{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T16:04:43.754","vulnerabilities":[{"cve":{"id":"CVE-2024-45605","sourceIdentifier":"security-advisories@github.com","published":"2024-09-17T20:15:05.120","lastModified":"2024-09-26T19:14:00.873","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Sentry es una plataforma de monitoreo de rendimiento y seguimiento de errores que prioriza a los desarrolladores. Un usuario autenticado elimina las notificaciones de alerta de emisión de usuario para usuarios arbitrarios a partir de una ID de alerta conocida. Se emitió un parche para garantizar que las verificaciones de autorización tengan el alcance adecuado en las solicitudes de eliminación de notificaciones de alerta de usuario. Los usuarios de Sentry SaaS no necesitan realizar ninguna acción. Los usuarios de Sentry alojado en servidores propios deben actualizar a la versión 24.9.0 o superior. No existen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*","versionStartIncluding":"23.9.0","versionEndExcluding":"24.9.0","matchCriteriaId":"2E6FD59C-D86A-4163-9245-EC4000DC98FC"}]}]}],"references":[{"url":"https://github.com/getsentry/self-hosted","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/getsentry/sentry/pull/77093","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}