{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:48:38.875","vulnerabilities":[{"cve":{"id":"CVE-2024-6612","sourceIdentifier":"security@mozilla.org","published":"2024-07-09T15:15:13.107","lastModified":"2025-04-04T14:42:13.783","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CSP violations generated links in the console tab of the developer tools, pointing to the violating resource. This caused a DNS prefetch which leaked that a CSP violation happened. This vulnerability affects Firefox < 128 and Thunderbird < 128."},{"lang":"es","value":"Las infracciones de CSP generaron enlaces en la pestaña de la consola de las herramientas de desarrollador, que apuntaban al recurso infractor. Esto provocó una captación previa de DNS que filtró que se había producido una infracción de CSP. Esta vulnerabilidad afecta a Firefox &lt; 128."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"128.0","matchCriteriaId":"540E6900-1ECF-4138-9ABB-C3CC81FCF47B"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"128.0","matchCriteriaId":"F38B1ACE-990E-429F-BFA5-07EE4475D0F6"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1880374","source":"security@mozilla.org","tags":["Issue Tracking"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-29/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-32/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1880374","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-29/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-32/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}