CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2023-4211
5.5
MEDIUM
KEV
EPSS 0.00
ARM GPU Kernel Drivers - Use-After-Free
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
CWE-416
Oct 01, 2023
CVE-2023-41179
7.2
HIGH
KEV
EPSS 0.02
Trend Micro Apex One - Command Injection
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.
Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
CWE-94
Sep 19, 2023
CVE-2023-26369
7.8
HIGH
KEV
EPSS 0.01
Acrobat Reader <23.003.20284, <20.005.30516, <20.005.30514 - RCE
Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-787
Sep 13, 2023
CVE-2023-20269
5.0
MEDIUM
KEV
RANSOMWARE
EPSS 0.01
Cisco ASA/FTD - Auth Bypass
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
Notes:
Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
CWE-288
Sep 06, 2023
CVE-2023-36761
6.5
MEDIUM
KEV
EPSS 0.07
Microsoft Word - Info Disclosure
Microsoft Word Information Disclosure Vulnerability
CWE-20
Sep 12, 2023
CVE-2023-41061
7.8
HIGH
KEV
EPSS 0.01
watchOS <9.6.2-iPadOS <16.6.1 - RCE
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-20
Sep 07, 2023
CVE-2023-26359
9.8
CRITICAL
KEV
EPSS 0.86
Adobe ColdFusion <2018 Update 15, 2021 Update 5 - Code Injection
Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.
CWE-502
Mar 23, 2023
CVE-2023-38180
7.5
HIGH
KEV
EPSS 0.01
.NET - DoS
.NET and Visual Studio Denial of Service Vulnerability
CWE-400
Aug 08, 2023
CVE-2023-35081
7.2
HIGH
KEV
EPSS 0.91
Ivanti Endpoint Manager Mobile < 11.8.1.2 - Path Traversal
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance.
CWE-22
Aug 03, 2023
CVE-2023-37580
6.1
MEDIUM
KEV
NUCLEI
EPSS 0.94
Synacor Zimbra Collaboration Suite < 8.8.15 - XSS
Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41 allows XSS in the Zimbra Classic Web Client.
CWE-79
Jul 31, 2023
CVE-2023-38606
5.5
MEDIUM
KEV
EPSS 0.00
Apple - Info Disclosure
This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
Jul 27, 2023
CVE-2023-38205
7.5
HIGH
KEV
NUCLEI
EPSS 0.94
Adobe ColdFusion <2018u18,2021u8,2023u2 - Privilege Escalation
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CWE-284
Sep 14, 2023
CVE-2023-29298
7.5
HIGH
KEV
NUCLEI
EPSS 0.94
Adobe ColdFusion <2018u16, 2021u6, 2023.0.0.330468 - Security Featu...
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CWE-284
Jul 12, 2023
CVE-2023-37450
8.8
HIGH
KEV
EPSS 0.00
Apple Safari < 16.5.2 - Denial of Service
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Jul 27, 2023
CVE-2023-35311
8.8
HIGH
KEV
EPSS 0.00
Microsoft 365 Apps - TOCTOU Race Condition
Microsoft Outlook Security Feature Bypass Vulnerability
CWE-367
Jul 11, 2023
CVE-2023-32049
8.8
HIGH
KEV
EPSS 0.09
Windows SmartScreen - Privilege Escalation
Windows SmartScreen Security Feature Bypass Vulnerability
Jul 11, 2023
CVE-2023-32046
7.8
HIGH
KEV
EPSS 0.43
Windows MSHTML - Privilege Escalation
Windows MSHTML Platform Elevation of Privilege Vulnerability
Jul 11, 2023
CVE-2023-32439
8.8
HIGH
KEV
EPSS 0.01
Apple Safari < 16.5.1 - Type Confusion
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-843
Jun 23, 2023
CVE-2023-32435
8.8
HIGH
KEV
EPSS 0.00
Apple Safari < 16.4 - Out-of-Bounds Write
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
CWE-787
Jun 23, 2023
CVE-2023-27992
9.8
CRITICAL
KEV
EPSS 0.87
Zyxel Nas326 Firmware < 5.21\(aazf.14\)c0 - OS Command Injection
The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request.
CWE-78
Jun 19, 2023