<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Updates on Omid Farhang</title><link>https://omid.dev/tags/updates/</link><description>Recent content in Updates on Omid Farhang</description><generator>Hugo -- 0.152.2</generator><language>en-US</language><copyright>2025 Omid Farhang | All rights reserved.</copyright><lastBuildDate>Thu, 25 Sep 2014 22:10:46 +0000</lastBuildDate><atom:link href="https://omid.dev/tags/updates/index.xml" rel="self" type="application/rss+xml"/><item><title>What you need to know about BERserk and Mozilla</title><link>https://omid.dev/2014/09/25/need-know-berserk-mozilla/</link><pubDate>Thu, 25 Sep 2014 22:10:46 +0000</pubDate><guid>https://omid.dev/2014/09/25/need-know-berserk-mozilla/</guid><description>&lt;p&gt;The &lt;strong&gt;Intel Security Advanced Threat Research Team&lt;/strong&gt; has discovered a critical signature forgery vulnerability in the &lt;strong&gt;Mozilla Network Security Services (NSS) crypto library&lt;/strong&gt; that could allow malicious parties to set up fraudulent sites masquerading as legitimate businesses and other organizations.&lt;/p&gt;
&lt;p&gt;The Mozilla NSS library, commonly utilized in the &lt;strong&gt;Firefox web browser, can also be found in Thunderbird, Seamonkey, and other Mozilla products.&lt;/strong&gt;  Dubbed &lt;strong&gt;“BERserk”&lt;/strong&gt;, this vulnerability allows for attackers to forge RSA signatures, thereby allowing for the bypass of authentication to websites utilizing SSL/TLS.  Given that certificates can be forged for any domain, this issue raises serious concerns around integrity and confidentiality as we traverse what we perceive to be secure websites.&lt;/p&gt;</description></item><item><title>Chrome 28 with new Blink engine and Rich Notifications</title><link>https://omid.dev/2013/07/10/chrome-28-with-new-blink-engine-and-rich-notifications/</link><pubDate>Wed, 10 Jul 2013 13:31:59 +0000</pubDate><guid>https://omid.dev/2013/07/10/chrome-28-with-new-blink-engine-and-rich-notifications/</guid><description>&lt;p&gt;Cross-posted from H-Online:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://omid.dev/images/2013/05/new-chrome-logo.png"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/05/new-chrome-logo.png" alt="new-chrome-logo" /&gt;
&lt;/a&gt;Google &lt;a href="http://googlechromereleases.blogspot.co.uk/2013/07/stable-channel-update.html"&gt;has released&lt;/a&gt; the stable version 28 of its Chrome browser. It is the first version to use the new &lt;a href="http://www.chromium.org/blink"&gt;Blink engine&lt;/a&gt; for rendering web pages and it appears that the new engine will allow web pages to be loaded about ten per cent faster. The developers say that the increased speed is also thanks to the new &lt;a href="https://groups.google.com/a/chromium.org/forum/#%21topic/chromium-dev/hBUVtg7gacE"&gt;threaded HTML parser&lt;/a&gt;, which frees up the JavaScript thread, allowing DOM content to be displayed faster. The HTML parser also takes fewer breaks, which is said to result in time savings of up to 40 per cent. Another contributor to the faster working speed is the optimized &lt;a href="https://code.google.com/p/v8/"&gt;V8&lt;/a&gt; JavaScript engine.&lt;/p&gt;</description></item><item><title>WordPress hardened with XSS, DoS and SSRF fixes</title><link>https://omid.dev/2013/06/25/wordpress-hardened-with-xss-dos-and-ssrf-fixes/</link><pubDate>Tue, 25 Jun 2013 10:57:44 +0000</pubDate><guid>https://omid.dev/2013/06/25/wordpress-hardened-with-xss-dos-and-ssrf-fixes/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/06/WordPress_grey_120.png"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/06/WordPress_grey_120.png" alt="WordPress" /&gt;
&lt;/a&gt;With the second security and maintenance release of WordPress 3.5, the developers of the popular open source blogging software have closed &lt;a href="http://core.trac.wordpress.org/query?status=closed&amp;amp;group=resolution&amp;amp;milestone=3.5.2"&gt;12 bugs&lt;/a&gt;, seven of them security issues. In their &lt;a href="http://wordpress.org/news/2013/06/wordpress-3-5-2/"&gt;announcement&lt;/a&gt;, the developers “strongly encourage” all users to update all their installations of the software to version 3.5.2 immediately. In addition to the fixed vulnerabilities, the new release also includes some proactive changes intended to harden the platform against attacks.&lt;/p&gt;</description></item><item><title>Symantec updates Norton 2013 range to v20.4</title><link>https://omid.dev/2013/06/19/symantec-updates-norton-2013-range-to-v20-4/</link><pubDate>Wed, 19 Jun 2013 09:41:51 +0000</pubDate><guid>https://omid.dev/2013/06/19/symantec-updates-norton-2013-range-to-v20-4/</guid><description>&lt;h3 id="nis-iconsymantec-has-updated-its-suite-of-windows-security-products-with-the-release-of-norton-antivirus-2013-v204-norton-internet-security-2013-v204-and-norton-360-2013-v204"&gt;&lt;a href="https://omid.dev/images/2013/06/NIS-e1371815807148.png"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/06/NIS-e1371815807148.png" alt="NIS Icon" /&gt;
&lt;/a&gt;Symantec has updated its suite of Windows security products with the release of Norton Antivirus 2013 v20.4, Norton Internet Security 2013 v20.4 and Norton 360 2013 v20.4.&lt;/h3&gt;
&lt;p&gt;Version 20.4 is primarily a bug-fix release, with some notable fixes, but also tweaks the user interface.&lt;/p&gt;
&lt;p&gt;One visible change for users who also have &lt;a href="https://omid.dev/en/knowledge-base/programs/malwarebytes-antimalware/"&gt;Malwarebytes Anti-Malware Free&lt;/a&gt; installed as additional protection is a fix that prevents Norton from blocking or flagging up MBAM as incompatible.&lt;/p&gt;</description></item><item><title>Apple closes QuickTime vulnerabilities on Windows</title><link>https://omid.dev/2013/05/23/apple-closes-quicktime-vulnerabilities-on-windows/</link><pubDate>Thu, 23 May 2013 20:01:51 +0000</pubDate><guid>https://omid.dev/2013/05/23/apple-closes-quicktime-vulnerabilities-on-windows/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/05/apple.jpg"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/05/apple.jpg" alt="apple" /&gt;
&lt;/a&gt;Apple has &lt;a href="http://prod.lists.apple.com/archives/security-announce/2013/May/msg00001.html"&gt;released&lt;/a&gt; a security update for its QuickTime media framework for Windows. Version 7.7.4 of the software closes 12 critical security holes causing memory corruption and buffer overflows when processing a number of media formats. The vulnerabilities affect Windows 7, Vista and XP SP2 or later and could be exploited to cause arbitrary code execution and application crashes.&lt;/p&gt;
&lt;p&gt;The vulnerabilities affected the playback of MP3, H.263, H.264, TeXML, JPEG, QTIF, Sorenson Video and FPX files as well as the handling of dref, enof and mvhd atoms within the program. All of the problems were reported by researchers working with HP&amp;rsquo;s Zero Day Initiative, five of them by Tom Gallagher and Paul Bates from Microsoft.&lt;/p&gt;</description></item><item><title>Ubuntu 13.04 Raring Ringtail is out, What's new?</title><link>https://omid.dev/2013/04/25/ubuntu-13-04-raring-ringtail-is-out-whats-new/</link><pubDate>Thu, 25 Apr 2013 19:39:43 +0000</pubDate><guid>https://omid.dev/2013/04/25/ubuntu-13-04-raring-ringtail-is-out-whats-new/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/04/ubuntu_rr.jpg"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/04/ubuntu_rr-300x191.jpg" alt="ubuntu_rr" /&gt;
&lt;/a&gt;Canonical has released Ubuntu 13.04 Raring Ringtail, most likely the last release of Ubuntu that will primarily cater for laptop and desktop users. For Ubuntu 13.04, Canonical focused on tightening up the core of the OS and  polishing the Unity interface in preparation for Ubuntu’s smartphone and tablet debut, which is slated to occur in October with the release of version 13.10. There’s also the usual slew of package updates, a new Linux kernel, and a couple of new features, too.&lt;/p&gt;</description></item><item><title>Microsoft patches the security update 2823324</title><link>https://omid.dev/2013/04/24/microsoft-patches-the-security-update-2823324/</link><pubDate>Wed, 24 Apr 2013 12:56:13 +0000</pubDate><guid>https://omid.dev/2013/04/24/microsoft-patches-the-security-update-2823324/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/04/windows-update3.jpg"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/04/windows-update3.jpg" alt="windows update[3]" /&gt;
&lt;/a&gt;Microsoft is making another attempt to close the privilege elevation hole in the NTFS filesystem&amp;rsquo;s kernel driver for Windows 7 and Server 2008, including R2. The new patch, &lt;a href="http://support.microsoft.com/kb/2840149"&gt;2840149&lt;/a&gt;, supersedes security update 2823324, which Microsoft released on its &lt;a href="http://www.h-online.com/news/item/Springtime-for-patches-Microsoft-9-Adobe-3-1838189.html" title="Springtime for patches: Microsoft 9 - Adobe 3 – 10 April 2013, 09:16"&gt;April Patch Tuesday&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;However, shortly after releasing it, the software giant had to &lt;a href="http://www.h-online.com/news/item/Microsoft-pulls-security-update-for-Windows-and-Windows-Server-1840815.html" title="Microsoft pulls security update for Windows and Windows Server – 12 April 2013, 10:52"&gt;recall&lt;/a&gt; the first update because it caused problems with various third-party programs; it crippled computers and triggered error messages. Kaspersky&amp;rsquo;s anti-virus programs also started acting up once the update was installed, erroneously assuming that they no longer had a valid licence and discontinuing operation. When re-releasing the update, Microsoft didn&amp;rsquo;t clarify whether this was the reason for the system malfunctioning.&lt;/p&gt;</description></item><item><title>Microsoft to plug holes in Windows Defender in Patch Tuesday</title><link>https://omid.dev/2013/04/05/microsoft-to-plug-holes-in-windows-defender-in-patch-tuesday/</link><pubDate>Fri, 05 Apr 2013 20:18:00 +0000</pubDate><guid>https://omid.dev/2013/04/05/microsoft-to-plug-holes-in-windows-defender-in-patch-tuesday/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/04/windows-update3.jpg"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/04/windows-update3.jpg" alt="windows update[3]" /&gt;
&lt;/a&gt;Microsoft&amp;rsquo;s Patch Tuesday on 9 April will be an important spring cleaning day; the company plans to implement &lt;a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-apr"&gt;nine security bulletins&lt;/a&gt;. One of the bulletins deals with vulnerabilities in Windows Defender for Windows 8 and RT; the hole is rated as important and can be exploited to achieve elevated privileges.&lt;/p&gt;
&lt;p&gt;The headline bulletins will be the two critical security holes, one of which affects all versions of Windows and Windows Server, and another critical vulnerability which can be found in all versions of Internet Explorer. Whether the Internet Explorer fix will be addressing the IE vulnerability revealed at the recent Pwn2Own contest is unclear though. Both critical holes allow for remote code execution.&lt;/p&gt;</description></item><item><title>Google updates all Chrome editions</title><link>https://omid.dev/2012/11/29/google-updates-all-chrome-editions/</link><pubDate>Thu, 29 Nov 2012 20:48:00 +0000</pubDate><guid>https://omid.dev/2012/11/29/google-updates-all-chrome-editions/</guid><description>&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-jf_RJKSlvmw/ULfDIl4eitI/AAAAAAAAHoY/ok_C5icwWyQ/s1600-h/new-chrome-logo%25255B2%25255D.png" target="_blank"&gt;&lt;img title="new-chrome-logo" border="0" alt="new-chrome-logo" align="right" src="http://lh6.ggpht.com/-JukPshaZbqU/ULfDLTK54XI/AAAAAAAAHog/ZK1LjYQppaQ/new-chrome-logo_thumb.png?imgmax=800" width="128" height="125" /&gt;&lt;/a&gt;h-online: Google has updated the Stable, Beta and Developer Channels of the desktop version of its Chrome browser with a number of bug fixes and improvements. The Stable Channel update closes seven security vulnerabilities, three of them rated High, and includes bug fixes. New stable Chrome versions for iOS and Android have also been released and include minor improvements. The iOS version of the browser now supports Apple&amp;rsquo;s Passbook application.&lt;/p&gt;</description></item><item><title>Firefox 16 re-released fixing multiple vulnerabilities</title><link>https://omid.dev/2012/10/12/firefox-16-re-released-fixing-multiple-vulnerabilities/</link><pubDate>Fri, 12 Oct 2012 11:39:00 +0000</pubDate><guid>https://omid.dev/2012/10/12/firefox-16-re-released-fixing-multiple-vulnerabilities/</guid><description>&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-Mi-4Pbjkj04/UHf6TXOfveI/AAAAAAAAHfg/9S8mO5R2x9Y/s1600-h/Mozilla_Firefox_cracked_bandaid_120%25255B2%25255D.png" target="_blank"&gt;&lt;img title="Mozilla_Firefox_cracked_bandaid_120" border="0" alt="Mozilla_Firefox_cracked_bandaid_120" align="right" src="http://lh3.ggpht.com/-Z8ssS5vSqH0/UHf6WfCGeqI/AAAAAAAAHfo/rWgWRa7vx0g/Mozilla_Firefox_cracked_bandaid_120_thumb.png?imgmax=800" width="120" height="120" /&gt;&lt;/a&gt;The H-Online: The latest version of Firefox, version 16, has returned to Mozilla&amp;rsquo;s servers with the release of Firefox 16.0.1 after the discovery of vulnerabilities caused the organization to remove the just-released open source web browser from circulation. Mozilla&amp;rsquo;s security &lt;a href="https://blog.mozilla.org/security/2012/10/10/security-vulnerability-in-firefox-16/"&gt;blog post&lt;/a&gt; described the problem as just that of a malicious web site being able to potentially determine the URLs and parameters used and suggested downgrading to Firefox 15.0.1, despite the &lt;a href="https://omid.dev/2012/10/mozilla-closes-numerous-critical-holes.html" target="_blank"&gt;numerous critical bugs fixed&lt;/a&gt; in Firefox 16.&lt;/p&gt;</description></item><item><title>Mozilla closes numerous critical holes in Firefox 16 [Update]</title><link>https://omid.dev/2012/10/12/mozilla-closes-numerous-critical-holes-in-firefox-16-update/</link><pubDate>Fri, 12 Oct 2012 11:35:00 +0000</pubDate><guid>https://omid.dev/2012/10/12/mozilla-closes-numerous-critical-holes-in-firefox-16-update/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-dAKceUABy4A/UHf5VBetdeI/AAAAAAAAHfQ/cgWxWK8mgNQ/s1600-h/moztrio%25255B2%25255D.png" target="_blank"&gt;&lt;img title="moztrio" border="0" alt="moztrio" align="right" src="http://lh5.ggpht.com/-gcSRB98Uovg/UHf5XrkfSxI/AAAAAAAAHfY/EYM8wRLPr-g/moztrio_thumb.png?imgmax=800" width="170" height="80" /&gt;&lt;/a&gt;The h-online: Following the recent Firefox 16 release, Mozilla has now detailed all of the security fixes in the new version of its open source web browser as well as in the Thunderbird news and email client. Version 2.13 of the SeaMonkey “all-in-one internet application suite” has also received fixes. In addition to adding new features, version 16.0 of Firefox closes a total of 14 security holes, 11 of which are rated as “Critical” by the project.&lt;/p&gt;</description></item><item><title>Microsoft's September Patch Tuesday closes important XSS holes</title><link>https://omid.dev/2012/09/12/microsofts-september-patch-tuesday-closes-important-xss-holes/</link><pubDate>Wed, 12 Sep 2012 19:27:00 +0000</pubDate><guid>https://omid.dev/2012/09/12/microsofts-september-patch-tuesday-closes-important-xss-holes/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-ZMGeRyOvRxA/UFDbAZR71yI/AAAAAAAAHbo/ao_SvXZuY1A/s1600-h/windows%252520update%25255B3%25255D.jpg" target="_blank"&gt;&lt;img title="windows update" border="0" alt="windows update" align="right" src="http://lh3.ggpht.com/-q6lLiDU5wLY/UFDbCTI9vsI/AAAAAAAAHbw/WcIc04ez6X8/windows%252520update_thumb%25255B5%25255D.jpg?imgmax=800" width="156" height="209" /&gt;&lt;/a&gt;h-online: On its September Patch Tuesday, Microsoft &lt;a href="http://blogs.technet.com/b/msrc/archive/2012/09/11/update-tuesday-overview-for-september-2012.aspx"&gt;released&lt;/a&gt; &lt;a href="http://technet.microsoft.com/en-us/security/bulletin/ms12-sep"&gt;two security updates&lt;/a&gt; that are rated as &lt;a href="http://technet.microsoft.com/en-US/security/gg309177"&gt;important&lt;/a&gt; and which close holes in &lt;a href="http://technet.microsoft.com/en-US/security/bulletin/ms12-061"&gt;Visual Studio Team Foundation Server 2010&lt;/a&gt; (TFS) and &lt;a href="http://technet.microsoft.com/en-US/security/bulletin/ms12-062"&gt;Systems Management Server 2003 and 2007&lt;/a&gt;. Both updates fix cross-site scripting (XSS) vulnerabilities in the web interfaces that allow attackers to execute arbitrary code in the victim&amp;rsquo;s browser.&lt;/p&gt;
&lt;p&gt;As the holes enable an attacker to access the web interfaces at the user&amp;rsquo;s privilege level, Microsoft has classified them as privilege escalation vulnerabilities. The company notes that, to its knowledge, neither of the holes is being actively exploited for attacks.&lt;/p&gt;</description></item><item><title>Symantec releases Norton 2013 security suites</title><link>https://omid.dev/2012/09/07/symantec-releases-norton-2013-security-suites/</link><pubDate>Fri, 07 Sep 2012 15:29:00 +0000</pubDate><guid>https://omid.dev/2012/09/07/symantec-releases-norton-2013-security-suites/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-_Ue0jCvK8cQ/UEoLsNDKH8I/AAAAAAAAHWQ/OlK97LYx0hc/s1600-h/Norton-Internet-Security-2013-600x450%25255B3%25255D.jpg" target="_blank"&gt;&lt;img title="Norton-Internet-Security-2013-600x450" border="0" alt="Norton-Internet-Security-2013-600x450" src="http://lh4.ggpht.com/-iKQi8DkF5gI/UEoLyXGoNaI/AAAAAAAAHWY/B570Q2NlJRY/Norton-Internet-Security-2013-600x450_thumb%25255B1%25255D.jpg?imgmax=800" width="500" height="375" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;BetaNews: Symantec has released brand new versions of its Norton security packages for Windows, Norton Anti-Virus 2013, Norton Internet Security 2013 and Norton 360 2013. It’s the first time all three packages have been updated simultaneously, while the branding has also been amended to remove all references to a date, simply naming each Norton Anti-Virus, Norton Internet Security and Norton 360, respectively.&lt;/p&gt;
&lt;p&gt;The 2013 versions come with what Symantec describes as “five layers of patented protection”, which include stronger social networking and anti-scam protection. There’s also full, certified support for Windows 8 and the promise of better performance on multi-core CPUs.&lt;/p&gt;</description></item><item><title>Oracle rushes out patch for critical 0-day Java exploit</title><link>https://omid.dev/2012/08/31/oracle-rushes-out-patch-for-critical-0-day-java-exploit/</link><pubDate>Fri, 31 Aug 2012 14:17:00 +0000</pubDate><guid>https://omid.dev/2012/08/31/oracle-rushes-out-patch-for-critical-0-day-java-exploit/</guid><description>&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-wPwb8KpcqAo/UEDAS4TObCI/AAAAAAAAHR4/xIkTWQH65oM/s1600-h/Java%25255B3%25255D.jpg" target="_blank"&gt;&lt;img title="Java" border="0" alt="Java" align="right" src="http://lh3.ggpht.com/--isUL_TW-Wc/UEDAU9yTz2I/AAAAAAAAHSA/DkthqbTP-iw/Java_thumb%25255B6%25255D.jpg?imgmax=800" width="170" height="300" /&gt;&lt;/a&gt;TheRegister: In an uncommon break with its thrice-annual security update schedule, Oracle has released a patch for three Java 7 security flaws that have recently been targeted by web-based exploits.&lt;/p&gt;
&lt;p&gt;“Due to the high severity of these vulnerabilities, Oracle recommends that customers apply this Security Alert as soon as possible,” Eric Maurice, the company&amp;rsquo;s director of software security assurance, said in a &lt;a href="https://blogs.oracle.com/security/entry/security_alert_for_cve_20121"&gt;blog post&lt;/a&gt; published on Thursday.&lt;/p&gt;
&lt;p&gt;Maurice said that the vulnerabilities patched only affect Java running in browsers, and not standalone desktop Java applications or Java running on servers. According to Oracle&amp;rsquo;s &lt;a href="http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"&gt;official advisory&lt;/a&gt; on the flaws:&lt;/p&gt;</description></item><item><title>Download Firefox 15 and Thunderbird 15!</title><link>https://omid.dev/2012/08/28/download-firefox-15-and-thunderbird-15/</link><pubDate>Tue, 28 Aug 2012 16:55:00 +0000</pubDate><guid>https://omid.dev/2012/08/28/download-firefox-15-and-thunderbird-15/</guid><description>&lt;p&gt;Cross-copied from &lt;a href="http://betanews.com/2012/08/28/download-firefox-15-and-thunderbird-15-now/" target="_blank"&gt;BetaNews&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-ZoPErUioMCk/UDzwx4iIvGI/AAAAAAAAHQU/GW5FEZuXKq4/s1600-h/Firefox-15%25255B5%25255D.jpg" target="_blank"&gt;&lt;img title="Firefox-15" border="0" alt="Firefox-15" src="http://lh3.ggpht.com/-_JKv3l5urpc/UDzw4AUagTI/AAAAAAAAHQc/2_55EkWK5sA/Firefox-15_thumb%25255B3%25255D.jpg?imgmax=800" width="500" height="382" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Mozilla has quietly placed major new versions of its open-source, cross-platform web browser and email client onto its download servers ahead of an official release.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.downloadcrew.com/article/24333-firefox"&gt;Firefox 15 FINAL&lt;/a&gt; benefits largely from behind-the-scenes performance tweaks, while &lt;a href="http://www.downloadcrew.com/article/24287-mozilla_thunderbird"&gt;Thunderbird 15 FINAL&lt;/a&gt; introduces a few new features, including a new curvy user interface.&lt;/p&gt;
&lt;p&gt;Firefox 15 FINAL’s most notable changes are performance-based. There’s faster startup on Windows PCs, plus incremental garbage collection and better management of plugins to prevent memory leaks. Other performance improvements surround WebGL enhancements.&lt;/p&gt;</description></item><item><title>Adobe Flash Player update patches six critical holes</title><link>https://omid.dev/2012/08/23/adobe-flash-player-update-patches-six-critical-holes/</link><pubDate>Thu, 23 Aug 2012 12:53:00 +0000</pubDate><guid>https://omid.dev/2012/08/23/adobe-flash-player-update-patches-six-critical-holes/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-cl4YyDO42hg/UDYgqworJcI/AAAAAAAAHJA/KjHVTTHAeAU/s1600-h/Adobe_Flash_120%25255B3%25255D.png" target="_blank"&gt;&lt;img title="Adobe_Flash_120" border="0" alt="Adobe_Flash_120" align="right" src="http://lh4.ggpht.com/-UBA2J9Xxfxs/UDYgs1MunfI/AAAAAAAAHJI/7Qq7qp--OU0/Adobe_Flash_120_thumb%25255B1%25255D.png?imgmax=800" width="124" height="124" /&gt;&lt;/a&gt;h-Online: Adobe has &lt;a href="http://blogs.adobe.com/psirt/2012/08/security-updates-available-for-adobe-flash-player-apsb12-19.html"&gt;released&lt;/a&gt; the second update for its Flash Player software in a week, this time for six critical vulnerabilities. Four of the issues addressed are problems with memory corruption that could lead to remote code execution; additionally, the update fixes an integer overflow vulnerability that could also lead to remote code execution. Another bug that was fixed is a cross-domain information leak. The problems exist in Flash Player 11.3.300.271 and earlier versions on Windows, Macintosh and Linux, and in the Android versions 11.1.115.11 (Android 4.0) and 11.1.111.10 (Android 3.x and 2.x) and earlier.&lt;/p&gt;</description></item><item><title>PostgreSQL patches XML flaws</title><link>https://omid.dev/2012/08/19/postgresql-patches-xml-flaws/</link><pubDate>Sun, 19 Aug 2012 08:51:00 +0000</pubDate><guid>https://omid.dev/2012/08/19/postgresql-patches-xml-flaws/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-_CvERcVioNM/UDCiAjUuQUI/AAAAAAAAG_k/BhHqmScL6wQ/s1600-h/PostgreSQL_Logo%25255B2%25255D.png" target="_blank"&gt;&lt;img title="PostgreSQL_Logo" border="0" alt="PostgreSQL_Logo" align="right" src="http://lh6.ggpht.com/-NQBd0Fjk1dQ/UDCiCi6_FMI/AAAAAAAAG_s/wB-EwOeaYfE/PostgreSQL_Logo_thumb.png?imgmax=800" width="150" height="117" /&gt;&lt;/a&gt;h-online: A flaw in the built-in XML functionality of &lt;a href="http://www.postgresql.org/"&gt;PostgreSQL&lt;/a&gt; (CVE-2012-3488) and another in its optional XSLT handling (CVE-2012-3489) have been patched, and the developers have &lt;a href="http://www.postgresql.org/about/news/1407/"&gt;released updated versions&lt;/a&gt; of the open source database with relevant fixes. The holes being patched are related to insecure use of the widely used libxml2 and libxslt open source libraries and the PostgreSQL developers advise anyone using those libraries to check their systems for similar problems.&lt;/p&gt;</description></item><item><title>IE 9.0.9 Available via Windows Update</title><link>https://omid.dev/2012/08/16/ie-9-0-9-available-via-windows-update/</link><pubDate>Thu, 16 Aug 2012 10:43:00 +0000</pubDate><guid>https://omid.dev/2012/08/16/ie-9-0-9-available-via-windows-update/</guid><description>&lt;p&gt;MSDN:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh3.ggpht.com/-qAYbwQpCauA/UCzH0B4SFII/AAAAAAAAG-E/k0aqdkRp0xk/s1600-h/internetexplorer9logo%25255B6%25255D.png" target="_blank"&gt;&lt;img title="internetexplorer9logo" border="0" alt="internetexplorer9logo" align="right" src="http://lh4.ggpht.com/-wS5QGPxrHGg/UCzH2Z-anWI/AAAAAAAAG-M/z7LXL4pwLDQ/internetexplorer9logo_thumb%25255B4%25255D.png?imgmax=800" width="178" height="184" /&gt;&lt;/a&gt;The &lt;a href="http://support.microsoft.com/kb/2722913"&gt;&lt;strong&gt;August 2012 Cumulative Security Update for Internet Explorer&lt;/strong&gt;&lt;/a&gt; is now available via &lt;a href="http://go.microsoft.com/fwlink/?LinkID=40747"&gt;&lt;strong&gt;Windows Update&lt;/strong&gt;&lt;/a&gt;. This security update resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows clients and Moderate for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows servers For more information, see the &lt;a href="http://technet.microsoft.com/en-us/security/bulletin/ms12-052"&gt;full bulletin&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Adobe Flash Player 11.3.300.270 for Windows released to address a crash</title><link>https://omid.dev/2012/08/03/adobe-flash-player-11-3-300-270-for-windows-released-to-address-a-crash/</link><pubDate>Fri, 03 Aug 2012 09:13:00 +0000</pubDate><guid>https://omid.dev/2012/08/03/adobe-flash-player-11-3-300-270-for-windows-released-to-address-a-crash/</guid><description>&lt;p&gt;Adobe wrote:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-_CrJFp4sO6k/UBuPL-gtLWI/AAAAAAAAG2k/LNOJO4JslDk/s1600-h/Adobe_Flash_120%25255B2%25255D.png" target="_blank"&gt;&lt;img title="Adobe_Flash_120" border="0" alt="Adobe_Flash_120" align="right" src="http://lh3.ggpht.com/-UPBOlKGRcXU/UBuPN588N1I/AAAAAAAAG2s/WtVU71xIp7E/Adobe_Flash_120_thumb.png?imgmax=800" width="120" height="120" /&gt;&lt;/a&gt;Today, Flash Player 11.3.300.270 for Windows was released to address a crash that was occurring in the Adobe Flash Player Update Service (FlashPlayerUpdateService.exe).  There are no other fixes or changes provided with this build.  This release is available for Windows only, and affects the Active X and Plug-in installers, uninstaller, and msi&amp;rsquo;s (available on the distribution page.)  No other platforms are affected.&lt;/p&gt;
&lt;p&gt;Please be aware that this release is not available from the Product Download Center (&lt;a href="http://get.adobe.com/flashplayer"&gt;http://get.adobe.com/flashplayer&lt;/a&gt;) which will continue to provide 11.3.300.268.  We realize that this might cause confusion for some users.  Due to the severity of this issue, we decided to make this build available immediately to help customers affected by this bug.  Due to logistical issues and time constraints, we were unable to update the release on the Product Download Center.  The next release of Flash Player will correct this disparity.  Please note that unless you have been affected by the FlashPlayerUpdateService.exe crash, both 11.3.300.270 and 11.3.300.268 will be functionally identical.&lt;/p&gt;</description></item><item><title>Chrome 21 arrives with new API for video and audio communication</title><link>https://omid.dev/2012/08/02/chrome-21-arrives-with-new-api-for-video-and-audio-communication/</link><pubDate>Thu, 02 Aug 2012 19:53:00 +0000</pubDate><guid>https://omid.dev/2012/08/02/chrome-21-arrives-with-new-api-for-video-and-audio-communication/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-2E06ei7wjEo/UBrTXKPuvtI/AAAAAAAAGxw/qomp-xpQ_pM/s1600-h/new-chrome-logo%25255B2%25255D.png"&gt;&lt;img loading="lazy" src="http://lh6.ggpht.com/-2EmMc9Ve3t4/UBrTZNd7lgI/AAAAAAAAGx4/Vu4J4XG059g/new-chrome-logo_thumb.png?imgmax=800" alt="new-chrome-logo" title="new-chrome-logo" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;h-online: With the &lt;a href="http://chrome.blogspot.com/2012/07/new-senses-for-web.html"&gt;release of Chrome 21&lt;/a&gt;, web applications can now directly access the local system&amp;rsquo;s built-in camera and microphone. Instead of requiring a special plugin, the major stable update to the WebKit-based web browser includes a new HTML5 &lt;code&gt;&amp;lt;a href=&amp;quot;http://www.html5rocks.com/en/tutorials/getusermedia/intro/&amp;quot;&amp;gt;getUserMedia&amp;lt;/a&amp;gt;&lt;/code&gt; API – currently a &lt;a href="http://dev.w3.org/2011/webrtc/editor/getusermedia.html"&gt;W3C Editor&amp;rsquo;s Draft&lt;/a&gt; – to provide web apps with access to the camera and microphone. For security purposes, users will be prompted to grant apps permission to access the hardware.&lt;/p&gt;</description></item></channel></rss>