<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/feed</id>
  <title>CIRCL - Known Exploited Vulnerabilities Catalog</title>
  <updated>2026-03-13T05:29:07.851105+00:00</updated>
  <author>
    <name>CIRCL</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>KEV catalog conforming to GCVE BCP-07. Contains the most recent 20 entries.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e778c2d-cf27-4c9c-9fe6-fc01102b5431</id>
    <title>CVE-2024-13030 - Confirmed Exploitation</title>
    <updated>2026-03-12T10:50:26.115478+00:00</updated>
    <content>&lt;h3&gt;CVE-2024-13030&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-03-12 10:49 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-03-12&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-03-12&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2024-13030"/>
    <published>2026-03-12T10:49:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/aec8c947-3fea-48c3-9bec-d2cec737fac3</id>
    <title>CVE-2021-35394 - Confirmed Exploitation</title>
    <updated>2026-03-12T10:46:10.536420+00:00</updated>
    <content>&lt;h3&gt;CVE-2021-35394&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-03-12 10:45 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-03-12&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-03-12&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2021-35394"/>
    <published>2026-03-12T10:45:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f4f43160-12d2-41a0-9dcf-d016d5bd8761</id>
    <title>CVE-2017-17215 - Confirmed Exploitation</title>
    <updated>2026-03-12T10:48:16.957923+00:00</updated>
    <content>&lt;h3&gt;CVE-2017-17215&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-03-12 10:42 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternative IDs:&lt;/strong&gt; []&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-03-12&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-03-12&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2017-17215"/>
    <published>2026-03-12T10:42:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1b1e860e-2f21-4e03-8570-b3edc31111f9</id>
    <title>CVE-2014-8361 - Confirmed Exploitation</title>
    <updated>2026-03-12T10:16:33.414541+00:00</updated>
    <content>&lt;h3&gt;CVE-2014-8361&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-03-12 10:16 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-03-12&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-03-12&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2014-8361"/>
    <published>2026-03-12T10:16:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/523ca818-9868-4f11-832b-baf2fbd9d76c</id>
    <title>GCVE-1-2026-0020 - Confirmed Exploitation</title>
    <updated>2026-03-11T14:14:51.677937+00:00</updated>
    <content>&lt;h3&gt;GCVE-1-2026-0020&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-03-11 14:12 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-01-14&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-03-11&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/GCVE-1-2026-0020"/>
    <published>2026-03-11T14:12:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/faf06699-e4d6-4b42-a97e-6e625bf07c3a</id>
    <title>CVE-2026-25108 - Confirmed Exploitation</title>
    <updated>2026-02-26T10:02:35.959729+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-25108&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-26 10:01 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-26&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Asserted:&lt;/strong&gt; 2026-02-26&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2026-25108"/>
    <published>2026-02-26T10:01:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d24b6076-eba9-482f-9c75-f3d3f6d33de6</id>
    <title>CVE-2026-1340 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:17:50.418181+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-1340&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 16:24 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-03&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2026-1340"/>
    <published>2026-02-03T16:24:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8532db83-0134-4daa-a82f-90fd78906237</id>
    <title>CVE-2026-1281 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:17:50.418181+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-1281&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 16:21 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-02-03&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2026-1281"/>
    <published>2026-02-03T16:21:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/654a76ab-65b5-485b-a116-b3d71a795054</id>
    <title>CVE-2023-28771 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:17:50.418181+00:00</updated>
    <content>&lt;h3&gt;CVE-2023-28771&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-03 09:42 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternative IDs:&lt;/strong&gt; GCVE-0-2023-28771&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Severity: 100.0, Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Evidence Sources:&lt;/strong&gt; 1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-01-01&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope Notes:&lt;/strong&gt; #  ip           | as_num | as_name                     | as_country | ptr                                | last_timestamp   &#13;
#  -------------+--------+-----------------------------+------------+------------------------------------+------------------&#13;
  69.69.70.70  | 209    | CENTURYLINK-US-LEGACY-QWEST | US         | nj-69-69-70-70.dyn.embarqhsd.net   | 2026-01-28 17:45:08&#13;
  70.71.69.69  | 6327   | SHAW                        | CA         | S0106889e68483a90.vs.shawcable.net | 2026-01-28 17:45:09&#13;
  98.45.67.89  | 7922   | COMCAST-7922                | US         | c-98-45-67-89.hsd1.ca.comcast.net  | 2026-01-28 17:45:07&#13;
  95.135.54.10 | 209630 | KREDIT-AS                   | UA         |                                    | 2026-01-28 17:24:43&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2023-28771"/>
    <published>2026-02-03T09:42:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/50fd1f23-20c3-46f1-8fd0-dfcac5812225</id>
    <title>CVE-2026-21509 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:17:50.418181+00:00</updated>
    <content>&lt;h3&gt;CVE-2026-21509&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-02 15:44 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2026-01-26&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2026-21509"/>
    <published>2026-02-02T15:44:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9d0b5efa-7369-4c7b-a448-529e4a837f2e</id>
    <title>CVE-2025-53770 - Confirmed Exploitation</title>
    <updated>2026-02-06T07:17:50.418181+00:00</updated>
    <content>&lt;h3&gt;CVE-2025-53770&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt; Confirmed&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exploited:&lt;/strong&gt; Yes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Status Updated:&lt;/strong&gt; 2026-02-02 14:32 UTC&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternative IDs:&lt;/strong&gt; GCVE-0-2025-53770&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Characteristics:&lt;/strong&gt; Remote Code Execution, No Authentication Required, Remote Access&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First Seen:&lt;/strong&gt; 2025-07-20&lt;/p&gt;</content>
    <link href="http://cvepremium.circl.lu/vuln/CVE-2025-53770"/>
    <published>2026-02-02T14:32:46+00:00</published>
  </entry>
</feed>
