CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
607 results Clear all
CVE-2021-37415 9.8 CRITICAL KEV NUCLEI EPSS 0.92
Zohocorp Manageengine Servicedesk Plus - Missing Authentication
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
CWE-306 Sep 01, 2021
CVE-2021-38000 6.1 MEDIUM KEV EPSS 0.05
Google Chrome <95.0.4638.69 - Open Redirect
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.
CWE-20 Nov 23, 2021
CVE-2021-27561 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Yealink DM 3.6.0.20 - Command Injection
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CWE-78 Oct 15, 2021
CVE-2021-37976 6.5 MEDIUM KEV EPSS 0.08
Google Chrome < 94.0.4606.71 - Missing Authorization
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
CWE-862 Oct 08, 2021
CVE-2021-37975 8.8 HIGH KEV EPSS 0.63
Google Chrome < 94.0.4606.71 - Use After Free
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416 Oct 08, 2021
CVE-2021-37973 9.6 CRITICAL KEV EPSS 0.06
Google Chrome < 94.0.4606.61 - Use After Free
Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CWE-416 Oct 08, 2021
CVE-2021-30633 9.6 CRITICAL KEV EPSS 0.38
Google Chrome <93.0.4577.82 - Use After Free
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CWE-416 Oct 08, 2021
CVE-2021-38649 7.0 HIGH KEV EPSS 0.05
Open Management Infrastructure - Privilege Escalation
Open Management Infrastructure Elevation of Privilege Vulnerability
Sep 15, 2021
CVE-2021-38645 7.8 HIGH KEV EPSS 0.12
Open Management Infrastructure - Privilege Escalation
Open Management Infrastructure Elevation of Privilege Vulnerability
Sep 15, 2021
CVE-2021-30713 7.8 HIGH KEV EPSS 0.00
macOS Big Sur <11.4 - Privilege Escalation
A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited..
CWE-862 Sep 08, 2021
CVE-2021-30666 8.8 HIGH KEV EPSS 0.01
iOS <12.5.3 - RCE
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-119 Sep 08, 2021
CVE-2021-30665 8.8 HIGH KEV EPSS 0.01
Apple Ipados < 14.5.1 - Out-of-Bounds Write
A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-787 Sep 08, 2021
CVE-2021-30663 8.8 HIGH KEV EPSS 0.01
iOS <14.5.1 - RCE
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution.
CWE-190 Sep 08, 2021
CVE-2021-30661 8.8 HIGH KEV EPSS 0.00
Safari <14.1 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-416 Sep 08, 2021
CVE-2021-30762 8.8 HIGH KEV EPSS 0.00
iOS <12.5.4 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-416 Sep 08, 2021
CVE-2021-30761 8.8 HIGH KEV EPSS 0.00
iOS <12.5.4 - Code Injection
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-787 Sep 08, 2021
CVE-2021-28550 8.8 HIGH KEV EPSS 0.33
Adobe Acrobat DC < 21.001.20150 - Use After Free
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Sep 02, 2021
CVE-2021-30869 7.8 HIGH KEV EPSS 0.02
iOS <12.5.5, iPadOS <14.4, macOS Big Sur <11.2 - Code Injection
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.
CWE-843 Aug 24, 2021
CVE-2021-35395 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Realtek Jungle SDK <3.4.14B - Buffer Overflow
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.
Aug 16, 2021
CVE-2021-36948 7.8 HIGH KEV EPSS 0.01
Windows Update Medic Service - Privilege Escalation
Windows Update Medic Service Elevation of Privilege Vulnerability
Aug 12, 2021