List & Label Standard Reporting Edition 31.001

Released: Jan 22, 2026

Mises à jour de 31.001

Fonctionnalités

  • General:
    • PDF/ZUGFeRD: Official support for the ZUGFeRD format in version 2.4.
    • Delphi: Added support for Embarcadero RAD Studio 13.
    • Enhanced speed and reduced memory consumption of the "Endless Export" feature (HTML, XLS, TXT, CSV). However, truly "endless" exports remain impractical, as memory usage continues to increase with data volume. For substantial data exports, executing the process in a 64-bit environment is required.
  • .NET:
    • Ad-hoc Designer now provides fallback paper sizes when no printer is installed.
    • ADO data provider schema caching was changed from static to instance-specific to improve stability in long-running processes.
    • Added a new AuthorizationHeader authentication mode to the Windows Client Web Designer.
    • Barcode fallback type for unparseable types was corrected from EAN128 to CODE128.
  • Designer:
    • Contrast optimization now also considers solid pattern zebra shading (simple scenarios).
    • PDF objects can now be selected by clicking on surrounding space created by isotropic filling.
    • Window positions changed via Windows snap keys are now correctly remembered.
  • DOM:
    • The barcode() function can now detect the barcode type from quoted values even if variables cannot be evaluated.
  • Web Components:
    • WRD: Updated Monaco Editor to mitigate multiple security issues caused by outdated DOMPurify versions.
    • The combit.ListLabel31.WebDesigner.exe is now digitally signed.
  • Other:
    • Storage conversions using LlStgsysStorageConvert now copy only required BLOBs, significantly reducing file size.
    • Dynamic Pascal declaration files now compile successfully with Delphi 13 Florence.
    • Updated libpng to version 1.6.54 to mitigate CVE-2026-22695 and CVE-2026-22801.
    • Updated libpng to version 1.6.53 to mitigate CVE-2025-66293.
    • Updated libpng to version 1.6.51 to mitigate CVE-2025-65018, CVE-2025-64720, CVE-2025-64506, and CVE-2025-64505.