{"id":"CVE-2021-23995","details":"When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.","modified":"2026-03-13T01:49:57.756082Z","published":"2021-06-24T14:15:09.357Z","related":["MGASA-2021-0198","MGASA-2021-0199","SUSE-SU-2021:1307-1","SUSE-SU-2021:1325-1","SUSE-SU-2021:1432-1","SUSE-SU-2021:1433-1","SUSE-SU-2021:14708-1","openSUSE-SU-2021:0621-1","openSUSE-SU-2021:0644-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-15/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-16/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2021-14/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1699835"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"88.0"}]},{"events":[{"introduced":"0"},{"fixed":"78.10"}]},{"events":[{"introduced":"0"},{"fixed":"78.10"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-23995.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}