Firefox before 2.0.0.15 is affected by the vulnerabilities described in the above links.
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine. (CVE-2008-2798)
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine. (CVE-2008-2799)
Mozilla Firefox before 2.0.0.15 does not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files. (CVE-2008-2801)
Mozilla Firefox before 2.0.0.15 allows remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level." (CVE-2008-2802)
The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons. (CVE-2008-2803)
Mozilla Firefox before 2.0.0.15 allows remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range. (CVE-2008-2805)
Mozilla Firefox before 2.0.0.15 allows remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect. (CVE-2008-2806)
Mozilla Firefox before 2.0.0.15 does not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file. (CVE-2008-2807)
Mozilla Firefox before 2.0.0.15 does not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename. (CVE-2008-2808)
Mozilla Firefox 2 before 2.0.0.15 and other versions before 1.1.10, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site. (CVE-2008-2809)
Mozilla Firefox before 2.0.0.15 does not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut. (CVE-2008-2810)
The block reflow implementation in Mozilla Firefox before 2.0.0.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines. (CVE-2008-2811)
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center