mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
182 lines
5.3 KiB
JSON
182 lines
5.3 KiB
JSON
{
|
|
"id": "CVE-2024-54467",
|
|
"sourceIdentifier": "product-security@apple.com",
|
|
"published": "2025-03-10T19:15:38.387",
|
|
"lastModified": "2025-03-14T11:59:19.543",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A cookie management issue was addressed with improved state management. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se solucion\u00f3 un problema de administraci\u00f3n de cookies con una mejor administraci\u00f3n del estado. Este problema se solucion\u00f3 en watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18 y tvOS 18. Un sitio web malicioso puede filtrar datos de origen cruzado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "18.0",
|
|
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "18.0",
|
|
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "18.0",
|
|
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "15.0",
|
|
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "18.0",
|
|
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "11.0",
|
|
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.apple.com/en-us/121238",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/121240",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/121241",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/121248",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/121249",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/121250",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory",
|
|
"Release Notes"
|
|
]
|
|
}
|
|
]
|
|
} |