<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/feed</id>
  <title>CIRCL - Known Exploited Vulnerabilities Catalog</title>
  <updated>2026-03-11T11:00:05.876204+00:00</updated>
  <author>
    <name>CIRCL</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu/known-exploited-vulnerabilities-catalog" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>KEV catalog conforming to GCVE BCP-07. Contains the most recent 20 entries.</subtitle>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/faf06699-e4d6-4b42-a97e-6e625bf07c3a</id>
    <title>CVE-2026-25108 - Confirmed Exploitation</title>
    <updated>2026-02-26T10:01:52+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-25108&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-26 10:01 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-26&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-02-26&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2026-25108"/>
    <published>2026-02-26T10:01:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/d24b6076-eba9-482f-9c75-f3d3f6d33de6</id>
    <title>CVE-2026-1340 - Confirmed Exploitation</title>
    <updated>2026-02-03T16:24:28+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-1340&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 16:24 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-03&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2026-1340"/>
    <published>2026-02-03T16:24:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/8532db83-0134-4daa-a82f-90fd78906237</id>
    <title>CVE-2026-1281 - Confirmed Exploitation</title>
    <updated>2026-02-03T16:21:36+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-1281&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 16:21 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-03&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2026-1281"/>
    <published>2026-02-03T16:21:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/654a76ab-65b5-485b-a116-b3d71a795054</id>
    <title>CVE-2023-28771 - Confirmed Exploitation</title>
    <updated>2026-02-03T09:42:53+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-28771&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 09:42 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternative IDs:&lt;/strong&gt; GCVE-0-2023-28771&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-01&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; #  ip           | as_num | as_name                     | as_country | ptr                                | last_timestamp   &#13;
#  -------------+--------+-----------------------------+------------+------------------------------------+------------------&#13;
  69.69.70.70  | 209    | CENTURYLINK-US-LEGACY-QWEST | US         | nj-69-69-70-70.dyn.embarqhsd.net   | 2026-01-28 17:45:08&#13;
  70.71.69.69  | 6327   | SHAW                        | CA         | S0106889e68483a90.vs.shawcable.net | 2026-01-28 17:45:09&#13;
  98.45.67.89  | 7922   | COMCAST-7922                | US         | c-98-45-67-89.hsd1.ca.comcast.net  | 2026-01-28 17:45:07&#13;
  95.135.54.10 | 209630 | KREDIT-AS                   | UA         |                                    | 2026-01-28 17:24:43&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-28771"/>
    <published>2026-02-03T09:42:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/50fd1f23-20c3-46f1-8fd0-dfcac5812225</id>
    <title>CVE-2026-21509 - Confirmed Exploitation</title>
    <updated>2026-02-02T15:44:22+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-21509&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-02 15:44 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-01-26&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2026-21509"/>
    <published>2026-02-02T15:44:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/9d0b5efa-7369-4c7b-a448-529e4a837f2e</id>
    <title>CVE-2025-53770 - Confirmed Exploitation</title>
    <updated>2026-02-02T14:32:46+00:00</updated>
    <content>&lt;h3&gt;CVE-2025-53770&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-02 14:32 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternative IDs:&lt;/strong&gt; GCVE-0-2025-53770&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-20&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2025-53770"/>
    <published>2026-02-02T14:32:46+00:00</published>
  </entry>
</feed>
