{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:47:31.906","vulnerabilities":[{"cve":{"id":"CVE-2024-9392","sourceIdentifier":"security@mozilla.org","published":"2024-10-01T16:15:10.570","lastModified":"2025-11-03T23:17:33.740","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A compromised content process could have allowed for the arbitrary loading of cross-origin pages. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Firefox ESR < 115.16, Thunderbird < 128.3, and Thunderbird < 131."},{"lang":"es","value":"Un proceso de contenido comprometido podría haber permitido la carga arbitraria de páginas de origen cruzado. Esta vulnerabilidad afecta a Firefox &lt; 131, Firefox ESR &lt; 128.3, Firefox ESR &lt; 115.16, Thunderbird &lt; 128.3 y Thunderbird &lt; 131."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*","versionEndExcluding":"115.6.0","matchCriteriaId":"277BD1BE-3F67-42D7-8B95-735FF00D95FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"131.0","matchCriteriaId":"DA47FFCA-3451-462C-8FFB-47143C65E65A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"128.3.0","matchCriteriaId":"162E998D-FC05-4428-A848-3073BC879D13"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionStartIncluding":"129.0","versionEndExcluding":"131.0","matchCriteriaId":"9556B29A-F934-4F99-9C7F-6506CA829DB3"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1899154","source":"security@mozilla.org","tags":["Issue Tracking"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1905843","source":"security@mozilla.org","tags":["Issue Tracking"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-46/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-47/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-48/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-49/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-50/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00004.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00006.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}