diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json index 7049f47292b..37ab8b27918 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4907", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:10.860", - "lastModified": "2023-08-10T03:15:54.747", + "lastModified": "2023-11-13T05:15:08.490", "vulnStatus": "Modified", "descriptions": [ { @@ -89,6 +89,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5552", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46201.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46201.json new file mode 100644 index 00000000000..207c3b8d7b9 --- /dev/null +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46201.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46201", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T05:15:08.650", + "lastModified": "2023-11-13T05:15:08.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jeff Sherk Auto Login New User After Registration allows Stored XSS.This issue affects Auto Login New User After Registration: from n/a through 1.9.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/auto-login-new-user-after-registration/wordpress-auto-login-new-user-after-registration-plugin-1-9-6-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6d850278013..a862db92cd4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-13T05:00:20.276988+00:00 +2023-11-13T07:00:18.588532+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-13T04:15:08.497000+00:00 +2023-11-13T05:15:08.650000+00:00 ``` ### Last Data Feed Release @@ -29,58 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230416 +230417 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `1` -* [CVE-2022-45835](CVE-2022/CVE-2022-458xx/CVE-2022-45835.json) (`2023-11-13T03:15:07.783`) -* [CVE-2023-23684](CVE-2023/CVE-2023-236xx/CVE-2023-23684.json) (`2023-11-13T03:15:07.993`) -* [CVE-2023-23800](CVE-2023/CVE-2023-238xx/CVE-2023-23800.json) (`2023-11-13T03:15:08.190`) -* [CVE-2023-31219](CVE-2023/CVE-2023-312xx/CVE-2023-31219.json) (`2023-11-13T03:15:08.383`) -* [CVE-2023-34013](CVE-2023/CVE-2023-340xx/CVE-2023-34013.json) (`2023-11-13T03:15:08.570`) -* [CVE-2023-35041](CVE-2023/CVE-2023-350xx/CVE-2023-35041.json) (`2023-11-13T03:15:08.777`) -* [CVE-2023-37978](CVE-2023/CVE-2023-379xx/CVE-2023-37978.json) (`2023-11-13T03:15:08.957`) -* [CVE-2023-38515](CVE-2023/CVE-2023-385xx/CVE-2023-38515.json) (`2023-11-13T03:15:09.143`) -* [CVE-2023-41239](CVE-2023/CVE-2023-412xx/CVE-2023-41239.json) (`2023-11-13T03:15:09.347`) -* [CVE-2023-46207](CVE-2023/CVE-2023-462xx/CVE-2023-46207.json) (`2023-11-13T03:15:09.537`) -* [CVE-2023-47163](CVE-2023/CVE-2023-471xx/CVE-2023-47163.json) (`2023-11-13T03:15:09.743`) -* [CVE-2023-46634](CVE-2023/CVE-2023-466xx/CVE-2023-46634.json) (`2023-11-13T04:15:08.050`) -* [CVE-2023-47516](CVE-2023/CVE-2023-475xx/CVE-2023-47516.json) (`2023-11-13T04:15:08.287`) -* [CVE-2023-47652](CVE-2023/CVE-2023-476xx/CVE-2023-47652.json) (`2023-11-13T04:15:08.497`) +* [CVE-2023-46201](CVE-2023/CVE-2023-462xx/CVE-2023-46201.json) (`2023-11-13T05:15:08.650`) ### CVEs modified in the last Commit -Recently modified CVEs: `131` +Recently modified CVEs: `1` -* [CVE-2023-27436](CVE-2023/CVE-2023-274xx/CVE-2023-27436.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-27438](CVE-2023/CVE-2023-274xx/CVE-2023-27438.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-27441](CVE-2023/CVE-2023-274xx/CVE-2023-27441.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-27445](CVE-2023/CVE-2023-274xx/CVE-2023-27445.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-26531](CVE-2023/CVE-2023-265xx/CVE-2023-26531.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-26543](CVE-2023/CVE-2023-265xx/CVE-2023-26543.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46618](CVE-2023/CVE-2023-466xx/CVE-2023-46618.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46619](CVE-2023/CVE-2023-466xx/CVE-2023-46619.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46620](CVE-2023/CVE-2023-466xx/CVE-2023-46620.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46625](CVE-2023/CVE-2023-466xx/CVE-2023-46625.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46629](CVE-2023/CVE-2023-466xx/CVE-2023-46629.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46636](CVE-2023/CVE-2023-466xx/CVE-2023-46636.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-46638](CVE-2023/CVE-2023-466xx/CVE-2023-46638.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-47230](CVE-2023/CVE-2023-472xx/CVE-2023-47230.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-32583](CVE-2023/CVE-2023-325xx/CVE-2023-32583.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-32588](CVE-2023/CVE-2023-325xx/CVE-2023-32588.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-33207](CVE-2023/CVE-2023-332xx/CVE-2023-33207.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-34378](CVE-2023/CVE-2023-343xx/CVE-2023-34378.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-34384](CVE-2023/CVE-2023-343xx/CVE-2023-34384.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-38363](CVE-2023/CVE-2023-383xx/CVE-2023-38363.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-38364](CVE-2023/CVE-2023-383xx/CVE-2023-38364.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-47669](CVE-2023/CVE-2023-476xx/CVE-2023-47669.json) (`2023-11-13T03:16:20.870`) -* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-13T03:21:54.270`) -* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-13T03:28:00.920`) -* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-13T03:30:02.753`) +* [CVE-2022-4907](CVE-2022/CVE-2022-49xx/CVE-2022-4907.json) (`2023-11-13T05:15:08.490`) ## Download and Usage