Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-3324

Severity
4.3MEDIUM
EPSS
26.4%
top 3.68%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 17
Latest updateMay 13

Description

The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-125

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

🔴Vulnerability Details

2
GHSA
GHSA-p4fm-mppm-v7m5: The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 32022-05-13
CVEList
CVE-2010-3324: The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 32010-09-17

💥Exploits & PoCs

1
Exploit-DB
Microsoft Internet Explorer 8 - 'toStaticHTML()' HTML Sanitization Bypass2010-08-16
CVE-2010-3324 (MEDIUM CVSS 4.3) | The toStaticHTML function in Micros | cvebase.io