CISA KEV Gaps — Exploited CVEs Missing from KEV
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
607 results
Clear all
CVE-2024-43572
7.8
HIGH
KEV
EPSS 0.49
Microsoft Windows 10 1507 < 10.0.10240.20796 - Remote Code Execution
Microsoft Management Console Remote Code Execution Vulnerability
CWE-707
Oct 08, 2024
CVE-2024-43047
7.8
HIGH
KEV
EPSS 0.02
Qualcomm FastConnect and QCA6174A/QAM8295P Firmware - Memory Corruption
Memory corruption while maintaining memory maps of HLOS memory.
CWE-416
Oct 07, 2024
CVE-2024-43461
8.8
HIGH
KEV
EPSS 0.10
Windows MSHTML - SSRF
Windows MSHTML Platform Spoofing Vulnerability
CWE-451
Sep 10, 2024
CVE-2024-38226
7.3
HIGH
KEV
EPSS 0.01
Microsoft Publisher - Privilege Escalation
Microsoft Publisher Security Feature Bypass Vulnerability
CWE-693
Sep 10, 2024
CVE-2024-38217
5.4
MEDIUM
KEV
EPSS 0.12
Windows - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
CWE-693
Sep 10, 2024
CVE-2024-38014
7.8
HIGH
KEV
EPSS 0.13
Microsoft Windows Installer - Elevation of Privilege
Windows Installer Elevation of Privilege Vulnerability
CWE-269
Sep 10, 2024
CVE-2024-40766
9.8
CRITICAL
KEV
RANSOMWARE
EPSS 0.04
SonicWall - Improper Access Control
An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.
CWE-284
Aug 23, 2024
CVE-2024-7262
7.8
HIGH
KEV
EPSS 0.12
Kingsoft Wps Office < 12.2.0.16412 - Path Traversal
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.
The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
CWE-22
Aug 15, 2024
CVE-2024-28986
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.77
SolarWinds Web Help Desk < 12.8.3 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.
While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.
However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
CWE-502
Aug 13, 2024
CVE-2024-38213
6.5
MEDIUM
KEV
EPSS 0.59
Windows Mark of the Web - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
CWE-693
Aug 13, 2024
CVE-2024-38178
7.5
HIGH
KEV
EPSS 0.30
Microsoft Windows Scripting Engine - Memory Corruption
Scripting Engine Memory Corruption Vulnerability
CWE-843
Aug 13, 2024
CVE-2024-38107
7.8
HIGH
KEV
EPSS 0.03
Windows Power Dependency Coordinator - Privilege Escalation
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CWE-416
Aug 13, 2024
CVE-2024-38106
7.0
HIGH
KEV
EPSS 0.01
Windows Kernel - Privilege Escalation
Windows Kernel Elevation of Privilege Vulnerability
CWE-591
Aug 13, 2024
CVE-2024-39891
5.3
MEDIUM
KEV
EPSS 0.30
Twilio Authy < 26.1.0 - Information Disclosure
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
CWE-203
Jul 02, 2024
CVE-2024-32896
7.8
HIGH
KEV
EPSS 0.00
Logic Error - Privilege Escalation
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-783
Jun 13, 2024
CVE-2024-4610
7.8
HIGH
KEV
EPSS 0.01
ARM Bifrost Gpu Kernel Driver < r41p0 - Use After Free
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0.
CWE-416
Jun 07, 2024
CVE-2024-4978
8.4
HIGH
KEV
EPSS 0.14
Justice AV Solutions Viewer Setup <8.3.7.250-1 - Code Injection
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.
CWE-506
May 23, 2024
CVE-2024-30040
8.8
HIGH
KEV
EPSS 0.23
Windows MSHTML < - Privilege Escalation
Windows MSHTML Platform Security Feature Bypass Vulnerability
CWE-20
May 14, 2024
CVE-2024-4671
9.6
CRITICAL
KEV
EPSS 0.00
Google Chrome < 124.0.6367.201 - Use After Free
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-416
May 14, 2024
CVE-2024-20359
6.0
MEDIUM
KEV
RANSOMWARE
EPSS 0.00
Cisco ASA/FTD - Privilege Escalation
A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.
This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
CWE-94
Apr 24, 2024