diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46899.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46899.json new file mode 100644 index 00000000000..ef264e6de7e --- /dev/null +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46899.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-46899", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-09T19:15:07.713", + "lastModified": "2023-12-09T19:15:07.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SyncTrayzor 1.1.29 enables CEF (Chromium Embedded Framework) remote debugging, allowing a local attacker to control the application." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/canton7/SyncTrayzor/issues/666", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/canton7/SyncTrayzor/releases", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json index 0b0a0813355..5cd80fe3030 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43641", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-09T22:15:12.707", - "lastModified": "2023-10-27T17:53:23.093", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-09T19:15:07.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -139,6 +139,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html", + "source": "security-advisories@github.com" + }, { "url": "https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/", "source": "security-advisories@github.com", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50428.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50428.json new file mode 100644 index 00000000000..7702893bae2 --- /dev/null +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50428.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-50428", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-09T19:15:07.977", + "lastModified": "2023-12-09T19:15:07.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Bitcoin Core through 26.0 and Bitcoin Knots before 25.1.knots20231115, datacarrier size limits can be bypassed by obfuscating data as code (e.g., with OP_FALSE OP_IF), as exploited in the wild by Inscriptions in 2022 and 2023." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoin/bitcoin/pull/28408#issuecomment-1844981799", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoin/bitcoin/tags", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoinknots/bitcoin/blob/aed49ce8989334c364a219a6eb016a3897d4e3d7/doc/release-notes.md", + "source": "cve@mitre.org" + }, + { + "url": "https://twitter.com/LukeDashjr/status/1732204937466032285", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3a8394140f7..d51c5854a1b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-09T19:00:18.081663+00:00 +2023-12-09T21:00:17.939375+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-09T18:15:06.723000+00:00 +2023-12-09T19:15:07.977000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -232665 +232667 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +* [CVE-2021-46899](CVE-2021/CVE-2021-468xx/CVE-2021-46899.json) (`2023-12-09T19:15:07.713`) +* [CVE-2023-50428](CVE-2023/CVE-2023-504xx/CVE-2023-50428.json) (`2023-12-09T19:15:07.977`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -* [CVE-2023-36922](CVE-2023/CVE-2023-369xx/CVE-2023-36922.json) (`2023-12-09T17:15:44.150`) -* [CVE-2023-41835](CVE-2023/CVE-2023-418xx/CVE-2023-41835.json) (`2023-12-09T18:15:06.723`) +* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-12-09T19:15:07.813`) ## Download and Usage