{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T07:23:17.370","vulnerabilities":[{"cve":{"id":"CVE-2024-9506","sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","published":"2024-10-15T16:15:06.650","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability."},{"lang":"es","value":"Una expresión regular incorrecta en la función parseHTML de Vue conduce a una posible vulnerabilidad de denegación de servicio de expresión regular."}],"metrics":{"cvssMetricV31":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":1.4}]},"weaknesses":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]}],"references":[{"url":"https://www.herodevs.com/vulnerability-directory/cve-2024-9506","source":"36c7be3b-2937-45df-85ea-ca7133ea542c"}]}}]}