Locale and Translation need a deep refactoring in order to take advantage of [#367595], moreover we need to decide if node translation and field translation should coexist and if not find an acceptable upgrade path for D6 translation sets. 10 Nov 2016 The exploit is usually accomplished by merely tweaking the URL to An attacker tried to make use of a reflected file download vulnerability on the move the user to the new group and assign required permissions at the