Page 10 of 11 FirstFirst ... 67891011 LastLast
Results 91 to 100 of 102

Thread: Firefox updates

  1. #91
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post Firefox v7.0.1 released

    FYI...

    Firefox v7.0.1 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/en-US/firefox/all.html
    September 29, 2011
    Issue discovered with Firefox add-on upgrades
    - https://blog.mozilla.com/addons/2011...d-on-upgrades/
    "... some users may have one or more of their add-ons hidden after upgrading to the latest Firefox version, affecting both desktop and mobile. These add-ons and their data are still intact and haven’t actually been removed... update to Firefox will fix this and restore any hidden add-ons..."
    > https://support.mozilla.com/en-US/kb...ting-firefox-7
    > https://addons.mozilla.org/en-US/fir.../fx7-recovery/

    Release notes
    - https://www.mozilla.org/en-US/firefo.../releasenotes/

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #92
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox v8.0 released

    FYI...

    Firefox v8.0 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/en-US/firefox/all.html
    November 8, 2011

    - https://www.mozilla.org/en-US/firefox/8.0/releasenotes/
    Security Advisories :
    - https://www.mozilla.org/security/kno....html#firefox8
    Fixed in Firefox 8:
    MFSA 2011-52 Code execution via NoWaiverWrapper
    MFSA 2011-51 Cross-origin image theft on Mac with integrated Intel GPU
    MFSA 2011-50 Cross-origin data theft using canvas and Windows D2D
    MFSA 2011-49 Memory corruption while profiling using Firebug
    MFSA 2011-48 Miscellaneous memory safety hazards (rv:8.0)
    MFSA 2011-47 Potential XSS against sites using Shift-JIS
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3649 - 2.6
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3653 - 5.0
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3650 - 9.3 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3655 - 9.3 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3651 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3652 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3654 - 10.0 (HIGH)
    CVSS v2 Base Score: 10.0 (HIGH)
    "... Firefox before 8.0..."

    Bugs fixed
    - https://www.mozilla.org/en-US/firefo...s/buglist.html
    ___

    Firefox v3.6.24 released
    November 8, 2011
    From an admin. account, start Firefox, then >Help >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/en-US/firefox/all-older.html
    Security Advisories:
    - https://www.mozilla.org/security/kno...#firefox3.6.24
    Fixed in Firefox 3.6.24:
    MFSA 2011-49 Memory corruption while profiling using Firebug
    MFSA 2011-47 Potential XSS against sites using Shift-JIS
    MFSA 2011-46 loadSubScript unwraps XPCNativeWrapper scope parameter (1.9.2 branch)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3648 - 4.3
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3647 - 9.3 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3650 - 9.3 (HIGH)
    CVSS v2 Base Score: 9.3 (HIGH)
    "... Firefox before 3.6.24..."

    Bugs fixed
    - https://bugzilla.mozilla.org/buglist....2%3A.24-fixed
    ___

    - https://secunia.com/advisories/46773/
    Release Date: 2011-11-09
    Criticality level: Highly critical
    Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access
    Where: From remote ...
    Solution: Upgrade to version 8.0...

    - https://secunia.com/advisories/46757/
    Release Date: 2011-11-09
    Criticality level: Highly critical
    Impact: Cross Site Scripting, Exposure of sensitive information, System access
    Where: From remote ...
    Solution: Update to Firefox version 3.6.24 ...

    - http://www.securitytracker.com/id/1026298
    Date: Nov 9 2011
    CVE Reference: CVE-2011-3647, CVE-2011-3648, CVE-2011-3649, CVE-2011-3650, CVE-2011-3651, CVE-2011-3652, CVE-2011-3653, CVE-2011-3654, CVE-2011-3655
    Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network...
    Solution: The vendor has issued a fix (3.6.24, 8.0)...

    Last edited by AplusWebMaster; 2011-11-16 at 04:12.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #93
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Lightbulb Firefox v9.0 released ...

    FYI...

    Firefox v9.0 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/en-US/firefox/all.html
    December 20, 2011

    - https://www.mozilla.org/en-US/firefox/9.0/releasenotes/
    Security Advisories:
    - https://www.mozilla.org/security/kno....html#firefox9
    Fixed in Firefox 9:
    MFSA 2011-58 Crash scaling <video> to extreme sizes
    MFSA 2011-57 Crash when plugin removes itself on Mac OS X
    MFSA 2011-56 Key detection without JavaScript via SVG animation
    MFSA 2011-55 nsSVGValue out-of-bounds access
    MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library
    MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)

    Bugs fixed
    - https://www.mozilla.org/en-US/firefo...s/buglist.html

    - https://secunia.com/advisories/47302/
    Release Date: 2011-12-21
    Criticality level: Highly critical
    Impact: Unknown, Exposure of sensitive information, System access
    Where: From remote
    CVE Reference(s):
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3658 - 7.5 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3660 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3661 - 7.5 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3663 - 4.3
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3664 - 7.5 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3665 - 7.5 (HIGH)
    Last revised: 12/21/2011
    ... exploitation of vulnerabilities... may allow execution of arbitrary code.
    Solution: Upgrade to version 9.0.

    - http://www.securitytracker.com/id/1026445
    Dec 21 2011
    ___

    Firefox v3.6.25 released
    December 20, 2011
    From an admin. account, start Firefox, then >Help >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/en-US/firefox/all-older.html
    Security Advisories:
    - https://www.mozilla.org/security/kno...#firefox3.6.25
    Fixed in Firefox 3.6.25:
    MFSA 2011-59 .jar not treated as executable in Firefox 3.6 on Mac

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3666
    Last revised: 12/21/2011
    CVSS v2 Base Score: 6.8 (MEDIUM)
    "... Firefox before 3.6.25..."

    Bugs fixed
    - https://bugzilla.mozilla.org/buglist....2%3A.25-fixed

    .
    Last edited by AplusWebMaster; 2011-12-23 at 16:48.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #94
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Question Firefox v9.0.1 ? ...

    FYI...

    - https://wiki.mozilla.org/Releases#Firefox_10
    "... Firefox 10... January 31, 2012..."
    ___

    Firefox v9.0.1 ?
    - https://www.mozilla.org/en-US/firefo...s/buglist.html
    December 21st, 2011

    - http://forums.mozillazine.org/viewto...?f=7&t=2391989
    Dec. 21 4:51 pm - "... 9.0.1 the next day?... Apparently Mac users were experiencing crashes on startup..."

    - https://ftp.mozilla.org/pub/mozilla....idates/build1/
    Index of /pub/mozilla.org/firefox/nightly/9.0.1-candidates/build1

    - https://bugzilla.mozilla.org/show_bug.cgi?id=711794#c96
    2011-12-21 19:17:51 PST
    ___

    Mozilla and Google Sign New Agreement for Default Search in Firefox
    - https://blog.mozilla.com/blog/2011/1...ch-in-firefox/
    December 20, 2011 - "... we have negotiated a significant and mutually beneficial revenue agreement with Google. This new agreement extends our long term search relationship with Google for at least three additional years..."

    - http://h-online.com/-1400943
    23 December 2011

    Last edited by AplusWebMaster; 2012-01-27 at 22:37.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #95
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox v10.0 released ...

    FYI...

    Firefox v10.0 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/firefox/all.html
    Jan 31, 2012

    What's new...
    - https://www.mozilla.org/en-US/firefo.../releasenotes/
    Release Notes/Bug fixes ... complete list of changes in this release.
    - https://www.mozilla.org/en-US/firefo...s/buglist.html
    Security Advisories:
    - https://www.mozilla.org/security/kno...html#firefox10
    Fixed in Firefox 10
    MFSA 2012-08 Crash with malformed embedded XSLT stylesheets
    MFSA 2012-07 Potential Memory Corruption When Decoding Ogg Vorbis files
    MFSA 2012-06 Uninitialized memory appended when encoding icon images may cause information disclosure
    MFSA 2012-05 Frame scripts calling into untrusted objects bypass security checks
    MFSA 2012-04 Child nodes from nsDOMAttribute still accessible after removal of nodes
    MFSA 2012-03 <iframe> element exposed across domains via name attribute
    MFSA 2012-01 Miscellaneous memory safety hazards (rv:10.0/ rv:1.9.2.26)

    - http://www.securitytracker.com/id/1026605
    Updated: Feb 1 2012
    CVE Reference:
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3659 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0442 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0443 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0444 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0445 - 5.0
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0446 - 4.3
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0447 - 5.0
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0449 - 10.0 (HIGH)
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0450 - 2.1
    Impact: Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
    Version(s): prior to 3.2.26; prior to 10.0

    - http://www.securitytracker.com/id/1026608
    Date: Feb 1 2012
    CVE Reference: CVE-2011-3670
    Impact: Disclosure of system information, Disclosure of user information
    Version(s): prior to 3.6.26, prior to 7.0

    - https://secunia.com/advisories/47816/
    Release Date: 2012-02-01
    Criticality level: Highly critical
    Impact: Security Bypass, Exposure of sensitive information, System access
    Where: From remote...
    Solution: Upgrade to Firefox version 10.0...

    - https://secunia.com/advisories/47839/
    Release Date: 2012-02-01
    Criticality level: Highly critical
    Impact: Exposure of sensitive information, System access
    Where: From remote...
    Solution: Update to Firefox version 3.6.26...

    - http://h-online.com/-1425611
    31 January 2012
    ___

    Firefox v3.6.26 released
    Jan 31, 2012

    From an admin. account, start Firefox, then >Help >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/firefox/all-older.html
    Security Advisories:
    - https://www.mozilla.org/security/kno...#firefox3.6.26
    Fixed in Firefox 3.6.26:
    MFSA 2012-08 Crash with malformed embedded XSLT stylesheets
    MFSA 2012-07 Potential Memory Corruption When Decoding Ogg Vorbis files
    MFSA 2012-04 Child nodes from nsDOMAttribute still accessible after removal of nodes
    MFSA 2012-02 Overly permissive IPv6 literal syntax
    MFSA 2012-01 Miscellaneous memory safety hazards (rv:10.0/ rv:1.9.2.26)

    Bugs fixed
    - https://bugzilla.mozilla.org/buglist....2%3A.26-fixed

    .
    Last edited by AplusWebMaster; 2012-02-04 at 01:40.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #96
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox v10.0.1 released

    FYI...

    Firefox v10.0.1 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/firefox/all.html

    - https://www.mozilla.org/security/kno...#firefox10.0.1
    Impact: Critical
    Feb 10, 2012
    Fixed in Firefox 10.0.1:
    MFSA 2012-10 use after free in nsXBLDocumentInfo::ReadPrototypeBindings

    - https://www.mozilla.org/security/ann...sa2012-10.html
    References:
    . use after free in nsXBLDocumentInfo::ReadPrototypeBindings
    . http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-0452 - 7.5 (HIGH)
    Last revised: 02/13/2012 - "... allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code..."
    __

    - https://secunia.com/advisories/48008/
    Release Date: 2012-02-13
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    CVE Reference: CVE-2012-0452
    Solution:
    Update Firefox and Thunderbird to version 10.0.1 and SeaMonkey to version 2.7.1

    - http://www.securitytracker.com/id/1026663
    Date: Feb 13 2012
    CVE Reference: CVE-2012-0452
    Impact: Execution of arbitrary code via network, User access via network
    Solution: The vendor has issued a fix (10.0.1).

    Last edited by AplusWebMaster; 2012-02-15 at 14:13.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #97
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox v10.0.2 released

    FYI...

    Firefox v10.0.2 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download:
    - https://www.mozilla.com/firefox/all.html

    - https://www.mozilla.org/security/ann...sa2012-11.html
    Impact:Critical
    Fixed in: Firefox 10.0.2 or 3.6.27**, Thunderbird 10.0.2 or 3.1.19, or SeaMonkey 2.7.2.
    ** https://www.mozilla.org/en-US/firefox/all-older.html

    Mozilla release to address CVE-2011-3026
    - https://blog.mozilla.com/security/20...cve-2011-3026/
    2.17.12 - Issue: The libpng graphics library, used by Firefox and Thunderbird as well as many other software packages, contains an exploitable integer overflow bug. An attacker could craft malicious images which exploit this bug, and deliver them to users through websites or email messages.
    Impact to users: This bug is remotely exploitable and can lead to arbitrary code execution. Firefox, Thunderbird and Seamonkey users could be attacked simply by displaying a maliciously crafted image.
    Status: Mozilla is aware of this bug and has issued a fix that will be released today for Firefox -and- Thunderbird*.
    Credit: The bug was reported by RedHat representatives..."

    > http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-3026 - 7.5 (HIGH)
    Last revised: 02/17/2012 - "Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation..."

    * https://www.mozilla.org/thunderbird/.../releasenotes/
    v. 10.0.2, released: Feb 16, 2012
    ___

    Firefox...
    - http://www.securitytracker.com/id/1026707
    Date: Feb 18 2012
    CVE Reference: CVE-2011-3026
    Version(s): ... prior to 3.6.27; prior to 10.0.2...
    Impact: A remote user can create a PNG image that, when loaded by the target user, will execute arbitrary code on the target user's system...

    Thunderbird...
    - http://www.securitytracker.com/id/1026706
    Date: Feb 18 2012
    CVE Reference: CVE-2011-3026
    Version(s): ... prior to 3.1.19; prior to 10.0.2
    Impact: A remote user can create a PNG image that, when loaded by the target user, will execute arbitrary code on the target user's system...

    - https://secunia.com/advisories/48089/
    Release Date: 2012-02-17
    Criticality level: Highly critical
    Impact: System access
    Where: From remote...
    Solution: Update to Firefox 10.0.2 or 3.6.27, Thunderbird 10.0.2 or 3.1.19, or SeaMonkey 2.7.2.
    Original Advisory: Mozilla:
    http://www.mozilla.org/security/anno...sa2012-11.html
    http://blog.mozilla.com/security/201...cve-2011-3026/

    Vuln in libpng ...
    - http://h-online.com/-1436810
    17 Feb 2012

    >> https://secunia.com/advisories/48026/

    Last edited by AplusWebMaster; 2012-02-19 at 13:42.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #98
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox v11.0 released

    FYI...

    Firefox v11.0 released

    From an admin. account, start Firefox, then >Help >About >Check for Updates
    -or-
    Download: https://www.mozilla.com/firefox/all.html
    March 13, 2012

    What's new...
    - https://www.mozilla.org/firefox/11.0/releasenotes/
    Release Notes/Bug fixes ... See: Known Issues...
    Complete list of changes in this release:
    - https://www.mozilla.org/firefox/11.0...s/buglist.html
    Security Advisories:
    - https://www.mozilla.org/security/kno...html#firefox11
    Fixed in Firefox 11
    MFSA 2012-19 Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28)
    MFSA 2012-18 window.fullScreen writeable by untrusted content
    MFSA 2012-17 Crash when accessing keyframe cssText after dynamic modification
    MFSA 2012-16 Escalation of privilege with Javascript: URL as home page
    MFSA 2012-15 XSS with multiple Content Security Policy headers
    MFSA 2012-14 SVG issues found with Address Sanitizer
    MFSA 2012-13 XSS with Drag and Drop and Javascript: URL
    MFSA 2012-12 Use-after-free in shlwapi.dll

    - https://secunia.com/advisories/48402/
    Release Date: 2012-03-14
    Criticality level: Highly critical
    Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access
    Where: From remote
    CVE Reference(s): CVE-2012-0451, CVE-2012-0454, CVE-2012-0455, CVE-2012-0456 CVSS, CVE-2012-0457, CVE-2012-0458, CVE-2012-0459, CVE-2012-0460, CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464
    Solution: Update or upgrade to Firefox versions 11.0 or 10.0.3, Thunderbird versions 11.0 or 10.0.3, and SeaMonkey version 2.8.

    - http://www.securitytracker.com/id/1026801
    Date: Mar 14 2012
    CVE Reference: CVE-2012-0451, CVE-2012-0454, CVE-2012-0455, CVE-2012-0456, CVE-2012-0457, CVE-2012-0458, CVE-2012-0459, CVE-2012-0460, CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464
    Impact: Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
    Version(s): prior to 11
    Solution: The vendor has issued a fix (3.6.28, ESR 10.0.3, 11.0)...
    ___

    Firefox v3.6.28 released
    March 13, 2012

    From an admin. account, start Firefox, then >Help >Check for Updates
    -or-
    Download: https://www.mozilla.com/firefox/all-older.html

    - https://www.mozilla.org/security/kno...#firefox3.6.28
    Fixed in Firefox 3.6.28

    - https://secunia.com/advisories/48414/
    Release Date: 2012-03-14
    Criticality level: Highly critical
    Impact: Cross Site Scripting, System access
    Where: From remote
    CVE Reference(s): CVE-2012-0455, CVE-2012-0456, CVE-2012-0457, CVE-2012-0458, CVE-2012-0461, CVE-2012-0464
    Original Advisory:
    http://www.mozilla.org/security/anno...sa2012-13.html
    http://www.mozilla.org/security/anno...sa2012-14.html
    http://www.mozilla.org/security/anno...sa2012-16.html
    http://www.mozilla.org/security/anno...sa2012-19.html
    Solution: Update to Firefox version 3.6.28 and Thunderbird version 3.1.20.

    Last edited by AplusWebMaster; 2012-03-19 at 22:15.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #99
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Firefox 3.6.x EOL

    FYI...

    Firefox 3.6.x EOL
    - http://h-online.com/-1479643
    26 March 2012 - "The Mozilla Project has announced* that... the 3.6.x branch of its open source Firefox web browser will reach its end of life on Tuesday 24 April... from that date onwards, no new updates, including security updates and critical fixes, will be released for Firefox 3.6.x... version 3.6.28 from earlier this month will be the final 3.6.x release of Firefox... All Firefox 3.6.x users are strongly advised to upgrade..."
    * http://blog.mozilla.com/futurereleas...pport-changes/

    - https://wiki.mozilla.org/Releases#Upcoming_Releases
    "Firefox 12... Moves to RELEASED on April 24, 2012..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #100
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Lightbulb Firefox blocklist includes vulnerable Java versions

    FYI...

    Firefox blocklist now includes vulnerable Java versions...
    - https://www.computerworld.com/s/arti...efox_blocklist
    April 3, 2012 - "Mozilla has blacklisted* unpatched versions of the Java plug-in from Firefox on Windows in order to protect its users from attacks that exploit known vulnerabilities in those versions. Mozilla can add extensions or plug-ins to the Firefox add-on blocklist if they cause significant security or performance issues. Firefox installations automatically query the blocklist and notify users before disabling the targeted add-ons..."
    * https://blog.mozilla.com/addons/2012...blocking-java/
    "... vulnerability - present in the older versions of the JDK and JRE - is actively being exploited, and is a potential risk to users. To mitigate this risk, we have added affected versions of the Java plugin for Windows (Version 6 Update 30 and below as well as Version 7 Update 2 and below) to Firefox’s blocklist**. A blocklist entry for the Java plugin on OS X may be added at a future date. Mozilla strongly encourages anyone who requires the JDK and JRE to update to the current version as soon as possible on all platforms..."
    ** https://addons.mozilla.org/en-US/firefox/blocked/p80

    - https://bugzilla.mozilla.org/show_bug.cgi?id=739955

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •