webform 7.x-3.17

Security update
Bug fixes
Insecure

This release of Webform fixes a few issues discovered since the 3.16 release, specifically around the new AJAX-enabled file component added in 3.16, as well as some long-standing minor bugs. This release also includes a security fix related to using Webform in combination with Select or Other... module. If you are using Webform and Select or Other modules together, please upgrade your site immediately. See SA-CONTRIB-2012-035 - Webform Cross Site Scripting (XSS) for more details.

Bug fixes:

  • #1468324: Files are never marked permanent in 7.x-3.16.
  • #1472140: Drupal 6 number components missing label on submission display.
  • #1462286 by cbrasfield: Webform Components Clone cid variable is unset, but never actually re-set.
  • #1207374: Node tokens (provided by Webform) don't work as default values or description.
  • #1287474 by joachim: Don't show 'resend emails' action on the submission when there are no emails.
  • #1469530: Pass setcookie() HTTPONLY to prevent cross-site scripting.

webform 6.x-3.17

Security update
Bug fixes
Insecure

This release of Webform fixes a few issues discovered since the 3.16 release, as well as some long-standing minor bugs. This release also includes a security fix related to using Webform in combination with Select or Other... module. If you are using Webform and Select or Other modules together, please upgrade your site immediately. See SA-CONTRIB-2012-035 - Webform Cross Site Scripting (XSS) for more details.

Bug fixes:

  • #1472140: Drupal 6 number components missing label on submission display.
  • #1462286 by cbrasfield: Webform Components Clone cid variable is unset, but never actually re-set.
  • #1207374: Node tokens (provided by Webform) don't work as default values or description.
  • #1287474 by joachim: Don't show 'resend emails' action on the submission when there are no emails.
  • #1469530: Pass setcookie() HTTPONLY to prevent cross-site scripting.
  • #1470262 by bart.hanssens: Use the request_uri() function instead of $_SERVER['REQUEST_URI '] for Non-Apache servers.

block_class 7.x-1.1

Security update

This release addresses a cross-site scripting (XSS) vulnerability. Due to this vulnerability, a user could inject arbitrary scripts into pages affecting other site users. This could result in administrative account compromise leading to web server process compromise. This vulnerability is mitigated by the fact that an attacker must have the necessary permissions to administer blocks. SA-CONTRIB-2012-032 - Block Class - Cross Site scripting

ed_readmore 6.x-3.1

Security update

This release addresses a cross-site scripting (XSS) vulnerability. Due to this vulnerability, a user could inject arbitrary scripts into pages affecting other site users. This could result in administrative account compromise leading to web server process compromise. This vulnerability is mitigated by the fact that an attacker must have a role with the permission "access administration pages."

SA-CONTRIB-2012-033 - Read More Link - Cross Site Scripting

data 7.x-1.0-alpha3

Security update
Bug fixes

Changes since 7.x-1.0-alpha2:

data 6.x-1.1

Security update
Bug fixes

Changes since 6.x-1.0:

Pages

Subscribe with RSS Subscribe to RSS - Security update