Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2607-1 | firefox-esr security update |
![]() |
DLA-2609-1 | thunderbird security update |
![]() |
DSA-4874-1 | firefox-esr security update |
![]() |
DSA-4876-1 | thunderbird security update |
![]() |
EUVD-2021-10902 | Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9. |
![]() |
USN-4893-1 | Firefox vulnerabilities |
![]() |
USN-4995-1 | Thunderbird vulnerabilities |
![]() |
USN-4995-2 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-03T19:14:09.972Z
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-23982

No data.

Status : Modified
Published: 2021-03-31T14:15:19.000
Modified: 2024-11-21T05:52:09.040
Link: CVE-2021-23982


No data.