- Feb 4, 2016
- 2,520
source: Security Advisories for Firefox
NOTE:
With this release, legacy add-ons (XUL-based) will no longer function. This update changes the add-ons system to the WebExtensions API. The Mozilla Add-ons portal will list only WebExtensions-compatible add-ons by default.
_______EDIT___EDIT___EDIT___EDIT________
release notes (mozilla.org): Firefox — Notes (57.0)
- Critical Vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing.
- High Vulnerability can be used to gather sensitive data from sites in other windows or inject data or code into those sites, requiring no more than normal browsing actions.
- ....
- .......
- ...
NOTE:
With this release, legacy add-ons (XUL-based) will no longer function. This update changes the add-ons system to the WebExtensions API. The Mozilla Add-ons portal will list only WebExtensions-compatible add-ons by default.
_______EDIT___EDIT___EDIT___EDIT________
release notes (mozilla.org): Firefox — Notes (57.0)
Last edited: