| 2:49 am on Oct 27, 2010 (gmt 0)|
[edited by: Sgt_Kickaxe at 3:00 am (utc) on Oct 27, 2010]
| 2:57 am on Oct 27, 2010 (gmt 0)|
| 8:02 am on Oct 27, 2010 (gmt 0)|
"...vulnerability in Firefox to force end users to install malware ... The Windows executable was created on Sunday..."
| 8:14 am on Oct 27, 2010 (gmt 0)|
bill... nobody is talking about Java!
Heck, nobody even has to have that installed! (I don't, for example)...
| 9:13 am on Oct 27, 2010 (gmt 0)|
|bill... nobody is talking about Java! |
Sgt_Kickaxe edited his post. It was quite different before. ;)
| 9:51 am on Oct 27, 2010 (gmt 0)|
Apologies! (knew you knew better, shoulda kept mouth shut etc. ...)
Now I have egg on face! Thanks!
Somebody throw me a towel... or some Tabasco...
| 10:32 am on Oct 27, 2010 (gmt 0)|
| 5:44 pm on Oct 27, 2010 (gmt 0)|
The catch 22 is NoScript is one of the few ways to stay protected on the web.
| 7:07 pm on Oct 27, 2010 (gmt 0)|
Agreed r4bet, chances are China is behind this. Hilarious in a sickening way.
| 7:13 am on Oct 28, 2010 (gmt 0)|
maybe related to liu xiaobo?
| 11:58 pm on Oct 28, 2010 (gmt 0)|
I think FF has issued a patch... there was something that came through early morning/last night, but dang it I was tired and not paying attention when I clicked RESTART FIREFOX FOR UPDATES... Will go take a look, but if anyone has that info, please post... The Mozilla guys seem to take these exploit things very seriously.
| 12:21 am on Oct 29, 2010 (gmt 0)|
They did fix a critical 0-day exploit in the just released version 3.6.12 - not sure if it is THE 0-day exploit or not, but I think so.
|Fixed in Firefox 3.6.12 |
MFSA 2010-73 Heap buffer overflow mixing document.write and DOM insertion
https://bugzilla.mozilla.org/show_bug.cgi?id=607222 has the Bug Report from 2010-10-25