diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46900.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46900.json new file mode 100644 index 00000000000..88d72d1934f --- /dev/null +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46900.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2021-46900", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-31T05:15:08.040", + "lastModified": "2023-12-31T05:15:08.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sympa-community/sympa-community.github.io/blob/master/security/2021-001.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sympa-community/sympa/issues/1091", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sympa.community/security/2021-001.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52284.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52284.json new file mode 100644 index 00000000000..6f6141a980f --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52284.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-52284", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-31T06:15:08.487", + "lastModified": "2023-12-31T06:15:08.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Bytecode Alliance wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) before 1.3.0 can have an \"double free or corruption\" error for a valid WebAssembly module because push_pop_frame_ref_offset is mishandled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bytecodealliance/wasm-micro-runtime/compare/WAMR-1.2.3...WAMR-1.3.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/2586", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bytecodealliance/wasm-micro-runtime/pull/2590", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 55636d7ab35..bba3aeb1679 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-31T05:00:25.055151+00:00 +2023-12-31T07:00:24.574256+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-31T04:15:07.373000+00:00 +2023-12-31T06:15:08.487000+00:00 ``` ### Last Data Feed Release @@ -29,25 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234578 +234580 ``` ### CVEs added in the last Commit Recently added CVEs: `2` -* [CVE-2023-52275](CVE-2023/CVE-2023-522xx/CVE-2023-52275.json) (`2023-12-31T03:15:46.437`) -* [CVE-2023-52277](CVE-2023/CVE-2023-522xx/CVE-2023-52277.json) (`2023-12-31T03:15:46.540`) +* [CVE-2021-46900](CVE-2021/CVE-2021-469xx/CVE-2021-46900.json) (`2023-12-31T05:15:08.040`) +* [CVE-2023-52284](CVE-2023/CVE-2023-522xx/CVE-2023-52284.json) (`2023-12-31T06:15:08.487`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `0` -* [CVE-2018-1311](CVE-2018/CVE-2018-13xx/CVE-2018-1311.json) (`2023-12-31T04:15:07.217`) -* [CVE-2023-36546](CVE-2023/CVE-2023-365xx/CVE-2023-36546.json) (`2023-12-31T03:15:45.950`) -* [CVE-2023-7101](CVE-2023/CVE-2023-71xx/CVE-2023-7101.json) (`2023-12-31T03:15:46.600`) -* [CVE-2023-37536](CVE-2023/CVE-2023-375xx/CVE-2023-37536.json) (`2023-12-31T04:15:07.373`) ## Download and Usage