![]() ![]() This is in response to issues where webmasters would use rudimentary and naïve input-restricting scripts in onkeypress handlers that would not take into account editing keys or navigation keys, causing issues for users trying to enter data into forms (and e.g. Pale Moon will no longer fire the keypress events in content when the key pressed is a non-printable key.Note that wildcards are ignored (according to the spec) when credentials are passed. Most importantly, Pale Moon now accepts wildcard entries ("*") for the CORS statements Access-Control-Expose-Headers, Access-Control-Allow-Headers and Access-Control-Allow-Method. CORS support has been updated to the current spec. ![]() UXP Mozilla security patch summary: 2 fixed, 1 DiD, 1 deferred, 25 not applicable.Security issues addressed: CVE-2022-45411 and potential issues without a CVE number.Fixed a buffer overflow for Mac builds.Updated Internationalization data for time zones.Removed unused but performance-impacting panning and tab animation measuring code.Fixed some small issues in the display and operation of the Web Developer tools. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |