![]() ![]() (MFSA 2011-05) - A use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to an object which can be freed during garbage collection. (MFSA 2011-04) - A buffer overflow vulnerability exists in the JavaScript engine's internal mapping of string values and may lead to code execution. (MFSA 2011-03) - A buffer overflow vulnerability exists in the JavaScript engine's internal memory mapping of non-local variables and may lead to code execution. ![]() (MFSA 2011-02) - A use-after-free error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution. ![]() Closing the dialog results in default acceptance of the dialog. This error causes dialog boxes to be displayed with no content and non-functioning buttons. (MFSA 2010-74, MFSA 2011-01) - An error exists in the processing of recursive calls to 'eval()' when the call is wrapped in a try/catch statement. Such versions are potentially affected by multiple vulnerabilities : - Multiple memory corruption errors exist and may lead to arbitrary code execution. Description The installed version of Firefox 3.5 is earlier than 3.5.17. Synopsis The remote Windows host contains a web browser affected by multiple vulnerabilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |