Skip to content

Commit 3df5f62

Browse files
Commit from GitHub Actions (Update Notebooks)
1 parent 11eb53a commit 3df5f62

File tree

9 files changed

+530
-519
lines changed

9 files changed

+530
-519
lines changed

canary-intelligence/canary-kev.ipynb

Lines changed: 64 additions & 46 deletions
Large diffs are not rendered by default.

exploitation-timelines/exploitation-timeline.ipynb

Lines changed: 30 additions & 30 deletions
Large diffs are not rendered by default.

initial-access/initial-access.ipynb

Lines changed: 54 additions & 54 deletions
Large diffs are not rendered by default.

known-exploited-vulnerabilities/2024-dashboard.ipynb

Lines changed: 52 additions & 52 deletions
Large diffs are not rendered by default.

known-exploited-vulnerabilities/2025-dashboard.ipynb

Lines changed: 52 additions & 52 deletions
Large diffs are not rendered by default.

nist-nvd/nist-nvd.ipynb

Lines changed: 48 additions & 55 deletions
Large diffs are not rendered by default.

reserved-cves/reserved-but-exploited.ipynb

Lines changed: 99 additions & 99 deletions
Large diffs are not rendered by default.

reserved-cves/reserved-by-reference-count.ipynb

Lines changed: 98 additions & 98 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
"execution_count": 1,
66
"metadata": {
77
"execution": {
8-
"iopub.execute_input": "2026-03-11T12:28:39.094926Z",
9-
"iopub.status.busy": "2026-03-11T12:28:39.094717Z",
10-
"iopub.status.idle": "2026-03-11T12:42:59.016028Z",
11-
"shell.execute_reply": "2026-03-11T12:42:59.015153Z"
8+
"iopub.execute_input": "2026-03-12T12:32:22.693038Z",
9+
"iopub.status.busy": "2026-03-12T12:32:22.692838Z",
10+
"iopub.status.idle": "2026-03-12T12:51:02.271380Z",
11+
"shell.execute_reply": "2026-03-12T12:51:02.270515Z"
1212
},
1313
"tags": [
1414
"remove-cell"
@@ -54,35 +54,35 @@
5454
" </tr>\n",
5555
" <tr>\n",
5656
" <th>1</th>\n",
57-
" <td>CVE-2026-3911</td>\n",
58-
" <td>2026-03-11</td>\n",
59-
" <td>5</td>\n",
60-
" <td>https://github.com/github/advisory-database/bl...</td>\n",
61-
" <td>2026-03-11</td>\n",
57+
" <td>CVE-2026-4016</td>\n",
58+
" <td>2026-03-12</td>\n",
59+
" <td>8</td>\n",
60+
" <td>https://github.com/gpac/gpac/</td>\n",
61+
" <td>1970-01-01</td>\n",
6262
" </tr>\n",
6363
" <tr>\n",
6464
" <th>2</th>\n",
65-
" <td>CVE-2026-3906</td>\n",
66-
" <td>2026-03-11</td>\n",
67-
" <td>4</td>\n",
68-
" <td>https://core.trac.wordpress.org/browser/trunk/...</td>\n",
65+
" <td>CVE-2026-4015</td>\n",
66+
" <td>2026-03-12</td>\n",
67+
" <td>9</td>\n",
68+
" <td>https://github.com/gpac/gpac/</td>\n",
6969
" <td>1970-01-01</td>\n",
7070
" </tr>\n",
7171
" <tr>\n",
7272
" <th>3</th>\n",
73-
" <td>CVE-2026-3903</td>\n",
74-
" <td>2026-03-11</td>\n",
75-
" <td>4</td>\n",
76-
" <td>https://plugins.trac.wordpress.org/changeset/3...</td>\n",
73+
" <td>CVE-2026-4014</td>\n",
74+
" <td>2026-03-12</td>\n",
75+
" <td>6</td>\n",
76+
" <td>https://github.com/wangchaoxing/CVE/issues/5</td>\n",
7777
" <td>1970-01-01</td>\n",
7878
" </tr>\n",
7979
" <tr>\n",
8080
" <th>4</th>\n",
81-
" <td>CVE-2026-3884</td>\n",
82-
" <td>2026-03-11</td>\n",
81+
" <td>CVE-2026-4013</td>\n",
82+
" <td>2026-03-12</td>\n",
8383
" <td>5</td>\n",
84-
" <td>https://github.com/github/advisory-database/bl...</td>\n",
85-
" <td>2026-03-11</td>\n",
84+
" <td>https://vuldb.com/?ctiid.350535</td>\n",
85+
" <td>1970-01-01</td>\n",
8686
" </tr>\n",
8787
" </tbody>\n",
8888
"</table>\n",
@@ -91,17 +91,17 @@
9191
"text/plain": [
9292
" CVE Published Date Reference Count \\\n",
9393
"0 CVE-2026-9293 1970-01-01 1 \n",
94-
"1 CVE-2026-3911 2026-03-11 5 \n",
95-
"2 CVE-2026-3906 2026-03-11 4 \n",
96-
"3 CVE-2026-3903 2026-03-11 4 \n",
97-
"4 CVE-2026-3884 2026-03-11 5 \n",
94+
"1 CVE-2026-4016 2026-03-12 8 \n",
95+
"2 CVE-2026-4015 2026-03-12 9 \n",
96+
"3 CVE-2026-4014 2026-03-12 6 \n",
97+
"4 CVE-2026-4013 2026-03-12 5 \n",
9898
"\n",
99-
" First Reference URL First Reference Date \n",
100-
"0 https://www.tp-link.com/us/support/faq/4969/ 2026-02-13 \n",
101-
"1 https://github.com/github/advisory-database/bl... 2026-03-11 \n",
102-
"2 https://core.trac.wordpress.org/browser/trunk/... 1970-01-01 \n",
103-
"3 https://plugins.trac.wordpress.org/changeset/3... 1970-01-01 \n",
104-
"4 https://github.com/github/advisory-database/bl... 2026-03-11 "
99+
" First Reference URL First Reference Date \n",
100+
"0 https://www.tp-link.com/us/support/faq/4969/ 2026-02-13 \n",
101+
"1 https://github.com/gpac/gpac/ 1970-01-01 \n",
102+
"2 https://github.com/gpac/gpac/ 1970-01-01 \n",
103+
"3 https://github.com/wangchaoxing/CVE/issues/5 1970-01-01 \n",
104+
"4 https://vuldb.com/?ctiid.350535 1970-01-01 "
105105
]
106106
},
107107
"metadata": {},
@@ -218,10 +218,10 @@
218218
"execution_count": 2,
219219
"metadata": {
220220
"execution": {
221-
"iopub.execute_input": "2026-03-11T12:42:59.048746Z",
222-
"iopub.status.busy": "2026-03-11T12:42:59.048455Z",
223-
"iopub.status.idle": "2026-03-11T12:42:59.088160Z",
224-
"shell.execute_reply": "2026-03-11T12:42:59.087476Z"
221+
"iopub.execute_input": "2026-03-12T12:51:02.303744Z",
222+
"iopub.status.busy": "2026-03-12T12:51:02.303487Z",
223+
"iopub.status.idle": "2026-03-12T12:51:02.342886Z",
224+
"shell.execute_reply": "2026-03-12T12:51:02.342189Z"
225225
},
226226
"tags": [
227227
"hide-input"
@@ -234,7 +234,7 @@
234234
"\n",
235235
"\n",
236236
"<h2 style=\"margin-bottom: 5px;\">Top 50 Reserved CVEs by Public Reference Count</h2>\n",
237-
"<p><strong>Total Matching CVEs: 4271</strong></p>\n",
237+
"<p><strong>Total Matching CVEs: 4246</strong></p>\n",
238238
"\n",
239239
"<div style=\"max-height: 500px; overflow-y: scroll; border: 1px solid #ccc; padding: 10px\">\n",
240240
" <table border=\"1\" class=\"dataframe\">\n",
@@ -374,22 +374,10 @@
374374
" <td>2020-01-14</td>\n",
375375
" </tr>\n",
376376
" <tr>\n",
377-
" <td>CVE-2018-18855</td>\n",
378-
" <td>16</td>\n",
379-
" <td>https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-ww3v-6xjf-jv28/GHSA-ww3v-6xjf-jv28.json</td>\n",
380-
" <td>2022-06-28</td>\n",
381-
" </tr>\n",
382-
" <tr>\n",
383-
" <td>CVE-2025-33143</td>\n",
384-
" <td>16</td>\n",
385-
" <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0760/</td>\n",
386-
" <td>2025-09-05</td>\n",
387-
" </tr>\n",
388-
" <tr>\n",
389-
" <td>CVE-2024-31884</td>\n",
377+
" <td>CVE-2016-1000212</td>\n",
390378
" <td>16</td>\n",
391-
" <td>https://explore.alas.aws.amazon.com/CVE-2024-31884.html</td>\n",
392-
" <td>2026-01-22</td>\n",
379+
" <td>https://explore.alas.aws.amazon.com/CVE-2016-1000212.html</td>\n",
380+
" <td>2022-10-12</td>\n",
393381
" </tr>\n",
394382
" <tr>\n",
395383
" <td>CVE-2025-36350</td>\n",
@@ -404,22 +392,34 @@
404392
" <td>2024-07-12</td>\n",
405393
" </tr>\n",
406394
" <tr>\n",
395+
" <td>CVE-2025-33143</td>\n",
396+
" <td>16</td>\n",
397+
" <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0760/</td>\n",
398+
" <td>2025-09-05</td>\n",
399+
" </tr>\n",
400+
" <tr>\n",
407401
" <td>CVE-2026-0966</td>\n",
408402
" <td>16</td>\n",
409403
" <td>https://explore.alas.aws.amazon.com/CVE-2026-0966.html</td>\n",
410404
" <td>2026-02-11</td>\n",
411405
" </tr>\n",
412406
" <tr>\n",
413-
" <td>CVE-2026-2369</td>\n",
407+
" <td>CVE-2018-18855</td>\n",
414408
" <td>16</td>\n",
415-
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2369.html</td>\n",
416-
" <td>2026-02-13</td>\n",
409+
" <td>https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-ww3v-6xjf-jv28/GHSA-ww3v-6xjf-jv28.json</td>\n",
410+
" <td>2022-06-28</td>\n",
417411
" </tr>\n",
418412
" <tr>\n",
419-
" <td>CVE-2016-1000212</td>\n",
413+
" <td>CVE-2024-31884</td>\n",
420414
" <td>16</td>\n",
421-
" <td>https://explore.alas.aws.amazon.com/CVE-2016-1000212.html</td>\n",
422-
" <td>2022-10-12</td>\n",
415+
" <td>https://explore.alas.aws.amazon.com/CVE-2024-31884.html</td>\n",
416+
" <td>2026-01-22</td>\n",
417+
" </tr>\n",
418+
" <tr>\n",
419+
" <td>CVE-2026-2369</td>\n",
420+
" <td>16</td>\n",
421+
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2369.html</td>\n",
422+
" <td>2026-02-13</td>\n",
423423
" </tr>\n",
424424
" <tr>\n",
425425
" <td>CVE-2026-0967</td>\n",
@@ -428,28 +428,28 @@
428428
" <td>2026-02-11</td>\n",
429429
" </tr>\n",
430430
" <tr>\n",
431-
" <td>CVE-2020-1441</td>\n",
432-
" <td>15</td>\n",
433-
" <td>https://bdu.fstec.ru/vul/2020-03093</td>\n",
434-
" <td>2020-06-17</td>\n",
435-
" </tr>\n",
436-
" <tr>\n",
437431
" <td>CVE-2020-2521</td>\n",
438432
" <td>15</td>\n",
439433
" <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-625/</td>\n",
440434
" <td>2020-10-09</td>\n",
441435
" </tr>\n",
442436
" <tr>\n",
443-
" <td>CVE-2024-21944</td>\n",
437+
" <td>CVE-2020-1441</td>\n",
438+
" <td>15</td>\n",
439+
" <td>https://bdu.fstec.ru/vul/2020-03093</td>\n",
440+
" <td>2020-06-17</td>\n",
441+
" </tr>\n",
442+
" <tr>\n",
443+
" <td>CVE-2024-32110</td>\n",
444444
" <td>14</td>\n",
445-
" <td>https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html</td>\n",
446-
" <td>2024-12-10</td>\n",
445+
" <td>https://www.rapid7.com/db/vulnerabilities/ajax-load-more-anything-plugin-cve-2024-32110/</td>\n",
446+
" <td>2025-05-16</td>\n",
447447
" </tr>\n",
448448
" <tr>\n",
449-
" <td>CVE-2026-2708</td>\n",
449+
" <td>CVE-2026-2271</td>\n",
450450
" <td>14</td>\n",
451-
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2708.html</td>\n",
452-
" <td>2026-02-20</td>\n",
451+
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2271.html</td>\n",
452+
" <td>2026-02-11</td>\n",
453453
" </tr>\n",
454454
" <tr>\n",
455455
" <td>CVE-2026-2272</td>\n",
@@ -458,6 +458,12 @@
458458
" <td>2026-02-11</td>\n",
459459
" </tr>\n",
460460
" <tr>\n",
461+
" <td>CVE-2023-28355</td>\n",
462+
" <td>14</td>\n",
463+
" <td>https://bdu.fstec.ru/vul/2023-02779</td>\n",
464+
" <td>2023-04-11</td>\n",
465+
" </tr>\n",
466+
" <tr>\n",
461467
" <td>CVE-2026-0968</td>\n",
462468
" <td>14</td>\n",
463469
" <td>https://explore.alas.aws.amazon.com/CVE-2026-0968.html</td>\n",
@@ -470,27 +476,21 @@
470476
" <td>2026-02-11</td>\n",
471477
" </tr>\n",
472478
" <tr>\n",
473-
" <td>CVE-2026-0964</td>\n",
474-
" <td>14</td>\n",
475-
" <td>https://explore.alas.aws.amazon.com/CVE-2026-0964.html</td>\n",
476-
" <td>2026-02-11</td>\n",
477-
" </tr>\n",
478-
" <tr>\n",
479-
" <td>CVE-2024-32110</td>\n",
479+
" <td>CVE-2026-2708</td>\n",
480480
" <td>14</td>\n",
481-
" <td>https://www.rapid7.com/db/vulnerabilities/ajax-load-more-anything-plugin-cve-2024-32110/</td>\n",
482-
" <td>2025-05-16</td>\n",
481+
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2708.html</td>\n",
482+
" <td>2026-02-20</td>\n",
483483
" </tr>\n",
484484
" <tr>\n",
485-
" <td>CVE-2023-28355</td>\n",
485+
" <td>CVE-2024-21944</td>\n",
486486
" <td>14</td>\n",
487-
" <td>https://bdu.fstec.ru/vul/2023-02779</td>\n",
488-
" <td>2023-04-11</td>\n",
487+
" <td>https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html</td>\n",
488+
" <td>2024-12-10</td>\n",
489489
" </tr>\n",
490490
" <tr>\n",
491-
" <td>CVE-2026-2271</td>\n",
491+
" <td>CVE-2026-0964</td>\n",
492492
" <td>14</td>\n",
493-
" <td>https://explore.alas.aws.amazon.com/CVE-2026-2271.html</td>\n",
493+
" <td>https://explore.alas.aws.amazon.com/CVE-2026-0964.html</td>\n",
494494
" <td>2026-02-11</td>\n",
495495
" </tr>\n",
496496
" <tr>\n",
@@ -512,16 +512,16 @@
512512
" <td>2026-02-10</td>\n",
513513
" </tr>\n",
514514
" <tr>\n",
515-
" <td>CVE-2020-9713</td>\n",
515+
" <td>CVE-2025-43236</td>\n",
516516
" <td>11</td>\n",
517-
" <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n",
518-
" <td>2020-08-11</td>\n",
517+
" <td>https://support.apple.com/en-us/124149</td>\n",
518+
" <td>2025-07-29</td>\n",
519519
" </tr>\n",
520520
" <tr>\n",
521-
" <td>CVE-2024-38393</td>\n",
521+
" <td>CVE-2020-9713</td>\n",
522522
" <td>11</td>\n",
523-
" <td>https://www.cert.ssi.gouv.fr/avis/CERTFR-2024-AVI-0816/</td>\n",
524-
" <td>2024-09-26</td>\n",
523+
" <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n",
524+
" <td>2020-08-11</td>\n",
525525
" </tr>\n",
526526
" <tr>\n",
527527
" <td>CVE-2020-9695</td>\n",
@@ -530,23 +530,23 @@
530530
" <td>2020-08-11</td>\n",
531531
" </tr>\n",
532532
" <tr>\n",
533-
" <td>CVE-2025-43236</td>\n",
534-
" <td>11</td>\n",
535-
" <td>https://support.apple.com/en-us/124149</td>\n",
536-
" <td>2025-07-29</td>\n",
537-
" </tr>\n",
538-
" <tr>\n",
539-
" <td>CVE-2020-9711</td>\n",
533+
" <td>CVE-2024-1627</td>\n",
540534
" <td>11</td>\n",
541-
" <td>https://helpx.adobe.com/security/products/acrobat/apsb20-48.html</td>\n",
542-
" <td>2020-08-11</td>\n",
535+
" <td>https://explore.alas.aws.amazon.com/CVE-2024-1627.html</td>\n",
536+
" <td>2024-02-28</td>\n",
543537
" </tr>\n",
544538
" <tr>\n",
545539
" <td>CVE-2025-43238</td>\n",
546540
" <td>11</td>\n",
547541
" <td>https://support.apple.com/en-us/124149</td>\n",
548542
" <td>2025-07-29</td>\n",
549543
" </tr>\n",
544+
" <tr>\n",
545+
" <td>CVE-2014-1003</td>\n",
546+
" <td>11</td>\n",
547+
" <td>https://www.exploit-db.com/exploits/30689</td>\n",
548+
" <td>2014-01-04</td>\n",
549+
" </tr>\n",
550550
" </tbody>\n",
551551
"</table>\n",
552552
"</div>\n"

0 commit comments

Comments
 (0)