A <dialog> element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121.
<dialog>
[ { "events": [ { "introduced": "0" }, { "fixed": "121.0" } ] } ]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6869.json"