CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2021-30983
7.8
HIGH
KEV
EPSS 0.00
iOS <15.2 - Buffer Overflow
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.2 and iPadOS 15.2. An application may be able to execute arbitrary code with kernel privileges.
CWE-120
Aug 24, 2021
CVE-2021-30533
6.5
MEDIUM
KEV
EPSS 0.11
Google Chrome <91.0.4472.77 - CSRF
Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.
CWE-863
Jun 07, 2021
CVE-2021-1048
7.8
HIGH
KEV
EPSS 0.01
Android - Use After Free
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel
CWE-416
Dec 15, 2021
CVE-2021-0920
6.4
MEDIUM
KEV
EPSS 0.01
Android kernel - Use After Free
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
CWE-362
Dec 15, 2021
CVE-2021-1789
8.8
HIGH
KEV
EPSS 0.00
Apple Ipados < 14.4 - Type Confusion
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.
CWE-843
Apr 02, 2021
CVE-2021-41357
7.8
HIGH
KEV
EPSS 0.05
Win32k - Privilege Escalation
Win32k Elevation of Privilege Vulnerability
Oct 13, 2021
CVE-2021-40450
7.8
HIGH
KEV
EPSS 0.06
Win32k - Privilege Escalation
Win32k Elevation of Privilege Vulnerability
Oct 13, 2021
CVE-2021-39793
7.8
HIGH
KEV
EPSS 0.00
Google Android - Out-of-Bounds Write
In kbase_jd_user_buf_pin_pages of mali_kbase_mem.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210470189References: N/A
CWE-787
Mar 16, 2022
CVE-2021-27852
9.8
CRITICAL
KEV
EPSS 0.26
Checkbox Survey <7 - RCE
Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code. This issue affects: Checkbox Survey versions prior to 7.
CWE-502
May 27, 2021
CVE-2021-45382
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.94
Dlink Dir-820l Firmware - OS Command Injection
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.
CWE-78
Feb 17, 2022
CVE-2021-34484
7.8
HIGH
KEV
EPSS 0.03
Windows User Profile Service - Privilege Escalation
Windows User Profile Service Elevation of Privilege Vulnerability
Aug 12, 2021
CVE-2021-28799
10.0
CRITICAL
KEV
RANSOMWARE
NUCLEI
EPSS 0.91
QNAP HBS 3 - Broken Access Control
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. This issue does not affect: QNAP Systems Inc. HBS 2 . QNAP Systems Inc. HBS 1.3 .
CWE-285
May 13, 2021
CVE-2021-38646
7.8
HIGH
KEV
RANSOMWARE
EPSS 0.51
Microsoft Office Access Connectivity Engine - RCE
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
Sep 15, 2021
CVE-2021-35247
4.3
MEDIUM
KEV
EPSS 0.05
SolarWinds Serv-U - Info Disclosure
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.
CWE-20
Jan 10, 2022
CVE-2021-22991
9.8
CRITICAL
KEV
EPSS 0.73
BIG-IP <16.0.1.1, <15.1.2.1, <14.1.4, <13.1.3.6, <12.1.5.3 - DoS/RCE
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
CWE-119
Mar 31, 2021
CVE-2021-27860
9.8
CRITICAL
KEV
EPSS 0.43
FatPipe WARP/IPVPN/MPVPN <10.1.2r60p92-10.2.2r44p1 - File Upload
A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.
CWE-434
Dec 08, 2021
CVE-2021-22017
5.3
MEDIUM
KEV
NUCLEI
EPSS 0.75
vCenter Server - SSRF
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.
Sep 23, 2021
CVE-2021-4102
8.8
HIGH
KEV
EPSS 0.05
Google Chrome < 96.0.4664.110 - Use After Free
Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416
Feb 11, 2022
CVE-2021-44515
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Zohocorp Manageengine Desktop Central - Remote Code Execution
Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.
Dec 12, 2021
CVE-2021-35394
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Realtek Jungle SDK <3.4.14B - RCE
Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers.
CWE-78
Aug 16, 2021