Versions of Firefox less than 11 are potentially affected by the following security issues :
An error exists with handling JavaScript errors that could lead to information disclosure. (CVE-2011-1187)
An off-by-one error exists in the βOpenType Sanitizerβ that could lead to out-bounds-reads and possible code execution. (CVE-2011-3062)
Memory safety issues exist that could lead to arbitrary code execution. (CVE-2012-0467, CVE-2012-0468)
A use-after-free error exists related to βIDBKeyRangeβ of βindexedDBβ. (CVE-2012-0469)
Heap-corruption errors exist related to βgfxImageSurfaceβ that could lead to possible code execution. (CVE-2012-0470)
A multi-octet encoding issue exists that could allow cross-site scripting attacks as certain octets in multibyte character sets can destroy following octets.(CVE-2012-0471)
An error exists related to font rendering with βcairo-dwriteβ that could cause memory corruption leading to crashes and potentially code execution. (CVE-2012-0472)
An error exists in βWebGLBufferβ that could lead to the reading of illegal video memory. (CVE-2012-0473)
An unspecified error could allow URL bar spoofing. (CVE-2012-0474)
IPv6 addresses and cross-site βXHRβ or βWebSocketβ connections on non-standard ports could allow this application to send ambiguous origin headers. (CVE-2012-0475)
A decoding issue exists related to βISO-2022-KRβ and βISO-2022-CNβ character sets that could lead to cross-site scripting attacks. (CVE-2012-0477)
An error exists related to βWebGLβ and βtexImage2Dβ that could allow application crashes and possibly code execution when βJSVAL_TO_OBJECTβ is used on ordinary objects. (CVE-2012-0478)
Address bar spoofing is possible when βAtom XMLβ or βRSSβ data is loaded over HTTPS leading to phishing attacks. (CVE-2012-0479)
Binary data 801359.prm
.mozilla.org/security/announce/2012/mfsa2012-20.html
.mozilla.org/security/announce/2012/mfsa2012-22.html
.mozilla.org/security/announce/2012/mfsa2012-23.html
.mozilla.org/security/announce/2012/mfsa2012-24.html
.mozilla.org/security/announce/2012/mfsa2012-25.html
.mozilla.org/security/announce/2012/mfsa2012-26.html
.mozilla.org/security/announce/2012/mfsa2012-27.html
.mozilla.org/security/announce/2012/mfsa2012-28.html
.mozilla.org/security/announce/2012/mfsa2012-29.html
.mozilla.org/security/announce/2012/mfsa2012-30.html
.mozilla.org/security/announce/2012/mfsa2012-31.html
.mozilla.org/security/announce/2012/mfsa2012-32.html
.mozilla.org/security/announce/2012/mfsa2012-33.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479