Join the AMA (Ask Me Anything) with the Firefox leadership team to celebrate Firefox 20th anniversary and discuss Firefox’s future on Mozilla Connect. Mark your calendar on Thursday, November 14, 18:00 - 20:00 UTC!

Caută ajutor

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Află mai multe

Acest fir de discuție a fost arhivat. Adresează o întrebare nouă dacă ai nevoie de ajutor.

is there a danger to keeping unused browsers (not updated) on my PC

more options

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used.

thanks!

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used. thanks!

Toate răspunsurile (2)

more options

Hi, no danger at all - as long as one of them isn't your default browser, and if you do want to use them, you make sure they are up to date first.

I currently have 7 other browsers installed for comparison and testing purposes!

If your question is resolved by this or another answer, please take a minute to let us know. Thank you!

more options

I think you can imagine a scenario where a command line is executed on the PC that launches content X in program Y, or a reusable component of program Y is called or instantiated by program Z, to exploit a known vulnerability in program Y. That may occur too quickly for an updater to protect the system.