CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
607 results Clear all
CVE-2023-4211 5.5 MEDIUM KEV EPSS 0.00
ARM GPU Kernel Drivers - Use-After-Free
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
CWE-416 Oct 01, 2023
CVE-2023-41179 7.2 HIGH KEV EPSS 0.02
Trend Micro Apex One - Command Injection
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
CWE-94 Sep 19, 2023
CVE-2023-26369 7.8 HIGH KEV EPSS 0.01
Acrobat Reader <23.003.20284, <20.005.30516, <20.005.30514 - RCE
Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-787 Sep 13, 2023
CVE-2023-20269 5.0 MEDIUM KEV RANSOMWARE EPSS 0.01
Cisco ASA/FTD - Auth Bypass
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). Notes: Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
CWE-288 Sep 06, 2023
CVE-2023-36761 6.5 MEDIUM KEV EPSS 0.07
Microsoft Word - Info Disclosure
Microsoft Word Information Disclosure Vulnerability
CWE-20 Sep 12, 2023
CVE-2023-41061 7.8 HIGH KEV EPSS 0.01
watchOS <9.6.2-iPadOS <16.6.1 - RCE
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-20 Sep 07, 2023
CVE-2023-26359 9.8 CRITICAL KEV EPSS 0.86
Adobe ColdFusion <2018 Update 15, 2021 Update 5 - Code Injection
Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.
CWE-502 Mar 23, 2023
CVE-2023-38180 7.5 HIGH KEV EPSS 0.01
.NET - DoS
.NET and Visual Studio Denial of Service Vulnerability
CWE-400 Aug 08, 2023
CVE-2023-35081 7.2 HIGH KEV EPSS 0.91
Ivanti Endpoint Manager Mobile < 11.8.1.2 - Path Traversal
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance.
CWE-22 Aug 03, 2023
CVE-2023-37580 6.1 MEDIUM KEV NUCLEI EPSS 0.94
Synacor Zimbra Collaboration Suite < 8.8.15 - XSS
Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41 allows XSS in the Zimbra Classic Web Client.
CWE-79 Jul 31, 2023
CVE-2023-38606 5.5 MEDIUM KEV EPSS 0.00
Apple - Info Disclosure
This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
Jul 27, 2023
CVE-2023-38205 7.5 HIGH KEV NUCLEI EPSS 0.94
Adobe ColdFusion <2018u18,2021u8,2023u2 - Privilege Escalation
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CWE-284 Sep 14, 2023
CVE-2023-29298 7.5 HIGH KEV NUCLEI EPSS 0.94
Adobe ColdFusion <2018u16, 2021u6, 2023.0.0.330468 - Security Featu...
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CWE-284 Jul 12, 2023
CVE-2023-37450 8.8 HIGH KEV EPSS 0.00
Apple Safari < 16.5.2 - Denial of Service
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Jul 27, 2023
CVE-2023-35311 8.8 HIGH KEV EPSS 0.00
Microsoft 365 Apps - TOCTOU Race Condition
Microsoft Outlook Security Feature Bypass Vulnerability
CWE-367 Jul 11, 2023
CVE-2023-32049 8.8 HIGH KEV EPSS 0.09
Windows SmartScreen - Privilege Escalation
Windows SmartScreen Security Feature Bypass Vulnerability
Jul 11, 2023
CVE-2023-32046 7.8 HIGH KEV EPSS 0.43
Windows MSHTML - Privilege Escalation
Windows MSHTML Platform Elevation of Privilege Vulnerability
Jul 11, 2023
CVE-2023-32439 8.8 HIGH KEV EPSS 0.01
Apple Safari < 16.5.1 - Type Confusion
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-843 Jun 23, 2023
CVE-2023-32435 8.8 HIGH KEV EPSS 0.00
Apple Safari < 16.4 - Out-of-Bounds Write
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
CWE-787 Jun 23, 2023
CVE-2023-27992 9.8 CRITICAL KEV EPSS 0.87
Zyxel Nas326 Firmware < 5.21\(aazf.14\)c0 - OS Command Injection
The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request.
CWE-78 Jun 19, 2023