Everything posted by 大†Shinegumi†大
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 86.0.4240.80 update
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
81.0.2 update
-
Adobe Flash Player 32.0.0.453 Silent
[b]Adobe Flash Player 32.0.0.445 update[/b]
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
[b] Mozilla Firefox 81.0.1 update[/b]
-
Brave Browser 1.73.105 AIO Silent
Brave Browser is a free, fast, secure and open source web browsing application based on the Chromium and available for your all devices. Complete with a built-in ad blocker that prevents tracking and provides security protection with optimized data and battery performance. The Brave is much more than a web browser, it is a new way of thinking about how the web works. Brave is on a mission to fix the web by giving users a safer, faster and better browsing experience while growing support for content creators through a new attention-based ecosystem of rewards. Brave is built by a team of privacy focused, performance oriented pioneers of the web, including the inventor of JavaScript and co-founder of Mozilla. It begins with giving you back power. Get unmatched speed, security and privacy by blocking trackers. Earn rewards by opting into our privacy-respecting ads and help give publishers back their fair share of Internet revenue. Browse Faster – Load pages 3x to 6x faster Watch Brave in action, head-to-head-to-head against Chrome and Firefox. Brave loads pages three times as fast out of the box with nothing to install, learn or manage. Switching is easy – Import and continue where you left off It’s easy to import your settings from your old browser. You can do it during the welcome tour or later through the menus. All of your old browser profiles will appear in a list. You can import other browser data through the main menu item called “Import Bookmarks and Settings.” Support your favorite sites with Brave Rewards Turn on Brave Rewards and give a little back to the sites you frequent most. Earn frequent flyer-like tokens (BAT) for viewing privacy-respecting ads through Brave and help fund the content you love. Browsing the web with Brave is free: with Brave Rewards activated, you can support the content creators you love at the amount that works for you. The browser can automatically distribute your contributions based on how much time you spend on sites. Or, you can choose to tip sites directly, and even offer a fixed monthly tip amount. All of this works while keeping your browsing history private. Your funds are made available to site owners through an anonymous ledger system, so you can’t be identified based on the sites you visit and support. Over 10,000 publishers and content creators have registered to receive Brave Rewards. Remember: these contributions are optional – browsing the web with Brave Browser is free. Brave Browser Feature List: Shields Ad blocking Fingerprinting prevention Cookie control HTTPS upgrading Block scripts Per-site shield settings Configurable global shield defaults Brave Rewards Earn by viewing private ads Tip your favorite creators Contribute monthly to sites Auto-contribute to sites Verify with Uphold and move funds in and out of your wallet Become a verified creator and start earning BAT from tips, contributions and referrals Tabs and Windows Private Windows Pinned Tabs Auto-unload Drag and drop Duplicate Close Options Find on page Print page Security Clear browsing data Built-in password manager Form autofill Control content access to full-screen presentation Control site access to autoplay media Send “Do not track” with browsing requests Search Choose default search engine Use keyboard shortcuts for alternate search engines Option to use DuckDuckGo for private window search Address Bar Add Bookmark Autosuggest URLs Search from address bar Autosuggest search terms Show/hide bookmarks toolbar Show secure or insecure site Extensions and Plugins Brave Desktop now supports most of the Chrome extensions in the chrome web store Windows 7/8/10 Silent installation Silent installation X64 X86 Silent installation X64 X86 G
-
Adobe Acrobat Reader DC 2022.003.20322 Install Silent
uodate
-
K-Lite Codec Pack Full 18.8.0 Silent Install
Notes: 1- youtube-dl.exe included to run video URLs 2- Disabled check for updates 3- Enabled Dark Theme 4- Enabled playback ability in the preview pane of Explorer 5- Command line switches: Auto install with Progress Only "/SILENT" Or Completely Silent "/VERYSILENT" 6- Enjoy! K-Lite Codec Pack Full 18.8.0 Silent Install Silent installation Silent installation
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
[b]Mozilla Firefox 81 update[/b]
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 85.0.4183.121 update
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 85.0.4183.121 update
-
Format Factory 5.20.0 (x64) Multilingual Silent
Format Factory 5.4.5.1
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 85.0.4183.102 update
-
Adobe Flash Player 32.0.0.453 Silent
Adobe Flash Player 32.0.0.433 update
-
Skype Desktop PC 8.136.0.203 Silent [Multi/Ru]
Skype 8.64.0.78 update
-
VirtualBox 6.1.14 Build 140239 Silent
VirtualBox is an application installed on an existing host OS; Within this application, Additional operating systems can be loaded and run, each with its own virtual environment. For example, Multiple Linux distributions can be hosted on a single Windows XP machine; Likewise, XP and Vista It can run on a Linux machine etc. There is free for personal Or the review uses a proprietary version and the GNU General Public version VirtualBox 6.1.14 Build 140239 Silent
-
Format Factory 5.20.0 (x64) Multilingual Silent
Old 32Bit Version: http://public.pcfreetime.com/FFSetup4.10.5.0.exe
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
Mozilla Firefox 80.0.1 update
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Correcciones de seguridad Chrome 85 implementa 20 correcciones de seguridad. Investigadores externos encontraron lo siguiente: [$ N / A] [ 1109120 ] Alto CVE-2020-6558: Cumplimiento de políticas insuficiente en iOS. Reportado por Alison Huffman, Microsoft Browser Vulnerability Research el 2020-07-24 [$ TBD] [ 1116706 ] Alto CVE-2020-6559: usar después de la API gratuita en la presentación. Reportado por Liu Wei y Wu Zekai de Tencent Security Xuanwu Lab el 2020-08-15 [$ 5000] [ 1108181 ] Medio CVE-2020-6560: Cumplimiento de políticas insuficiente en la función de autocompletar. Reportado por Nadja Ungethuem de www.unnex.de el 2020-07-22 [$ 1000] [ 932892 ] Medio CVE-2020-6561: Implementación inapropiada en la Política de seguridad de contenido. Reportado por Rob Wu el 2019-02-16 [$ 1000] [ 1086845 ] Medio CVE-2020-6562: Cumplimiento de políticas insuficiente en Blink. Reportado por Masato Kinugawa el 2020-05-27 [$ 1000] [ 1104628 ] Medio CVE-2020-6563: Cumplimiento de políticas insuficiente en el manejo de intenciones. Reportado por Pedro Oliveira el 2020-07-12 [$ 500] [ 841622 ] Medio CVE-2020-6564: IU de seguridad incorrecta en los permisos. Reportado por Khalil Zhani el 2018-05-10 [$ 500] [ 1029907 ] Medio CVE-2020-6565: IU de seguridad incorrecta en Omnibox. Reportado por Khalil Zhani el 2019-12-02 [$ N / A] [ 1065264 ] Medio CVE-2020-6566: Cumplimiento de políticas insuficiente en los medios. Reportado por Jun Kokatsu, Microsoft Browser Vulnerability Research el 2020-03-27 [$ 500] [ 937179 ] Bajo CVE-2020-6567: validación insuficiente de la entrada no confiable en el manejo de la línea de comandos. Reportado por Joshua Graham de TSS el 2019-03-01 [$ 500] [ 1092451 ] CVE-2020-6568 bajo: Cumplimiento de políticas insuficiente en el manejo de intenciones. Informado por Yongke Wang (@Rudykewang) y Aryb1n (@ aryb1n) de Tencent Security Xuanwu Lab (Tencent Security Xuanwu Lab) el 2020-06 -08 [$ N / A] [ 995732 ] Bajo CVE-2020-6569: Desbordamiento de enteros en WebUSB. Reportado por guaixiaomei el 2019-08-20 [$ N / A] [ 1084699 ] Bajo CVE-2020-6570: Fuga de información de canal lateral en WebRTC. Reportado por Signal / Tenable el 2020-05-19 [$ N / A] [ 1085315 ] CVE-2020-6571 bajo: IU de seguridad incorrecta en el cuadro multifunción. Reportado por Rayyan Bijoora el 2020-05-21 [ 1121299 ] Varias correcciones de auditorías internas, fuzzing y otras iniciativas Por lo tanto, Google gastó al menos $ 10,000 en recompensas por errores para esta versión, una pequeña cantidad en comparación con su gasto habitual. Como siempre, las correcciones de seguridad por sí solas deberían ser un incentivo suficiente para que actualice.
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
Mozilla Firefox 80.0 update
-
Adobe Acrobat Reader DC 2022.003.20322 Install Silent
Password: damas
-
Adobe Acrobat Reader DC 2022.003.20322 Install Silent
.: Installation Notes:. # Old Versions Are Cleaned Before Installation. # Initial Auto Starts and Services Removed. Storage of Setup Files has been removed. Agreements Come Accepted. # Product Improvement, Digital Edition Help, Acrobat.Com Access Closed. # All Updates Closed. Update Service is Disabled. # Wait Until Information About the Installation Is Given… Download: Password: damas Silent installation x64 x86
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 84.0.4147.135 update
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
Google Chrome 84.0.4147.125 update
-
Mozilla Firefox 105.0.3 Aio Silent Arabic/English/French
https://www.mozilla.org/en-US/firefox/79.0/releasenotes/
-
Google Chrome 108.0.5359.125 Dual x86x64 Silent
This update includes 38 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information. [$TBD][1103195] Critical CVE-2020-6510: Heap buffer overflow in background fetch. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-07-08 [$5000][1074317] High CVE-2020-6511: Side-channel information leakage in content security policy. Reported by Mikhail Oblozhikhin on 2020-04-24 [$5000][1084820] High CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu of WeChat Open Platform Security Team on 2020-05-20 [$2000][1091404] High CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar Nikolic of Cisco Talos on 2020-06-04 [$TBD][1076703] High CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2020-04-30 [$TBD][1082755] High CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA on 2020-05-14 [$TBD][1092449] High CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang of Tencent's Xuanwu Lab (xlab.tencent.com) on 2020-06-08 [$TBD][1095560] High CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu (@hellowuzekai) of Tencent Security Xuanwu Lab on 2020-06-16 [$3000][986051] Medium CVE-2020-6518: Use after free in developer tools. Reported by David Erceg on 2019-07-20 [$3000][1064676] Medium CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman (@WeizmanGal) of PerimeterX on 2020-03-25 [$1000][1092274] Medium CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-08 [$500][1075734] Medium CVE-2020-6521: Side-channel information leakage in autofill. Reported by Xu Lin (University of Illinois at Chicago), Panagiotis Ilia (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago) on 2020-04-27 [$TBD][1052093] Medium CVE-2020-6522: Inappropriate implementation in external protocol handlers. Reported by Eric Lawrence of Microsoft on 2020-02-13 [$N/A][1080481] Medium CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu Lab on 2020-05-08 [$N/A][1081722] Medium CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta (@Mipu94) of SEFCOM Lab, Arizona State University on 2020-05-12 [$N/A][1091670] Medium CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-05 [$1000][1074340] Low CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported by Jonathan Kingston on 2020-04-24 [$500][992698] Low CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong Zhaochen of andsecurity.cn on 2019-08-10 [$500][1063690] Low CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan Bijoora on 2020-03-22 [$N/A][978779] Low CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by kaustubhvats7 on 2019-06-26 [$N/A][1016278] Low CVE-2020-6530: Out of bounds memory access in developer tools. Reported by myvyang on 2019-10-21 [$TBD][1042986] Low CVE-2020-6531: Side-channel information leakage in scroll to text. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-01-17 [$N/A][1069964] Low CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen @ SeraphicAlgorithms on 2020-04-11 [$N/A][1072412] Low CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous on 2020-04-20 [$TBD][1073409] Low CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-04-22 [$TBD][1080934] Low CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng of Tencent security platform department on 2020-05-09 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. As usual, our ongoing internal security work was responsible for a wide range of fixes: [1105224] Various fixes from internal audits, fuzzing and other initiatives