CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2024-43572 7.8 HIGH KEV EPSS 0.49
Microsoft Windows 10 1507 < 10.0.10240.20796 - Remote Code Execution
Microsoft Management Console Remote Code Execution Vulnerability
CWE-707 Oct 08, 2024
CVE-2024-43047 7.8 HIGH KEV EPSS 0.02
Qualcomm FastConnect and QCA6174A/QAM8295P Firmware - Memory Corruption
Memory corruption while maintaining memory maps of HLOS memory.
CWE-416 Oct 07, 2024
CVE-2024-43461 8.8 HIGH KEV EPSS 0.10
Windows MSHTML - SSRF
Windows MSHTML Platform Spoofing Vulnerability
CWE-451 Sep 10, 2024
CVE-2024-38226 7.3 HIGH KEV EPSS 0.01
Microsoft Publisher - Privilege Escalation
Microsoft Publisher Security Feature Bypass Vulnerability
CWE-693 Sep 10, 2024
CVE-2024-38217 5.4 MEDIUM KEV EPSS 0.12
Windows - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
CWE-693 Sep 10, 2024
CVE-2024-38014 7.8 HIGH KEV EPSS 0.13
Microsoft Windows Installer - Elevation of Privilege
Windows Installer Elevation of Privilege Vulnerability
CWE-269 Sep 10, 2024
CVE-2024-40766 9.8 CRITICAL KEV RANSOMWARE EPSS 0.04
SonicWall - Improper Access Control
An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.
CWE-284 Aug 23, 2024
CVE-2024-7262 7.8 HIGH KEV EPSS 0.12
Kingsoft Wps Office < 12.2.0.16412 - Path Traversal
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
CWE-22 Aug 15, 2024
CVE-2024-28986 9.8 CRITICAL KEV NUCLEI EPSS 0.77
SolarWinds Web Help Desk < 12.8.3 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.   However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
CWE-502 Aug 13, 2024
CVE-2024-38213 6.5 MEDIUM KEV EPSS 0.59
Windows Mark of the Web - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
CWE-693 Aug 13, 2024
CVE-2024-38178 7.5 HIGH KEV EPSS 0.30
Microsoft Windows Scripting Engine - Memory Corruption
Scripting Engine Memory Corruption Vulnerability
CWE-843 Aug 13, 2024
CVE-2024-38107 7.8 HIGH KEV EPSS 0.03
Windows Power Dependency Coordinator - Privilege Escalation
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CWE-416 Aug 13, 2024
CVE-2024-38106 7.0 HIGH KEV EPSS 0.01
Windows Kernel - Privilege Escalation
Windows Kernel Elevation of Privilege Vulnerability
CWE-591 Aug 13, 2024
CVE-2024-39891 5.3 MEDIUM KEV EPSS 0.30
Twilio Authy < 26.1.0 - Information Disclosure
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
CWE-203 Jul 02, 2024
CVE-2024-32896 7.8 HIGH KEV EPSS 0.00
Logic Error - Privilege Escalation
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-783 Jun 13, 2024
CVE-2024-4610 7.8 HIGH KEV EPSS 0.01
ARM Bifrost Gpu Kernel Driver < r41p0 - Use After Free
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0.
CWE-416 Jun 07, 2024
CVE-2024-4978 8.4 HIGH KEV EPSS 0.14
Justice AV Solutions Viewer Setup <8.3.7.250-1 - Code Injection
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.
CWE-506 May 23, 2024
CVE-2024-30040 8.8 HIGH KEV EPSS 0.23
Windows MSHTML < - Privilege Escalation
Windows MSHTML Platform Security Feature Bypass Vulnerability
CWE-20 May 14, 2024
CVE-2024-4671 9.6 CRITICAL KEV EPSS 0.00
Google Chrome < 124.0.6367.201 - Use After Free
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-416 May 14, 2024
CVE-2024-20359 6.0 MEDIUM KEV RANSOMWARE EPSS 0.00
Cisco ASA/FTD - Privilege Escalation
A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
CWE-94 Apr 24, 2024