Join the AMA (Ask Me Anything) with the Firefox leadership team to celebrate Firefox 20th anniversary and discuss Firefox’s future on Mozilla Connect. Mark your calendar on Thursday, November 14, 18:00 - 20:00 UTC!

Cerca nel supporto

Attenzione alle mail truffa. Mozilla non chiederà mai di chiamare o mandare messaggi a un numero di telefono o di inviare dati personali. Segnalare qualsiasi attività sospetta utilizzando l'opzione “Segnala abuso”.

Ulteriori informazioni

Questa discussione è archiviata. Inserire una nuova richiesta se occorre aiuto.

is there a danger to keeping unused browsers (not updated) on my PC

more options

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used.

thanks!

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used. thanks!

Tutte le risposte (2)

more options

Hi, no danger at all - as long as one of them isn't your default browser, and if you do want to use them, you make sure they are up to date first.

I currently have 7 other browsers installed for comparison and testing purposes!

If your question is resolved by this or another answer, please take a minute to let us know. Thank you!

more options

I think you can imagine a scenario where a command line is executed on the PC that launches content X in program Y, or a reusable component of program Y is called or instantiated by program Z, to exploit a known vulnerability in program Y. That may occur too quickly for an updater to protect the system.