https://bugzilla.wikimedia.org/show_bug.cgi?id=54181
--- Comment #16 from Isarra <[email protected]> --- (In reply to comment #5) > RedHat Bugzilla also uses Off, and to my surprise Mozilla Bugzilla uses On. To be perfectly frank, folks in bugzilla generally know how to handle these things anyway, which might explain that. This whole bug confuses me, though - forcing download seems like it'd be MORE of a security issue than viewing in-browser, not less, since then the file goes through at least two more layers of handling where it could encounter/trigger vulnerabilities - the OS reading it to figure out where to send it, and wherever it sends it. Which in the case of some versions of Windows would mean that any executable file could easily be automatically executed, from what I understand. (In reply to comment #15) I love you. -- You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug. _______________________________________________ Wikibugs-l mailing list [email protected] https://lists.wikimedia.org/mailman/listinfo/wikibugs-l
