CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2025-21334
7.8
HIGH
KEV
EPSS 0.07
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Use After Free
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-416
Jan 14, 2025
CVE-2024-57728
7.2
HIGH
KEV
RANSOMWARE
EPSS 0.01
Simple-help Simplehelp < 5.5.8 - Symlink Following
SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
CWE-22
Jan 15, 2025
CVE-2024-57726
9.9
CRITICAL
KEV
RANSOMWARE
EPSS 0.00
Simple-help Simplehelp < 5.5.8 - Missing Authorization
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
CWE-862
Jan 15, 2025
CVE-2024-7694
7.2
HIGH
KEV
EPSS 0.01
Teamt5 Threatsonar Anti-ransomware < 3.5.0 - Unrestricted File Upload
ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server.
CWE-434
Aug 12, 2024
CVE-2024-37079
9.8
CRITICAL
KEV
EPSS 0.82
Vmware Cloud Foundation < 5.2 - Out-of-Bounds Write
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CWE-787
Jun 18, 2024
CVE-2024-8068
8.0
HIGH
KEV
EPSS 0.08
Citrix Session Recording - Privilege Escalation
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
CWE-269
Nov 12, 2024
CVE-2024-0769
5.3
MEDIUM
KEV
1 Writeup
EPSS 0.75
D-Link DIR-859 1.06B01 - Path Traversal
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CWE-22
Jan 21, 2024
CVE-2024-11182
6.1
MEDIUM
KEV
EPSS 0.15
Mdaemon < 24.5.1 - XSS
An XSS issue was discovered in
MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message
with
JavaScript in an img tag. This could
allow a remote attacker
to load arbitrary JavaScript code in the context of a webmail user's browser window.
CWE-79
Nov 15, 2024
CVE-2024-27443
6.1
MEDIUM
KEV
NUCLEI
EPSS 0.32
Zimbra Collaboration - Cross-Site Scripting (XSS)
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
CWE-79
Aug 12, 2024
CVE-2024-12987
7.3
HIGH
KEV
NUCLEI
EPSS 0.79
Draytek Vigor300b Firmware - Command Injection
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
CWE-78
Dec 27, 2024
CVE-2024-6047
9.8
CRITICAL
KEV
EPSS 0.73
Geovision Gv-dsp Lpr Firmware - OS Command Injection
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
CWE-78
Jun 17, 2024
CVE-2024-58136
9.0
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.58
Yii 2 <2.0.52 - RCE
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
CWE-424
Apr 10, 2025
CVE-2024-53197
7.8
HIGH
KEV
EPSS 0.02
Linux Kernel < 4.19.325 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev->config.
This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
CWE-787
Dec 27, 2024
CVE-2024-53150
7.1
HIGH
KEV
EPSS 0.01
Debian Linux < 5.4.287 - Out-of-Bounds Read
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors. That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.
For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal. When the descriptor
length is shorter than expected, it's skipped in the loop.
For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
CWE-125
Dec 24, 2024
CVE-2024-20439
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.86
Cisco Smart Licensing Utility - Auth Bypass
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.
This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CWE-912
Sep 04, 2024
CVE-2024-57968
9.9
CRITICAL
KEV
EPSS 0.44
Advantive Veracore < 2024.4.2.1 - Unrestricted File Upload
Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this.
CWE-434
Feb 03, 2025
CVE-2024-13161
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.92
Ivanti EPM - Path Traversal
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
CWE-36
Jan 14, 2025
CVE-2024-13160
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.93
Ivanti EPM - Path Traversal
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
CWE-36
Jan 14, 2025
CVE-2024-50302
5.5
MEDIUM
KEV
EPSS 0.02
Google Android < 4.19.324 - Use of Uninitialized Resource
In the Linux kernel, the following vulnerability has been resolved:
HID: core: zero-initialize the report buffer
Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
CWE-908
Nov 19, 2024
CVE-2024-49035
8.7
HIGH
KEV
EPSS 0.06
Microsoft Partner Center - Improper Privilege Management
An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network.
CWE-269
Nov 26, 2024