Known Exploited Vulnerabilities Catalog

Local catalog of known exploited vulnerabilities conforming to GCVE BCP-07 standard.
Catalog UUID: 1a89b78e-f703-45f3-bb86-59eb712668bd (gna-1)
This catalog contains 11 entries.

Vulnerability ID Status Exploited Status Updated Evidence Characteristics Actions
CVE-2024-13030 Confirmed
Asserted: 2026-03-12
Yes 2026-03-12
First seen: 2026-03-12
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2021-35394 Confirmed
Asserted: 2026-03-12
Yes 2026-03-12
First seen: 2026-03-12
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2017-17215
Alternative IDs: []
Confirmed
Asserted: 2026-03-12
Yes 2026-03-12
First seen: 2026-03-12
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2014-8361 Confirmed
Asserted: 2026-03-12
Yes 2026-03-12
First seen: 2026-03-12
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
GCVE-1-2026-0020 Confirmed
Asserted: 2026-03-11
Yes 2026-03-11
First seen: 2026-01-14
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2026-25108 Confirmed
Asserted: 2026-02-26
Yes 2026-02-26
First seen: 2026-02-26
- RCE
Details
CVE-2026-1340 Confirmed Yes 2026-02-03
First seen: 2026-02-03
- RCE
No Auth Required
Remote
Details
CVE-2026-1281 Confirmed Yes 2026-02-03
First seen: 2026-02-03
- Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2023-28771
Alternative IDs: GCVE-0-2023-28771
Confirmed Yes 2026-02-03
First seen: 2025-01-01
1 source
sinkhole
Severity: 100.0
RCE
No Auth Required
Remote
Details
CVE-2026-21509 Confirmed Yes 2026-02-02
First seen: 2026-01-26
- RCE
No Auth Required
Details
displaying 1 - 10 KEV entries in total 11
About this Catalog

CIRCL provides a known-exploited vulnerability and supporting the different status_reason described in GCVE BCP-07.

This Known Exploited Vulnerabilities (KEV) catalog conforms to the GCVE BCP-07 standard (Best Current Practice) standard for documenting vulnerabilities with confirmed or suspected active exploitation.

Each entry includes exploitation status, evidence sources, and characteristics to help organizations prioritize vulnerability remediation efforts.