<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d12493326\x26blogName\x3dTechnology+::++State+of+the+Art\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://techtrack.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://techtrack.blogspot.com/\x26vt\x3d4088457725845351436', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

Tuesday, May 10, 2005

Firefox Vulnerable to Malicious Code Writers

Security firm Secunia is reporting two "extremely critical" flaws in Mozilla's Firefox. The vulnerabilities can be exploited by malicious people who wish to take control of victims' computers. The Mozilla Foundation is aware of the two flaws. The organization said there are currently no known active exploits of these vulnerabilities, although a "proof of concept" has been reported. Mozilla said changes to its update Web service have been made to mitigate the risk of an exploit.

More:
FireFox Vulnerable
Two FireFox Security Flaws Lead To Exploit Potential
Exploit Code chases Two FireFox Flaws

0 Comments:

Post a Comment

<< Home