[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-2317":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T15:11:42.125Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":280,"aliases":281,"duplicate_of":9,"upstream":282,"downstream":283,"duplicates":292,"related":293,"reserved_at":9,"published_at":298,"modified_at":299,"state":300,"summary":301,"references_raw":310,"kevs":323,"epss":324,"epss_history":327,"metrics":487,"affected":495},"CVE-2026-2317","Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",null,[11,256],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-200","Exposure of Sensitive Information to an Unauthorized Actor","The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.","weakness","Draft","Class","High",[20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84,88,92,96,100,104,108,112,116,120,124,128,132,136,140,144,148,152,156,160,164,168,172,176,180,184,188,192,196,200,204,208,212,216,220,224,228,232,236,240,244,248,252],{"id":21,"name":22,"techniques":23},"CAPEC-116","Excavation",[],{"id":25,"name":26,"techniques":27},"CAPEC-13","Subverting Environment Variable Values",[],{"id":29,"name":30,"techniques":31},"CAPEC-169","Footprinting",[],{"id":33,"name":34,"techniques":35},"CAPEC-22","Exploiting Trust in Client",[],{"id":37,"name":38,"techniques":39},"CAPEC-224","Fingerprinting",[],{"id":41,"name":42,"techniques":43},"CAPEC-285","ICMP Echo Request Ping",[],{"id":45,"name":46,"techniques":47},"CAPEC-287","TCP SYN Scan",[],{"id":49,"name":50,"techniques":51},"CAPEC-290","Enumerate Mail Exchange (MX) Records",[],{"id":53,"name":54,"techniques":55},"CAPEC-291","DNS Zone Transfers",[],{"id":57,"name":58,"techniques":59},"CAPEC-292","Host Discovery",[],{"id":61,"name":62,"techniques":63},"CAPEC-293","Traceroute Route Enumeration",[],{"id":65,"name":66,"techniques":67},"CAPEC-294","ICMP Address Mask Request",[],{"id":69,"name":70,"techniques":71},"CAPEC-295","Timestamp Request",[],{"id":73,"name":74,"techniques":75},"CAPEC-296","ICMP Information Request",[],{"id":77,"name":78,"techniques":79},"CAPEC-297","TCP ACK Ping",[],{"id":81,"name":82,"techniques":83},"CAPEC-298","UDP Ping",[],{"id":85,"name":86,"techniques":87},"CAPEC-299","TCP SYN Ping",[],{"id":89,"name":90,"techniques":91},"CAPEC-300","Port Scanning",[],{"id":93,"name":94,"techniques":95},"CAPEC-301","TCP Connect Scan",[],{"id":97,"name":98,"techniques":99},"CAPEC-302","TCP FIN Scan",[],{"id":101,"name":102,"techniques":103},"CAPEC-303","TCP Xmas Scan",[],{"id":105,"name":106,"techniques":107},"CAPEC-304","TCP Null Scan",[],{"id":109,"name":110,"techniques":111},"CAPEC-305","TCP ACK Scan",[],{"id":113,"name":114,"techniques":115},"CAPEC-306","TCP Window Scan",[],{"id":117,"name":118,"techniques":119},"CAPEC-307","TCP RPC Scan",[],{"id":121,"name":122,"techniques":123},"CAPEC-308","UDP Scan",[],{"id":125,"name":126,"techniques":127},"CAPEC-309","Network Topology Mapping",[],{"id":129,"name":130,"techniques":131},"CAPEC-310","Scanning for Vulnerable Software",[],{"id":133,"name":134,"techniques":135},"CAPEC-312","Active OS Fingerprinting",[],{"id":137,"name":138,"techniques":139},"CAPEC-313","Passive OS Fingerprinting",[],{"id":141,"name":142,"techniques":143},"CAPEC-317","IP ID Sequencing Probe",[],{"id":145,"name":146,"techniques":147},"CAPEC-318","IP 'ID' Echoed Byte-Order Probe",[],{"id":149,"name":150,"techniques":151},"CAPEC-319","IP (DF) 'Don't Fragment Bit' Echoing Probe",[],{"id":153,"name":154,"techniques":155},"CAPEC-320","TCP Timestamp Probe",[],{"id":157,"name":158,"techniques":159},"CAPEC-321","TCP Sequence Number Probe",[],{"id":161,"name":162,"techniques":163},"CAPEC-322","TCP (ISN) Greatest Common Divisor Probe",[],{"id":165,"name":166,"techniques":167},"CAPEC-323","TCP (ISN) Counter Rate Probe",[],{"id":169,"name":170,"techniques":171},"CAPEC-324","TCP (ISN) Sequence Predictability Probe",[],{"id":173,"name":174,"techniques":175},"CAPEC-325","TCP Congestion Control Flag (ECN) Probe",[],{"id":177,"name":178,"techniques":179},"CAPEC-326","TCP Initial Window Size Probe",[],{"id":181,"name":182,"techniques":183},"CAPEC-327","TCP Options Probe",[],{"id":185,"name":186,"techniques":187},"CAPEC-328","TCP 'RST' Flag Checksum Probe",[],{"id":189,"name":190,"techniques":191},"CAPEC-329","ICMP Error Message Quoting Probe",[],{"id":193,"name":194,"techniques":195},"CAPEC-330","ICMP Error Message Echoing Integrity Probe",[],{"id":197,"name":198,"techniques":199},"CAPEC-472","Browser Fingerprinting",[],{"id":201,"name":202,"techniques":203},"CAPEC-497","File Discovery",[],{"id":205,"name":206,"techniques":207},"CAPEC-508","Shoulder Surfing",[],{"id":209,"name":210,"techniques":211},"CAPEC-573","Process Footprinting",[],{"id":213,"name":214,"techniques":215},"CAPEC-574","Services Footprinting",[],{"id":217,"name":218,"techniques":219},"CAPEC-575","Account Footprinting",[],{"id":221,"name":222,"techniques":223},"CAPEC-576","Group Permission Footprinting",[],{"id":225,"name":226,"techniques":227},"CAPEC-577","Owner Footprinting",[],{"id":229,"name":230,"techniques":231},"CAPEC-59","Session Credential Falsification through Prediction",[],{"id":233,"name":234,"techniques":235},"CAPEC-60","Reusing Session IDs (aka Session Replay)",[],{"id":237,"name":238,"techniques":239},"CAPEC-616","Establish Rogue Location",[],{"id":241,"name":242,"techniques":243},"CAPEC-643","Identify Shared Files/Directories on System",[],{"id":245,"name":246,"techniques":247},"CAPEC-646","Peripheral Footprinting",[],{"id":249,"name":250,"techniques":251},"CAPEC-651","Eavesdropping",[],{"id":253,"name":254,"techniques":255},"CAPEC-79","Using Slashes in Alternate Encoding",[],{"_key":257,"id":257,"name":258,"description":259,"type":15,"status":260,"abstraction":261,"likelihood_of_exploit":262,"capec":263},"CWE-352","Cross-Site Request Forgery (CSRF)","The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.","Stable","Compound","Medium",[264,268,272,276],{"id":265,"name":266,"techniques":267},"CAPEC-111","JSON Hijacking (aka JavaScript Hijacking)",[],{"id":269,"name":270,"techniques":271},"CAPEC-462","Cross-Domain Search Timing",[],{"id":273,"name":274,"techniques":275},"CAPEC-467","Cross Site Identification",[],{"id":277,"name":278,"techniques":279},"CAPEC-62","Cross Site Request Forgery",[],[],[],[],[284,286,288,290],{"_key":285},"DSA-6135-1",{"_key":287},"DEBIAN-CVE-2026-2317",{"_key":289},"OPENSUSE-SU-2026:10201-1",{"_key":291},"OPENSUSE-SU-2026:20248-1",[],[294,295,296],{"_key":289},{"_key":291},{"_key":297},"CGA-QRXJ-FWHJ-V6QX","2026-02-11T18:08:03.364Z","2026-02-12T15:52:36.512Z","Analyzed",{"cisa_kev":302,"cisa_ransomware":302,"cisa_vendor":9,"epss_severity":303,"epss_score":304,"severity":305,"severity_score":306,"severity_version":307,"severity_source":308,"severity_vector":309,"severity_status":300},false,"low",0.00018,"medium",6.5,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",[311,318],{"url":312,"sources":313,"tags":315},"https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html",[308,314],"nvd",[316,317],"Release Notes","Vendor Advisory",{"url":319,"sources":320,"tags":321},"https://issues.chromium.org/issues/464173573",[308,314],[322],"Permissions Required",[],{"date":325,"score":304,"percentile":326},"2026-04-06",0.04421,[328,332,336,340,343,346,349,352,355,358,361,363,366,369,372,375,378,380,383,386,389,392,395,398,400,403,406,409,412,415,417,420,423,426,429,432,435,438,441,444,447,450,453,456,459,462,465,468,471,474,477,480,483,486],{"date":329,"score":330,"percentile":331},"2026-02-12",0.00035,0.09976,{"date":333,"score":334,"percentile":335},"2026-02-13",0.00014,0.02176,{"date":337,"score":338,"percentile":339},"2026-02-14",0.00016,0.0325,{"date":341,"score":338,"percentile":342},"2026-02-15",0.03246,{"date":344,"score":338,"percentile":345},"2026-02-16",0.03241,{"date":347,"score":304,"percentile":348},"2026-02-17",0.03792,{"date":350,"score":338,"percentile":351},"2026-02-18",0.0347,{"date":353,"score":338,"percentile":354},"2026-02-19",0.03488,{"date":356,"score":338,"percentile":357},"2026-02-20",0.03494,{"date":359,"score":338,"percentile":360},"2026-02-21",0.03493,{"date":362,"score":338,"percentile":360},"2026-02-22",{"date":364,"score":338,"percentile":365},"2026-02-23",0.03471,{"date":367,"score":338,"percentile":368},"2026-02-24",0.0346,{"date":370,"score":338,"percentile":371},"2026-02-25",0.03452,{"date":373,"score":338,"percentile":374},"2026-02-26",0.03443,{"date":376,"score":338,"percentile":377},"2026-02-27",0.03502,{"date":379,"score":338,"percentile":377},"2026-02-28",{"date":381,"score":338,"percentile":382},"2026-03-01",0.03553,{"date":384,"score":338,"percentile":385},"2026-03-02",0.03583,{"date":387,"score":338,"percentile":388},"2026-03-03",0.03599,{"date":390,"score":338,"percentile":391},"2026-03-04",0.03523,{"date":393,"score":338,"percentile":394},"2026-03-05",0.03564,{"date":396,"score":338,"percentile":397},"2026-03-06",0.03555,{"date":399,"score":338,"percentile":394},"2026-03-07",{"date":401,"score":338,"percentile":402},"2026-03-08",0.03565,{"date":404,"score":338,"percentile":405},"2026-03-09",0.03548,{"date":407,"score":338,"percentile":408},"2026-03-10",0.03551,{"date":410,"score":338,"percentile":411},"2026-03-11",0.03549,{"date":413,"score":338,"percentile":414},"2026-03-12",0.03568,{"date":416,"score":338,"percentile":394},"2026-03-13",{"date":418,"score":338,"percentile":419},"2026-03-14",0.03546,{"date":421,"score":304,"percentile":422},"2026-03-15",0.04124,{"date":424,"score":304,"percentile":425},"2026-03-16",0.04129,{"date":427,"score":304,"percentile":428},"2026-03-17",0.04118,{"date":430,"score":304,"percentile":431},"2026-03-18",0.04131,{"date":433,"score":304,"percentile":434},"2026-03-19",0.04152,{"date":436,"score":304,"percentile":437},"2026-03-20",0.0416,{"date":439,"score":304,"percentile":440},"2026-03-21",0.04349,{"date":442,"score":304,"percentile":443},"2026-03-22",0.04339,{"date":445,"score":304,"percentile":446},"2026-03-23",0.0434,{"date":448,"score":304,"percentile":449},"2026-03-24",0.04327,{"date":451,"score":304,"percentile":452},"2026-03-25",0.04357,{"date":454,"score":304,"percentile":455},"2026-03-26",0.04387,{"date":457,"score":304,"percentile":458},"2026-03-27",0.04391,{"date":460,"score":304,"percentile":461},"2026-03-28",0.04395,{"date":463,"score":304,"percentile":464},"2026-03-29",0.04388,{"date":466,"score":304,"percentile":467},"2026-03-30",0.0437,{"date":469,"score":304,"percentile":470},"2026-03-31",0.04348,{"date":472,"score":304,"percentile":473},"2026-04-01",0.04359,{"date":475,"score":304,"percentile":476},"2026-04-02",0.04398,{"date":478,"score":304,"percentile":479},"2026-04-03",0.04419,{"date":481,"score":304,"percentile":482},"2026-04-04",0.04424,{"date":484,"score":304,"percentile":485},"2026-04-05",0.04418,{"date":325,"score":304,"percentile":326},[488,493],{"source":308,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":489,"cvss_v4_0":9},{"baseScore":306,"baseSeverity":490,"vectorString":309,"impactScore":491,"exploitabilityScore":492},"MEDIUM",6,7.2,{"source":314,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":494,"cvss_v4_0":9},{"baseScore":306,"baseSeverity":490,"vectorString":309,"impactScore":491,"exploitabilityScore":492},[496],{"ecosystem":9,"name":497,"vendor":9,"product":497,"cpe_part":9,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":498},"Chrome",[499,505],{"version":500,"is_range":501,"range_type":308,"version_start":502,"version_start_type":503,"version_end":502,"version_end_type":504,"fixed_in":9},">= 145.0.7632.45, \u003C 145.0.7632.45",true,"145.0.7632.45","including","excluding",{"version":506,"is_range":501,"range_type":507,"version_start":9,"version_start_type":9,"version_end":502,"version_end_type":504,"fixed_in":9},"lt145.0.7632.45","cpe"]