Cookie Consent by Free Privacy Policy Generator 📌 New in Chrome 106

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 New in Chrome 106


💡 Newskategorie: Programmierung
🔗 Quelle: developer.chrome.com

Here's what you need to know:

  • There are new Intl APIs to give you more control when formatting numbers.
  • There’s an origin trial for the Pop-up API to make it easy to surface critical content to the user.
  • We’re adding a handful of CSS features to improve interop.
  • And there's plenty more.

I'm Pete LePage, and I’m Adriana Jara. Let's dive in and see what's new for developers in Chrome 106.

New Intl APIs

The Intl APIs help to display content in a localized format.

Like other Intl APIs, this shifts the burden to the system—so you don’t need to ship or maintain complex localization code to every user.

The API knows where the currency symbol goes, how to format dates and times, or compile a list.

Chrome 106 adds a slew of new number format functionality.

const opts = {
style: 'currency',
currency: 'EUR'
};
const x = new Intl.NumberFormat('de-DE', opts);
const r = x.format(number);
// expected output: "123.456,79 €"

Need to display a price range? formatRange has you covered.

Create a new numberFormat object, provide the style and other options, and how many digits to show.

Then call formatRange() to get the formatted string.

const opts = {
style: "currency",
currency: "EUR",
maximumFractionDigits: 0,
};
const nf = new Intl.NumberFormat("en-US", opts);
nf.formatRange(2.9, 3.1);
// expected output: "~€3"

Want to round a number to the nearest increment of five with an accuracy of two decimal places? No problem.

Specify the minimumFractionDigits, and roundingIncrement, then call format().

const opts = {
style: 'percent',
minimumFractionDigits: 2,
roundingIncrement: 5,
};
const nf = new Intl.NumberFormat("en-US", opts);
nf.format(0.428267);
// expected output: "42.85%"

You can even tell the browser to include trailing zeros with trailingZeroDisplay, super helpful for prices.

const strip = new Intl.NumberFormat('en-US', {
style: 'percent',
minimumFractionDigits: 2,
trailingZeroDisplay: 'stripIfInteger',
}).format(0.42);
// 42%

const auto = new Intl.NumberFormat('en-US', {
style: 'percent',
minimumFractionDigits: 2,
trailingZeroDisplay: 'auto',
}).format(0.42);
// 42.00%

Check out the Intl Number Format docs on MDN for more information.

Pop-up API

The Pop-Up API makes building UIs way easier, for those times when you just need to put information right in front of your user.

The `popup` attribute, automatically brings the element to the site's top layer and provides easy controls to toggle visibility. No more worrying about positioning, stacking elements, focus, or keyboard interactions for you. Best of all it requires zero JavaScript.

With only the following snippet the API takes care of rendering the element on top of all other content, and handles user input, and focus management.

<div id="my-pop-up" popup>
Pop-up content!
</div>
<button popuptoggletarget="my-pop-up">
Toggle Pop-up button
</button>

By default, users can close the popup with gestures like the ESC key or clicking on other elements.

And developers have full control over the style,positioning and size of the top layer, but also the flexibility to modify the default behaviors. Using only CSS and HTML.

Check out Jhey’s article for more examples and API options.

Sign up for the origin trial to easily give your users timely information. Let us know what you think.

New css features

There are two new CSS features that improve interop and hopefully make your life a little easier.

There is a new length unit in town: ic is joining the party. ic is similar to ch. But ic is used specifically for text written in languages that use ideograms, basically it measures length based on the width or height of this character [point somewhere] which means water.

It is a unit designed to size text, allowing you to limit width to improve readability, and it gives predictable control regardless of the text size.

For example if you set the max-width of a container, let's say to 10ic, you know that container will contain at most 10 full width glyphs, no matter the font-size. Check it out in the following example:

CSS Grid support for interpolation for grid-template-columns and grid-template-rows is coming, it was planned for 106, but is delayed and will be launched in Chrome 107, you can still try it out in Chrome Beta. Here is Bramus' code as an example:

And more!

Of course there’s plenty more.

  • We’re starting phase five of the user agent reduction plan.
  • Support for HTTP2 Push and the Persistent quota type are being deprecated.
  • And the CSS property hyphenate-character is now available unprefixed.

Further reading

This covers only some key highlights. Check the links below for additional changes in Chrome 106.

Subscribe

To stay up to date, subscribe to the Chrome Developers YouTube channel, and you'll get an email notification whenever we launch a new video.

I’m Adriana Jara, and as soon as Chrome 107 is released, I'll be right here to tell you what's new in Chrome!

...



📌 CVE-2015-6042 | Microsoft Internet Explorer 11 CWindow use after free (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6047 | Microsoft Internet Explorer 8/9/10/11 EditWith Broker access control (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6046 | Microsoft Internet Explorer 9/10/11 Memory information disclosure (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6044 | Microsoft Internet Explorer 8 access control (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6048 | Microsoft Internet Explorer 7/8/9/10/11 memory corruption (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6050 | Microsoft Internet Explorer 10 memory corruption (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6049 | Microsoft Internet Explorer 7/8/9/10/11 memory corruption (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6053 | Microsoft Internet Explorer 11 ArrayBuffer.slice information disclosure (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6051 | Microsoft Internet Explorer 10/11 access control (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 CVE-2015-6045 | Microsoft Internet Explorer 11 CElement Object use after free (MS15-106 / MS15-106)


📈 29.99 Punkte

📌 Chrome 106 Beta: New CSS Features, WebCodecs and WebXR Improvements, and More


📈 22.27 Punkte

📌 What's New In DevTools (Chrome 106)


📈 22.27 Punkte

📌 Chrome 106 - What’s New in DevTools


📈 22.27 Punkte

📌 New in Chrome 106: Intl API Improvements, Pop-Up API, CSS Improvements, and more!


📈 22.27 Punkte

📌 New in Chrome 106


📈 22.27 Punkte

📌 Chrome 106 Beta: New CSS Features, WebCodecs and WebXR Improvements, and More


📈 22.27 Punkte

📌 Vuln: Google Chrome Prior to 47.0.2526.106 Multiple Remote Code Execution Vulnerabilities


📈 19.34 Punkte

📌 Vuln: Google Chrome Prior to 47.0.2526.106 Multiple Remote Code Execution Vulnerabilities


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Blink HTML Page information disclosure


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 WebAssembly HTML Page Integer Overflow memory corruption


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Skia HTML Page Integer Overflow memory corruption


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Service Worker HTML Page Cross-Origin information disclosure


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 PDFium PDF File privilege escalation


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 WebAssembly HTML Page Use-After-Free memory corruption


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Networking Disk Cache HTML Page memory corruption


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Networking Disk Cache HTML Page privilege escalation


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 URL Formatter spoofing


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Prompts HTML Page Policy privilege escalation


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Omnibox URL spoofing


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 DevTools HTML Page cross site scripting


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 Blink HTML Page CORS privilege escalation


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 URL Formatter Domain Name spoofing


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 File Download Page.downloadBehavior HTML Page privilege escalation


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 WebAssembly HTML Page Out-of-Bounds memory corruption


📈 19.34 Punkte

📌 Google Chrome prior 66.0.3359.106 File Download HTML Page Malware privilege escalation


📈 19.34 Punkte











matomo