https://bugzilla.wikimedia.org/show_bug.cgi?id=54181

--- Comment #16 from Isarra <[email protected]> ---
(In reply to comment #5)
> RedHat Bugzilla also uses Off, and to my surprise Mozilla Bugzilla uses On.

To be perfectly frank, folks in bugzilla generally know how to handle these
things anyway, which might explain that.

This whole bug confuses me, though - forcing download seems like it'd be MORE
of a security issue than viewing in-browser, not less, since then the file goes
through at least two more layers of handling where it could encounter/trigger
vulnerabilities - the OS reading it to figure out where to send it, and
wherever it sends it. Which in the case of some versions of Windows would mean
that any executable file could easily be automatically executed, from what I
understand.

(In reply to comment #15)

I love you.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l

Reply via email to