Mirillis Action! 歷史版本列表 Page37

最新版本 Ryujinx 1.1.1188

Mirillis Action! 歷史版本列表

Mirillis Action! 允許在一流的高清視頻質量的 Windows 桌面流媒體和實時錄製。隨著行動!您可以錄製和流式傳輸您的遊戲玩法,網絡播放器視頻,錄製音樂,截取屏幕截圖,遠程訪問您的 PC,使用 Android 設備玩 PC 遊戲等等。下載 Mirillis Action! 用於 Windows 的脫機安裝程序安裝.以 HD 格式記錄遊戲。基準遊戲性能.行動!出色的性能和 GPU 利... Mirillis Action! 軟體介紹


Node.js 15.12.0 (64-bit) 查看版本資訊

更新時間:2021-03-18
更新細節:

What's new in this version:

crypto:
- add optional callback to crypto.sign and crypto.verify
- support JWK objects in create*Key

deps:
- switch openssl to quictls/openssl
- update to [email protected]

fs:
- improve fsPromises writeFile performance
- improve fsPromises readFile performance

lib:
- implement AbortSignal.abort()

node-api:
- define version 8

worker:
- add setEnvironmentData/getEnvironmentData

Streamlabs OBS 1.0.2 查看版本資訊

更新時間:2021-03-12
更新細節:

Opera GX 73.0.3856.415 (64-bit) 查看版本資訊

更新時間:2021-03-11
更新細節:

Streamlabs OBS 1.0.1 查看版本資訊

更新時間:2021-03-11
更新細節:

Opera GX 73.0.3856.414 (64-bit) 查看版本資訊

更新時間:2021-03-10
更新細節:

Opera GX 73.0.3856.408 (64-bit) 查看版本資訊

更新時間:2021-03-04
更新細節:

Mirillis Action! 4.16.0 查看版本資訊

更新時間:2021-03-04
更新細節:

Node.js 15.11.0 (64-bit) 查看版本資訊

更新時間:2021-03-03
更新細節:

What's new in this version:

- crypto: make FIPS related options always awailable
- errors: remove experimental from --enable-source-maps

Node.js 15.10.0 (64-bit) 查看版本資訊

更新時間:2021-02-24
更新細節:

What's new in this version:

Fixed:
- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
- CVE-2021-22884: DNS rebinding in --inspect
Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
This is a vulnerability in OpenSSL which may be exploited through Node.js

Node.js 15.9.0 (64-bit) 查看版本資訊

更新時間:2021-02-18
更新細節:

What's new in this version:

Changed:
crypto:
- add keyObject.export() 'jwk' format option

deps:
- upgrade to libuv 1.41.0

doc:
- add dmabupt to collaborators
- refactor fs docs structure

fs:
- add fsPromises.watch()
- use a default callback for fs.close()
- add AbortSignal support to watch

perf_hooks:
- introduce createHistogram

stream:
- improve Readable.from error handling

timers:
- introduce setInterval async iterator

tls:
- add ability to get cert/peer cert as X509Certificate object