CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
607 results Clear all
CVE-2023-6549 8.2 HIGH KEV NUCLEI EPSS 0.77
NetScaler ADC & NetScaler Gateway - DoS
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
CWE-119 Jan 17, 2024
CVE-2023-41990 7.8 HIGH KEV EPSS 0.03
Apple Ipados < 15.7.8 - Denial of Service
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
Sep 12, 2023
CVE-2023-38203 9.8 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.94
Adobe ColdFusion <2018u17, <2021u7, <2023u1 - Code Injection
Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
CWE-502 Jul 20, 2023
CVE-2023-7101 7.8 HIGH KEV 3 Writeups EPSS 0.83
Jmcnamara Spreadsheet < 0.65 - Code Injection
Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
CWE-95 Dec 24, 2023
CVE-2023-47565 8.0 HIGH KEV EPSS 0.87
Qnap Qvr Firmware < 5.0.0 - OS Command Injection
An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later
CWE-78 Dec 08, 2023
CVE-2023-49897 8.8 HIGH KEV EPSS 0.24
FXC Ae1021 Firmware < 2.0.10 - OS Command Injection
An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product.
CWE-78 Dec 06, 2023
CVE-2023-6448 9.8 CRITICAL KEV EPSS 0.13
Unitronics VisiLogic <9.9.00 - Info Disclosure
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
CWE-1188 Dec 05, 2023
CVE-2023-33106 8.4 HIGH KEV EPSS 0.00
NVIDIA < - Memory Corruption
Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.
CWE-119 Dec 05, 2023
CVE-2023-33063 7.8 HIGH KEV EPSS 0.00
Qualcomm 315 5G Iot Modem Firmware - Use After Free
Memory corruption in DSP Services during a remote call from HLOS to DSP.
CWE-416 Dec 05, 2023
CVE-2023-42917 8.8 HIGH KEV EPSS 0.00
Apple Safari < 17.1.2 - Out-of-Bounds Write
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
CWE-787 Nov 30, 2023
CVE-2023-42916 6.5 MEDIUM KEV EPSS 0.00
Apple Safari < 17.1.2 - Out-of-Bounds Read
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
CWE-125 Nov 30, 2023
CVE-2023-6345 9.6 CRITICAL KEV EPSS 0.01
Google Chrome <119.0.6045.199 - Sandbox Escape
Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
CWE-190 Nov 29, 2023
CVE-2023-36584 5.4 MEDIUM KEV EPSS 0.15
Windows Mark of the Web - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
Oct 10, 2023
CVE-2023-36036 7.8 HIGH KEV EPSS 0.01
Windows Cloud Files Mini Filter Driver - Privilege Escalation
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CWE-122 Nov 14, 2023
CVE-2023-36033 7.8 HIGH KEV EPSS 0.01
Windows DWM Core Library - Privilege Escalation
Windows DWM Core Library Elevation of Privilege Vulnerability
CWE-119 Nov 14, 2023
CVE-2023-36851 5.3 MEDIUM KEV EPSS 0.15
Juniper Networks Junos OS - Unauthenticated File Upload/Download
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2.
CWE-306 Sep 27, 2023
CVE-2023-46748 8.8 HIGH KEV EPSS 0.04
BIG-IP - Authenticated SQL Injection
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-89 Oct 26, 2023
CVE-2023-41763 5.3 MEDIUM KEV NUCLEI EPSS 0.16
Microsoft Skype For Business Server - SSRF
Skype for Business Elevation of Privilege Vulnerability
CWE-918 Oct 10, 2023
CVE-2023-36563 6.5 MEDIUM KEV EPSS 0.02
Microsoft WordPad - Info Disclosure
Microsoft WordPad Information Disclosure Vulnerability
CWE-20 Oct 10, 2023
CVE-2023-20109 6.6 MEDIUM KEV EPSS 0.01
Cisco IOS Software/Cisco IOS XE Software - RCE
A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.
CWE-787 Sep 27, 2023