{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T00:03:08.105","vulnerabilities":[{"cve":{"id":"CVE-2024-45346","sourceIdentifier":"security@xiaomi.com","published":"2024-08-28T07:15:08.823","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución de código en el producto de aplicación XiaomiGetApps. Esta vulnerabilidad se debe a que se omite la lógica de verificación y un atacante puede aprovechar esta vulnerabilidad para ejecutar código malicioso."}],"metrics":{"cvssMetricV31":[{"source":"security@xiaomi.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@xiaomi.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"references":[{"url":"https://trust.mi.com/misrc/bulletins/advisory?cveId=545","source":"security@xiaomi.com"}]}}]}