![]() |
Critial Flaw in FIREFOX (html link)
|
"A patch is expected shortly, but in the meantime users can protect themselves by switching off JavaScript. In addition, the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites, according to security experts."
Yeah look how fast it was fixed.. Lets see IE do that. ;) |
This never happens in IE.
|
CRITICAL flaw
|
" However, industry observers have long warned that the browser is more secure partly because of its relatively small user base. As Firefox's profile grows, attackers will increasingly target the browser."
Favorite part of the story. |
ha firefox rocks. that's a hell of a turn around time for a patch. ;]
|
Quote:
7 days ?????? |
Quote:
|
Security Advisory (May 8, 2005) The Mozilla Foundation is aware of two potentially critical Firefox security vulnerabilities as reported publicly Saturday, May 7th. There are currently no known active exploits of these vulnerabilities although a "proof of concept" has been reported. Changes to the Mozilla Update web service have been made to mitigate the risk of an exploit. Mozilla is aggressively working to provide a more comprehensive solution to these potential vulnerabilities and will provide that solution in a forthcoming security update. Users can further protect themselves today by temporarily disabling JavaScript.
http://www.mozilla.org/security/#Security_Alerts :smokin |
All times are GMT -7. The time now is 06:38 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123