<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>EUVD KEV - Known Exploited Vulnerabilities Catalog</title>
    <link>https://db.gcve.eu/known-exploited-vulnerabilities-catalog</link>
    <description>KEV catalog conforming to GCVE BCP-07. Contains the most recent 20 entries.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 11 Mar 2026 09:59:02 +0000</lastBuildDate>
    <item>
      <title>CVE-2025-25231 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2025-25231</link>
      <description>&lt;h3&gt;CVE-2025-25231&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-09-09 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Omnissa / Omnissa Workspace ONE UEM | Description: Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints | Origin source: CERT-PL | Notes: https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2025-25231&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-09-09 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-09-09&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Omnissa / Omnissa Workspace ONE UEM | Description: Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints | Origin source: CERT-PL | Notes: https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/06eada7c-1ab5-44fe-afd3-79a5dd68784a</guid>
      <pubDate>Tue, 09 Sep 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2025-6543 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2025-6543</link>
      <description>&lt;h3&gt;CVE-2025-6543&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-18 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2025-6543&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-18 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-18&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/016fe937-b9d9-4fc4-8ac7-7078d88c8ada</guid>
      <pubDate>Fri, 18 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2011-4085 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2011-4085</link>
      <description>&lt;h3&gt;CVE-2011-4085&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: some management interfaces remain accessible and lack effective access control mechanisms | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2011-4085&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: some management interfaces remain accessible and lack effective access control mechanisms | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/6bb27705-58ad-4939-a015-6851a41823da</guid>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2010-0738 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2010-0738</link>
      <description>&lt;h3&gt;CVE-2010-0738&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: this management interface allows administrative operations to be performed without adequate access controls allowing a remote attacker to interact with the system in an unauthorized manner | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2010-0738&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: this management interface allows administrative operations to be performed without adequate access controls allowing a remote attacker to interact with the system in an unauthorized manner | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/126fdecc-867c-46fd-b738-2c1a930b4635</guid>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2015-7501 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2015-7501</link>
      <description>&lt;h3&gt;CVE-2015-7501&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / Commons Collections library | Description: the system accepts serialized objects without verifying their origin or reliability allowing an attacker to send specially crafted payloads that are then deserialized and executed | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2015-7501&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / Commons Collections library | Description: the system accepts serialized objects without verifying their origin or reliability allowing an attacker to send specially crafted payloads that are then deserialized and executed | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/b7d611b3-06a2-471c-a7b6-9875c4a93f2e</guid>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2017-12149 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2017-12149</link>
      <description>&lt;h3&gt;CVE-2017-12149&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: the servlet exposes an endpoint that allows you to invoke Java Management Extensions (JMX) operations without any authentication or access control | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2017-12149&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-07-14 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-07-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Red Hat / JBoss Application Server | Description: the servlet exposes an endpoint that allows you to invoke Java Management Extensions (JMX) operations without any authentication or access control | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/a2b930f7-c321-4a08-b003-9b78b8ba3d6a</guid>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2024-55591 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2024-55591</link>
      <description>&lt;h3&gt;CVE-2024-55591&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-02-13 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS/FortiProxy | Description: authentication bypass using an alternate path or channel vulnerability | Exploitation type: ransomware | CWEs: CWE-288 | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2024-55591&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-02-13 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-02-13&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS/FortiProxy | Description: authentication bypass using an alternate path or channel vulnerability | Exploitation type: ransomware | CWEs: CWE-288 | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/7a881107-1112-4d54-a209-79eedb65ef61</guid>
      <pubDate>Thu, 13 Feb 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-46604 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-46604</link>
      <description>&lt;h3&gt;CVE-2023-46604&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / ActiveMQ | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-46604&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Apache / ActiveMQ | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/4c9dc532-4817-4485-87bc-ca2e4991b226</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-46747 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-46747</link>
      <description>&lt;h3&gt;CVE-2023-46747&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: F5 / BIG-IP | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-46747&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: F5 / BIG-IP | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/2b661063-e9ab-4d5b-9d00-d94de7451d55</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2020-1472 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2020-1472</link>
      <description>&lt;h3&gt;CVE-2020-1472&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Netlogon (ZeroLogon) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2020-1472&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Netlogon (ZeroLogon) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/d704f438-9fc8-48cc-8348-6e8c67033e0e</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-48788 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-48788</link>
      <description>&lt;h3&gt;CVE-2023-48788&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiClientEMS | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-48788&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiClientEMS | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/f10c4840-9aa4-4de2-915a-c7f87e9daa7d</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-22515 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-22515</link>
      <description>&lt;h3&gt;CVE-2023-22515&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Atlassian / Confluence Server and Data Server | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-22515&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Atlassian / Confluence Server and Data Server | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/fd776135-8e5d-4387-9f59-380aa3df5498</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-27997 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-27997</link>
      <description>&lt;h3&gt;CVE-2023-27997&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS and FortiProxy | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-27997&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Fortinet / FortiOS and FortiProxy | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/909840f5-f5e0-41a7-a93d-79d2df8e2551</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2017-0144 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2017-0144</link>
      <description>&lt;h3&gt;CVE-2017-0144&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows (SMBv1 - EternalBlue) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2017-0144&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows (SMBv1 - EternalBlue) | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/28270eb4-56ca-4ff4-8cc0-bd6661b2ba7b</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2023-3519 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2023-3519</link>
      <description>&lt;h3&gt;CVE-2023-3519&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2023-3519&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Citrix / Citrix ADC and Citrix Gateway | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/b868fc15-ceb2-4b78-b60c-910f63afee4e</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2020-0787 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2020-0787</link>
      <description>&lt;h3&gt;CVE-2020-0787&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows BITS26 | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2020-0787&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-23 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-23&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Microsoft / Windows BITS26 | Exploitation type: ransomware | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/d4c9d523-8783-43c5-93fc-7d1106d68d4b</guid>
      <pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2024-8190 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2024-8190</link>
      <description>&lt;h3&gt;CVE-2024-8190&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2024-8190&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/2a69e6af-0944-47bc-8819-d13de8d45d53</guid>
      <pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2024-9380 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2024-9380</link>
      <description>&lt;h3&gt;CVE-2024-9380&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2024-9380&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/206c31c6-b4a6-46fa-8e4d-95dd5f0d8911</guid>
      <pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2024-8963 - Confirmed Exploitation</title>
      <link>http://db.gcve.eu/vuln/CVE-2024-8963</link>
      <description>&lt;h3&gt;CVE-2024-8963&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;CVE-2024-8963&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2025-01-17 00:00 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2025-01-17&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; Affected: Ivanti / CSA (Cloud Services Appliance) | Origin source: cnw&lt;/p&gt;</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/known-exploited-vulnerabilities-catalog/fe14dbbb-4054-4eaa-8465-8f20cc02e7a4</guid>
      <pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
