Firefox 3.0.8

The Latest Version of Firefox Is Available :slight_smile:

Page - mozilla.com/en-US/firefox/

Direct Link (>>3.0.8<<) -  download.mozilla.org/?product=fi … lang=en-US

//

The Latest >BETA< Version -

Page - mozilla.com/en-US/firefox/all-beta.html

Direct Link (>>3.1b3<<)- download.mozilla.org/?product=fi … lang=en-US

////

Also,

Some Cool & Hip (Addons)? or Extensions that’ll help you customize your Firefox experience.

Page - labs.mozilla.com/projects/

One I’m using:
Page (Simple Theme Extension)- labs.mozilla.com/projects/firefox-personas/
Direct Link - addons.mozilla.org/en-US/firefo … test/10900

Thanks for the update.  I’ve updated all of my units to 3.08.  FF 3.08 fixes two security vulnerabilities:

[quote]Mozilla Foundation Security Advisory 2009-13

Title: Arbitrary code execution via XUL tree element
Impact: Critical
Announced: March 27, 2009
Reporter: Nils
Products: Firefox

Fixed in: Firefox 3.0.8
Description

Security researcher Nils reported via TippingPoint’s Zero Day Initiative that the XUL tree method _moveToEdgeShift was in some cases triggering garbage collection routines on objects which were still in use. In such cases, the browser would crash when attempting to access a previously destroyed object and this crash could be used by an attacker to run arbitrary code on a victim’s computer.

This vulnerability was used by the reporter to win the 2009 CanSecWest Pwn2Own contest.

This vulnerability does not affect Firefox 2, Thunderbird 2, or released versions of SeaMonkey.[/quote]

[quote]Title: XSL Transformation vulnerability
Impact: Critical
Announced: March 27, 2009
Reporter: Guido Landi, Andre, Michael Rooney, Martin
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.0.8
SeaMonkey 1.1.16
Description

Security researcher Guido Landi discovered that a XSL stylesheet could be used to crash the browser during a XSL transformation. An attacker could potentially use this crash to run arbitrary code on a victim’s computer.

This vulnerability was also previously reported as a stability problem by Ubuntu community member, Andre. Ubuntu community member Michael Rooney reported Andre’s findings to Mozilla, and Mozilla community member Martin helped reduce Andre’s original testcase and contributed a patch to fix the vulnerability.[/quote]