{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T13:17:35.813","vulnerabilities":[{"cve":{"id":"CVE-2026-0102","sourceIdentifier":"secure@microsoft.com","published":"2026-02-17T20:22:05.500","lastModified":"2026-02-19T15:39:08.397","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Under specific conditions, a malicious webpage may trigger autofill population after two consecutive taps, potentially without clear or intentional user consent. This could result in disclosure of stored autofill data such as addresses, email, or phone number metadata."},{"lang":"es","value":"Bajo condiciones específicas, una página web maliciosa puede activar el llenado automático después de dos toques consecutivos, potencialmente sin el consentimiento claro o intencional del usuario. Esto podría resultar en la divulgación de datos de autocompletado almacenados, como direcciones, correo electrónico o metadatos de números de teléfono."}],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}]},"weaknesses":[{"source":"secure@microsoft.com","type":"Primary","description":[{"lang":"en","value":"CWE-359"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*","versionEndExcluding":"145.0.3800.58","matchCriteriaId":"7625822C-F0EF-4A29-B90B-7B4E15C8E3C2"}]}]}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0102","source":"secure@microsoft.com","tags":["Vendor Advisory"]}]}}]}