|
5 | 5 | "execution_count": 1, |
6 | 6 | "metadata": { |
7 | 7 | "execution": { |
8 | | - "iopub.execute_input": "2026-03-11T12:28:39.094926Z", |
9 | | - "iopub.status.busy": "2026-03-11T12:28:39.094717Z", |
10 | | - "iopub.status.idle": "2026-03-11T12:42:59.016028Z", |
11 | | - "shell.execute_reply": "2026-03-11T12:42:59.015153Z" |
| 8 | + "iopub.execute_input": "2026-03-12T12:32:22.693038Z", |
| 9 | + "iopub.status.busy": "2026-03-12T12:32:22.692838Z", |
| 10 | + "iopub.status.idle": "2026-03-12T12:51:02.271380Z", |
| 11 | + "shell.execute_reply": "2026-03-12T12:51:02.270515Z" |
12 | 12 | }, |
13 | 13 | "tags": [ |
14 | 14 | "remove-cell" |
|
54 | 54 | " </tr>\n", |
55 | 55 | " <tr>\n", |
56 | 56 | " <th>1</th>\n", |
57 | | - " <td>CVE-2026-3911</td>\n", |
58 | | - " <td>2026-03-11</td>\n", |
59 | | - " <td>5</td>\n", |
60 | | - " <td>https://github.com/github/advisory-database/bl...</td>\n", |
61 | | - " <td>2026-03-11</td>\n", |
| 57 | + " <td>CVE-2026-4016</td>\n", |
| 58 | + " <td>2026-03-12</td>\n", |
| 59 | + " <td>8</td>\n", |
| 60 | + " <td>https://github.com/gpac/gpac/</td>\n", |
| 61 | + " <td>1970-01-01</td>\n", |
62 | 62 | " </tr>\n", |
63 | 63 | " <tr>\n", |
64 | 64 | " <th>2</th>\n", |
65 | | - " <td>CVE-2026-3906</td>\n", |
66 | | - " <td>2026-03-11</td>\n", |
67 | | - " <td>4</td>\n", |
68 | | - " <td>https://core.trac.wordpress.org/browser/trunk/...</td>\n", |
| 65 | + " <td>CVE-2026-4015</td>\n", |
| 66 | + " <td>2026-03-12</td>\n", |
| 67 | + " <td>9</td>\n", |
| 68 | + " <td>https://github.com/gpac/gpac/</td>\n", |
69 | 69 | " <td>1970-01-01</td>\n", |
70 | 70 | " </tr>\n", |
71 | 71 | " <tr>\n", |
72 | 72 | " <th>3</th>\n", |
73 | | - " <td>CVE-2026-3903</td>\n", |
74 | | - " <td>2026-03-11</td>\n", |
75 | | - " <td>4</td>\n", |
76 | | - " <td>https://plugins.trac.wordpress.org/changeset/3...</td>\n", |
| 73 | + " <td>CVE-2026-4014</td>\n", |
| 74 | + " <td>2026-03-12</td>\n", |
| 75 | + " <td>6</td>\n", |
| 76 | + " <td>https://github.com/wangchaoxing/CVE/issues/5</td>\n", |
77 | 77 | " <td>1970-01-01</td>\n", |
78 | 78 | " </tr>\n", |
79 | 79 | " <tr>\n", |
80 | 80 | " <th>4</th>\n", |
81 | | - " <td>CVE-2026-3884</td>\n", |
82 | | - " <td>2026-03-11</td>\n", |
| 81 | + " <td>CVE-2026-4013</td>\n", |
| 82 | + " <td>2026-03-12</td>\n", |
83 | 83 | " <td>5</td>\n", |
84 | | - " <td>https://github.com/github/advisory-database/bl...</td>\n", |
85 | | - " <td>2026-03-11</td>\n", |
| 84 | + " <td>https://vuldb.com/?ctiid.350535</td>\n", |
| 85 | + " <td>1970-01-01</td>\n", |
86 | 86 | " </tr>\n", |
87 | 87 | " </tbody>\n", |
88 | 88 | "</table>\n", |
|
91 | 91 | "text/plain": [ |
92 | 92 | " CVE Published Date Reference Count \\\n", |
93 | 93 | "0 CVE-2026-9293 1970-01-01 1 \n", |
94 | | - "1 CVE-2026-3911 2026-03-11 5 \n", |
95 | | - "2 CVE-2026-3906 2026-03-11 4 \n", |
96 | | - "3 CVE-2026-3903 2026-03-11 4 \n", |
97 | | - "4 CVE-2026-3884 2026-03-11 5 \n", |
| 94 | + "1 CVE-2026-4016 2026-03-12 8 \n", |
| 95 | + "2 CVE-2026-4015 2026-03-12 9 \n", |
| 96 | + "3 CVE-2026-4014 2026-03-12 6 \n", |
| 97 | + "4 CVE-2026-4013 2026-03-12 5 \n", |
98 | 98 | "\n", |
99 | | - " First Reference URL First Reference Date \n", |
100 | | - "0 https://www.tp-link.com/us/support/faq/4969/ 2026-02-13 \n", |
101 | | - "1 https://github.com/github/advisory-database/bl... 2026-03-11 \n", |
102 | | - "2 https://core.trac.wordpress.org/browser/trunk/... 1970-01-01 \n", |
103 | | - "3 https://plugins.trac.wordpress.org/changeset/3... 1970-01-01 \n", |
104 | | - "4 https://github.com/github/advisory-database/bl... 2026-03-11 " |
| 99 | + " First Reference URL First Reference Date \n", |
| 100 | + "0 https://www.tp-link.com/us/support/faq/4969/ 2026-02-13 \n", |
| 101 | + "1 https://github.com/gpac/gpac/ 1970-01-01 \n", |
| 102 | + "2 https://github.com/gpac/gpac/ 1970-01-01 \n", |
| 103 | + "3 https://github.com/wangchaoxing/CVE/issues/5 1970-01-01 \n", |
| 104 | + "4 https://vuldb.com/?ctiid.350535 1970-01-01 " |
105 | 105 | ] |
106 | 106 | }, |
107 | 107 | "metadata": {}, |
|
218 | 218 | "execution_count": 2, |
219 | 219 | "metadata": { |
220 | 220 | "execution": { |
221 | | - "iopub.execute_input": "2026-03-11T12:42:59.048746Z", |
222 | | - "iopub.status.busy": "2026-03-11T12:42:59.048455Z", |
223 | | - "iopub.status.idle": "2026-03-11T12:42:59.088160Z", |
224 | | - "shell.execute_reply": "2026-03-11T12:42:59.087476Z" |
| 221 | + "iopub.execute_input": "2026-03-12T12:51:02.303744Z", |
| 222 | + "iopub.status.busy": "2026-03-12T12:51:02.303487Z", |
| 223 | + "iopub.status.idle": "2026-03-12T12:51:02.342886Z", |
| 224 | + "shell.execute_reply": "2026-03-12T12:51:02.342189Z" |
225 | 225 | }, |
226 | 226 | "tags": [ |
227 | 227 | "hide-input" |
|
234 | 234 | "\n", |
235 | 235 | "\n", |
236 | 236 | "<h2 style=\"margin-bottom: 5px;\">Top 50 Reserved CVEs by Public Reference Count</h2>\n", |
237 | | - "<p><strong>Total Matching CVEs: 4271</strong></p>\n", |
| 237 | + "<p><strong>Total Matching CVEs: 4246</strong></p>\n", |
238 | 238 | "\n", |
239 | 239 | "<div style=\"max-height: 500px; overflow-y: scroll; border: 1px solid #ccc; padding: 10px\">\n", |
240 | 240 | " <table border=\"1\" class=\"dataframe\">\n", |
|
374 | 374 | " <td>2020-01-14</td>\n", |
375 | 375 | " </tr>\n", |
376 | 376 | " <tr>\n", |
377 | | - " <td>CVE-2018-18855</td>\n", |
378 | | - " <td>16</td>\n", |
379 | | - " <td>https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-ww3v-6xjf-jv28/GHSA-ww3v-6xjf-jv28.json</td>\n", |
380 | | - " <td>2022-06-28</td>\n", |
381 | | - " </tr>\n", |
382 | | - " <tr>\n", |
383 | | - " <td>CVE-2025-33143</td>\n", |
384 | | - " <td>16</td>\n", |
385 | | - " <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0760/</td>\n", |
386 | | - " <td>2025-09-05</td>\n", |
387 | | - " </tr>\n", |
388 | | - " <tr>\n", |
389 | | - " <td>CVE-2024-31884</td>\n", |
| 377 | + " <td>CVE-2016-1000212</td>\n", |
390 | 378 | " <td>16</td>\n", |
391 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2024-31884.html</td>\n", |
392 | | - " <td>2026-01-22</td>\n", |
| 379 | + " <td>https://explore.alas.aws.amazon.com/CVE-2016-1000212.html</td>\n", |
| 380 | + " <td>2022-10-12</td>\n", |
393 | 381 | " </tr>\n", |
394 | 382 | " <tr>\n", |
395 | 383 | " <td>CVE-2025-36350</td>\n", |
|
404 | 392 | " <td>2024-07-12</td>\n", |
405 | 393 | " </tr>\n", |
406 | 394 | " <tr>\n", |
| 395 | + " <td>CVE-2025-33143</td>\n", |
| 396 | + " <td>16</td>\n", |
| 397 | + " <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0760/</td>\n", |
| 398 | + " <td>2025-09-05</td>\n", |
| 399 | + " </tr>\n", |
| 400 | + " <tr>\n", |
407 | 401 | " <td>CVE-2026-0966</td>\n", |
408 | 402 | " <td>16</td>\n", |
409 | 403 | " <td>https://explore.alas.aws.amazon.com/CVE-2026-0966.html</td>\n", |
410 | 404 | " <td>2026-02-11</td>\n", |
411 | 405 | " </tr>\n", |
412 | 406 | " <tr>\n", |
413 | | - " <td>CVE-2026-2369</td>\n", |
| 407 | + " <td>CVE-2018-18855</td>\n", |
414 | 408 | " <td>16</td>\n", |
415 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2026-2369.html</td>\n", |
416 | | - " <td>2026-02-13</td>\n", |
| 409 | + " <td>https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-ww3v-6xjf-jv28/GHSA-ww3v-6xjf-jv28.json</td>\n", |
| 410 | + " <td>2022-06-28</td>\n", |
417 | 411 | " </tr>\n", |
418 | 412 | " <tr>\n", |
419 | | - " <td>CVE-2016-1000212</td>\n", |
| 413 | + " <td>CVE-2024-31884</td>\n", |
420 | 414 | " <td>16</td>\n", |
421 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2016-1000212.html</td>\n", |
422 | | - " <td>2022-10-12</td>\n", |
| 415 | + " <td>https://explore.alas.aws.amazon.com/CVE-2024-31884.html</td>\n", |
| 416 | + " <td>2026-01-22</td>\n", |
| 417 | + " </tr>\n", |
| 418 | + " <tr>\n", |
| 419 | + " <td>CVE-2026-2369</td>\n", |
| 420 | + " <td>16</td>\n", |
| 421 | + " <td>https://explore.alas.aws.amazon.com/CVE-2026-2369.html</td>\n", |
| 422 | + " <td>2026-02-13</td>\n", |
423 | 423 | " </tr>\n", |
424 | 424 | " <tr>\n", |
425 | 425 | " <td>CVE-2026-0967</td>\n", |
|
428 | 428 | " <td>2026-02-11</td>\n", |
429 | 429 | " </tr>\n", |
430 | 430 | " <tr>\n", |
431 | | - " <td>CVE-2020-1441</td>\n", |
432 | | - " <td>15</td>\n", |
433 | | - " <td>https://bdu.fstec.ru/vul/2020-03093</td>\n", |
434 | | - " <td>2020-06-17</td>\n", |
435 | | - " </tr>\n", |
436 | | - " <tr>\n", |
437 | 431 | " <td>CVE-2020-2521</td>\n", |
438 | 432 | " <td>15</td>\n", |
439 | 433 | " <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-625/</td>\n", |
440 | 434 | " <td>2020-10-09</td>\n", |
441 | 435 | " </tr>\n", |
442 | 436 | " <tr>\n", |
443 | | - " <td>CVE-2024-21944</td>\n", |
| 437 | + " <td>CVE-2020-1441</td>\n", |
| 438 | + " <td>15</td>\n", |
| 439 | + " <td>https://bdu.fstec.ru/vul/2020-03093</td>\n", |
| 440 | + " <td>2020-06-17</td>\n", |
| 441 | + " </tr>\n", |
| 442 | + " <tr>\n", |
| 443 | + " <td>CVE-2024-32110</td>\n", |
444 | 444 | " <td>14</td>\n", |
445 | | - " <td>https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html</td>\n", |
446 | | - " <td>2024-12-10</td>\n", |
| 445 | + " <td>https://www.rapid7.com/db/vulnerabilities/ajax-load-more-anything-plugin-cve-2024-32110/</td>\n", |
| 446 | + " <td>2025-05-16</td>\n", |
447 | 447 | " </tr>\n", |
448 | 448 | " <tr>\n", |
449 | | - " <td>CVE-2026-2708</td>\n", |
| 449 | + " <td>CVE-2026-2271</td>\n", |
450 | 450 | " <td>14</td>\n", |
451 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2026-2708.html</td>\n", |
452 | | - " <td>2026-02-20</td>\n", |
| 451 | + " <td>https://explore.alas.aws.amazon.com/CVE-2026-2271.html</td>\n", |
| 452 | + " <td>2026-02-11</td>\n", |
453 | 453 | " </tr>\n", |
454 | 454 | " <tr>\n", |
455 | 455 | " <td>CVE-2026-2272</td>\n", |
|
458 | 458 | " <td>2026-02-11</td>\n", |
459 | 459 | " </tr>\n", |
460 | 460 | " <tr>\n", |
| 461 | + " <td>CVE-2023-28355</td>\n", |
| 462 | + " <td>14</td>\n", |
| 463 | + " <td>https://bdu.fstec.ru/vul/2023-02779</td>\n", |
| 464 | + " <td>2023-04-11</td>\n", |
| 465 | + " </tr>\n", |
| 466 | + " <tr>\n", |
461 | 467 | " <td>CVE-2026-0968</td>\n", |
462 | 468 | " <td>14</td>\n", |
463 | 469 | " <td>https://explore.alas.aws.amazon.com/CVE-2026-0968.html</td>\n", |
|
470 | 476 | " <td>2026-02-11</td>\n", |
471 | 477 | " </tr>\n", |
472 | 478 | " <tr>\n", |
473 | | - " <td>CVE-2026-0964</td>\n", |
474 | | - " <td>14</td>\n", |
475 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2026-0964.html</td>\n", |
476 | | - " <td>2026-02-11</td>\n", |
477 | | - " </tr>\n", |
478 | | - " <tr>\n", |
479 | | - " <td>CVE-2024-32110</td>\n", |
| 479 | + " <td>CVE-2026-2708</td>\n", |
480 | 480 | " <td>14</td>\n", |
481 | | - " <td>https://www.rapid7.com/db/vulnerabilities/ajax-load-more-anything-plugin-cve-2024-32110/</td>\n", |
482 | | - " <td>2025-05-16</td>\n", |
| 481 | + " <td>https://explore.alas.aws.amazon.com/CVE-2026-2708.html</td>\n", |
| 482 | + " <td>2026-02-20</td>\n", |
483 | 483 | " </tr>\n", |
484 | 484 | " <tr>\n", |
485 | | - " <td>CVE-2023-28355</td>\n", |
| 485 | + " <td>CVE-2024-21944</td>\n", |
486 | 486 | " <td>14</td>\n", |
487 | | - " <td>https://bdu.fstec.ru/vul/2023-02779</td>\n", |
488 | | - " <td>2023-04-11</td>\n", |
| 487 | + " <td>https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html</td>\n", |
| 488 | + " <td>2024-12-10</td>\n", |
489 | 489 | " </tr>\n", |
490 | 490 | " <tr>\n", |
491 | | - " <td>CVE-2026-2271</td>\n", |
| 491 | + " <td>CVE-2026-0964</td>\n", |
492 | 492 | " <td>14</td>\n", |
493 | | - " <td>https://explore.alas.aws.amazon.com/CVE-2026-2271.html</td>\n", |
| 493 | + " <td>https://explore.alas.aws.amazon.com/CVE-2026-0964.html</td>\n", |
494 | 494 | " <td>2026-02-11</td>\n", |
495 | 495 | " </tr>\n", |
496 | 496 | " <tr>\n", |
|
512 | 512 | " <td>2026-02-10</td>\n", |
513 | 513 | " </tr>\n", |
514 | 514 | " <tr>\n", |
515 | | - " <td>CVE-2020-9713</td>\n", |
| 515 | + " <td>CVE-2025-43236</td>\n", |
516 | 516 | " <td>11</td>\n", |
517 | | - " <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n", |
518 | | - " <td>2020-08-11</td>\n", |
| 517 | + " <td>https://support.apple.com/en-us/124149</td>\n", |
| 518 | + " <td>2025-07-29</td>\n", |
519 | 519 | " </tr>\n", |
520 | 520 | " <tr>\n", |
521 | | - " <td>CVE-2024-38393</td>\n", |
| 521 | + " <td>CVE-2020-9713</td>\n", |
522 | 522 | " <td>11</td>\n", |
523 | | - " <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2024-AVI-0816/</td>\n", |
524 | | - " <td>2024-09-26</td>\n", |
| 523 | + " <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n", |
| 524 | + " <td>2020-08-11</td>\n", |
525 | 525 | " </tr>\n", |
526 | 526 | " <tr>\n", |
527 | 527 | " <td>CVE-2020-9695</td>\n", |
|
530 | 530 | " <td>2020-08-11</td>\n", |
531 | 531 | " </tr>\n", |
532 | 532 | " <tr>\n", |
533 | | - " <td>CVE-2025-43236</td>\n", |
534 | | - " <td>11</td>\n", |
535 | | - " <td>https://support.apple.com/en-us/124149</td>\n", |
536 | | - " <td>2025-07-29</td>\n", |
537 | | - " </tr>\n", |
538 | | - " <tr>\n", |
539 | | - " <td>CVE-2020-9711</td>\n", |
| 533 | + " <td>CVE-2024-1627</td>\n", |
540 | 534 | " <td>11</td>\n", |
541 | | - " <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n", |
542 | | - " <td>2020-08-11</td>\n", |
| 535 | + " <td>https://explore.alas.aws.amazon.com/CVE-2024-1627.html</td>\n", |
| 536 | + " <td>2024-02-28</td>\n", |
543 | 537 | " </tr>\n", |
544 | 538 | " <tr>\n", |
545 | 539 | " <td>CVE-2025-43238</td>\n", |
546 | 540 | " <td>11</td>\n", |
547 | 541 | " <td>https://support.apple.com/en-us/124149</td>\n", |
548 | 542 | " <td>2025-07-29</td>\n", |
549 | 543 | " </tr>\n", |
| 544 | + " <tr>\n", |
| 545 | + " <td>CVE-2014-1003</td>\n", |
| 546 | + " <td>11</td>\n", |
| 547 | + " <td>https://www.exploit-db.com/exploits/30689</td>\n", |
| 548 | + " <td>2014-01-04</td>\n", |
| 549 | + " </tr>\n", |
550 | 550 | " </tbody>\n", |
551 | 551 | "</table>\n", |
552 | 552 | "</div>\n" |
|
0 commit comments