coderman @ 2007/06/21 11:33:
On 6/21/07, scar [EMAIL PROTECTED] wrote:
...
it seems to me that many addons which are downloaded
from https://addons.mozilla.org/ use different, non-https,
addresses to check for and download updates.
the problem exists when non https is used for updates. any
coderman @ 2007/05/30 00:00:
it would be trivial for a rogue exit to use this technique. public
wifi users should also take note.
check your firefox extensions!
http://paranoia.dubfire.net/2007/05/remote-vulnerability-in-firefox.html
A vulnerability exists in the upgrade mechanism
On 6/21/07, scar [EMAIL PROTECTED] wrote:
...
it seems to me that many addons which are downloaded
from https://addons.mozilla.org/ use different, non-https,
addresses to check for and download updates.
the problem exists when non https is used for updates. any plugins
getting updates via http
3 matches
Mail list logo