Tuesday, February 18, 2025
HomeFirefoxFirefox 83.0 Released - Improved Page Load Performance, HTTPS-Only Mode...

Firefox 83.0 Released – Improved Page Load Performance, HTTPS-Only Mode & 0-Day Fix – Update Now!!

Published on

SIEM as a Service

Follow Us on Google News

Mozilla released Firefox 83.0 with new impartments on page load performance, fixed the Zero-day bug, introduces HTTPS-Only Mode., and various other functions.

Firefox 80.3 will let you experience the page loading performance by up to 15%, page responsiveness by up to 12%, and reduced memory usage by up to 8%.

Mozilla also fixed 21 vulnerabilities which including 5 high severity vulnerabilities, 11 moderate vulnerabilities, and 5 low severity vulnerabilities that affected the previous version of Firefox.

HTTPS-only Mode enables to modify the URL automatically to continue with HTTPS version, for example, If users will type http:// URLs, it will automatically change into secure https:// URLs. You can enable it in Firefox Preferences.

Firefox 83.0 now support the AcroForm PDF forms technology that allow users to  fill in, print, and save supported PDF forms and the PDF viewer.

 Firefox Search Features Improvements

According to Mozilla release notes, following improvement has been applied in this Firefox 83.0:-

  • Selecting a search engine at the bottom of the search panel now enters search mode for that engine, allowing you to see suggestions (if available) for your search terms. The old behavior (immediately performing a search) is available with a shift-click.
  • When Firefox autocompletes the URL of one of your search engines, you can now search with that engine directly in the address bar by selecting the shortcut in the address bar results.
  • We’ve added buttons at the bottom of the search panel to allow you to search your bookmarks, open tabs, and history.

Zero-day Bug Fixes

Firefox 83.0 released with the fixes of Heap buffer overflow in “FreeType” zero-day vulnerability that active attacks against Google Chrome and Firefox.

“In Freetype, if PNG images were embedded into fonts, the Load_SBit_Png function contained an integer overflow that led to a heap buffer overflow, memory corruption, and an exploitable crash.”

 Mozilla has fixed the “CVE-2020-15999” and the vulnerability was being exploited in wide against both Firefox and Chrome and is only affected the  Linux and Android operating systems.

You can upgrade to Firefox 83 by going to Options -> Help -> About Firefox

You can dowload the the latest version of Firefox 83.0 here:;

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber...

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Flesh Stealer Malware Attacking Chrome, Firefox, and Edge Users to Steal Passwords

A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Firefox Memory Corruption Flaw Let Attacker Execute Arbitrary Code

Mozilla Firefox 119 was released with updates for 11 vulnerabilities, including three issues of high...