Node.js 15.10.0 (64-bit) 軟體資訊介紹&下載

Autoruns for Windows,軟體教學,軟體下載,電腦問題,電腦教學
此實用程序具有關於任何啟動監視器的自動啟動位置最全面的知識,可顯示在系統啟動或登錄期間將配置哪些程序配置為運行,並按照 Windows 處理它們的順序顯示條目。這些程序包括啟動文件夾中的 Run,RunOnce 和其他註冊表項。您可以配置 Autoruns for Windows 以顯示其他位置,包括資源管理器外殼擴展,工具欄,瀏覽器幫助程序對象,Winlogon 通知,自動啟動服務等等。 Autoruns 遠遠超出了與 Windows Me 和 XP 捆綁在一起的 MSConfig 實用程序.

Autoruns“隱藏已簽名的 Microsoft 條目”選項可幫助您放大已添加到系統中的第三方自動啟動圖像,並支持查看自動 - 為系統上配置的其他帳戶啟動映像。下載包中還包含一個可以以 CSV 格式輸出的等效命令行 Autorunsc。您可能會驚訝於有多少可執行文件自動啟動!

Autoruns for Windows Screenshot 1
Autoruns for Windows Screenshot 2
Autoruns for Windows Screenshot 3

Node.js 15.10.0 (64-bit)

node-v15.10.0-x64.msi

Windows XP / Vista / Windows 7 / Windows 8 / Windows 10 / XP64 / Vista64 / Windows 7 64 / Windows 8 64 / Windows 10 64

免費軟體

Microsoft SysInternals

http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx

2021-02-24

What's new in this version:

Fixed:
- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
- CVE-2021-22884: DNS rebinding in --inspect
Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
This is a vulnerability in OpenSSL which may be exploited through Node.js

Autoruns for Windows 相關參考資料