{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T11:39:18.551","vulnerabilities":[{"cve":{"id":"CVE-2024-5687","sourceIdentifier":"security@mozilla.org","published":"2024-06-11T13:15:50.260","lastModified":"2025-03-27T20:13:57.260","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127."},{"lang":"es","value":"Si se realiza una secuencia específica de acciones al abrir una nueva pestaña, es posible que el principal desencadenante asociado con la nueva pestaña haya sido incorrecto. El principal de activación se utiliza para calcular muchos valores, incluidos los encabezados `Referer` y `Sec-*`, lo que significa que existe la posibilidad de que se realicen controles de seguridad incorrectos dentro del navegador, además de información incorrecta o engañosa enviada a sitios web remotos. *Este error sólo afecta a Firefox para Android. Otras versiones de Firefox no se ven afectadas.* Esta vulnerabilidad afecta a Firefox &lt; 127."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"127.0","matchCriteriaId":"4CF5E7C8-8673-4B56-AF92-44C08B086E02"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1889066","source":"security@mozilla.org","tags":["Exploit","Issue Tracking"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1889066","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}