From 79fafe2f44f5e31522dd93013950474342bfdfb0 Mon Sep 17 00:00:00 2001 From: luxagraf Date: Sat, 4 May 2019 15:48:55 -0500 Subject: archived all the stuff from freelancing for wired --- .../Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt | 13 ------------- 1 file changed, 13 deletions(-) delete mode 100644 published/Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt (limited to 'published/Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt') diff --git a/published/Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt b/published/Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt deleted file mode 100644 index 850a18e..0000000 --- a/published/Webmonkey/Monkey_Bites/2007/07.16.07/Wed/firefox.txt +++ /dev/null @@ -1,13 +0,0 @@ -Mozilla has pushed out a new version of Firefox 2 that includes a patch for the high-profile vulnerability that allows attackers to use Internet Explorer to [trick Firefox into executing remote code][1]. - -There has been much debate over whether the vulnerability was Firefox's fault or IE's fault, but arguably both browsers were at fault since neither one escaped or sanitised the URLs being passed. - -Whatever the case, Firefox has patched things from its end. - -Several other security fixes are included in Firefox 2.0.0.5 -- the [release notes][2] have more information and specific fixes can be viewed [here][3]. - -Firefox 2.0.0.5 can be downloaded from the Firefox product page. - -[1]: http://www.mozillazine.org/talkback.html?article=22198 -[2]: http://www.mozilla.com/en-US/firefox/2.0.0.5/releasenotes/#whatsnew -[3]: http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.5 \ No newline at end of file -- cgit v1.2.3-70-g09d2