Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-23982

Опубликовано: 23 мар. 2021
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2021:099225.03.2021
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2021:099625.03.2021
Red Hat Enterprise Linux 8firefoxFixedRHSA-2021:099025.03.2021
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2021:099325.03.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportfirefoxFixedRHSA-2021:099125.03.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportthunderbirdFixedRHSA-2021:099525.03.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportfirefoxFixedRHSA-2021:098925.03.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportthunderbirdFixedRHSA-2021:099425.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1942785Mozilla: Internal network hosts could have been probed by a malicious webpage

EPSS

Процентиль: 42%
0.00196
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 5 лет назад

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

CVSS3: 6.5
nvd
почти 5 лет назад

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

CVSS3: 6.5
debian
почти 5 лет назад

Using techniques that built on the slipstream research, a malicious we ...

github
больше 3 лет назад

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.

suse-cvrf
почти 5 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 42%
0.00196
Низкий

6.1 Medium

CVSS3