The following feature enhancements and bug fixes have been made in ThingWorx 6.0.
The following Infotable snippets have been added in this release:
|Delete rows by filter|
A CSRF (Cross Site Request Forgery) vulnerability was detected in ThingWorx and action may be necessary by current users to prevent any attacks. In a CSRF attack, the attacker exploits how the target web application manages authentication. For CSRF to be exploited, the victim must be logged in to the target site. While this vulnerability has been fixed in ThingWorx 6.0, current users with custom applications may be affected.
By default, the request method can no longer be changed by request parameters. If your application was developed using these practices, you can: