{"id":"CVE-2021-23982","details":"Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR \u003c 78.9, Firefox \u003c 87, and Thunderbird \u003c 78.9.","modified":"2026-03-10T23:26:48.819835Z","published":"2021-03-31T14:15:19Z","related":["MGASA-2021-0163","MGASA-2021-0164","SUSE-SU-2021:0966-1","SUSE-SU-2021:0999-1","SUSE-SU-2021:1007-1","SUSE-SU-2021:1167-1","SUSE-SU-2021:14684-1","openSUSE-SU-2021:0487-1","openSUSE-SU-2021:0580-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-10/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-11/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-12/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677046"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"87.0"}]},{"events":[{"introduced":"0"},{"fixed":"78.9"}]},{"events":[{"introduced":"0"},{"fixed":"78.9"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23982.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}