Brave Browser (64-bit)

最新版本 cURL 7.84.0

cURL 7.84.0

cURL 7.84.0
新的勇敢的瀏覽器 64 位自動阻止廣告和跟踪器,使其比目前的瀏覽器更快,更安全。除了真實的內容,一切頁面的加載速度都是驚人的。最多 60%的網頁加載時間是由每次在您最喜歡的新聞網站上打開頁面時加載到各個位置的基礎廣告技術引起的。其中 20%的時間花在加載試圖了解更多關於你的東西上。下載勇敢的瀏覽器 64 位脫機安裝程序安裝程序!

Brave 底層是一個基於 Chromium 的網絡瀏覽器,這意味著它的性能和網絡兼容性是非常相似的基於 Chromium 的其他瀏覽器.

Brave 瀏覽器功能:

Browse 更快 61225896Brave 塊跟踪和侵入性的廣告,可以放慢你在網絡上.

瀏覽更安全
Brave 64 位讓你和你的信息更安全,有效地屏蔽你從第三方跟踪和 malletin.

Browse Better
With 勇敢,你可以選擇是否看到廣告,尊重您的隱私或支付網站直接。無論哪種方式,您都可以在幫助資助內容創作者方面感覺良好.

阻止有害的廣告
在城裡有一個新的廣告遊戲。這就是所謂的“惡意廣告”。最新的展示廣告技術可以在您不知情的情況下在您的筆記本電腦上安裝惡意程但不能與勇敢的看著你的後背.

Brave 將網站重定向到 HTTPS
“我們已經將 HTTPS Everywhere 集成到每個勇敢的瀏覽器中,以確保您始終將您的位移到最安全的管道。下載勇敢的瀏覽器 64 位離線安裝程序安裝程序!

阻止塊跟踪像素和跟踪 Cookie
您是否曾經有過這樣的感覺,即當您看到某個廣告前幾天購買了某個東西時,有人在註視著您?當您在網上購物並瀏覽您最喜愛的網站時,我們確保您沒有被追踪.

也可用:下載 Brave Browser for Mac

ScreenShot

軟體資訊
檔案版本 cURL 7.84.0

檔案名稱 curl-7.84.0.zip
檔案大小
系統 Windows 7 64 / Windows 8 64 / Windows 10 64
軟體類型 開源軟體
作者 Brave Software Inc.
官網 https://www.brave.com
更新日期 2022-06-27
更新日誌

What's new in this version:

Changed:
- curl: add --rate to set max request rate per time unit
- curl: deprecate --random-file and --egd-file
- curl_version_info: add CURL_VERSION_THREADSAFE
- CURLINFO_CAPATH/CAINFO: get the default CA paths from libcurl
- lib: make curl_global_init() threadsafe when possible
- libssh2: add CURLOPT_SSH_HOSTKEYFUNCTION
- opts: deprecate RANDOM_FILE and EGDSOCKET
- socks: support unix sockets for socks proxy

Fixed:
- aws-sigv4: fix potentional NULL pointer arithmetic
- bindlocal: don't use a random port if port number would wrap
- c-hyper: mark status line as status for Curl_client_write()
- ci: avoid `cmake -Hpath`
- CI: bump FreeBSD 13.0 to 13.1
- ci: update github actions
- cmake: add libpsl support
- cmake: do not add libcurl.rc to the static libcurl library
- cmake: enable curl.rc for all Windows targets
- cmake: fix detecting libidn2
- cmake: support adding a suffix to the OS value
- configure: skip libidn2 detection when winidn is used
- configure: use the SED value to invoke sed
- configure: warn about rustls being experimental
- content_encoding: return error on too many compression steps
- cookie: address secure domain overlay
- cookie: apply limits
- copyright.pl: parse and use .reuse/dep5 for skips
- copyright: make repository REUSE compliant
- curl.1: add a few see also --tls-max
- curl.1: mention exit code zero too
- curl: re-enable --no-remote-name
- curl_easy_pause.3: remove explanation of progress function
- curl_getdate.3: document that some illegal dates pass through
- Curl_parsenetrc: don't access local pwbuf outside of scope
- curl_url_set.3: clarify by default using known schemes only
- CURLOPT_ALTSVC.3: document the file format
- CURLOPT_FILETIME.3: fix the protocols this works with
- CURLOPT_HTTPHEADER.3: improve comment in example
- CURLOPT_NETRC.3: document the .netrc file format
- CURLOPT_PORT.3: We discourage using this option
- CURLOPT_RANGE.3: remove ranged upload advice
- digest: added detection of more syntax error in server headers
- digest: tolerate missing "realm"
- digest: unquote realm and nonce before processing
- DISABLED: disable 1021 for hyper again
- docs/cmdline-opts: add copyright and license identifier to each file
- docs/CONTRIBUTE.md: document the 'needs-votes' concept
- docs: clarify data replacement policy for MIME API
- doh: remove UNITTEST macro definition
- examples/crawler.c: use the curl license
- examples: remove fopen.c and rtsp.c
- FAQ: Clarify Windows double quote usage
- fopen: add Curl_fopen() for better overwriting of files
- ftp: restore protocol state after http proxy CONNECT
- ftp: when failing to do a secure GSSAPI login, fail hard
- GHA/hyper: enable debug in the build
- gssapi: improve handling of errors from gss_display_status
- gssapi: initialize gss_buffer_desc strings
- headers api: remove EXPERIMENTAL tag
- http2: always debug print stream id in decimal with %u
- http2: reject overly many push-promise headers
- http: restore header folding behavior
- hyper: use 'alt-used'
- krb5: return error properly on decode errors
- lib: make more protocol specific struct fields #ifdefed
- libcurl-security.3: add "Secrets in memory"
- libcurl-security.3: document CRLF header injection
- libssh: skip the fake-close when libssh does the right thing
- links: update dead links to the curl-wiki
- log2changes: do not indent empty lines [ci skip]
- macos9: remove partial support
- Makefile.am: fix portability issues
- Makefile.m32: delete obsolete options, improve -On [ci skip]
- Makefile.m32: delete two obsolete OpenSSL options [ci skip]
- Makefile.m32: stop forcing XP target with ipv6 enabled [ci skip]
- max-time.d: clarify max-time sets max transfer time
- mprintf: ignore clang non-literal format string
- netrc: check %USERPROFILE% as well on Windows
- netrc: support quoted strings
- ngtcp2: allow curl to send larger UDP datagrams
- ngtcp2: correct use of ngtcp2 and nghttp3 signed integer types
- ngtcp2: enable Linux GSO
- ngtcp2: extend QUIC transport parameters buffer
- ngtcp2: fix alert_read_func return value
- ngtcp2: fix typo in preprocessor condition
- ngtcp2: handle error from ngtcp2_conn_submit_crypto_data
- ngtcp2: send appropriate connection close error code
- ngtcp2: support boringssl crypto backend
- ngtcp2: use helper funcs to simplify TLS handshake integration
- ntlm: provide a fixed fake host name
- projects: fix third-party SSL library build paths for Visual Studio
- quic: add Curl_quic_idle
- quiche: support ca-fallback
- rand: stop detecting /dev/urandom in cross-builds
- remote-name.d: mention --output-dir
- runtests.pl: add the --repeat parameter to the --help output
- runtests: fix skipping tests not done event-based
- runtests: skip starting the ssh server if user name is lacking
- scripts/copyright.pl: fix the exclusion to not ignore man pages
- sectransp: check for a function defined when __BLOCKS__ is undefined
- select: return error from "lethal" poll/select errors
- server/sws: support spaces in the HTTP request path
- speed-limit/time.d: mention these affect transfers in either direction
- strcase: some optimisations
- test 2081: add a valid reply for the second request
- test 675: add missing CR so the test passes when run through Privoxy
- test414: add the '--resolve' keyword
- test681: verify --no-remote-name
- tests 266, 116 and 1540: add a small write delay
- tests/data/test1501: kill ftp server after slow LIST response
- tests/getpart: fix getpartattr to work with "data" and "data2"
- tests/server/sws.c: change the HTTP writedelay unit to milliseconds
- test{440,441,493,977}: add "HTTP proxy" keywords
- tool_getparam: fix --parallel-max maximum value constraint
- tool_operate: make sure --fail-with-body works with --retry
- transfer: fix potential NULL pointer dereference
- transfer: maintain --path-as-is after redirects
- transfer: upload performance; avoid tiny send
- url: free old conn better on reuse
- url: remove redundant #ifdefs in allocate_conn()
- url: URL encode the path when extracted, if spaces were set
- urlapi: make curl_url_set(url, CURLUPART_URL, NULL, 0) clear all parts
- urlapi: support CURLU_URLENCODE for curl_url_get()
- urldata: reduce size of a few struct fields
- urldata: remove three unused booleans from struct UserDefined
- urldata: store tcp_keepidle and tcp_keepintvl as ints
- version: allow stricmp() for sorting the feature list
- vtls: make curl_global_sslset thread-safe
- wolfssh.h: removed
- wolfssl: correct the failf() message when a handle can't be made
- wolfSSL: explicitly use compatibility layer
- x509asn1: mark msnprintf return as unchecked

cURL 7.84.0 相關參考資料
Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039) for ...

2023年10月10日 — Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039) for Windows 10 and Windows 11 OS ... Tenable Vulnerability scanner is detectong a CURL vulnerable ...

https://learn.microsoft.com

cURL 7.84.0

沒有這個頁面的資訊。

https://github.com

Curl 7.84.0 <= 8.4.0 資訊洩漏(CVE-2023-46219)

2024年1月10日 — 概要. 遠端Windows 主機上的一個程式受到資訊洩漏弱點的影響。 說明. 遠端主機上安裝的Curl 版本介於7.84.0 和8.4.0 之間。因此受到資訊洩漏弱點的 ...

https://zh-tw.tenable.com

Curl 7.84.0 <= 8.4.0 資訊洩漏(CVE-2023-46219) 變更記錄

2024年1月10日 — 遠端Windows 主機上的一個程式受到資訊洩漏弱點的影響。 (Nessus Plugin ID 187726)

https://zh-tw.tenable.com

curl 7.84.0 with Daniel Stenberg

https://www.youtube.com

Curl Arbitrary File Write 7.x >= 7.84.0 8.x <= 8.1.2 (CVE- ...

2023年8月1日 — Hi everyone, Nessus found a vulnerability with curl. It looks like Windows Server 2019 uses version 8.0.1 which is vulnerable.

https://learn.microsoft.com

cURL-7.84.0

The cURL package contains an utility and a library used for transferring files with URL syntax to any of the following protocols: FTP, FTPS, HTTP, HTTPS, SCP, ...

https://www.linuxfromscratch.o

Releases · curlcurl

A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, ...

https://github.com

Vulnerabilities in curl 7.84.0

2022年6月27日 — curl version 7.84.0 was released on June 27 2022. The following 24 security problems are known to exist in this version.

https://curl.se

[RELEASE] curl 7.84.0

2022年6月27日 — Hello friends, I'm happy to announce that curl 7.84.0 has been packaged, signed and uploaded. Avaiable at https://curl.se/ as always. ... special ...

https://curl.se