Documentation: General

Knowledgebase Docs » General

Terms & Conditions 20

Licensing Licenses are valid for one year from the date of purchase. A valid, active license is required to receive access to product support and updates. Licenses can be renewed yearly at a 20% discount. An expired license does not prevent usage of a product, only access to support and updates. You are free to use the product forever without renewing your license. License Terms A license entitles you to install the product on a specific number of sites. A 1 site license permits installation on a single site, a 5 site license permits installation on up to 5 sites, and so on. For each production site, you are also permitted an installation on a test/development server. Licenses are non-transferrable, and may only be used on the site they are originally installed on. A standard license does not grant you the right to distribute the product. Products may not be re-sold or re-distributed as-is in any capacity. To include a product as an element in a stock item you are selling, you must purchase an Extended License (if available). Extended License An Extended License allows you to distribute the product as part of a package you are selling. For example, if you are selling a WordPress theme, you can distribute an Extended License plugin with that theme. Your users may use that plugin with your theme. The project you are distributing the product with must be significantly larger than the product itself. You may not distribute the product on its own. You may not make a small change or addition and distribute the product. The product cannot be the main item in the package you are distributing. In general, the Extended License is valid only for distributing a WordPress plugin packaged with your WordPress theme. You must own the copyright […]

View

How to check for Javascript Errors 6

If your site is producing javascript errors, they will be displayed in your browser’s Javascript console. To check for javascript errors, simply open the console and look for the errors. It’ll look something like this: Errors are generally marked in red or with a × . Any errors on your site have the potential to halt all other javascript execution, preventing other scripts from being able to run. The red text described the error (in the example above, the script is calling a function, examplefunc(), which does not exist). The link on the right shows the script and line number at which the error occurred. Note that this does not necessarily mean that is the problematic code. For example, that line will often show that the error occurs in jquery.js, but bugs in the jQuery core are exceptionally rare and very unlikely to be the source of your issue. Click the arrow on the left to open the Stack Trace, which will show all the functions called along the way, with their scripts and line numbers. Generally scripts coming from themes or plugins are causing the issue. Here’s how to open the console in various browsers: Chrome To open the console in Chrome, you can either: Use the keyboard shortcut Command – Option – J (Mac) or Control -Shift -J (Windows/Linux). Select View > Developer > JavaScript Console. Chrome: Using the Console Firefox To open the console in Firefox, either: Select “Web Console” from the Web Developer submenu in the Firefox Menu (or Tools menu if you display the menu bar or are on Mac OS X) By pressing its Control-Shift-K (Command-Option-K on the Mac) keyboard shortcut. Firefox: Web Console Safari In Safari, you need to first enable the Web Inspector. Please follow these instructions.

View

Contact Form 7 Dynamic Text Extension Security Disclosure 2019-07-24 (Resolved) 0

On July 24, 2019, we received an XSS vulnerability report for Contact Form 7 – Dynamic Text Extension. The plugin was immediately patched and the fix released in version 2.0.3. While this vulnerability is unlikely to affect many users due to its nature, it is recommended that all Contact Form 7 Dynamic Text Extension users upgrade to the latest version immediately. Vulnerability Status: Resolved (v2.0.3) Plugin: Contact Form 7 – Dynamic Text Extension Type: Reflected XSS vulnerability Severity: Minor Versions affected: < 2.0.2.1 Fix released: 2.0.3 on July 24, 2019 Details: Usage of CF7_GET and CF7_POST shortcodes outside of Contact Form 7 itself could result in XSS vulnerability. Because this issue is only present when using the CF7 DTX shortcodes outside the CF7 DTX, it’s unlikely to affect users in practice. If you are using the CF7_GET or CF7_POST shortcodes inside the CF7 form tags (standard plugin usage), such as you are protected because the CF7 DTX escapes the shortcode output before placing it in the form input attribute. The vulnerability occurs if the shortcode were to be used outside of a CF7 form tag in a non-standard way, for example, within page content as: There is no application for using the shortcode in this way, so fortunately the impact of this vulnerability should be minimal. However, if you are doing so, updating will patch the vulnerability. Resolution: This vulnerability is resolved in v2.0.3 by sanitizing the shortcode output even when used outside of Contact Form 7. Recommended steps: To resolve the vulnerability, just update Contact Form 7 – Dynamic Text Extension to version 2.0.3 or later.

View