Zero-day vulnerability detected in Firefox

Firefox

While Safari is an excellent browser, it still has a few buts that does not make it the best browser within the macOS ecosystem. To make up for some of the shortcomings it offers us, we have at our disposal different options such as Chrome, Firefox, Opera ... Particularly, after having suffered with Chrome and its excessive consumption of battery and resources when we open more than three tabs, I decided to opt for Firefox ,

Firefox, from the Mozilla Foundation, is a very complete browser that makes up for some of the shortcomings that I find in Safari, and that also it does not record all the activity we carry out on it, as Chrome does well even though we are not logged in with our account. If it is your header or secondary browser, you should run to update it as soon as possible, since a zero-day vulnerability has been detected.

Zero-day vulnerabilities or zero-day as it has been translated into Spanish, are vulnerabilities found in the application, or operating system if it is the case, since the first version was launched, that is, it has always been there and has been able to be used by any friend of others.

According to the Mozilla Foundation, this vulnerability is found when the browser is manipulating JavaScript objects, objects that are found in all web pages and that to a greater or lesser extent are responsible for recording both our activity on the web page.

This vulnerability has been discovered by Google security researcher Samuel GroB, who is working on Google's Project Zero program and Coinbase's.

Firefox already offers us the update that solves this security problem. To do this, we just have to completely close the browser and reopen it so that at that moment, the browser detects that there is a new version on the servers and automatically proceeds to download it.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.