Mark Hansen wrote:
What this means is that SM 1.1.18 is vulnerable to any security holes
discovered by the "bad guys" since it was delivered, and it's only going to
get worse as time moves on and new vulnerabilities are discovered.

Even worse, Paul says he's using 1.1.17, which allows all SSL connection to be intercepted by a third party, which was the main problem we fixed in 1.1.18.

Robert Kaiser
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to