[G3]-Technews
[G3]-TechNews : Home| RSS | Atom | MSN | WAP

 Stickies:
Article: Step-by-Step Guide: How to set up a VPN
Article: Download: Microsoft Monad (Beta)
Article: Building a 64-Bit Multimedia Workstation
Article: Coming Soon to Windows: The Microsoft Shell (MSH)
Article: How to Reset Win NT / 2000 / XP Administrator Password
Article: The Technology Behind Dual Core CPUs
Article: How-To: Wireless Network Security
Article: Article: PCI Express - technology backgrounder
Article: Tutorial: Access Hidden Files on Your iPod
Article: Troubleshooting drivers with XP's hidden Driver Verifier Manager
Article: How to Make a 5 in 1 Network Cable
Article: Comparison - Blu-ray & HD DVD
Article: Beginners Guides Linux : Part 1 | Part 2 | Part 3
Article: How To Crack WEP (Wired Equivalent Privacy)
Article: Email Addresses Spoofing.
Link: Free PHP ebook
Link: FREE ASP.NET books and eLearning course
Link: Free registration code for Opera 8.
Invitations: Gazzag (Here) | Yahoo! 360 (Here)  | Orkut (Here)

New bug-fixed version of Firefox released
Contributed by: SHA, at 7/14/2005 08:20:00 PM.

The open source consortium Mozilla has released a new version of its popular Firefox browser this week. Version 1.0.5 addresses a number of security issues that have come to light since the last update in May.
There are 12 vulnerabilities identified and fixed in the current update. Two of which are said to be critical. The first allowed applications to run arbitrary code through the browser; the second allowed code execution through shared objects.
Media players, such as Flash and QuickTime can open URLs in the default browser. Previously, Firefox replaced the currently open browser window's content with the externally opened content. If the external URL was a JavaScript url it would run as if it came from the site that served the previous content, which could be used to access sensitive information.
The second more esoteric bug meant that improper cloning of base objects allowed web content scripts to walk up the prototype chain to get to a privileged object. This could be used to execute code with enhanced privileges.


Source : Link


Important:
To Read MOST UPDATED News Items browse to HOME page.

0 Comments:

Post a Comment

<< Home



[G3]-TechNews : Home| RSS | Atom | MSN | WAP


Archives :

- Monthly Archives :


- Post Count: 1,783 before June 1, 2005. (Since: October 26, 2004)