Anyway I solved it by doing some JavaScript stuff around the Telerik Grid and DropDownList controls.
One thing I had to do to get the JavaScript working with the telerik controls was to put the Line back into web.config that this thread talks about removing.
I totally agree with not discussing the vulnerability but can I ask if I were to add the Telerik JavaScript libraries manually to would this still be an issue, and would this work (I have not had chance to try that yet).
Hi all, the first part of my code looks like below. Has it been fixed already??????????
<add verb="GET,HEAD" path="asset.axd" validate="false" type="Telerik.Web.Mvc.WebAssetHttpHandler, Telerik.Web.Mvc" /> <!--Uncomment the following lines in order to enabled static file caching and compression for IIS 6 <remove verb="GET,HEAD,POST" path="*" /> <add verb="GET,HEAD,POST" path="*" type="Nop.Web.Framework.StaticFileHandler" />-->
<add verb="GET,HEAD" path="asset.axd" validate="false" type="Telerik.Web.Mvc.WebAssetHttpHandler, Telerik.Web.Mvc" /> No, it's not fixed. Please read the first post in this topic
So it's ok to delete only what was described in the first post and leave this part alone? : <!--Uncomment the following lines in order to enabled static file caching and compression for IIS 6 <remove verb="GET,HEAD,POST" path="*" />