mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-09T21:00:17.939375+00:00
This commit is contained in:
parent
311f507fb0
commit
fc5a2c4815
24
CVE-2021/CVE-2021-468xx/CVE-2021-46899.json
Normal file
24
CVE-2021/CVE-2021-468xx/CVE-2021-46899.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-46899",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-09T19:15:07.713",
|
||||
"lastModified": "2023-12-09T19:15:07.713",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SyncTrayzor 1.1.29 enables CEF (Chromium Embedded Framework) remote debugging, allowing a local attacker to control the application."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/canton7/SyncTrayzor/issues/666",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/canton7/SyncTrayzor/releases",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43641",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-09T22:15:12.707",
|
||||
"lastModified": "2023-10-27T17:53:23.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-09T19:15:07.813",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -139,6 +139,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/",
|
||||
"source": "security-advisories@github.com",
|
||||
|
36
CVE-2023/CVE-2023-504xx/CVE-2023-50428.json
Normal file
36
CVE-2023/CVE-2023-504xx/CVE-2023-50428.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-50428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-09T19:15:07.977",
|
||||
"lastModified": "2023-12-09T19:15:07.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bitcoin Core through 26.0 and Bitcoin Knots before 25.1.knots20231115, datacarrier size limits can be bypassed by obfuscating data as code (e.g., with OP_FALSE OP_IF), as exploited in the wild by Inscriptions in 2022 and 2023."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bitcoin/bitcoin/pull/28408#issuecomment-1844981799",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bitcoin/bitcoin/tags",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bitcoinknots/bitcoin/blob/aed49ce8989334c364a219a6eb016a3897d4e3d7/doc/release-notes.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/LukeDashjr/status/1732204937466032285",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
15
README.md
15
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-09T19:00:18.081663+00:00
|
||||
2023-12-09T21:00:17.939375+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-09T18:15:06.723000+00:00
|
||||
2023-12-09T19:15:07.977000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,21 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
232665
|
||||
232667
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2021-46899](CVE-2021/CVE-2021-468xx/CVE-2021-46899.json) (`2023-12-09T19:15:07.713`)
|
||||
* [CVE-2023-50428](CVE-2023/CVE-2023-504xx/CVE-2023-50428.json) (`2023-12-09T19:15:07.977`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2023-36922](CVE-2023/CVE-2023-369xx/CVE-2023-36922.json) (`2023-12-09T17:15:44.150`)
|
||||
* [CVE-2023-41835](CVE-2023/CVE-2023-418xx/CVE-2023-41835.json) (`2023-12-09T18:15:06.723`)
|
||||
* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-12-09T19:15:07.813`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user