Mozilla is prone to a security weakness in the default handling of HTML Application (HTA) files. When vulnerable versions of Mozilla prompt a user when downloading HTA files, the default option is to open the file and then don't ask again in the future when handling this type of file. Users who are not aware that HTA files may contain hostile content may be tempted to select this option instead of just opting to save the file without opening it. This has the potential to create a false sense of security. This is only an issue on Windows versions of the software.
Mozilla is prone to a security weakness in the default handling of HTML Application (HTA) files. When vulnerable versions of Mozilla prompt a user when downloading HTA files, the default option is to open the file and then don't ask again in the future when handling this type of file. Users who are not aware that HTA files may contain hostile content may be tempted to select this option instead of just opting to save the file without opening it. This has the potential to create a false sense of security. This is only an issue on Windows versions of the software.