Mozilla Firefox ESR Multiple Vulnerabilities-01 Dec13 (Windows)

Summary
This host is installed with Mozilla Firefox ESR and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to conduct cross-site scripting attacks, bypass certain security restrictions, disclose potentially sensitive information, and compromise a user's system. Impact Level: System/Application
Solution
Upgrade to Mozilla Firefox ESR version 24.2 or later, For updates refer to http://www.mozilla.com/en-US/firefox/all.html
Insight
Multiple flaws are due to, - Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function. - JavaScript implementation does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs. - Use-after-free vulnerability in the nsEventListenerManager::HandleEvent SubType function - unspecified error in nsGfxScrollFrameInner::IsLTR function. - Flaw is due to the program ignoring the setting to remove the trust for extended validation (EV) capable root certificates.
Affected
Mozilla Firefox ESR version 24.x before 24.2 on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References