CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 18m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2022-22674
5.5
MEDIUM
KEV
EPSS 0.00
Apple Mac OS X < 10.15.7 - Out-of-Bounds Read
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Monterey 12.3.1, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. A local user may be able to read kernel memory.
CWE-125
May 26, 2022
CVE-2022-26871
9.8
CRITICAL
KEV
EPSS 0.19
Trend Micro Apex Central - RCE
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
CWE-345
Mar 29, 2022
CVE-2022-26143
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.89
Mitel MiCollab - Information Disclosure & Denial of Service
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
CWE-306
Mar 10, 2022
CVE-2022-26486
9.6
CRITICAL
KEV
EPSS 0.05
Firefox < 97.0.2 - Use After Free
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
CWE-416
Dec 22, 2022
CVE-2022-20708
10.0
CRITICAL
KEV
EPSS 0.13
Cisco Rv340 Firmware < 1.0.03.24 - OS Command Injection
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
Feb 10, 2022
CVE-2022-20703
10.0
CRITICAL
KEV
EPSS 0.02
Cisco Rv340 Firmware < 1.0.03.24 - Improper Certificate Validation
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-295
Feb 10, 2022
CVE-2022-20701
10.0
CRITICAL
KEV
EPSS 0.06
Cisco Rv340 Firmware < 1.0.03.24 - Out-of-Bounds Write
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-121
Feb 10, 2022
CVE-2022-20700
10.0
CRITICAL
KEV
EPSS 0.22
Cisco Rv340 Firmware < 1.0.03.24 - Out-of-Bounds Write
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-121
Feb 10, 2022
CVE-2022-24682
6.1
MEDIUM
KEV
RANSOMWARE
NUCLEI
EPSS 0.88
Zimbra Collaboration Suite <8.8.15 patch 30 (update 1) - XSS
An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
CWE-116
Feb 09, 2022
CVE-2022-0609
8.8
HIGH
KEV
RANSOMWARE
EPSS 0.47
Google Chrome <98.0.4758.102 - Use After Free
Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416
Apr 05, 2022
CVE-2022-22587
9.8
CRITICAL
KEV
EPSS 0.00
iOS <15.3 - Memory Corruption
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-787
Mar 18, 2022
CVE-2021-30952
7.8
HIGH
KEV
EPSS 0.01
tvOS <15.2 - RCE
An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
CWE-190
Aug 24, 2021
CVE-2021-22681
9.8
CRITICAL
KEV
EPSS 0.15
Rockwell Automation Studio 5000 <21 - Path Traversal
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
CWE-522
Mar 03, 2021
CVE-2021-22175
6.8
MEDIUM
KEV
NUCLEI
EPSS 0.71
Gitlab < 13.6.7 - SSRF
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CWE-918
Jun 11, 2021
CVE-2021-39935
6.8
MEDIUM
KEV
1 Writeup
EPSS 0.58
Gitlab < 14.3.6 - SSRF
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API
CWE-918
Dec 13, 2021
CVE-2021-26829
5.4
MEDIUM
KEV
EPSS 0.07
Scadabr < 0.9.1 - XSS
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
CWE-79
Jun 11, 2021
CVE-2021-32030
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Asus Lyra Mini Firmware < 3.0.0.4.384.46630 - Authentication Bypass
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CWE-287
May 06, 2021
CVE-2021-20035
6.5
MEDIUM
KEV
EPSS 0.05
Sonicwall Sma 200 Firmware < 9.0.0.11-31sv - OS Command Injection
Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.
CWE-78
Sep 27, 2021
CVE-2021-44207
8.1
HIGH
KEV
1 Writeup
EPSS 0.09
Acclaimsystems Usaherds < 7.4.0.1 - Hard-coded Credentials
Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials.
CWE-798
Dec 21, 2021
CVE-2021-40407
7.2
HIGH
KEV
EPSS 0.33
Reolink RLC-410W v3.0.0.136_20121102 - Command Injection
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
CWE-78
Jan 28, 2022