Deployment:Deploying Firefox: Difference between revisions

Jump to navigation Jump to search
Line 50: Line 50:


<br>June 2004 https://www.kb.cert.org/vuls/id/713878
<br>June 2004 https://www.kb.cert.org/vuls/id/713878
Here is an excerpt from that article
Use a different web browser
There are a number of significant vulnerabilities in technologies related to the IE domain/zone security model, trust in and access to the local file system (Local Machine Zone), the Dynamic HTML (DHTML) document object model (in particular, proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI), and ActiveX. These technologies are implemented as operating system components that are used by IE and many other programs to provide web browser functionality. These components are integrated into Windows to such an extent that vulnerabilities in IE frequently provide an attacker significant access to the operating system.
<br>http://www.cert.org/tech_tips/securing_browser/
<br>http://www.cert.org/tech_tips/securing_browser/
<br>http://www.cbsnews.com/stories/2004/07/05/scitech/pcanswer/main627500.shtml
<br>http://www.cbsnews.com/stories/2004/07/05/scitech/pcanswer/main627500.shtml
Confirmed users, Bureaucrats and Sysops emeriti
1,531

edits

Navigation menu