Visual Identity Guidelines for Firefox

firefox

Visual Identity Guidelines: Firefox

     Firefox Logo Usage

  • The Firefox logo is to be displayed in its entirety on either a solid light or dark background (avoid mid-tone or strongly colored backgrounds).

  • Note that the shadow is part of the logo and should not be excluded.
  • The logo should not be displayed in parts, with color variations, or with other elements superimposed on top of the logo.

  • The logo must include the copyright (©) symbol.
  • Logo size:
    • The logo should not be displayed on screen at any smaller than 24px tall (with the exception of system icons that demand smaller sizes).

    • The logo should not be displayed in print at any smaller than 3/8″ tall.

Firefox Logo Firefox Logo on black

             Firefox logo on white and black background

Firefox Logo/Wordmark Usage

  • The Firefox logo may be displayed on its own without the accompanying “Mozilla Firefox” text. When displayed with the accompanying “Mozilla Firefox” text, it must be displayed in one of the following two arrangements.

  • When displayed with the Firefox logo, the product name “Mozilla Firefox” should be rendered in the MetaBoldLF-Roman font in the appropriate size in relation to the logo as indicated in the figures above.

  • The wordmark must include the registered trademark (®) symbol.

  • Colors:
    • “Mozilla” text and registered trademark (®) symbol must be rendered in the hex color #666666 (RGB: 102, 102, 102).

    • “Firefox” text must be rendered in the hex color #D64203 (RGB: 214, 66, 3).
  • Logo size:
    • The should not be displayed on screen with the logo portion at a size any smaller than 24px tall.
    • The logo should not be displayed in print with the logo portion at a size any smaller than 3/8″ tall.

Firefox Wordmark (horizontal)

          Firefox logo/wordmark in horizontal orientation

Firefox Wordmark (horizontal)

             Firefox logo/wordmark in vertical orientation.

So better be careful while using firefox logo anywhere……

Multiple Vulnerabilities in Mozilla Firefox 2.0.x

 firefoxMozilla Firefox Multiple Vulnerabilities

Multiple vulnerabilities been found in  Mozilla Firefox 2.0.x by secunia security analyses.

Secunia Advisory:

SA26095

 

Release Date:

2007-07-18

 

Critical:

Highly critical

Impact:

Cross Site Scripting
Spoofing
DoS
System access

Where:

From remote

Solution Status:

Vendor Patch

 

Software:

Mozilla Firefox 2.0.x

 

CVE reference:

CVE-2007-3734 (Secunia mirror)
CVE-2007-3735 (Secunia mirror)
CVE-2007-3736 (Secunia mirror)
CVE-2007-3737 (Secunia mirror)
CVE-2007-3738 (Secunia mirror)
CVE-2007-3089 (Secunia mirror)

 

Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks and potentially to compromise a user’s system.

1) Various errors in the browser engine can be exploited to cause memory corruption and potentially to execute arbitrary code.

2) Various errors in the Javascript engine can be exploited to cause memory corruption and potentially to execute arbitrary code.

3) An error in the “addEventListener” and “setTimeout” methods can be exploited to inject script into another site’s context, circumventing the browser’s same-origin policy.

4) An error in the cross-domain handling can be exploited to inject arbitrary HTML and script code in a sub-frame of another web site.

This is related to vulnerability #5 in:SA21906

5) An unspecified error in the handling of elements outside of documents allows an attacker to call an event handler and execute arbitrary code with chrome privileges.

6) An unspecified error in the handling of “XPCNativeWrapper” can lead to execution of user-supplied code.

Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable:http://secunia.com/software_inspector/

Solution:

firefox2.0.0.5
Update to version 2.0.0.5-Download Firefox – Free 2.0.0.5 for Windows, English (5.7MB)

Get free from Multiple vulnerabilities by secunia advisory, yup a better solution….