CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
607 results Clear all
CVE-2024-20353 8.6 HIGH KEV RANSOMWARE EPSS 0.20
Cisco ASA/FTD - DoS
A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
CWE-835 Apr 24, 2024
CVE-2024-29748 7.8 HIGH KEV EPSS 0.00
Logic Error - Privilege Escalation
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-755 Apr 05, 2024
CVE-2024-29745 5.5 MEDIUM KEV EPSS 0.00
Uninitialized Data - Info Disclosure
there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-908 Apr 05, 2024
CVE-2024-23225 7.8 HIGH KEV EPSS 0.00
Apple Ipados < 16.7.6 - Out-of-Bounds Write
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CWE-787 Mar 05, 2024
CVE-2024-21351 7.6 HIGH KEV EPSS 0.13
Microsoft Windows 10 1507 < 10.0.10240.20469 - Code Injection
Windows SmartScreen Security Feature Bypass Vulnerability
CWE-94 Feb 13, 2024
CVE-2023-27351 7.5 HIGH KEV RANSOMWARE NUCLEI EPSS 0.86
Papercut MF < 20.1.7 - Authentication Bypass
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226.
CWE-287 Apr 20, 2023
CVE-2023-43000 8.8 HIGH KEV EPSS 0.00
macOS Ventura <13.5-iPadOS <16.6-Safari <16.6 - Use After Free
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.
CWE-416 Nov 05, 2025
CVE-2023-52163 8.8 HIGH KEV NUCLEI EPSS 0.76
Digiever Ds-2105 Pro Firmware - Missing Authorization
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-862 Feb 03, 2025
CVE-2023-50224 6.5 MEDIUM KEV EPSS 0.01
Tp-link Tl-wr841n Firmware - Authentication Bypass by Spoofing
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
CWE-290 May 03, 2024
CVE-2023-39780 8.8 HIGH KEV 1 Writeup EPSS 0.41
Asus Rt-ax55 Firmware - OS Command Injection
On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.
CWE-78 Sep 11, 2023
CVE-2023-38950 7.5 HIGH KEV NUCLEI EPSS 0.83
ZKTeco BioTime <9.0.120240617.19506 - Path Traversal
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime.
CWE-22 Aug 03, 2023
CVE-2023-44221 7.2 HIGH KEV EPSS 0.20
Sonicwall Sma 200 Firmware < 10.2.1.9-57sv - OS Command Injection
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
CWE-78 Dec 05, 2023
CVE-2023-20118 6.5 MEDIUM KEV EPSS 0.04
Cisco Small Business Routers - Command Injection
A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not and will not release software updates that address this vulnerability. However, administrators may disable the affected feature as described in the Workarounds ["#workarounds"] section. {{value}} ["%7b%7bvalue%7d%7d"])}]]
CWE-77 Apr 13, 2023
CVE-2023-34192 9.0 CRITICAL KEV NUCLEI EPSS 0.89
Zimbra ZCS <8.8.15 - XSS
Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.
CWE-79 Jul 06, 2023
CVE-2023-48365 9.6 CRITICAL KEV RANSOMWARE EPSS 0.62
Qlik Sense - HTTP Request Smuggling
Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265.
CWE-444 Nov 15, 2023
CVE-2023-45727 7.5 HIGH KEV EPSS 0.21
Northgrid Proself < 1.09 - XXE
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
CWE-611 Oct 18, 2023
CVE-2023-28461 9.8 CRITICAL KEV RANSOMWARE EPSS 0.89
Array Networks Array AG Series & vxAG <9.4.0.481 - RCE
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
CWE-287 Mar 15, 2023
CVE-2023-25280 9.8 CRITICAL KEV NUCLEI EPSS 0.93
Dlink Dir-820l Firmware - OS Command Injection
OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.
CWE-78 Mar 16, 2023
CVE-2023-21237 5.5 MEDIUM KEV EPSS 0.01
Google Android - Information Disclosure
In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912
CWE-200 Jun 28, 2023
CVE-2023-34048 9.8 CRITICAL KEV NUCLEI EPSS 0.93
vCenter Server - Memory Corruption
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
CWE-787 Oct 25, 2023