Known Exploited Vulnerabilities Catalog
External catalog of known exploited vulnerabilities conforming to GCVE BCP-07 standard.
Catalog UUID: cce329bf-df49-4c6e-a027-80be2e6483bd (EUVD KEV)
This catalog contains 19 entries.
| Vulnerability ID | Status | Exploited | Status Updated | Evidence | Characteristics | Actions |
|---|---|---|---|---|---|---|
| CVE-2025-25231 |
Confirmed
Asserted: 2025-09-09 |
Yes |
2025-09-09
First seen: 2025-09-09 |
1
source
csirt_report |
- | Details |
| CVE-2025-6543 |
Confirmed
Asserted: 2025-07-18 |
Yes |
2025-07-18
First seen: 2025-07-18 |
1
source
csirt_report |
- | Details |
| CVE-2010-0738 |
Confirmed
Asserted: 2025-07-14 |
Yes |
2025-07-14
First seen: 2025-07-14 |
1
source
csirt_report |
- | Details |
| CVE-2011-4085 |
Confirmed
Asserted: 2025-07-14 |
Yes |
2025-07-14
First seen: 2025-07-14 |
1
source
csirt_report |
- | Details |
| CVE-2017-12149 |
Confirmed
Asserted: 2025-07-14 |
Yes |
2025-07-14
First seen: 2025-07-14 |
1
source
csirt_report |
- | Details |
| CVE-2015-7501 |
Confirmed
Asserted: 2025-07-14 |
Yes |
2025-07-14
First seen: 2025-07-14 |
1
source
csirt_report |
- | Details |
| CVE-2024-55591 |
Confirmed
Asserted: 2025-02-13 |
Yes |
2025-02-13
First seen: 2025-02-13 |
1
source
csirt_report |
- | Details |
| CVE-2023-27997 |
Confirmed
Asserted: 2025-01-23 |
Yes |
2025-01-23
First seen: 2025-01-23 |
1
source
csirt_report |
- | Details |
| CVE-2017-0144 |
Confirmed
Asserted: 2025-01-23 |
Yes |
2025-01-23
First seen: 2025-01-23 |
1
source
csirt_report |
- | Details |
| CVE-2023-3519 |
Confirmed
Asserted: 2025-01-23 |
Yes |
2025-01-23
First seen: 2025-01-23 |
1
source
csirt_report |
- | Details |
About this Catalog
ENISA via the CSIRTs network provides list of known-exploited seen in the CSIRTs network.
This Known Exploited Vulnerabilities (KEV) catalog conforms to the GCVE BCP-07 standard (Best Current Practice) standard for documenting vulnerabilities with confirmed or suspected active exploitation.
Each entry includes exploitation status, evidence sources, and characteristics to help organizations prioritize vulnerability remediation efforts.