CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
607 results Clear all
CVE-2022-41033 7.8 HIGH KEV EPSS 0.02
Windows COM+ Event System Service - Privilege Escalation
Windows COM+ Event System Service Elevation of Privilege Vulnerability
CWE-843 Oct 11, 2022
CVE-2022-40139 7.2 HIGH KEV EPSS 0.09
Trendmicro Apex One - Remote Code Execution
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
Sep 19, 2022
CVE-2022-32917 7.8 HIGH KEV EPSS 0.01
Apple Ipados < 15.7 - Out-of-Bounds Write
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-787 Sep 20, 2022
CVE-2022-3075 9.6 CRITICAL KEV EPSS 0.02
Google Chrome <105.0.5195.102 - RCE
Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CWE-20 Sep 26, 2022
CVE-2022-27593 10.0 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.93
QNAP NAS - Path Traversal
An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later
CWE-610 Sep 08, 2022
CVE-2022-26258 9.8 CRITICAL KEV 1 Writeup EPSS 0.87
D-Link DIR-820L <1.05B03 - RCE
D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
CWE-78 Mar 28, 2022
CVE-2022-2294 8.8 HIGH KEV RANSOMWARE EPSS 0.01
Google Chrome < 103.0.5060.114 - Out-of-Bounds Write
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787 Jul 28, 2022
CVE-2022-0028 8.6 HIGH KEV EPSS 0.05
Paloaltonetworks Pan-os < 8.1.23 - Denial of Service
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.
CWE-406 Aug 10, 2022
CVE-2022-2856 6.5 MEDIUM KEV EPSS 0.05
Google Chrome <104.0.5112.101 - XSS
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.
CWE-20 Sep 26, 2022
CVE-2022-32894 7.8 HIGH KEV EPSS 0.00
Apple Ipados < 15.6.1 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
CWE-787 Aug 24, 2022
CVE-2022-32893 8.8 HIGH KEV EPSS 0.00
Apple Safari < 15.6.1 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-787 Aug 24, 2022
CVE-2022-34713 7.8 HIGH KEV EPSS 0.03
Microsoft Windows 10 1507 < 10.0.10240.19387 - Remote Code Execution
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
Aug 09, 2022
CVE-2022-27924 7.5 HIGH KEV RANSOMWARE NUCLEI EPSS 0.91
Synacor Zimbra Collaboration Suite - Injection
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker to inject arbitrary memcache commands into a targeted instance. These memcache commands becomes unescaped, causing an overwrite of arbitrary cached entries.
CWE-74 Apr 21, 2022
CVE-2022-22047 7.8 HIGH KEV EPSS 0.01
Windows Client Server Run-time Subsystem - Privilege Escalation
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CWE-426 Jul 12, 2022
CVE-2022-26925 8.1 HIGH KEV RANSOMWARE EPSS 0.38
Windows LSA - Privilege Escalation
Windows LSA Spoofing Vulnerability
CWE-306 May 10, 2022
CVE-2022-29499 9.8 CRITICAL KEV RANSOMWARE EPSS 0.89
Mitel Mivoice Connect < 22.20.2300.0 - Improper Input Validation
The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.
CWE-20 Apr 26, 2022
CVE-2022-20821 6.5 MEDIUM KEV EPSS 0.09
Cisco Ios XR - Information Disclosure
A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.
CWE-200 May 26, 2022
CVE-2022-21919 7.0 HIGH KEV EPSS 0.00
Windows User Profile Service - Privilege Escalation
Windows User Profile Service Elevation of Privilege Vulnerability
CWE-59 Jan 11, 2022
CVE-2022-23176 8.8 HIGH KEV EPSS 0.10
WatchGuard Firebox/XTM - Privilege Escalation
WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access. This vulnerability impacts Fireware OS before 12.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3.
Feb 24, 2022
CVE-2022-22675 7.8 HIGH KEV EPSS 0.01
Apple Ipados < 15.4.1 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-787 May 26, 2022