From b58017425f2cfce5814782023b4508a1e3a5f2b6 Mon Sep 17 00:00:00 2001 From: rusty-snake <41237666+rusty-snake@users.noreply.github.com> Date: Sat, 10 Sep 2022 13:47:14 +0000 Subject: [PATCH] 5506: Only link to CVE with firefox --- user.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/user.js b/user.js index f2e931f..31a1e93 100644 --- a/user.js +++ b/user.js @@ -1035,7 +1035,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!"); * in native programs years ago [2]. WASM has powerful low-level access, making * certain attacks (brute-force) and vulnerabilities more possible * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3] - * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm + * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+wasm * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/ // user_pref("javascript.options.wasm", false);