vulnerability
Arch Linux: Arbitrary code execution (CVE-2021-43528)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Dec 8, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Dec 8, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Thunderbird before version 91.4.0 unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-43528
- https://attackerkb.com/topics/CVE-2021-43528
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1742579
- URL-https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
- URL-https://security.archlinux.org/ASA-202112-9
- URL-https://security.gentoo.org/glsa/202208-14
- URL-https://www.debian.org/security/2022/dsa-5034
- URL-https://www.mozilla.org/security/advisories/mfsa2021-54/
- CWE-269
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.