This site will have limited functionality while we undergo maintenance to improve your experience. If an article doesn't solve your issue and you want to ask a question, we have our support community waiting to help you at @FirefoxSupport on Twitter and/r/firefox on Reddit.

Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

is there a danger to keeping unused browsers (not updated) on my PC

more options

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used.

thanks!

There are some users who keep other browsers on their PC in addition to Firefox - i.e., chrome, etc - that are unused and not updated. for most, when they do launch the browser, it will update, but is there a security vulnerability/risk it keeping an unused, unupdated browser on a machine (i.e. plugins, add-ons,etc)? I say remove it if not needed, but our admin says there is no issue with having these on the system since they will update if they are ever used. thanks!

All Replies (2)

more options

Hi, no danger at all - as long as one of them isn't your default browser, and if you do want to use them, you make sure they are up to date first.

I currently have 7 other browsers installed for comparison and testing purposes!

If your question is resolved by this or another answer, please take a minute to let us know. Thank you!

more options

I think you can imagine a scenario where a command line is executed on the PC that launches content X in program Y, or a reusable component of program Y is called or instantiated by program Z, to exploit a known vulnerability in program Y. That may occur too quickly for an updater to protect the system.