CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2024-20953
8.8
HIGH
KEV
EPSS 0.67
Oracle Agile Product Lifecycle Management - Insecure Deserialization
Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
CWE-502
Feb 17, 2024
CVE-2024-41710
7.2
HIGH
KEV
1 Writeup
EPSS 0.20
Mitel 6800-6900w Series - Command Injection
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CWE-88
Aug 12, 2024
CVE-2024-40891
8.8
HIGH
KEV
EPSS 0.53
Zyxel VMG4325-B10A - Command Injection
**UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
CWE-78
Feb 04, 2025
CVE-2024-40890
8.8
HIGH
KEV
EPSS 0.46
Zyxel VMG4325-B10A - Command Injection
**UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.
CWE-78
Feb 04, 2025
CVE-2024-53104
7.8
HIGH
KEV
EPSS 0.13
Debian Linux < 4.19.324 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
CWE-787
Dec 02, 2024
CVE-2024-12686
6.6
MEDIUM
KEV
EPSS 0.32
Beyondtrust Privileged Remote Access < 24.3.1 - OS Command Injection
A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user.
CWE-78
Dec 18, 2024
CVE-2024-55550
2.7
LOW
KEV
RANSOMWARE
NUCLEI
EPSS 0.18
Mitel Micollab < 9.8.1.201 - Path Traversal
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CWE-22
Dec 10, 2024
CVE-2024-11667
7.5
HIGH
KEV
RANSOMWARE
EPSS 0.29
Zyxel ATP-USG FLEX-50(W) - Path Traversal
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
CWE-22
Nov 27, 2024
CVE-2024-44309
6.3
MEDIUM
KEV
EPSS 0.01
Debian Linux < 18.1.1 - XSS
A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
CWE-79
Nov 20, 2024
CVE-2024-21287
7.5
HIGH
KEV
EPSS 0.70
Oracle Agile Product Lifecycle Management - Incorrect Authorization
Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-863
Nov 18, 2024
CVE-2024-38813
7.5
HIGH
KEV
EPSS 0.30
Vmware Cloud Foundation < 5.2 - Privilege Escalation
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
CWE-273
Sep 17, 2024
CVE-2024-38812
9.8
CRITICAL
KEV
EPSS 0.78
Vmware Cloud Foundation < 5.2 - Out-of-Bounds Write
The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CWE-122
Sep 17, 2024
CVE-2024-8957
7.2
HIGH
KEV
RANSOMWARE
EPSS 0.56
Ptzoptics Pt30x-sdi Firmware < 6.3.40 - OS Command Injection
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices.
CWE-78
Sep 17, 2024
CVE-2024-8956
9.1
CRITICAL
KEV
EPSS 0.84
Ptzoptics Pt30x-sdi Firmware < 6.3.40 - Missing Authentication
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file.
CWE-287
Sep 17, 2024
CVE-2024-20481
5.8
MEDIUM
KEV
EPSS 0.11
Cisco ASA/FTD - DoS
A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service.
This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected.
Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials.
CWE-772
Oct 23, 2024
CVE-2024-38094
7.2
HIGH
KEV
RANSOMWARE
EPSS 0.64
Microsoft SharePoint - RCE
Microsoft SharePoint Remote Code Execution Vulnerability
CWE-502
Jul 09, 2024
CVE-2024-9537
9.8
CRITICAL
KEV
EPSS 0.64
ScienceLogic SL1 - Unspecified Vuln
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
Oct 18, 2024
CVE-2024-9380
7.2
HIGH
KEV
EPSS 0.88
Ivanti Endpoint Manager Cloud Services Appliance - Command Injection
An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.
CWE-78
Oct 08, 2024
CVE-2024-9379
6.5
MEDIUM
KEV
EPSS 0.82
Ivanti Endpoint Manager Cloud Services Appliance - SQL Injection
SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.
CWE-89
Oct 08, 2024
CVE-2024-43573
6.5
MEDIUM
KEV
EPSS 0.18
Microsoft Windows 10 1507 < 10.0.10240.20796 - XSS
Windows MSHTML Platform Spoofing Vulnerability
CWE-79
Oct 08, 2024