Mozilla Multiple Products Remote Code Execution Vulnerability
Release Date: 06th of October 2025
Impact : HIGH / CRITICAL
TLP Rating: Clear 
The Department of Communication and Digital Transformation (DCDT through CERT Vanuatu (CERTVU), provides the following advisory.
This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.
What is it?
CVE-2010-3765 is a remote code execution vulnerability in Mozilla products (Firefox / SeaMonkey / Thunderbird) caused by a heap buffer overflow when mixing document.write and DOM insertion; it was actively exploited in October–November 2010.
What are the Systems affected?
Affected:
- Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11 — fixed in Firefox 3.5.15 and 3.6.12.
- SeaMonkey fixed in 2.0.10.
- Thunderbird fixed in 3.0.10 and 3.1.6. (Any installs still running the pre-fixed releases are vulnerable.)
What this means?
Remote, client-side: malicious JavaScript on a webpage (or web-like content in RSS/add-ons where JS is enabled) leverages incorrect index tracking in nsCSSFrameConstructor::ContentAppended plus appendChild/document.write interactions to trigger heap corruption, then downloads and executes payloads (Belmoo / Backdoor in observed incidents). Exploits were delivered via malicious pages and exploit kits in the wild.
This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended. This then triggers memory corruption, as exploited in the wild in October 2010.
Mitigation process
CERTVU recommend:
- Patch immediately – Upgrade to the fixed product releases for affected products.
- If for some reason the endpoint(s) cannot be updated, disable JavaScript for untrusted content, block untrusted sites via proxy/URL Filtering, and restrict RSS/add-ons that execute web content.
- Harden endpoint by keeping AV/EDR signatures up to date.
References
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://www.cve.org/CVERecord?id=CVE-2010-3765
- https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/CVE-2010-3765
- Download advisory (English): Mozilla Multiple Products Remote Code Execution Vulnerability
- Download advisory (French): Vulnérabilité d’exécution de code à distance affectant plusieurs produits Mozilla