History log of /dokuwiki/lib/plugins/ (Results 1351 – 1375 of 2863)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
a466710405-Jan-2014 Andreas Gohr <andi@splitbrain.org>

added git warning

4c005e3f05-Jan-2014 Andreas Gohr <andi@splitbrain.org>

fixed strict standard error and added some docblock

9672d9f305-Jan-2014 Andreas Gohr <andi@splitbrain.org>

removed the old plugin manager

13ae5e0005-Jan-2014 Andreas Gohr <andi@splitbrain.org>

typo fix

5284857c05-Jan-2014 Andreas Gohr <andi@splitbrain.org>

protect authplain and current auth plugin

bcdcd3d105-Jan-2014 Andreas Gohr <andi@splitbrain.org>

do not show updates for bundled plugins

16660d3205-Jan-2014 Andreas Gohr <andi@splitbrain.org>

use config for firguring out if an extension is protected

220ab8d205-Jan-2014 Andreas Gohr <andi@splitbrain.org>

even more fixes for the bundled extension list

947a047205-Jan-2014 Andreas Gohr <andi@splitbrain.org>

template:default is no longer bundled

9a2e74c105-Jan-2014 Andreas Gohr <andi@splitbrain.org>

the plugin is called testing not test

e0ea4d0205-Jan-2014 alhajr <alhajr300@gmail.com>

translation update

8c339e9201-Jan-2014 alhajr <alhajr300@gmail.com>

translation update

49b230dd31-Dec-2013 matt carroll <matt.carroll@gmail.com>

translation update

b21beefd31-Dec-2013 Ivan Peltekov <ivan.peltekov@abv.bg>

translation update

d20f692024-Dec-2013 Hans Iwan Bratt <hibratt@gmail.com>

translation update

eced6aea19-Dec-2013 Dương Văn Hoàng <duongvanhoang1962@quan10.net>

translation update

6fdd11e015-Dec-2013 Andreas Gohr <andi@splitbrain.org>

removed superflous README for bundled plugin


9e8bcd5f10-Dec-2013 Andreas Gohr <gohr@cosmocode.de>

fix possible XSS vulnerability in Plugin Manager

The plugin manager echos raw URLs in error messages, this could allow to
construct an XSS attack. However the affected form is CSRF protected,
so an

fix possible XSS vulnerability in Plugin Manager

The plugin manager echos raw URLs in error messages, this could allow to
construct an XSS attack. However the affected form is CSRF protected,
so an attacker would require another XSS vulnerability to get the needed token,
rendering this attack unneeded. So this should not be exploitable.

show more ...

ccfec56007-Dec-2013 Anika Henke <anika@selfthinker.org>

crlf 2 lf whitespace fixes

6593db4307-Dec-2013 Myeongjin <aranet100@gmail.com>

translation update

7c586cd805-Dec-2013 anjianshi <anjianshi@gmail.com>

translation update

2c01be2f03-Dec-2013 zamroni <therons@ymail.com>

translation update

6b1ab5ac02-Dec-2013 Antonio Bueno <atnbueno@gmail.com>

translation update

1da08fca01-Dec-2013 Christopher Smith <chris@jalakai.co.uk>

remove incorrect 'private' restriction from tset method

3946d21601-Dec-2013 Christopher Smith <chris@jalakai.co.uk>

comment (hide) incomplete export with filter test

1...<<51525354555657585960>>...115