mirror of
https://github.com/arkenfox/user.js.git
synced 2025-04-30 14:03:40 +02:00
typo
This commit is contained in:
parent
296d09886b
commit
36d0070fb5
1 changed files with 2 additions and 2 deletions
4
user.js
4
user.js
|
@ -1,6 +1,6 @@
|
|||
/******
|
||||
* name: arkenfox user.js
|
||||
* date: 3 October 2023
|
||||
* date: 10 October 2023
|
||||
* version: 118
|
||||
* urls: https://github.com/arkenfox/user.js [repo]
|
||||
* : https://arkenfox.github.io/gui/ [interactive]
|
||||
|
@ -920,7 +920,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
|
|||
* Vulnerabilities [1] have increasingly been found, including those known and fixed
|
||||
* in native programs years ago [2]. WASM has powerful low-level access, making
|
||||
* certain attacks (brute-force) and vulnerabilities more possible
|
||||
* [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3]
|
||||
* [STATS] ~0.2% of websites, about half of which are for cryptomining / malvertising [2][3]
|
||||
* [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm
|
||||
* [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
|
||||
* [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
|
||||
|
|
Loading…
Add table
Reference in a new issue