{"metadata": {"count": 6, "page": 1, "per_page": 100}, "data": [{"uuid": "faf06699-e4d6-4b42-a97e-6e625bf07c3a", "vulnerability": {"vulnId": "CVE-2026-25108", "altId": []}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "gna": 1, "object_uuid": "faf06699-e4d6-4b42-a97e-6e625bf07c3a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-26T10:01:52+00:00"}, "characteristics": {"remote_code_execution": true, "authentication_required": true}, "timestamps": {"asserted_at": "2026-02-26T10:01:52", "last_seen_at": "2026-02-26T10:01:52", "first_seen_at": "2026-02-26T10:01:52"}, "scope": null, "evidence": [], "references": null}, {"uuid": "d24b6076-eba9-482f-9c75-f3d3f6d33de6", "vulnerability": {"vulnId": "CVE-2026-1340", "altId": []}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "object_uuid": "d24b6076-eba9-482f-9c75-f3d3f6d33de6"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T16:24:28+00:00"}, "characteristics": {"local_access_required": false, "remote_code_execution": true, "authentication_required": false}, "timestamps": {"first_seen_at": "2026-02-03T10:22:00"}, "scope": null, "evidence": [], "references": null}, {"uuid": "8532db83-0134-4daa-a82f-90fd78906237", "vulnerability": {"vulnId": "CVE-2026-1281", "altId": []}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "object_uuid": "8532db83-0134-4daa-a82f-90fd78906237"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T16:21:36+00:00"}, "characteristics": {"severity": 100.0, "local_access_required": false, "remote_code_execution": true, "authentication_required": false}, "timestamps": {"first_seen_at": "2026-02-03T00:09:00"}, "scope": null, "evidence": [], "references": null}, {"uuid": "654a76ab-65b5-485b-a116-b3d71a795054", "vulnerability": {"vulnId": "CVE-2023-28771", "altId": ["GCVE-0-2023-28771"]}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "object_uuid": "654a76ab-65b5-485b-a116-b3d71a795054"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T09:42:53+00:00"}, "characteristics": {"severity": 100.0, "local_access_required": false, "remote_code_execution": true, "authentication_required": false}, "timestamps": {"last_seen_at": "2026-01-28T17:00:00", "first_seen_at": "2025-01-01T00:00:00"}, "scope": {"notes": "#  ip           | as_num | as_name                     | as_country | ptr                                | last_timestamp   \r\n#  -------------+--------+-----------------------------+------------+------------------------------------+------------------\r\n  69.69.70.70  | 209    | CENTURYLINK-US-LEGACY-QWEST | US         | nj-69-69-70-70.dyn.embarqhsd.net   | 2026-01-28 17:45:08\r\n  70.71.69.69  | 6327   | SHAW                        | CA         | S0106889e68483a90.vs.shawcable.net | 2026-01-28 17:45:09\r\n  98.45.67.89  | 7922   | COMCAST-7922                | US         | c-98-45-67-89.hsd1.ca.comcast.net  | 2026-01-28 17:45:07\r\n  95.135.54.10 | 209630 | KREDIT-AS                   | UA         |                                    | 2026-01-28 17:24:43"}, "evidence": [{"type": "sinkhole", "source": "cti-feed.circl.lu", "signal": "in_the_wild_attempts", "confidence": 1.0, "details": null}], "references": null}, {"uuid": "50fd1f23-20c3-46f1-8fd0-dfcac5812225", "vulnerability": {"vulnId": "CVE-2026-21509", "altId": []}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "object_uuid": "50fd1f23-20c3-46f1-8fd0-dfcac5812225"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-02T15:44:22+00:00"}, "characteristics": {"remote_code_execution": true, "authentication_required": false}, "timestamps": {"first_seen_at": "2026-01-26T10:00:00"}, "scope": null, "evidence": [], "references": null}, {"uuid": "9d0b5efa-7369-4c7b-a448-529e4a837f2e", "vulnerability": {"vulnId": "CVE-2025-53770", "altId": ["GCVE-0-2025-53770"]}, "gcve": {"origin_uuid": "1a89b78e-f703-45f3-bb86-59eb712668bd", "object_uuid": "9d0b5efa-7369-4c7b-a448-529e4a837f2e"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-02T14:32:46+00:00"}, "characteristics": {"local_access_required": false, "remote_code_execution": true, "authentication_required": false}, "timestamps": {"last_seen_at": "2025-09-30T10:00:00", "first_seen_at": "2025-07-20T20:00:00"}, "scope": null, "evidence": [], "references": null}]}
