Addon Base now available
As per our poll
from last year, we are now providing an Addon Base
to categorize and provide user generated addons.
We are counting on your collaboration: Every user can publish his own addon, which will be checked by us and later released. Users can later download the addons, comment and rate them.
We are looking forward for your submissions.
Voting about an Addon Download Base
Since some time now, we the webSPELL team are thinking about increasing the functionality of our website with a download area for add-ons, to provide you with direct access to the best extensions of our webSPELL community.
The plan is to have a database with user-generated content, but with moderation and quality assurance by the webSPELL team. Additionally to this check, user comments and ratings will offer a rapid overview about successful and most popular add-ons, to guarantee an smooth integration into your webSPELL pages.
Add-on programmers will also benefit from this solution: webSPELL.org, as the main web portal for webSPELL users, offers a possibility to present your own modifications to a wider audience thanks to its huge user base
Of course we know about the numerous, but mostly short-living projects in the community, which try to achieve the same goal. So we want to have your thoughts about this new functionality on our website, and therefore have created a poll for all of you where you can vote and comment on this possible new feature.
We hope all of you are contributing to this by either vote or comment.
Server: hardware change
As you may have noticed webspell.org had some problems over the last days. Deeper investigation pinpointed harddrive failures as the cause of all problems.
Please excuse any inconveniences you experienced over the past days.
New SecurityFix for webSPELL 4.01.02
First of all we want to wish you happy Easter and nice holidays, hope you all have fun with searching some Easter eggs
Again a security vulnerability in webSPELL was found which affects web servers with activated register_globals php settings. We consider this vulnerability critical cause it allows to read arbitrary files an submit the source code of these files to the attackers browser.
In addition we use this security fix to close a second potential security hole in the automated cookie login. Thanks to the watchful user who discovered this vulnerability.
As always you are able to find the fixes in our download area.
[ Archive ]