Internet Security Advisory Agency Pure Hacking Company's Senior Consultant Ian Latter said that most of these security vulnerabilities are caused by applications that support JavaScript. "In the current computer operating environment, JavaScript support is generally improved, and even partially changes the security settings support JavaScript run, resulting in potential threats that malicious code running on the computer."
Latter also said that another reason for security hazards is to support malicious Scripts random access memory. "On the random memory logged in online attacker, maybe there is some information, the worst, this information contains some personal privacy data or some login passwords, passwords, etc."
Local time Monday, the security company SECUNIA said that 8 "high-risk" level security vulnerabilities were found in Mozilla's Firefox 0.x and Firefox 1.x version.
The report of the French Safety Accident Emergency Group said that the attacker used the security vulnerability on the pop-up advertising block on the Mozilla browser to achieve malicious code on the user system. In addition, the Firefox browser is running, reminds the user that there is no necessary plugin installed and will be arbitrarily provided to you a plugin and forced you to install. This is the harsh means that caused local data loss or malicious code.
It is reported that all Firefox browser versions prior to 1.7.7 prior to 1.0.3 have the above security vulnerabilities. To avoid attacks, users can cancel the JavaScript function or download the installation patch on the Mozilla website.