CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 19m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
607 results Clear all
CVE-2021-20124 7.5 HIGH KEV NUCLEI EPSS 0.94
Draytek Vigorconnect - Path Traversal
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CWE-22 Oct 13, 2021
CVE-2021-20123 7.5 HIGH KEV NUCLEI EPSS 0.94
Draytek Vigorconnect - Path Traversal
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CWE-22 Oct 13, 2021
CVE-2021-31196 7.2 HIGH KEV EPSS 0.03
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Jul 14, 2021
CVE-2021-40655 7.5 HIGH KEV 1 Writeup NUCLEI EPSS 0.93
D-LINK-DIR-605 B2 - Info Disclosure
An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CWE-863 Sep 24, 2021
CVE-2021-36380 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Sunhillo SureLine <8.7.0.1.1 - Code Injection
Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.
CWE-78 Aug 13, 2021
CVE-2021-29256 8.8 HIGH KEV EPSS 0.00
ARM Bifrost Gpu Kernel Driver < r30p0 - Use After Free
. The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0.
CWE-416 May 24, 2021
CVE-2021-25489 3.3 LOW KEV EPSS 0.00
Modem Interface Driver <SMR Oct-2021 Release 1 - Buffer Overflow
Assuming radio permission is gained, missing input validation in modem interface driver prior to SMR Oct-2021 Release 1 results in format string bug leading to kernel panic.
CWE-134 Oct 06, 2021
CVE-2021-25487 7.3 HIGH KEV EPSS 0.03
Modem Interface Driver <SMR Oct-2021 Release 1 - RCE
Lack of boundary checking of a buffer in set_skb_priv() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read and it results in arbitrary code execution by dereference of invalid function pointer.
CWE-125 Oct 06, 2021
CVE-2021-25395 6.4 MEDIUM KEV EPSS 0.00
MFC Charger Driver <SMR MAY-2021 Release 1 - Privilege Escalation
A race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows local attackers to bypass signature check given a radio privilege is compromised.
CWE-362 Jun 11, 2021
CVE-2021-25394 6.4 MEDIUM KEV EPSS 0.00
MFC Charger Driver <SMR MAY-2021 Release 1 - Use After Free
A use after free vulnerability via race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows arbitrary write given a radio privilege is compromised.
CWE-362 Jun 11, 2021
CVE-2021-25372 6.1 MEDIUM KEV EPSS 0.02
DSP driver <SMR Mar-2021 Release 1 - Memory Corruption
An improper boundary check in DSP driver prior to SMR Mar-2021 Release 1 allows out of bounds memory access.
CWE-703 Mar 26, 2021
CVE-2021-25371 6.1 MEDIUM KEV EPSS 0.02
DSP driver <SMR Mar-2021 Release 1 - Code Injection
A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP.
CWE-912 Mar 26, 2021
CVE-2021-27878 8.8 HIGH KEV RANSOMWARE EPSS 0.01
Veritas Backup Exec <21.2 - Auth Bypass
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges.
Mar 01, 2021
CVE-2021-27877 8.2 HIGH KEV RANSOMWARE NUCLEI EPSS 0.41
Veritas Backup Exec <21.2 - Privilege Escalation
An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
Mar 01, 2021
CVE-2021-30900 7.8 HIGH KEV EPSS 0.00
iOS <15.1 - Code Injection
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A malicious application may be able to execute arbitrary code with kernel privileges.
CWE-787 Aug 24, 2021
CVE-2021-25370 6.1 MEDIUM KEV EPSS 0.00
dpu driver <SMR Mar-2021 Release 1 - Memory Corruption
An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.
CWE-703 Mar 26, 2021
CVE-2021-25369 6.2 MEDIUM KEV EPSS 0.00
sec_log <SMR MAR-2021 Release 1 - Info Disclosure
An improper access control vulnerability in sec_log file prior to SMR MAR-2021 Release 1 exposes sensitive kernel information to userspace.
CWE-200 Mar 26, 2021
CVE-2021-39226 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.94
Grafana < 7.5.11 - Missing Authorization
Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.
CWE-862 Oct 05, 2021
CVE-2021-38406 7.8 HIGH KEV EPSS 0.68
Delta Electronic DOPSoft 2 <2.00.07 - Code Injection
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.
CWE-787 Sep 17, 2021
CVE-2021-31010 7.5 HIGH KEV EPSS 0.01
Apple - Use After Free
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..
CWE-502 Aug 24, 2021