Versions of Firefox 20.x and older are potentially affected by the following security issues :
An outdated MozillaMaintenance Service registry entry can trigger a trusted path privilege escalation (CVE-2013-1673)
An unspecified arbitrary code execution vulnerability within update service (CVE-2012-1942)
An arbitrary code execution vulnerability in Mozilla Maintenance Service with junctions (CVE-2013-1672)
Multiple memory corruption vulnerabilities exist that can lead to code execution (CVE-2013-0801, CVE-2013-1669)
The Chrome Object Wrapper (COW) does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (CVE-2013-1670)
File input control can disclose full path information, leading to information leakage that can be used for further attacks (CVE-2013-1671)
Some DOMSVGZoomEvent functions are used without being properly initialized, which can lead to information leakage in certain cases. (CVE-2013-1675)
A series of use-after-free, out of bounds read, and invalid write problems can be exploited for remote code execution (CVE-2013-1674, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681)
Binary data 801267.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
www.mozilla.org/security/announce/2013/mfsa2013-41.html
www.mozilla.org/security/announce/2013/mfsa2013-42.html
www.mozilla.org/security/announce/2013/mfsa2013-43.html
www.mozilla.org/security/announce/2013/mfsa2013-44.html
www.mozilla.org/security/announce/2013/mfsa2013-45.html
www.mozilla.org/security/announce/2013/mfsa2013-46.html
www.mozilla.org/security/announce/2013/mfsa2013-47.html
www.mozilla.org/security/announce/2013/mfsa2013-48.html