From 111f165f4f10329bd0efbd1e5ab58dd69e9bf948 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 27 Dec 2023 15:00:27 +0000 Subject: [PATCH] Auto-Update: 2023-12-27T15:00:24.054962+00:00 --- CVE-2023/CVE-2023-498xx/CVE-2023-49821.json | 47 +++++++++++++++++++-- README.md | 18 ++------ 2 files changed, 48 insertions(+), 17 deletions(-) diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49821.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49821.json index a91d7e16c7f..ab6bea61d59 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49821.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49821.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49821", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-18T23:15:09.833", - "lastModified": "2023-12-19T13:42:22.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T14:40:34.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livechat:livechat:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5.15", + "matchCriteriaId": "F752670E-F9F8-41DC-BB12-1B23B5FB3606" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-live-chat-software-for-wordpress/wordpress-livechat-plugin-4-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 312f700a6d6..4282f5ccc99 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-27T11:00:24.540369+00:00 +2023-12-27T15:00:24.054962+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-27T10:15:38.680000+00:00 +2023-12-27T14:40:34.053000+00:00 ``` ### Last Data Feed Release @@ -40,19 +40,9 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `1` -* [CVE-2022-23521](CVE-2022/CVE-2022-235xx/CVE-2022-23521.json) (`2023-12-27T10:15:36.893`) -* [CVE-2022-24765](CVE-2022/CVE-2022-247xx/CVE-2022-24765.json) (`2023-12-27T10:15:37.267`) -* [CVE-2022-29187](CVE-2022/CVE-2022-291xx/CVE-2022-29187.json) (`2023-12-27T10:15:37.470`) -* [CVE-2022-39253](CVE-2022/CVE-2022-392xx/CVE-2022-39253.json) (`2023-12-27T10:15:37.640`) -* [CVE-2022-39260](CVE-2022/CVE-2022-392xx/CVE-2022-39260.json) (`2023-12-27T10:15:37.793`) -* [CVE-2022-41903](CVE-2022/CVE-2022-419xx/CVE-2022-41903.json) (`2023-12-27T10:15:37.930`) -* [CVE-2023-22490](CVE-2023/CVE-2023-224xx/CVE-2023-22490.json) (`2023-12-27T10:15:38.107`) -* [CVE-2023-23946](CVE-2023/CVE-2023-239xx/CVE-2023-23946.json) (`2023-12-27T10:15:38.250`) -* [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2023-12-27T10:15:38.390`) -* [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2023-12-27T10:15:38.557`) -* [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2023-12-27T10:15:38.680`) +* [CVE-2023-49821](CVE-2023/CVE-2023-498xx/CVE-2023-49821.json) (`2023-12-27T14:40:34.053`) ## Download and Usage