Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 85.
References
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1677940 - Issue Tracking, Permissions Required, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/04/msg00019.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/04/msg00020.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202104-09 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202104-10 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4895 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4897 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2021-03/ - Release Notes, Vendor Advisory |
Information
Published : 2021-02-26 03:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-23961
Mitre link : CVE-2021-23961
CVE.ORG link : CVE-2021-23961
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- firefox
CWE