Monday, September 28, 2015

Pale Moon 25.7.1 (64-bit)

Pale Moon 25.7.1 (64-bit) description:

  • System requirements:

    Windows XP64 / Vista64 / Windows 7 64 / Windows 8 64 / Windows 10

  • User Rating:

    Click to vote
  • Product by / Product:

    Moonchild Productions / Pale Moon (64-bit)

  • Old Versions:

  • Filename:

    palemoon-25.7.1.win64.installer.exe

  • MD5 Checksum:

    0cbf2cd060697a6cfe2e0e375449e67b

Pale Moon is an Open Source, Firefox-based web browser available for Microsoft Windows, Android and Linux (with other operating systems in development), focusing on efficiency and ease of use. Make sure to get the most out of your browser!

Pale Moon offers you a browsing experience in a browser completely built from its own source with carefully selected features and optimizations to maximize the browser's speed, stability and user experience, while maintaining compatibility with thousands of Firefox extensions many have come to love and rely on.

Pale Moon Features:

  • Optimized for modern processors
  • Safe: forked from Firefox and regularly updated.
  • Supported by a friendly, active community of users
  • Familiar, efficient, fully customizable interface
  • Smooth and speedy page drawing and script processing
  • Increased stability: experience fewer browser crashes
  • Support for many Firefox extensions (add-ons) and themes
  • New: support for Pale Moon exclusive extensions and themes
  • Extensive and growing support for HTML5 and CSS3
  • Many customization and configuration options
  • Able to import existing Firefox profiles with the migration tool



Pale Moon 25.7.1 (64-bit) Download for Windows / Change Log / FileHorse.com

Speed-optimized version of Firefox designed for the best possible performance

Pale Moon (64-bit)
Download Pale Moon 25.7.1 (64-bit)

Pale Moon 25.7.1 (64-bit)

 -  100% Safe  -  Open Source

What's new in this version:

This is a security, stability and web-compatibility update. This also marks a security update for the Android version of Pale Moon to keep users of the otherwise currently unmaintained OS updated regarding known security vulnerabilities.

Fixes/changes:
- Code cleanup: Removed the majority of remaining telemetry code (including the data reporting back-end and health report) to prevent a few issues with partially removed code in earlier versions.
- Fixed a crash due to handling of bogus URIs passed to CSS style filters (e.g. whatsapp's web interface).
- Permitted spec-breaking syntax in Regex character classes, allowing ranges that would be permitted per the grammar rules in the spec but not necessarily following the syntax rules. This impacts a good number of (also higher profile) sites that use invalid ranges in regular expressions (e.g. Cisco's networking academy site, Yahoo Fantasy Football).
- Fixed a crash due to the newly introduced WASA PI handl ing of audio channel mapping that doesn't like actual surround hardware setups (e.g. playing a video with quadraphonic audio on a 4-speaker setup).
- Fixed an issue where site-specific dictionary selections would be written to content preferences without the user's action, potentially overwriting or clearing a previously-chosen dictionary.
- Added support for drag and drop of local files from sources which use text/uri-lists. (Some Linux flavors/file managers)
- Updated libnestegg to the most current version.
- Fixed an issue where setting the location to an empty string could cause a reload loop.

Security fixes:
- Changed the jemalloc poison address to something that is not a NOP-slide. DiD
- Fixed a memory safety hazard in ConvertDialogOptions (CVE-2015-4521)
- Fixed a buffer overflow/crash hazard in the VertexBufferInterface::reserveVertexSpace function in libGLES in ANGLE (CVE-2015-7179)
- Fixed an overflow/crash hazard in the X ULContentSinkImpl::AddText function (CVE-2015-7175)
- Fixed a stack buffer overread hazard in the ICC v4 profile parser (CVE-2015-4504)
- Fixed an HTMLVideoElement Use-After-Free Remote Code Execution 0-day vulnerability (ZDI-CAN-3176) (CVE-2015-4509)
- Fixed a potentially exploitable crash in nsXBLService::GetBinding
- Fixed a memory safety hazard in nsAttrAndChildArray::GrowBy (CVE-2015-7174)
- Fixed a memory safety hazard for callers of nsUnicodeToUTF8::GetMaxLength (CVE-2015-4522)
- Fixed a heap buffer overflow/crash hazard caused by invalid WebM headers (CVE-2015-4511)

No comments:

Post a Comment