Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-arg8-g1hg-uqcu
Vulnerability ID VCID-arg8-g1hg-uqcu
Aliases CVE-2010-3171
Summary Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation.
Status Published
Exploitability 2.0
Weighted Severity 5.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://archives.neohapsis.com/archives/bugtraq/2010-09/0117.html
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
https://api.first.org/data/v1/epss?cve=CVE-2010-3171
https://bugzilla.mozilla.org/show_bug.cgi?id=577512
http://secunia.com/advisories/42867
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7370
http://www.securityfocus.com/bid/43222
http://www.trusteer.com/sites/default/files/Cross_domain_Math_Random_leakage_in_FF_3.6.4-3.6.8.pdf
http://www.vupen.com/english/advisories/2011/0061
cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
CVE-2010-3171 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3171
CVE-2010-3171 https://nvd.nist.gov/vuln/detail/CVE-2010-3171
CVE-2010-3171;OSVDB-53341 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/34621.c
CVE-2010-3171;OSVDB-53341 Exploit https://www.securityfocus.com/bid/43222/info
GLSA-201301-01 https://security.gentoo.org/glsa/201301-01
mfsa2010-33 https://www.mozilla.org/en-US/security/advisories/mfsa2010-33
Data source Exploit-DB
Date added Sept. 14, 2010
Description Mozilla Firefox 3.6.8 - 'Math.random()' Cross Domain Information Disclosure
Ransomware campaign use Known
Source publication date Sept. 14, 2010
Exploit type remote
Platform unix
Source update date Sept. 11, 2014
Source URL https://www.securityfocus.com/bid/43222/info
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2010-3171
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92443
EPSS Score 0.08698
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:07:18.395337+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201301-01 38.0.0