<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/feed</id>
  <title>EUVD KEV - Known Exploited Vulnerabilities Catalog</title>
  <updated>2026-03-11T09:48:27.996429+00:00</updated>
  <author>
    <name>EUVD KEV</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu/known-exploited-vulnerabilities-catalog" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>KEV catalog conforming to GCVE BCP-07. Contains the most recent 20 entries.</subtitle>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/06eada7c-1ab5-44fe-afd3-79a5dd68784a</id>
    <title>CVE-2025-25231 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2025-25231&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-09-09 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Omnissa / Omnissa Workspace ONE UEM | Description: Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints | Origin source: CERT-PL | Notes: https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2025-25231"/>
    <published>2025-09-09T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/016fe937-b9d9-4fc4-8ac7-7078d88c8ada</id>
    <title>CVE-2025-6543 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2025-6543&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-18 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2025-6543"/>
    <published>2025-07-18T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/6bb27705-58ad-4939-a015-6851a41823da</id>
    <title>CVE-2011-4085 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2011-4085&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: some management interfaces remain accessible and lack effective access control mechanisms | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2011-4085"/>
    <published>2025-07-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/126fdecc-867c-46fd-b738-2c1a930b4635</id>
    <title>CVE-2010-0738 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2010-0738&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: this management interface allows administrative operations to be performed without adequate access controls allowing a remote attacker to interact with the system in an unauthorized manner | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2010-0738"/>
    <published>2025-07-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/b7d611b3-06a2-471c-a7b6-9875c4a93f2e</id>
    <title>CVE-2015-7501 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2015-7501&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / Commons Collections library | Description: the system accepts serialized objects without verifying their origin or reliability allowing an attacker to send specially crafted payloads that are then deserialized and executed | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2015-7501"/>
    <published>2025-07-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/a2b930f7-c321-4a08-b003-9b78b8ba3d6a</id>
    <title>CVE-2017-12149 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2017-12149&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: the servlet exposes an endpoint that allows you to invoke Java Management Extensions (JMX) operations without any authentication or access control | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2017-12149"/>
    <published>2025-07-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/7a881107-1112-4d54-a209-79eedb65ef61</id>
    <title>CVE-2024-55591 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2024-55591&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-02-13 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS/FortiProxy | Description: authentication bypass using an alternate path or channel vulnerability | Exploitation type: ransomware | CWEs: CWE-288 | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2024-55591"/>
    <published>2025-02-13T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/4c9dc532-4817-4485-87bc-ca2e4991b226</id>
    <title>CVE-2023-46604 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-46604&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / ActiveMQ | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-46604"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/2b661063-e9ab-4d5b-9d00-d94de7451d55</id>
    <title>CVE-2023-46747 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-46747&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: F5 / BIG-IP | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-46747"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/d704f438-9fc8-48cc-8348-6e8c67033e0e</id>
    <title>CVE-2020-1472 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2020-1472&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Netlogon (ZeroLogon) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2020-1472"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/f10c4840-9aa4-4de2-915a-c7f87e9daa7d</id>
    <title>CVE-2023-48788 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-48788&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiClientEMS | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-48788"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/fd776135-8e5d-4387-9f59-380aa3df5498</id>
    <title>CVE-2023-22515 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-22515&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Atlassian / Confluence Server and Data Server | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-22515"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/909840f5-f5e0-41a7-a93d-79d2df8e2551</id>
    <title>CVE-2023-27997 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-27997&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS and FortiProxy | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-27997"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/28270eb4-56ca-4ff4-8cc0-bd6661b2ba7b</id>
    <title>CVE-2017-0144 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2017-0144&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows (SMBv1 - EternalBlue) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2017-0144"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/b868fc15-ceb2-4b78-b60c-910f63afee4e</id>
    <title>CVE-2023-3519 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-3519&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2023-3519"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/d4c9d523-8783-43c5-93fc-7d1106d68d4b</id>
    <title>CVE-2020-0787 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2020-0787&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows BITS26 | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2020-0787"/>
    <published>2025-01-23T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/2a69e6af-0944-47bc-8819-d13de8d45d53</id>
    <title>CVE-2024-8190 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2024-8190&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2024-8190"/>
    <published>2025-01-17T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/206c31c6-b4a6-46fa-8e4d-95dd5f0d8911</id>
    <title>CVE-2024-9380 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2024-9380&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2024-9380"/>
    <published>2025-01-17T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/known-exploited-vulnerabilities-catalog/fe14dbbb-4054-4eaa-8465-8f20cc02e7a4</id>
    <title>CVE-2024-8963 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:53:13.022031+00:00</updated>
    <content>&lt;h3&gt;CVE-2024-8963&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content>
    <link href="http://db.gcve.eu/vuln/CVE-2024-8963"/>
    <published>2025-01-17T00:00:00+00:00</published>
  </entry>
</feed>
