CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2024-20953 8.8 HIGH KEV EPSS 0.67
Oracle Agile Product Lifecycle Management - Insecure Deserialization
Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Feb 17, 2024
CVE-2024-41710 7.2 HIGH KEV 1 Writeup EPSS 0.20
Mitel 6800-6900w Series - Command Injection
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CWE-88 Aug 12, 2024
CVE-2024-40891 8.8 HIGH KEV EPSS 0.53
Zyxel VMG4325-B10A - Command Injection
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
CWE-78 Feb 04, 2025
CVE-2024-40890 8.8 HIGH KEV EPSS 0.46
Zyxel VMG4325-B10A - Command Injection
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.
CWE-78 Feb 04, 2025
CVE-2024-53104 7.8 HIGH KEV EPSS 0.13
Debian Linux < 4.19.324 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.
CWE-787 Dec 02, 2024
CVE-2024-12686 6.6 MEDIUM KEV EPSS 0.32
Beyondtrust Privileged Remote Access < 24.3.1 - OS Command Injection
A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user.
CWE-78 Dec 18, 2024
CVE-2024-55550 2.7 LOW KEV RANSOMWARE NUCLEI EPSS 0.18
Mitel Micollab < 9.8.1.201 - Path Traversal
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CWE-22 Dec 10, 2024
CVE-2024-11667 7.5 HIGH KEV RANSOMWARE EPSS 0.29
Zyxel ATP-USG FLEX-50(W) - Path Traversal
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
CWE-22 Nov 27, 2024
CVE-2024-44309 6.3 MEDIUM KEV EPSS 0.01
Debian Linux < 18.1.1 - XSS
A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
CWE-79 Nov 20, 2024
CVE-2024-21287 7.5 HIGH KEV EPSS 0.70
Oracle Agile Product Lifecycle Management - Incorrect Authorization
Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-863 Nov 18, 2024
CVE-2024-38813 7.5 HIGH KEV EPSS 0.30
Vmware Cloud Foundation < 5.2 - Privilege Escalation
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
CWE-273 Sep 17, 2024
CVE-2024-38812 9.8 CRITICAL KEV EPSS 0.78
Vmware Cloud Foundation < 5.2 - Out-of-Bounds Write
The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CWE-122 Sep 17, 2024
CVE-2024-8957 7.2 HIGH KEV RANSOMWARE EPSS 0.56
Ptzoptics Pt30x-sdi Firmware < 6.3.40 - OS Command Injection
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices.
CWE-78 Sep 17, 2024
CVE-2024-8956 9.1 CRITICAL KEV EPSS 0.84
Ptzoptics Pt30x-sdi Firmware < 6.3.40 - Missing Authentication
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file.
CWE-287 Sep 17, 2024
CVE-2024-20481 5.8 MEDIUM KEV EPSS 0.11
Cisco ASA/FTD - DoS
A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service. This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected. Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials.
CWE-772 Oct 23, 2024
CVE-2024-38094 7.2 HIGH KEV RANSOMWARE EPSS 0.64
Microsoft SharePoint - RCE
Microsoft SharePoint Remote Code Execution Vulnerability
CWE-502 Jul 09, 2024
CVE-2024-9537 9.8 CRITICAL KEV EPSS 0.64
ScienceLogic SL1 - Unspecified Vuln
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
Oct 18, 2024
CVE-2024-9380 7.2 HIGH KEV EPSS 0.88
Ivanti Endpoint Manager Cloud Services Appliance - Command Injection
An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.
CWE-78 Oct 08, 2024
CVE-2024-9379 6.5 MEDIUM KEV EPSS 0.82
Ivanti Endpoint Manager Cloud Services Appliance - SQL Injection
SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.
CWE-89 Oct 08, 2024
CVE-2024-43573 6.5 MEDIUM KEV EPSS 0.18
Microsoft Windows 10 1507 < 10.0.10240.20796 - XSS
Windows MSHTML Platform Spoofing Vulnerability
CWE-79 Oct 08, 2024