﻿<?xml version="1.0" encoding="utf-8"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0"><channel><title>Intersoft Community - WebCombo</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><description /><generator>http://www.intersoftsolutions.com</generator><language>en</language><copyright>Copyright 2002 - 2015 Intersoft Solutions Corp. All rights reserved.</copyright><ttl>60</ttl><item><title>Webcombo Security issue</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Thu, 23 Nov 2023 12:11:16 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><category>Security issue</category><description>&lt;p&gt;Hi,&lt;/p&gt;&lt;p&gt;I am using Intersoft webcombo in my ASP.Net Web application.&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;I am checking the application security using the tool semgrep for SAST (Static Application Security Testing).&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;While testing I face the below errors. The JavaScript generated by the webcombo is causing the issue .&lt;/p&gt;&lt;p&gt;&lt;span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr"&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;Please help me to solve these issues.&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;b&gt;Files in which error occured:&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoListParagraphCxSpFirst" style="text-indent:-18.0pt;mso-list:l0 level1 lfo1"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:Symbol;
mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"&gt;&lt;b&gt;·&lt;/b&gt;&lt;span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/b&gt;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang="EN-US" style="font-size:10.0pt;
line-height:107%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;CoreValidator.js&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:Symbol;
mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"&gt;·&lt;span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang="EN-US" style="font-size:10.0pt;
line-height:107%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;Core_DragDrop.js&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:Symbol;
mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"&gt;·&lt;span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang="EN-US" style="font-size:10.0pt;
line-height:107%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;ISCore.js&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:Symbol;
mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"&gt;·&lt;span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang="EN-US" style="font-size:10.0pt;
line-height:107%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;WebUIValidation.js&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:Symbol;
mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"&gt;·&lt;span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang="EN-US" style="font-size:10.0pt;
line-height:107%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;WebCombo.js&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;!--[if !supportLists]--&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px;"&gt;







&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;b&gt;Error Message 1&lt;/b&gt;:&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;javascript.browser.security.insecure-document-method.insecure-document-method
User controlled data in methods like `innerHTML`, `outerHTML` or
`document.write` is an anti-pattern that can lead to XSS vulnerabilities&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin;background:yellow;
mso-highlight:yellow"&gt;...
e.innerHTML=v;WC40Engine.InvalidateResultBox(f);return
v},WriteCOLs:function(f,d){var&amp;nbsp;
e="";if(f.LayoutSettings.ComboMode=="MultipleColumns"){var
a= ...&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px;"&gt;



&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin;background:yellow;
mso-highlight:yellow"&gt;...
b.innerHTML="&amp;lt;nobr&amp;gt;"+l.Text+"&amp;lt;/nobr&amp;gt;"}}else{var
h=p.Columns;for(var&amp;nbsp; k=0;k&amp;lt;h.length;k++){var
f=h[k];if(f.Hidden&amp;amp;&amp;amp;!f.RenderOnHidden){continue}var q=f ...&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;b&gt;Error Message 2:&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;javascript.lang.security.audit.detect-non-literal-regexp.detect-non-literal-regexp
RegExp() called with a `e` function argument, this might allow an attacker to
cause a Regular Expression Denial-of-Service (ReDoS) within your application as
RegExP blocks the main thread. For this reason, it is recommended to use
hardcoded regexes instead. If your regex is run on user-controlled input,
consider performing input validation or use a regex checking/sanitization
library such as https://www.npmjs.com/package/recheck to verify that the regex
does not appear vulnerable to ReDoS.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px;"&gt;

&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:&amp;quot;Calibri&amp;quot;,sans-serif;
mso-ascii-theme-font:minor-latin;mso-fareast-font-family:Calibri;mso-fareast-theme-font:
minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin;
background:yellow;mso-highlight:yellow;mso-font-kerning:0pt;mso-ligatures:none;
mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA"&gt;…RegExp(c.Pattern,"img");g=c.NewValue.match(re);if(g==null){c.NewValue=c.NewValue.replace(new
&amp;nbsp;RegExp("\\s+","g"),"");g=c.NewValue.match(re)}if(g==
...&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;b&gt;Error Message 3:&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;javascript.browser.security.eval-detected.eval-detected
Detected the use of eval(). eval() can be dangerous if used to evaluate dynamic
content. If this content can be input from outside the program, this may be a
code injection vulnerability. Ensure evaluated content is not definable by
external sources.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px;"&gt;

&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:&amp;quot;Calibri&amp;quot;,sans-serif;
mso-ascii-theme-font:minor-latin;mso-fareast-font-family:Calibri;mso-fareast-theme-font:
minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin;
background:yellow;mso-highlight:yellow;mso-font-kerning:0pt;mso-ligatures:none;
mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA"&gt;al(this.getAttribute(name))}}}},_EmulateSelectionModel:function(){Object.defineProperty(HTMLDocument.prototype,"selection",{get:function(){return
w ...&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;b&gt;Error Message 4:&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;
mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"&gt;javascript.lang.security.audit.incomplete-sanitization.incomplete-sanitization
`h.replace` method will only replace the first occurrence when used with a
string argument ("$"). If this method is used for escaping of
dangerous data then there is a possibility for a bypass. Try to use
sanitization library instead or use a Regex with a global flag.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px;"&gt;

&lt;span lang="EN-US" style="font-size:10.0pt;line-height:107%;font-family:&amp;quot;Calibri&amp;quot;,sans-serif;
mso-ascii-theme-font:minor-latin;mso-fareast-font-family:Calibri;mso-fareast-theme-font:
minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin;
background:yellow;mso-highlight:yellow;mso-font-kerning:0pt;mso-ligatures:none;
mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA"&gt;replace("$","\\s*\\"+i+"\\s*")}else{if(j=="percent"){h=h.replace(i,"\\s*\\"+i+"\\s*")}}h="(?:^"+h.replace(new
RegExp("\\s*","g"),"")+"$)";return h}
...&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;&lt;br&gt;&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;With Regards,&lt;/p&gt;&lt;p style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px;"&gt;Giridhar JG&lt;/p&gt;</description></item><item><title>Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Tue, 01 Aug 2023 08:33:32 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><description>&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN"&gt;,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;We are facing the below mentioned security issue
in one of our client environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;A significant portion of the XSS test payload
appeared in the web page, but the page's DOM was not modified as expected for a
successful exploit. This result was manually verified to determine its
accuracy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;Kindly find the attached screenshots for
reference(Request and Response).&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:normal;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75" style='width:6in;
 height:59.5pt;visibility:visible;mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:/Users/VELUMA~1.MOO/AppData/Local/Temp/msohtmlclip1/01/clip_image003.png"
  o:title=""/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Kindly help us to resolve the same&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Thanks in advance.&lt;/span&gt;&lt;/p&gt;</description></item><item><title>Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Tue, 01 Aug 2023 08:31:46 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><description>&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN"&gt;,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;We are facing the below mentioned security issue
in one of our client environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;A significant portion of the XSS test payload
appeared in the web page, but the page's DOM was not modified as expected for a
successful exploit. This result was manually verified to determine its
accuracy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;Kindly find the attached screenshots for
reference(Request and Response).&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:normal;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75" style='width:6in;
 height:59.5pt;visibility:visible;mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:/Users/VELUMA~1.MOO/AppData/Local/Temp/msohtmlclip1/01/clip_image003.png"
  o:title=""/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Kindly help us to resolve the same&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Thanks in advance.&lt;/span&gt;&lt;/p&gt;</description></item><item><title>Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Tue, 01 Aug 2023 08:31:45 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><description>&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN"&gt;,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;We are facing the below mentioned security issue
in one of our client environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;A significant portion of the XSS test payload
appeared in the web page, but the page's DOM was not modified as expected for a
successful exploit. This result was manually verified to determine its
accuracy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;Kindly find the attached screenshots for
reference(Request and Response).&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:normal;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75" style='width:6in;
 height:59.5pt;visibility:visible;mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:/Users/VELUMA~1.MOO/AppData/Local/Temp/msohtmlclip1/01/clip_image003.png"
  o:title=""/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Kindly help us to resolve the same&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Thanks in advance.&lt;/span&gt;&lt;/p&gt;</description></item><item><title>Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Tue, 01 Aug 2023 08:30:25 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><category>XSS</category><category>cross-site scripting</category><category>Unencoded characters</category><description>&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN"&gt;,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;We are facing the below mentioned security issue
in one of our client environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;A significant portion of the XSS test payload
appeared in the web page, but the page's DOM was not modified as expected for a
successful exploit. This result was manually verified to determine its
accuracy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;Kindly find the attached screenshots for
reference(Request and Response).&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:normal;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75" style='width:6in;
 height:59.5pt;visibility:visible;mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:/Users/VELUMA~1.MOO/AppData/Local/Temp/msohtmlclip1/01/clip_image003.png"
  o:title=""/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Kindly help us to resolve the same&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Thanks in advance.&lt;/span&gt;&lt;/p&gt;</description></item><item><title>File versions between 2016 R1 and 2017 R1</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Tue, 11 Jun 2019 15:39:10 GMT</pubDate><dc:creator>fbadev</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;&lt;p&gt;I upgraded Intersoft WebUI package from 2016 R1 to 2017 R1. After upgrade, I realized there was an odd issue on file versions. The last release must has higher minor version number but on this issue, the previous release has higher minor version number.&amp;nbsp; Matched list between two different versions listed below.&amp;nbsp;&lt;/p&gt;&lt;p&gt;2016 R1 ISNet.WebUI.WebCombo.dll 7.0.7200.280&lt;/p&gt;&lt;p&gt;2017&amp;nbsp;R1 ISNet.WebUI.WebCombo.dll 7.0.7200.276&lt;/p&gt;&lt;p&gt;2016 R1 ISNet.dll 3.0.5000.978&lt;/p&gt;&lt;p&gt;2017 R1 ISNet.dll 3.0.5000.975&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>Component not render</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Thu, 04 Apr 2019 14:14:57 GMT</pubDate><dc:creator>peppecar</dc:creator><description>&lt;p&gt;Hi to all,&lt;/p&gt;&lt;p&gt;i'm running a project migrated from Visual 2008 to Visual Studio 2017 and i have a problem with Intersoft Components. The component is not rendered. The WebCombo present this layout(see attach file).&lt;/p&gt;&lt;p&gt;Can you help me, please?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Thanks&lt;/p&gt;&lt;p&gt;Giuseppe&lt;/p&gt;</description></item><item><title>Regarding Behaviour of WebCombo in iOS Devices</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Mon, 11 Mar 2019 12:26:06 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;&lt;p&gt;We are using WebCombo 7&lt;/p&gt;&lt;p&gt;On Android device (Tablet), we have called a web page with webcombo and we are able to search suggestion and from the suggestion we are able to select the value&lt;span style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;But on IOS ddevice (IPAD IOS version 9.0) webcombo search suggestion list is showing and the typed text is shown inside suggestion list so that it overlaps and we unable view typed text.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In IOS devices (IPhone IOS version 12.1) webcombo search suggestion list is shown below iOS Keypad. So the typed text cannot be viewed and couldn't select the suggestion list due to keyboard overlapped on suggestion list. And also control auto scrolled when typing search text. so that we unbale to select the search suggestion list.&lt;/p&gt;&lt;p&gt;Thanks in Advance&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>Webcombo (Multiselect Option with Checkbox)</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Mon, 29 Jan 2018 08:24:11 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;&lt;p&gt;We are using webcombo (multiselect option with checkbox). We are binding around 60000 records. The page is not loading. Kindly let us know on how to accompolish the same.&lt;/p&gt;&lt;p&gt;Thanks&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>Reg: WebCombo Typing, Filtering &amp; Select All option in multiselect web combo</title><link>http://www.intersoftsolutions.com/Community/WebCombo/</link><pubDate>Fri, 19 Jan 2018 06:07:22 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><category>Filtering &amp; Select All</category><category>Multiselect WebCombo</category><description>&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Hi,&lt;/p&gt;&lt;p&gt;We are using Intersoft WebCombo with multiselect functionality.&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;&amp;lt;MultipleSelectionSettings Enabled="True"&amp;gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;If TextBoxMode="Editable" then the checkbox is not showing and selection change event is fired for every value selected. If the&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: 10pt;"&gt;TextBoxMode="ReadOnly" then&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: 10pt;"&gt;checkboxes are shown and we are able to select multiple values but the we are not able to type any text for filtering the data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;Following is our requirement&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;1. We need provision to type some text.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;2. Select all the records/part of records from the filtered data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;3. Selection change event has to be fired after selecting the filtered records.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;Kindly let us know if any option is available for achieving the above functionality.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Thanks&lt;/p&gt;</description></item></channel></rss>