Drupal's l/url methods would usually escape all possible unsecure code. Due to an incompatibility, refine_by_taxo could no longer use this and build its own anchors, without escaping the tags properly.
Anyone who creates tags with core taxonomy module, could potentially inject arbitrary HTML and script code into your site when you use refine_by_taxo to display these tags. Note that core taxonomy has no issues, its only the display part in refine_by_taxo that did not properlty escape the output.
The first maintenance and security release of the Drupal 6 series. Only fixes for security vulnerabilities and other bugs have been committed. New features are only being added to the forthcoming Drupal 7.0 release.
This release fixes security vulnerabilities. Sites are urged to upgrade immediately. For more details, please see the security announcement:
This is the first official release of the 5.x-2.* series. The major new feature here is that issue followups now use core comments, instead of the previous special-case pseudo comments. This means the project_issue now depends on comment.module, upload.module (for file attachments to the initial issue post), and the comment_upload.module (for file attachments to followup comments).
This release requires Drupal 5.2 or greater.
Users of the 5.x-2.x-dev release should upgrade to this version immediately, since it fixes some critical security flaws: