Xenforo Core Package Nuléd

Xenforo Core Package Nuléd 2.3.10

Vous n'avez pas l'autorisation de télécharger
  • Auteur du fil de discussion Auteur du fil de discussion theresa
  • Date de début Date de début
Inscrit(e) le
Sep 11, 2021
Messages
9,269
Score de réaction
2,995
Credits
$11,890
theresa a soumis un nouveau ressource :



Paquet de Core Xenforo Nulé 2.2.7 - Core Xenforo




De plus qu'il s'agit d'une modification de schéma de base qui pourrait prendre beaucoup de temps à exécuter. Si vous avez une table xf_attachment et xf_attachmet_data particulièrement grande (plusieurs millions de lignes), nous vous recommandons de faire une mise à niveau CLI.



XenForo 2.2.7 est également la première version à soutenir la purge des fichiers qui appartiennent aux add-ons non installés. Vous pouvez en savoir plus sur cela.



Certains des changements dans XF 2.2.7 comprennent :
  • Mise à jour du barre de filtre de l'onglet add-on...




Lisez plus sur ce ressource...
 
jessy updated Xenforo Core Full Package Nulled with a new update entry:

change log

XenForo 2.2.7 inadvertently shipped with an implicit minimum requirement of PHP 7.1 due to the way that newer versions of composer attempt to validate your platform is compatible with the included dependencies.

If you're currently running PHP 7.0 you may have been unable to upgrade to or run XenForo 2.2.7. Patch 1 removes this platform check.

Additionally, if you're currently running PHP 7.0 we would strongly urge you to consider upgrading to a newer version as soon as possible...

Read the rest of this update entry...
 
jessy updated Xenforo Core Full Package Nulled with a new update entry:

2.2.8 update

Some of the changes in XF 2.2.8 include:
  • Do not wrap iconic inputs when directly adjacent to other inline items
  • Generate PhpStorm metadata for validator classes
  • Optionally normalize a URL passed into getRoutePathFromUrl to exclude the script part of the URL if it is passed in.
  • Fix further JavaScript regression in editor.js that affected older browsers.
  • Fix undefined variable $option when failing to refresh an OAuth email access token.
  • If the location field is...

Read the rest of this update entry...
 
thanks to dear member @jessy updated Xenforo Core Full Package Nulled with a new update entry:

2.2.9

XenForo 2.2.9 is now available for all licensed customers to download. We strongly recommend that all customers running previous versions of XenForo 2.2 upgrade to this release to benefit from increased stability.

In addition to the usual bug fixes and improvements, we've continued to improve compatibility with PHP 8.1 and added support for self-hosted licenses to more easily sign outgoing emails with DKIM as per...

Read the rest of this update entry...
 
2.2.10 bug:
Screenshot_20220713_200901.png

you need to do this :
add code
PHP:
--- src/XF/Pub/Controller/Search.orig.php    2022-07-14 09:15:02.888904630 +0200
+++ src/XF/Pub/Controller/Search.php    2022-07-14 09:14:47.017272442 +0200
@@ -143,12 +143,16 @@ class Search extends AbstractController
             }
             else if ($search && $search->search_query && $search->search_query !== $this->filter('q', 'str'))
             {
                 return $this->notFound();
             }
         }
+        # [ TL: workaround regression of 2.2.10 producing many errors with guests searching ]
+        if (!is_object($search)) {
+            return $this->message(\XF::phrase('no_results_found'));
+        }
         $page = $this->filterPage();
         $perPage = $this->options()->searchResultsPerPage;
         $this->assertValidPage($page, $perPage, $search->result_count, 'search', $search);

IOW, add the following hunk to the actionResults function before the $page = $this->filterPage(); line:
PHP:
if (!is_object($search)) {
    return $this->message(\XF::phrase('no_results_found'));
}
 
thanks to dear member @jessy updated Xenforo Core Full Package Nulled with a new update entry:

changelog

Today, we are releasing XenForo 2.2.11 to address a potential security vulnerability. We recommend that all customers running XenForo 2.2 upgrade to 2.2.11 or use the attached patch file as soon as possible.

The issue relates to HTML attribute injection which can be triggered when rendering editor content, such as when a post is edited or quoted.

XenForo extends thanks to security researcher @PaulB, the team at @NamePros and @Xon for reporting the issues.

We recommend doing a full upgrade...

Read the rest of this update entry...
 
thanks to dear member @jessy updated Xenforo Core Full Package Nulled with a new update entry:

changelog

XenForo 2.2.12 is now available for all licensed customers to download. We strongly recommend that all customers running previous versions of XenForo 2.2 upgrade to this release to benefit from increased stability.

We're pleased to announce the introduction of two new features available in XenForo 2.2.12.

New CAPTCHA provider: Cloudflare Turnstile​

In September...

Read the rest of this update entry...
 
Haut