Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-1199Integer Overflow or Wraparound in Mozilla Seamonkey

Severity
9.3CRITICALNVD
EPSS
42.7%
top 2.52%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 24
Latest updateMay 2

Description

Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

NVDmozilla/seamonkey2.0.4+34
NVDmozilla/thunderbird3.0.4+41
NVDmozilla/firefox12 versions+11

🔴Vulnerability Details

2
GHSA
GHSA-gf95-pc3w-rmh9: Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 32022-05-02
CVEList
CVE-2010-1199: Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 32010-06-23

💥Exploits & PoCs

2
Exploit-DB
Mozilla Firefox 3.6.3 - XSLT Sort Remote Code Execution2010-09-09
Exploit-DB
Mozilla Firefox/Thunderbird/SeaMonkey - XSLT Integer Overflow2010-06-22

📋Vendor Advisories

8
Ubuntu
Firefox and Xulrunner vulnerability2010-07-26
Ubuntu
Firefox and Xulrunner vulnerabilities2010-07-23
Ubuntu
ant, apturl, Epiphany, gluezilla, gnome-python-extras, liferea, mozvoikko, OpenJDK, packagekit, ubufox, webfav, yelp update2010-07-23
Ubuntu
Thunderbird vulnerabilities2010-07-06
Ubuntu
Firefox regression2010-06-30

💬Community

1
Bugzilla
CVE-2010-1199 Mozilla Integer Overflow in XSLT Node Sorting2010-05-10
CVE-2010-1199 — Integer Overflow or Wraparound | cvebase