<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Exploiting_Firefox_Extensions</id>
		<title>Exploiting Firefox Extensions - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Exploiting_Firefox_Extensions"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Exploiting_Firefox_Extensions&amp;action=history"/>
		<updated>2026-04-18T01:21:11Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Exploiting_Firefox_Extensions&amp;diff=66472&amp;oldid=prev</id>
		<title>Dhruvsoi: Created page with 'Firefox extensions are popular, well-established and used by millions of people around the world. Some of these extensions are recommended by the Mozilla community, and are impli…'</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Exploiting_Firefox_Extensions&amp;diff=66472&amp;oldid=prev"/>
				<updated>2009-07-24T06:52:13Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;Firefox extensions are popular, well-established and used by millions of people around the world. Some of these extensions are recommended by the Mozilla community, and are impli…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Firefox extensions are popular, well-established and used by millions of people around the world. Some of these extensions are recommended by the Mozilla community, and are implicitly trusted by the masses. Little is known about Firefox extensions from a security perspective and our research intends to fill this gap.&lt;br /&gt;
&lt;br /&gt;
The talk is divided in two parts: theory and practice. First, security model of Firefox extensions will be explored and security testing methodology will be presented. Next, it will illustrated on how to apply the theory and discovered severe vulnerabilities in the most popular and recommended Firefox extensions. Examples of exploits will also be demonstrated.&lt;br /&gt;
&lt;br /&gt;
After this talk, attendees will have gained a better understanding of the security implications, threats and risks of using and deploying Firefox extensions. Security professionals and auditors will be able to use our material as a security testing framework when auditing Firefox extensions&lt;/div&gt;</summary>
		<author><name>Dhruvsoi</name></author>	</entry>

	</feed>