Closed
Bug 983958
Opened 10 years ago
Closed 10 years ago
K7 Web Protection Browser Extension ( Plugin Click-To-Activate Whitelist Request )
Categories
(Firefox Graveyard :: Plugin Click-To-Activate Whitelist, defect)
Firefox Graveyard
Plugin Click-To-Activate Whitelist
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: androiddev, Assigned: benjamin)
Details
(Whiteboard: application complete. plugin delivered via .xpi)
Plugin name: K7 Web Protection Browser Extension Vendor: K7 Computing Pvt. Ltd. Point of contact: androiddev@k7computing.com Current version: 12.0.1.24 Download URL: http://www.k7computing.com/products/eng/K7ts/setup-eng-ts.exe Sample URL of plugin in use: http://www.k7computing.com/products/eng/K7ts/setup-eng-ts.exe Plugin details: Plugin is installed locally when K7TotalSecurity (Security Suite) is installed. The plugins facilitates communication from K7 Firefox extension with the K7 Product services. For Windows OS (32bit) K7Security Suite of Products File: npK7SRNPExt.dll Path: C:\Program Files\K7 Computing\K7TSecurity\npK7SRNPExt.dll Version: 12.0.1.24 State: Enabled K7 Web Protection Browser Extension MIME Type Description Suffixes application/k7webpro-plugin For Windows OS (64bit) K7Security Suite of Products File: npK7SRNPExt.dll Path: C:\Program Files (x86)\K7 Computing\K7TSecurity\npK7SRNPExt.dll Version: 12.0.1.24 State: Enabled K7 Web Protection Browser Extension MIME Type Description Suffixes application/k7webpro-plugin Are there any variations in the plugin file name, MIME types, description, or version from one release to the next? - NO Are there any known security issues in current or older versions of the plugin? - NO Migration Plan aware from NPAPI: We are in the process of replacing NPAPI plugin functionality with JS-CTypes based implementation.
Comment 1•10 years ago
|
||
If you are using the plugin from an extension, can you just deploy the plugin with the extension and set the required plugin permissions or prefs yourself? See here for some discussion on the topic: https://groups.google.com/d/topic/mozilla.dev.tech.plugins/fwM7N_xtfAU/discussion
Assignee | ||
Updated•10 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Whiteboard: application complete. plugin delivered via .xpi
Reporter | ||
Comment 2•10 years ago
|
||
K7TotalSecurity currently registers the plugin by using Windows Registry, by adding the relevant registry keys under: HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\@k7computing.com/k7webprotection > HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\@k7computing.com/k7webprotection\MimeTypes\application/k7webpro-plugin We're looking at the feasibility of delivering the same plugin via xpi.
Assignee | ||
Comment 3•10 years ago
|
||
We are automatically enabling plugins which are delivered as part of a Firefox extension. Given the data at hand, I don't think we want a separate whitelist entry if you can make the necessary changes in your extension.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → WONTFIX
Updated•8 years ago
|
Product: Firefox → Firefox Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•