Pulse
Bars = median days from CVE publish to first exploit. Line = % exploited as zero-day (TTE < 0). MOAK-class threats: TTE compresses toward zero.
exponential decay fit: half-life 1.0 yr · R²=0.805
Action Items
high-risk CVEs with zero detection — sorted by composite risk score (KEV+exploit+EPSS+CVSS)
| CVE | Title | CVSS | EPSS |
|---|---|---|---|
| CVE-2012-1710 | Oracle Fusion Middleware Unspecified Vulnerability (a:oracle:fusion_middleware) | 9.8 | 97.39% |
| CVE-2018-14839 | LG N1A1 NAS Remote Command Execution Vulnerability (o:lg:n1a1_firmware) | 9.8 | 99.60% |
| CVE-2018-0125 | Cisco VPN Routers Remote Code Execution Vulnerability (o:cisco:rv132w_firmware) | 9.8 | 96.63% |
| CVE-2018-14667 | Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability (a:redhat:richfaces) | 9.8 | 99.56% |
| CVE-2018-0147 | Cisco Secure Access Control System Java Deserialization Vulnerability (a:cisco:secure_access_control_system) | 9.8 | 88.39% |
| CVE-2018-14558 | Tenda AC7, AC9, and AC10 Routers Command Injection Vulnerability (o:tenda:ac10_firmware) | 9.8 | 99.03% |
| CVE-2018-4939 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability (a:adobe:coldfusion) | 9.8 | 97.86% |
| CVE-2018-20753 | Kaseya VSA Remote Code Execution Vulnerability (a:kaseya:virtual_system_administrator) | 9.8 | 97.22% |
| CVE-2018-19949 | QNAP NAS File Station Command Injection Vulnerability (o:qnap:qts) | 9.8 | 97.56% |
| CVE-2018-19323 | GIGABYTE Multiple Products Privilege Escalation Vulnerability (a:gigabyte:aorus_graphics_engine) | 9.8 | 94.51% |
Recent KEV
CISA Known Exploited Vulnerabilities added in the last 90 days
| CVE | Title | Date Added | Detections |
|---|---|---|---|
| CVE-2024-1708 | ConnectWise ScreenConnect Path Traversal Vulnerability (a:connectwise:screenconnect) | 2026/Apr/28 | KEV · CISA · Known Exploited IDS · Suricata/ET · SID 2050990 ET WEB_SPECIFIC_APPS ConnectWise ScreenConnect - SetupWizard SIEM · Sigma · proc_creation_win_powershell_iex_patterns SIEM · Sigma · proc_creation_win_susp_weak_or_abused_passwords SIEM · Sigma · file_event_win_exploit_cve_2024_1708_screenconnect SIEM · Sigma · win_security_exploit_cve_2024_1708_screenconnect SIEM · Sigma · file_event_win_apt_unknown_exploitation_indicators SIEM · Splunk · ConnectWise ScreenConnect Path Traversal SIEM · Splunk · ConnectWise ScreenConnect Path Traversal Windows SACL SIEM · Splunk · ConnectWise ScreenConnect Authentication Bypass SIEM · Splunk · Nginx ConnectWise ScreenConnect Authentication Bypass Exploit · Metasploit · exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1 |
| CVE-2026-32202 | Microsoft Windows Protection Mechanism Failure Vulnerability (o:microsoft:windows_10_1607) | 2026/Apr/28 | KEV · CISA · Known Exploited |
| CVE-2024-7399 | Samsung MagicINFO 9 Server Path Traversal Vulnerability (a:samsung:magicinfo_9_server) | 2026/Apr/24 | KEV · CISA · Known Exploited IDS · Suricata/ET · SID 2062136 ET WEB_SPECIFIC_APPS Samsung MagicINFO SWUpdateFileUploader Scanner · Nuclei · CVE-2024-7399 Exploit · Metasploit · exploits/windows/http/magicinfo_traversal |
| CVE-2024-57726 | SimpleHelp Missing Authorization Vulnerability (a:simple-help:simplehelp) | 2026/Apr/24 | KEV · CISA · Known Exploited |
| CVE-2024-57728 | SimpleHelp Path Traversal Vulnerability (a:simple-help:simplehelp) | 2026/Apr/24 | KEV · CISA · Known Exploited |
| CVE-2025-29635 | D-Link DIR-823X Command Injection Vulnerability (o:dlink:dir-823x_firmware) | 2026/Apr/24 | KEV · CISA · Known Exploited |
| CVE-2026-39987 | Marimo Remote Code Execution Vulnerability (a:coreweave:marimo) | 2026/Apr/23 | KEV · CISA · Known Exploited Scanner · Nuclei · CVE-2026-39987 |
| CVE-2026-33825 | Microsoft Defender Insufficient Granularity of Access Control Vulnerability (a:microsoft:defender_antimalware_platform) | 2026/Apr/22 | KEV · CISA · Known Exploited |
| CVE-2023-27351 | PaperCut NG/MF Improper Authentication Vulnerability (a:papercut:papercut_mf) | 2026/Apr/20 | KEV · CISA · Known Exploited Scanner · Nuclei · CVE-2023-27351 |
| CVE-2024-27199 | JetBrains TeamCity Relative Path Traversal Vulnerability (a:jetbrains:teamcity) | 2026/Apr/20 | KEV · CISA · Known Exploited IDS · Suricata/ET · SID 2051508 ET WEB_SPECIFIC_APPS JetBrains TeamCity Authentication Bypas IDS · Suricata/ET · SID 2051509 ET WEB_SPECIFIC_APPS JetBrains TeamCity Authentication Bypas IDS · Suricata/ET · SID 2051510 ET WEB_SPECIFIC_APPS JetBrains TeamCity Authentication Bypas IDS · Suricata/ET · SID 2051511 ET WEB_SPECIFIC_APPS JetBrains TeamCity Authentication Bypas IDS · Suricata/ET · SID 2051512 ET WEB_SPECIFIC_APPS JetBrains TeamCity Authentication Bypas SIEM · Splunk · JetBrains TeamCity Limited Auth Bypass Suricata CVE-2024-271 Scanner · Nuclei · CVE-2024-27199 |
Detection Gaps
KEV — No Detection
CISA KEV entries with no detection rule — sorted by KEV date (newest first)
| CVE | Title | CVSS | EPSS | KEV Date | ATT&CK |
|---|---|---|---|---|---|
| CVE-2026-32202 | Microsoft Windows Protection Mechanism Failure Vulnerability (o:microsoft:windows_10_1607) | 4.3 | 91.61% | 2026/Apr/28 | |
| CVE-2024-57726 | SimpleHelp Missing Authorization Vulnerability (a:simple-help:simplehelp) | 9.9 | 97.65% | 2026/Apr/24 | |
| CVE-2024-57728 | SimpleHelp Path Traversal Vulnerability (a:simple-help:simplehelp) | 7.2 | 98.25% | 2026/Apr/24 | T1574: Hijack Execution Flow · T1547: Boot or Logon Autostart Execution |
| CVE-2025-29635 | D-Link DIR-823X Command Injection Vulnerability (o:dlink:dir-823x_firmware) | 7.2 | 98.67% | 2026/Apr/24 | |
| CVE-2026-33825 | Microsoft Defender Insufficient Granularity of Access Control Vulnerability (a:microsoft:defender_antimalware_platform) | 7.8 | 87.27% | 2026/Apr/22 | |
| CVE-2026-20133 | Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (a:cisco:catalyst_sd-wan_manager) | 7.5 | 78.32% | 2026/Apr/20 | |
| CVE-2025-32975 | Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability (a:quest:kace_systems_management_appliance) | 10.0 | 97.67% | 2026/Apr/20 | |
| CVE-2025-48700 | Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability (a:synacor:zimbra_collaboration_suite) | 6.1 | 95.31% | 2026/Apr/20 | |
| CVE-2025-2749 | Kentico Xperience Path Traversal Vulnerability (a:kentico:xperience) | 7.2 | 89.80% | 2026/Apr/20 | |
| CVE-2026-32201 | Microsoft SharePoint Server Improper Input Validation Vulnerability (a:microsoft:sharepoint_server) | 6.5 | 92.06% | 2026/Apr/14 | T1574: Hijack Execution Flow · T1539: Steal Web Session Cookie |
Pre-Exploit Watchlist
CVEs with public exploit (Metasploit · ExploitDB · Nuclei) but no detection rule — highest exploitation probability first. These are MOAK-ready: auto-exploitable with no defensive signal.
| CVE | Title | CVSS | EPSS | KEV | Sources | ATT&CK |
|---|
High-Risk — No Detection
CVSS ≥ 9.0 or EPSS ≥ 0.5 with no detection coverage — sorted by EPSS
| CVE | Title | CVSS | EPSS | KEV | ATT&CK |
|---|---|---|---|---|---|
| CVE-2023-4863 | Google Chromium WebP Heap-Based Buffer Overflow Vulnerability (a:bandisoft:honeyview) | 8.8 | 99.91% | KEV | |
| CVE-2018-0798 | Microsoft Office Memory Corruption Vulnerability (a:microsoft:office) | 8.8 | 99.90% | KEV | |
| CVE-2016-3427 | Oracle Java SE and JRockit Unspecified Vulnerability (a:apache:cassandra) | 9.8 | 99.88% | KEV | |
| CVE-2016-8735 | Apache Tomcat Remote Code Execution Vulnerability (a:apache:tomcat) | 9.8 | 99.87% | KEV | |
| CVE-2010-2965 | (o:rockwellautomation:1756-enbt\/a_firmware) | 99.80% | |||
| CVE-2014-6321 | (o:microsoft:windows_7) | 99.79% | |||
| CVE-2024-38112 | Microsoft Windows MSHTML Platform Spoofing Vulnerability (o:microsoft:windows_10_1507) | 7.5 | 99.78% | KEV | |
| CVE-2019-1579 | Palo Alto Networks PAN-OS Remote Code Execution Vulnerability (o:paloaltonetworks:pan-os) | 8.1 | 99.78% | KEV | |
| CVE-2020-15999 | Google Chrome FreeType Heap Buffer Overflow Vulnerability (a:freetype:freetype) | 9.6 | 99.78% | KEV | |
| CVE-2022-34265 | (a:djangoproject:django) | 9.8 | 99.77% |
Detection Coverage
By Source
count of CVEs with at least one detection rule per source
By Severity
detection coverage broken down by CVSS severity band
| Severity | Total | Detected | Uncovered | Coverage |
|---|---|---|---|---|
| critical | 30,029 | 749 | 29,280 | 2.5% |
| high | 81,088 | 822 | 80,266 | 1.0% |
| medium | 94,133 | 261 | 93,872 | 0.3% |
| low | 4,443 | 5 | 4,438 | 0.1% |
| unknown | 137,603 | 1,921 | 135,682 | 1.4% |
Detection Source Overlap
how many CVEs have N detection sources (0 = no coverage)
Top Vendors by Coverage Gap
vendors ranked by number of CVEs with no detection rule — largest gaps first
| Vendor | Total | Detected | Uncovered | Coverage | KEV |
|---|---|---|---|---|---|
| 12,754 | 145 | 12,609 | 1.1% | 93 | |
| linux | 12,795 | 292 | 12,503 | 2.3% | 26 |
| microsoft | 13,966 | 1,804 | 12,162 | 12.9% | 385 |
| oracle | 10,205 | 474 | 9,731 | 4.6% | 75 |
| debian | 10,104 | 456 | 9,648 | 4.5% | 119 |
| apple | 8,541 | 539 | 8,002 | 6.3% | 104 |
| ibm | 8,123 | 294 | 7,829 | 3.6% | 10 |
| adobe | 7,096 | 354 | 6,742 | 5.0% | 78 |
| cisco | 6,558 | 270 | 6,288 | 4.1% | 94 |
| fedoraproject | 5,420 | 165 | 5,255 | 3.0% | 84 |
Exploit Intelligence
Exploitation Speed
exponential decay fit: half-life 1.0 yr · R²=0.805
Yearly Trend
median time-to-exploit and time-to-detect per year with zero-day rate
| Year | TTE Median | TTD Median | Exploited | Zero-days | ZD Rate |
|---|---|---|---|---|---|
| 2021 | 56 | 716 | 418 | 117 | 28.0% |
| 2022 | 41 | 391 | 346 | 102 | 29.5% |
| 2023 | 2 | 108 | 445 | 127 | 28.5% |
| 2024 | 0 | 62 | 610 | 224 | 36.7% |
| 2025 | 0 | 34 | 543 | 121 | 22.3% |
| 2026 | 0 | 8 | 130 | 25 | 19.2% |
Worst Exposure Windows
CVEs with largest gap between exploit publication and detection (exposure = TTD - TTE)
ATT&CK Coverage
Tactic Detection Coverage
detection rule coverage per MITRE ATT&CK tactic across all CVEs mapped to that tactic
| Tactic | Total CVEs | Detected | Gap | Coverage |
|---|---|---|---|---|
| TA0002: Execution | 26,010 | 2,029 | 23,981 | 7.8% |
| TA0006: Credential Access | 25,818 | 2,726 | 23,092 | 10.6% |
| TA0008: Lateral Movement | 14,672 | 1,608 | 13,064 | 11.0% |
| TA0004: Privilege Escalation | 14,098 | 1,626 | 12,472 | 11.5% |
| TA0003: Persistence | 11,328 | 1,254 | 10,074 | 11.1% |
| TA0007: Discovery | 9,460 | 8,719 | 741 | 92.2% |
| TA0043: Reconnaissance | 6,847 | 1,612 | 5,235 | 23.5% |
| TA0009: Collection | 5,780 | 593 | 5,187 | 10.3% |
| TA0040: Impact | 4,272 | 134 | 4,138 | 3.1% |
| TA0001: Initial Access | 3,085 | 195 | 2,890 | 6.3% |
Technique Detection Gap
top techniques by number of CVEs with no detection — largest blind spots first
| Technique | Total | Detected | Gap | Coverage |
|---|---|---|---|---|
| T1574: Hijack Execution Flow | 25912 | 2026 | 23886 | 7.8% |
| T1550: Use Alternate Authentication Material | 13271 | 1089 | 12182 | 8.2% |
| T1134: Access Token Manipulation | 12290 | 1047 | 11243 | 8.5% |
| T1539: Steal Web Session Cookie | 10192 | 928 | 9264 | 9.1% |
| T1083: File and Directory Discovery | 9387 | 672 | 8715 | 7.2% |
| T1111: Multi-Factor Authentication Interception | 7041 | 539 | 6502 | 7.7% |
| T1082: System Information Discovery | 6832 | 540 | 6292 | 7.9% |
| T1592: Gather Victim Host Information | 6832 | 540 | 6292 | 7.9% |
| T1135: Network Share Discovery | 6794 | 536 | 6258 | 7.9% |
| T1007: System Service Discovery | 6790 | 536 | 6254 | 7.9% |
Top Techniques (by CVE count)
most referenced ATT&CK techniques by number of mapped CVEs
Top CWE
most common weakness types across ATT&CK-mapped CVEs
Threat Intel
CVE Growth
year-over-year CVE publication volume with 3-year moving average
| Year | Count | YoY % | Cumulative |
|---|---|---|---|
| 2026 | 15,700 | -64.4% | 347,296 |
| 2025 | 44,127 | +13.0% | 331,596 |
| 2024 | 39,063 | +25.3% | 287,469 |
| 2023 | 31,170 | +13.5% | 248,406 |
| 2022 | 27,468 | +17.6% | 217,236 |
| 2021 | 23,358 | +11.2% | 189,768 |
| 2020 | 21,013 | +19.6% | 166,410 |
| 2019 | 17,571 | -0.7% | 145,397 |
| 2018 | 17,698 | +3.7% | 127,826 |
| 2017 | 17,061 | +60.8% | 110,128 |
Top EPSS Movers
CVEs with the largest EPSS score increase over their tracked history
| CVE | Title | CVSS | EPSS Start | EPSS Now | Delta | Detections |
|---|---|---|---|---|---|---|
| CVE-2025-11371 | Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability (a:gladinet:centrestack) | 7.5 | 1.54% | 98.74% | +0.972 | KEV · CISA · Known Exploited IDS · Suricata/ET · SID 2065258 ET WEB_SPECIFIC_APPS Gladinet CentreStack and Triofox Local Scanner · Nuclei · CVE-2025-11371 Exploit · Metasploit · auxiliary/gather/gladinet_storage_path_traversal_cve_2025_11 |
| CVE-2026-2025 | 7.5 | 0.65% | 96.27% | +0.956 | Scanner · Nuclei · CVE-2026-2025 | |
| CVE-2025-32463 | Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability (a:sudo_project:sudo) | 7.8 | 1.28% | 96.19% | +0.949 | KEV · CISA · Known Exploited SIEM · Sigma · file_event_lnx_exploit_cve_2025_32463 SIEM · Sigma · proc_creation_lnx_chroot_execution SIEM · Elastic · Potential CVE-2025-32463 Nsswitch File Creation SIEM · Elastic · Potential CVE-2025-32463 Sudo Chroot Execution Attempt Exploit · Metasploit · exploits/linux/local/sudo_chroot_cve_2025_32463 Exploit · Exploit-DB · EDB-52352 |
| CVE-2024-55963 | (a:appsmith:appsmith) | 6.5 | 1.48% | 96.14% | +0.947 | IDS · Suricata/ET · SID 2061291 ET WEB_SPECIFIC_APPS AppSmith PostgreSQL Command Injection A Exploit · Exploit-DB · EDB-52118 |
| CVE-2025-29927 | (a:vercel:next.js) | 9.1 | 5.25% | 99.77% | +0.945 | IDS · Suricata/ET · SID 2061026 ET WEB_SERVER Next.js Middleware Authorization Bypass (CVE-2 Scanner · Nuclei · CVE-2025-29927 Exploit · Exploit-DB · EDB-52124 |
| CVE-2025-1232 | (a:geminilabs:site_reviews) | 8.8 | 3.64% | 97.94% | +0.943 | Scanner · Nuclei · CVE-2025-1232 |
| CVE-2025-26493 | (a:jetbrains:teamcity) | 6.1 | 0.52% | 94.65% | +0.941 | |
| CVE-2024-49754 | (a:librenms:librenms) | 5.4 | 0.39% | 93.90% | +0.935 | |
| CVE-2025-31125 | Vite Vitejs Improper Access Control Vulnerability (a:vitejs:vite) | 7.5 | 5.78% | 99.26% | +0.935 | KEV · CISA · Known Exploited Scanner · Nuclei · CVE-2025-31125 |
| CVE-2025-30066 | tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability (a:tj-actions:changed-files) | 8.6 | 6.13% | 99.57% | +0.934 | KEV · CISA · Known Exploited |
Recent High-EPSS CVEs
EPSS ≥ 0.9 published since 2026
Exposure
Exposed CVEs
CVEs with internet visibility via Shodan, CIRCL sightings, ThreatFox IOCs, or in-the-wild exploitation — ranked by composite risk score. Highlighted rows have no detection coverage.
Actors
technique source confidence: kev curated KEV→ATT&CK mapping · det detection rule confirmed · cwe inferred via CWE→CAPEC chain (noisy)
Malware Families
malware families observed exploiting CVEs via ThreatFox IOC tags
| Malware Family | CVEs | Sample CVEs |
|---|---|---|
| Mirai | 3 | CVE-2021-44228 · CVE-2024-3721 · CVE-2025-55182 |
| Unidentified 001 | 3 | CVE-2011-3230 · CVE-2026-21509 · CVE-2026-21513 |
| Unknown malware | 2 | CVE-2025-55182 · CVE-2026-1731 |
| BEARDSHELL | 2 | CVE-2026-21509 · CVE-2026-21514 |
Technique Breakdown
top ATT&CK techniques with mapping confidence — kev and det are high-signal; cwe entries are inferred via CWE→CAPEC chain and should be treated as approximate
| Technique | CVEs | Confidence |
|---|---|---|
| T1574: Services File Permissions Weakness | 25,912 | det_confirmed |
| T1550: Web Session Cookie | 13,271 | cwe_chain |
| T1134: Token Impersonation/Theft | 12,290 | cwe_chain |
| T1539: Steal Web Session Cookie | 10,192 | cwe_chain |
| T1083: File and Directory Discovery | 9,387 | cwe_chain |
| T1111: Multi-Factor Authentication Interception | 7,041 | cwe_chain |
| T1082: System Information Discovery | 6,832 | cwe_chain |
| T1592: Gather Victim Host Information | 6,832 | cwe_chain |
| T1135: Network Share Discovery | 6,794 | cwe_chain |
| T1007: System Service Discovery | 6,790 | cwe_chain |
| T1016: System Network Configuration Discovery | 6,790 | cwe_chain |
| T1018: Remote System Discovery | 6,790 | cwe_chain |
| T1033: System Owner/User Discovery | 6,790 | cwe_chain |
| T1046: Network Service Discovery | 6,790 | cwe_chain |
| T1049: System Network Connections Discovery | 6,790 | cwe_chain |
Data Completeness
CNA Leaderboard
CVE Numbering Authorities ranked by data completeness across CWE, CVSS, CPE, and reference fields
| CNA | Total | CWE% | CVSS% | CPE% | Refs% | Score |
|---|---|---|---|---|---|---|
| Fidelis Cybersecurity, Inc. | 13 | 100.0 | 100.0 | 100.0 | 100.0 | 100.0 |
| Cyber Security Works Pvt. Ltd. | 11 | 100.0 | 100.0 | 100.0 | 100.0 | 100.0 |
| Securifera, Inc. | 25 | 100.0 | 100.0 | 100.0 | 100.0 | 100.0 |
| VDOO Connected Trust Ltd. | 11 | 100.0 | 100.0 | 100.0 | 100.0 | 100.0 |
| Silver Peak Systems, Inc. | 8 | 100.0 | 100.0 | 100.0 | 100.0 | 100.0 |
| Exodus Intelligence | 37 | 100.0 | 100.0 | 100.0 | 97.3 | 99.3 |
| Becton, Dickinson and Company (BD) | 22 | 95.5 | 100.0 | 95.5 | 95.5 | 96.6 |
| Alias Robotics S.L. | 29 | 86.2 | 100.0 | 100.0 | 100.0 | 96.5 |
| IDEMIA | 7 | 85.7 | 100.0 | 100.0 | 100.0 | 96.4 |
| Mirantis | 5 | 80.0 | 100.0 | 100.0 | 100.0 | 95.0 |
Publishing Activity
CNA publishing rate compared to their historical baseline — highlights unusual activity
| CNA | 30d | Baseline/mo | Deviation | Status | Last Pub |
|---|---|---|---|---|---|
| Artica PFMS | 8 | 0.2 | 3900.0% | surge | 2026/Apr/13 |
| PaperCut | 2 | 0.1 | 1900.0% | surge | 2026/Mar/31 |
| SailPoint Technologies | 2 | 0.1 | 1900.0% | surge | 2026/Apr/29 |
| Canonical Ltd. | 55 | 3.8 | 1347.4% | surge | 2026/Apr/27 |
| Open-Xchange | 29 | 2.4 | 1108.3% | surge | 2026/Apr/22 |
| Sierra Wireless Inc. | 3 | 0 | 999.9% | surge | 2026/Apr/07 |
| runZero | 12 | 0 | 999.9% | surge | 2026/Apr/07 |
| Foxit | 16 | 1.5 | 966.7% | surge | 2026/Apr/27 |
| floragunn GmbH | 3 | 0.3 | 900.0% | surge | 2026/Mar/31 |
| bcorg | 5 | 0.5 | 900.0% | surge | 2026/Apr/15 |
Research Labs
Vulnerability research teams attributed via CVE reference URLs — CVE count, KEV rate, and average severity per lab.
Lab Scorecard
KEV rate = % of lab's CVEs added to CISA's Known Exploited Vulnerabilities catalog — a proxy for weaponization impact
Risk Matrix
EPSS x CVSS Matrix
| EPSS \ CVSS | Critical (9.0–10.0) | High (7.0–8.9) | Medium (4.0–6.9) | Low (0.1–3.9) | None | |-------------|------:|------:|------:|------:|------:| | **Very High (>0.5)** | 18950 | 36274 | 24737 | 584 | 84288 | | **High (0.1–0.5)** | 9997 | 35476 | 51160 | 2526 | 32678 | | **Medium (0.01–0.1)** | 1017 | 8294 | 16233 | 1191 | 2932 | | **Low (≤0.01)** | 57 | 998 | 1919 | 141 | 181 | | **None** | 8 | 46 | 84 | 1 | 17524 |
Blind Spots
high EPSS, no KEV, no detection
| CVE | Title | CVSS | EPSS | CWE |
|---|---|---|---|---|
| CVE-2010-2965 | (o:rockwellautomation:1756-enbt\/a_firmware) | 99.80% | CWE-863: Incorrect Authorization | |
| CVE-2014-6321 | (o:microsoft:windows_7) | 99.79% | CWE-94: Improper Control of Generation of Code ('Code Injection') | |
| CVE-2022-34265 | (a:djangoproject:django) | 9.8 | 99.77% | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
| CVE-2019-10173 | (a:oracle:banking_platform) | 9.8 | 99.76% | |
| CVE-2024-21534 | 9.8 | 99.76% | ||
| CVE-2022-37434 | (a:netapp:active_iq_unified_manager) | 9.8 | 99.74% | CWE-787: Out-of-bounds Write |
| CVE-2021-40346 | (a:haproxy:haproxy) | 7.5 | 99.73% | CWE-190: Integer Overflow or Wraparound |
| CVE-2020-14645 | (a:oracle:weblogic_server) | 9.8 | 99.73% | |
| CVE-2023-2650 | (a:openssl:openssl) | 6.5 | 99.70% | CWE-770: Allocation of Resources Without Limits or Throttling |
| CVE-2017-7529 | (a:apple:xcode) | 7.5 | 99.70% |
Model Gaps
in CISA KEV but EPSS < 0.1
| CVE | Title | CVSS | EPSS | Detections |
|---|---|---|---|---|
| CVE-2023-43000 | Apple Multiple products Use-After-Free Vulnerability (a:apple:safari) | 8.8 | 5.48% | KEV · CISA · Known Exploited |
Vendors
Vendors and products ranked by undetected CVE count — most blind spots first.
Vendors
ranked by CVEs with no detection rule
Products
products with most undetected CVEs
| Vendor | Product | Total CVEs | Detected | Gaps | Det % | KEV |
|---|---|---|---|---|---|---|
| linux | linux_kernel | 12760 | 292 | 12468 | 2.3% | 26 |
| debian | debian_linux | 9960 | 448 | 9512 | 4.5% | 119 |
| android | 8028 | 62 | 7966 | 0.8% | 19 | |
| fedoraproject | fedora | 5351 | 164 | 5187 | 3.1% | 84 |
| microsoft | windows_server_2016 | 4564 | 261 | 4303 | 5.7% | 152 |
| microsoft | windows_server_2019 | 4295 | 163 | 4132 | 3.8% | 154 |
| chrome | 3982 | 64 | 3918 | 1.6% | 74 | |
| canonical | ubuntu_linux | 4105 | 266 | 3839 | 6.5% | 44 |
| apple | iphone_os | 3944 | 247 | 3697 | 6.3% | 92 |
| microsoft | windows_server_2012 | 3784 | 336 | 3448 | 8.9% | 155 |
| microsoft | windows_server_2008 | 3554 | 418 | 3136 | 11.8% | 148 |
| mozilla | firefox | 3083 | 127 | 2956 | 4.1% | 15 |
| apple | mac_os_x | 3210 | 277 | 2933 | 8.6% | 26 |
| microsoft | windows_10 | 2974 | 245 | 2729 | 8.2% | 2 |
| apple | macos | 2612 | 11 | 2601 | 0.4% | 69 |
| microsoft | windows_server_2022 | 2649 | 68 | 2581 | 2.6% | 104 |
| microsoft | windows_7 | 2368 | 364 | 2004 | 15.4% | 101 |
| microsoft | windows_8.1 | 2216 | 285 | 1931 | 12.9% | 95 |
| opensuse | leap | 1897 | 57 | 1840 | 3.0% | 18 |
| microsoft | windows_10_22h2 | 1884 | 47 | 1837 | 2.5% | 81 |
| microsoft | windows_10_21h2 | 1886 | 54 | 1832 | 2.9% | 96 |
| apple | ipados | 1827 | 10 | 1817 | 0.5% | 79 |
| microsoft | windows_10_1809 | 1888 | 81 | 1807 | 4.3% | 149 |
| redhat | enterprise_linux_desktop | 1928 | 137 | 1791 | 7.1% | 56 |
| apple | tvos | 1959 | 170 | 1789 | 8.7% | 37 |
| redhat | enterprise_linux_server | 1891 | 131 | 1760 | 6.9% | 58 |
| microsoft | windows_rt_8.1 | 2020 | 265 | 1755 | 13.1% | 87 |
| adobe | acrobat_dc | 1781 | 37 | 1744 | 2.1% | 7 |
| adobe | acrobat_reader_dc | 1781 | 37 | 1744 | 2.1% | 7 |
| redhat | enterprise_linux_workstation | 1845 | 132 | 1713 | 7.2% | 57 |
About
How Threatbook works, what data it uses, and licensing for each source.
Pipeline
Data Sources
| Source | Used For | License | Attribution |
|---|---|---|---|
| NVD | CVE metadata, CVSS scores, CPE, description | Public domain (US Gov) | Data from NVD API. Not endorsed by NVD. |
| CISA KEV | Known Exploited Vulnerabilities catalog | CC0 (public domain) | None required |
| EPSS | Exploitation probability scores (daily) | Open (FIRST.org, no formal license) | See EPSS at FIRST.org |
| MITRE ATT&CK | Technique mapping, tactic attribution, ATT&CK coverage | MITRE royalty-free license | © The MITRE Corporation. Used with permission. ATT&CK® is a registered trademark. |
| MITRE CWE | Weakness taxonomy per CVE | MITRE royalty-free license | © The MITRE Corporation. |
| MITRE CAPEC | Attack pattern chains (CWE→CAPEC→ATT&CK mapping) | MITRE royalty-free license | © The MITRE Corporation. |
| ThreatFox (Abuse.ch) | Malware family → CVE IOC attribution | Fair use (non-commercial) | Data from ThreatFox by Abuse.ch |
| CIRCL | CVE sighting counts from passive monitoring | CC-BY 4.0 | CIRCL — Computer Incident Response Center Luxembourg |
| Exploit-DB | Exploit code availability per CVE | GPL-2.0 (repo); site ToS applies | Exploit-DB by OffSec |
| Metasploit | Module availability per CVE | BSD-3-Clause | Metasploit Framework, Rapid7 |
| Sigma Rules | SIEM detection rule coverage per CVE | Detection Rule License (DRL 1.1) | SigmaHQ contributors |
| Elastic Detection Rules | Detection coverage, ATT&CK technique confirmation | Elastic License 2.0 | Elastic N.V. |
| Splunk Security Content | Detection analytics per CVE | Apache 2.0 | Splunk Inc. |
| Microsoft Sentinel | Detection rule coverage per CVE | MIT | Microsoft Corporation |
| Nuclei Templates | Scanner template availability per CVE | MIT | ProjectDiscovery, Inc. |
| VulnCheck KEV | Extended KEV catalog with additional exploited CVEs | Community license — attribution required | VulnCheck Known Exploited Vulnerabilities data is provided by VulnCheck and used here under their community license. |
| HackerOne | Public bug bounty disclosure rankings | Proprietary (public disclosures only) | HackerOne |
| Shodan | Internet exposure search links per CVE | Proprietary (personal account) | Shodan data is not redistributed here. Links go directly to Shodan search. |
Notes
Tabs
| Tab | What it shows |
|---|---|
| Pulse | Overview KPIs, CVE volume trend, KEV additions by month, CVSS vs EPSS risk scatter |
| Gaps | CVEs with no detection coverage across any source |
| Coverage | Detection source breakdown — how many CVEs are covered by each tool |
| Exploit | CVEs with public exploit code (EDB, Metasploit, Nuclei, GitHub PoC) |
| ATT&CK | MITRE ATT&CK tactic/technique coverage and gap analysis |
| Intel | Threat intelligence signals: EPSS movers, zero-days, recent KEV |
| Exposure | CVEs with active internet presence (CIRCL sightings, ThreatFox IOCs, ITW exploits) — ranked by composite risk score |
| Actors | Malware family → CVE attribution (ThreatFox) and ATT&CK technique mapping |
| Completeness | CNA data quality ranking — coverage of CVSS, CWE, CPE, and references per CVE numbering authority |
| Labs | Research team attribution from CVE reference URLs — CVE volume, KEV rate, and avg severity per lab |
| Risk | EPSS × CVSS risk matrix, blind spots (high EPSS, no KEV, no detection), and model gaps (KEV with low EPSS) |
| Vendors | Vendor and product CVE coverage — ranked by undetected CVE count, with detection percentage and KEV exposure |
| About | This page — pipeline, data sources, licenses |