DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system.
2) An error when processing the "persist" XUL attribute can be exploited to bypass cookie settings and uniquely identify a user in subsequent browsing sessions.
For more information see vulnerabilities #4 through #10 in: SA33184
The vulnerabilities are reported in versions prior to 3.0.5.
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Working for an ISP in Atlantic canada, the Accelerator we use is a Proxy that degrades images to make them smaller to download getting faster download speeds. Not bad if it's free only our's is an extra 5.95 a month