CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2021-37415
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.92
Zohocorp Manageengine Servicedesk Plus - Missing Authentication
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
CWE-306
Sep 01, 2021
CVE-2021-38000
6.1
MEDIUM
KEV
EPSS 0.05
Google Chrome <95.0.4638.69 - Open Redirect
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.
CWE-20
Nov 23, 2021
CVE-2021-27561
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Yealink DM 3.6.0.20 - Command Injection
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CWE-78
Oct 15, 2021
CVE-2021-37976
6.5
MEDIUM
KEV
EPSS 0.08
Google Chrome < 94.0.4606.71 - Missing Authorization
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
CWE-862
Oct 08, 2021
CVE-2021-37975
8.8
HIGH
KEV
EPSS 0.63
Google Chrome < 94.0.4606.71 - Use After Free
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416
Oct 08, 2021
CVE-2021-37973
9.6
CRITICAL
KEV
EPSS 0.06
Google Chrome < 94.0.4606.61 - Use After Free
Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CWE-416
Oct 08, 2021
CVE-2021-30633
9.6
CRITICAL
KEV
EPSS 0.38
Google Chrome <93.0.4577.82 - Use After Free
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CWE-416
Oct 08, 2021
CVE-2021-38649
7.0
HIGH
KEV
EPSS 0.05
Open Management Infrastructure - Privilege Escalation
Open Management Infrastructure Elevation of Privilege Vulnerability
Sep 15, 2021
CVE-2021-38645
7.8
HIGH
KEV
EPSS 0.12
Open Management Infrastructure - Privilege Escalation
Open Management Infrastructure Elevation of Privilege Vulnerability
Sep 15, 2021
CVE-2021-30713
7.8
HIGH
KEV
EPSS 0.00
macOS Big Sur <11.4 - Privilege Escalation
A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited..
CWE-862
Sep 08, 2021
CVE-2021-30666
8.8
HIGH
KEV
EPSS 0.01
iOS <12.5.3 - RCE
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-119
Sep 08, 2021
CVE-2021-30665
8.8
HIGH
KEV
EPSS 0.01
Apple Ipados < 14.5.1 - Out-of-Bounds Write
A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-787
Sep 08, 2021
CVE-2021-30663
8.8
HIGH
KEV
EPSS 0.01
iOS <14.5.1 - RCE
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution.
CWE-190
Sep 08, 2021
CVE-2021-30661
8.8
HIGH
KEV
EPSS 0.00
Safari <14.1 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-416
Sep 08, 2021
CVE-2021-30762
8.8
HIGH
KEV
EPSS 0.00
iOS <12.5.4 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-416
Sep 08, 2021
CVE-2021-30761
8.8
HIGH
KEV
EPSS 0.00
iOS <12.5.4 - Code Injection
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-787
Sep 08, 2021
CVE-2021-28550
8.8
HIGH
KEV
EPSS 0.33
Adobe Acrobat DC < 21.001.20150 - Use After Free
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416
Sep 02, 2021
CVE-2021-30869
7.8
HIGH
KEV
EPSS 0.02
iOS <12.5.5, iPadOS <14.4, macOS Big Sur <11.2 - Code Injection
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.
CWE-843
Aug 24, 2021
CVE-2021-35395
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Realtek Jungle SDK <3.4.14B - Buffer Overflow
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.
Aug 16, 2021
CVE-2021-36948
7.8
HIGH
KEV
EPSS 0.01
Windows Update Medic Service - Privilege Escalation
Windows Update Medic Service Elevation of Privilege Vulnerability
Aug 12, 2021