Last Updated: 2015-08-07 15:43:45 UTC
by Tony Carothers (Version: 1)
**NOTE**: This exploit has been seen in the wild, and leaves no trace it has run on the local machine. The exploit description described in greater detail at the Mozilla Security website gives additional details on what files are currently being targeted. As with any updates being deployed into the enterprise, we highly recommend testing updates for impact before deployment, and ensure all configuration and change control requirements are maintained.
tony d0t carothers --gmail