-03

Vulnerability Type:Authentication Bypass
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vendor:ConnectWise
Product:ScreenConnect
Description:

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. Vendor: ConnectWise Product: ScreenConnect Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-12 Ransomware Campaign Use: Known

Vulnerability Type:Directory Traversal
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 27, 2026 (25 days ago)
CVE ID:CVE-2024-1708
CWE:CWE-22
Due Date:May 11, 2026 (12 days ago)
Ransomware Use:Yes
Vendor:Microsoft
Product:Windows
Description:

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. Vendor: Microsoft Product: Windows Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-12

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 27, 2026 (25 days ago)
CVE ID:CVE-2026-32202
CWE:CWE-693
Due Date:May 11, 2026 (12 days ago)
Vendor:D-Link
Product:DIR-823X
Description:

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. Vendor: D-Link Product: DIR-823X Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud service

Vulnerability Type:Command Injection
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 23, 2026 (29 days ago)
CVE ID:CVE-2025-29635
CWE:CWE-77
Due Date:May 7, 2026 (16 days ago)
Vendor:Samsung
Product:MagicINFO 9 Server
Description:

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority. Vendor: Samsung Product: MagicINFO 9 Server Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-08

Vulnerability Type:Directory Traversal
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 23, 2026 (29 days ago)
CVE ID:CVE-2024-7399
CWE:CWE-22, CWE-434
Due Date:May 7, 2026 (16 days ago)
Vendor:SimpleHelp
Product:SimpleHelp
Description:

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. Vendor: SimpleHelp Product: SimpleHelp Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are una

Vulnerability Type:Directory Traversal
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 23, 2026 (29 days ago)
CVE ID:CVE-2024-57728
CWE:CWE-22
Due Date:May 7, 2026 (16 days ago)
Ransomware Use:Yes
Vendor:SimpleHelp
Product:SimpleHelp
Description:

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. Vendor: SimpleHelp Product: SimpleHelp Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-08 Ransomware Campaign Use: K

Vulnerability Type:Local Privilege Escalation
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 23, 2026 (29 days ago)
CVE ID:CVE-2024-57726
CWE:CWE-862
Due Date:May 7, 2026 (16 days ago)
Ransomware Use:Yes
Vendor:Marimo
Product:Marimo
Description:

Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands. Vendor: Marimo Product: Marimo Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-07

Vulnerability Type:Remote Code Execution
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 22, 2026 (30 days ago)
CVE ID:CVE-2026-39987
CWE:CWE-306
Due Date:May 6, 2026 (17 days ago)
Vendor:Microsoft
Product:Defender
Description:

Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally. Vendor: Microsoft Product: Defender Action Required: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due Date: 2026-05-06

Vulnerability Type:Local Privilege Escalation
Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Details

Date Added:April 21, 2026 (31 days ago)
CVE ID:CVE-2026-33825
CWE:CWE-1220
Due Date:May 5, 2026 (18 days ago)