CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2025-21334 7.8 HIGH KEV EPSS 0.07
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Use After Free
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-416 Jan 14, 2025
CVE-2024-57728 7.2 HIGH KEV RANSOMWARE EPSS 0.01
Simple-help Simplehelp < 5.5.8 - Symlink Following
SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
CWE-22 Jan 15, 2025
CVE-2024-57726 9.9 CRITICAL KEV RANSOMWARE EPSS 0.00
Simple-help Simplehelp < 5.5.8 - Missing Authorization
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
CWE-862 Jan 15, 2025
CVE-2024-7694 7.2 HIGH KEV EPSS 0.01
Teamt5 Threatsonar Anti-ransomware < 3.5.0 - Unrestricted File Upload
ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server.
CWE-434 Aug 12, 2024
CVE-2024-37079 9.8 CRITICAL KEV EPSS 0.82
Vmware Cloud Foundation < 5.2 - Out-of-Bounds Write
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CWE-787 Jun 18, 2024
CVE-2024-8068 8.0 HIGH KEV EPSS 0.08
Citrix Session Recording - Privilege Escalation
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
CWE-269 Nov 12, 2024
CVE-2024-0769 5.3 MEDIUM KEV 1 Writeup EPSS 0.75
D-Link DIR-859 1.06B01 - Path Traversal
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CWE-22 Jan 21, 2024
CVE-2024-11182 6.1 MEDIUM KEV EPSS 0.15
Mdaemon < 24.5.1 - XSS
An XSS issue was discovered in MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window.
CWE-79 Nov 15, 2024
CVE-2024-27443 6.1 MEDIUM KEV NUCLEI EPSS 0.32
Zimbra Collaboration - Cross-Site Scripting (XSS)
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
CWE-79 Aug 12, 2024
CVE-2024-12987 7.3 HIGH KEV NUCLEI EPSS 0.79
Draytek Vigor300b Firmware - Command Injection
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
CWE-78 Dec 27, 2024
CVE-2024-6047 9.8 CRITICAL KEV EPSS 0.73
Geovision Gv-dsp Lpr Firmware - OS Command Injection
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
CWE-78 Jun 17, 2024
CVE-2024-58136 9.0 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.58
Yii 2 <2.0.52 - RCE
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
CWE-424 Apr 10, 2025
CVE-2024-53197 7.8 HIGH KEV EPSS 0.02
Linux Kernel < 4.19.325 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
CWE-787 Dec 27, 2024
CVE-2024-53150 7.1 HIGH KEV EPSS 0.01
Debian Linux < 5.4.287 - Out-of-Bounds Read
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.
CWE-125 Dec 24, 2024
CVE-2024-20439 9.8 CRITICAL KEV NUCLEI EPSS 0.86
Cisco Smart Licensing Utility - Auth Bypass
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CWE-912 Sep 04, 2024
CVE-2024-57968 9.9 CRITICAL KEV EPSS 0.44
Advantive Veracore < 2024.4.2.1 - Unrestricted File Upload
Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this.
CWE-434 Feb 03, 2025
CVE-2024-13161 9.8 CRITICAL KEV NUCLEI EPSS 0.92
Ivanti EPM - Path Traversal
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
CWE-36 Jan 14, 2025
CVE-2024-13160 9.8 CRITICAL KEV NUCLEI EPSS 0.93
Ivanti EPM - Path Traversal
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
CWE-36 Jan 14, 2025
CVE-2024-50302 5.5 MEDIUM KEV EPSS 0.02
Google Android < 4.19.324 - Use of Uninitialized Resource
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
CWE-908 Nov 19, 2024
CVE-2024-49035 8.7 HIGH KEV EPSS 0.06
Microsoft Partner Center - Improper Privilege Management
An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network.
CWE-269 Nov 26, 2024