DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system.
2) An error when processing the "persist" XUL attribute can be exploited to bypass cookie settings and uniquely identify a user in subsequent browsing sessions.
For more information see vulnerabilities #4 through #10 in: SA33184
The vulnerabilities are reported in versions prior to 3.0.5.
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
At 8 years old I would say to listen more to parent Rinberg over privacy advocate. At 8 years old I honestly can't see the child having anything going on in their development where unknown monitoring would violate the spirit of letting them grow.