CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 19m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2021-20124
7.5
HIGH
KEV
NUCLEI
EPSS 0.94
Draytek Vigorconnect - Path Traversal
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CWE-22
Oct 13, 2021
CVE-2021-20123
7.5
HIGH
KEV
NUCLEI
EPSS 0.94
Draytek Vigorconnect - Path Traversal
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CWE-22
Oct 13, 2021
CVE-2021-31196
7.2
HIGH
KEV
EPSS 0.03
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Jul 14, 2021
CVE-2021-40655
7.5
HIGH
KEV
1 Writeup
NUCLEI
EPSS 0.93
D-LINK-DIR-605 B2 - Info Disclosure
An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CWE-863
Sep 24, 2021
CVE-2021-36380
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Sunhillo SureLine <8.7.0.1.1 - Code Injection
Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.
CWE-78
Aug 13, 2021
CVE-2021-29256
8.8
HIGH
KEV
EPSS 0.00
ARM Bifrost Gpu Kernel Driver < r30p0 - Use After Free
. The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0.
CWE-416
May 24, 2021
CVE-2021-25489
3.3
LOW
KEV
EPSS 0.00
Modem Interface Driver <SMR Oct-2021 Release 1 - Buffer Overflow
Assuming radio permission is gained, missing input validation in modem interface driver prior to SMR Oct-2021 Release 1 results in format string bug leading to kernel panic.
CWE-134
Oct 06, 2021
CVE-2021-25487
7.3
HIGH
KEV
EPSS 0.03
Modem Interface Driver <SMR Oct-2021 Release 1 - RCE
Lack of boundary checking of a buffer in set_skb_priv() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read and it results in arbitrary code execution by dereference of invalid function pointer.
CWE-125
Oct 06, 2021
CVE-2021-25395
6.4
MEDIUM
KEV
EPSS 0.00
MFC Charger Driver <SMR MAY-2021 Release 1 - Privilege Escalation
A race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows local attackers to bypass signature check given a radio privilege is compromised.
CWE-362
Jun 11, 2021
CVE-2021-25394
6.4
MEDIUM
KEV
EPSS 0.00
MFC Charger Driver <SMR MAY-2021 Release 1 - Use After Free
A use after free vulnerability via race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows arbitrary write given a radio privilege is compromised.
CWE-362
Jun 11, 2021
CVE-2021-25372
6.1
MEDIUM
KEV
EPSS 0.02
DSP driver <SMR Mar-2021 Release 1 - Memory Corruption
An improper boundary check in DSP driver prior to SMR Mar-2021 Release 1 allows out of bounds memory access.
CWE-703
Mar 26, 2021
CVE-2021-25371
6.1
MEDIUM
KEV
EPSS 0.02
DSP driver <SMR Mar-2021 Release 1 - Code Injection
A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP.
CWE-912
Mar 26, 2021
CVE-2021-27878
8.8
HIGH
KEV
RANSOMWARE
EPSS 0.01
Veritas Backup Exec <21.2 - Auth Bypass
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges.
Mar 01, 2021
CVE-2021-27877
8.2
HIGH
KEV
RANSOMWARE
NUCLEI
EPSS 0.41
Veritas Backup Exec <21.2 - Privilege Escalation
An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
Mar 01, 2021
CVE-2021-30900
7.8
HIGH
KEV
EPSS 0.00
iOS <15.1 - Code Injection
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A malicious application may be able to execute arbitrary code with kernel privileges.
CWE-787
Aug 24, 2021
CVE-2021-25370
6.1
MEDIUM
KEV
EPSS 0.00
dpu driver <SMR Mar-2021 Release 1 - Memory Corruption
An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.
CWE-703
Mar 26, 2021
CVE-2021-25369
6.2
MEDIUM
KEV
EPSS 0.00
sec_log <SMR MAR-2021 Release 1 - Info Disclosure
An improper access control vulnerability in sec_log file prior to SMR MAR-2021 Release 1 exposes sensitive kernel information to userspace.
CWE-200
Mar 26, 2021
CVE-2021-39226
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.94
Grafana < 7.5.11 - Missing Authorization
Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.
CWE-862
Oct 05, 2021
CVE-2021-38406
7.8
HIGH
KEV
EPSS 0.68
Delta Electronic DOPSoft 2 <2.00.07 - Code Injection
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.
CWE-787
Sep 17, 2021
CVE-2021-31010
7.5
HIGH
KEV
EPSS 0.01
Apple - Use After Free
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..
CWE-502
Aug 24, 2021