Super fast Goanna-based browser designed for the best possible performance

Pale Moon (32-bit)

Pale Moon 34.2.1 (32-bit)

  -  29.8 MB  -  Open Source

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Pale Moon 34.2.1 (32-bit).


For those interested in downloading the most recent release of Pale Moon (32-bit) or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

Why is this app published on FileHorse? (More info)
  • Pale Moon 34.2.1 (32-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Pale Moon 34.2.1 (32-bit) Screenshot 1
  • Pale Moon 34.2.1 (32-bit) Screenshot 2
  • Pale Moon 34.2.1 (32-bit) Screenshot 3

What's new in this version:

Changes/fixes:
- Fixed a regression leading to cursive languages (where multiple characters combine) not being rendered correctly (e.g. Arabic)
- Updated our cookie magic prefix handling, adding __Http- and __Host-Http- magic prefixes and aligning our implementation with RFC 6265bis
- Updated our Brotli library to 1.2.0+ (1.2.0 with additional fixes)
- Updated NSS to 3.90.10.0 (UXP). For clarity, the version now carries the (UXP) label to distinguish this fork (which has additional mitigations) from the 3.90 branch of NSS maintained by Mozilla
- A large audit of security issues was performed. Many security issues were addressed, including potential crash scenarios and code correctness issues
- As a summary: 50 potential vulnerabilities were found applicable and fixed, 20 issues had DiD code changes applied, and 4 were already mitigated by us before being reported
- Of the reported vulnerabilities, 270 were not applicable to our code (with the vast majority pertaining to e10s/multi-process browser architecture) and 6 low-impact ones were marked for further investigation at a later time