a4667104 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
added git warning |
4c005e3f | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
fixed strict standard error and added some docblock |
9672d9f3 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
removed the old plugin manager |
13ae5e00 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
typo fix |
5284857c | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
protect authplain and current auth plugin |
bcdcd3d1 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
do not show updates for bundled plugins |
16660d32 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
use config for firguring out if an extension is protected |
220ab8d2 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
even more fixes for the bundled extension list |
947a0472 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
template:default is no longer bundled |
9a2e74c1 | 05-Jan-2014 |
Andreas Gohr <andi@splitbrain.org> |
the plugin is called testing not test |
e0ea4d02 | 05-Jan-2014 |
alhajr <alhajr300@gmail.com> |
translation update |
8c339e92 | 01-Jan-2014 |
alhajr <alhajr300@gmail.com> |
translation update |
49b230dd | 31-Dec-2013 |
matt carroll <matt.carroll@gmail.com> |
translation update |
b21beefd | 31-Dec-2013 |
Ivan Peltekov <ivan.peltekov@abv.bg> |
translation update |
d20f6920 | 24-Dec-2013 |
Hans Iwan Bratt <hibratt@gmail.com> |
translation update |
eced6aea | 19-Dec-2013 |
Dương Văn Hoàng <duongvanhoang1962@quan10.net> |
translation update |
6fdd11e0 | 15-Dec-2013 |
Andreas Gohr <andi@splitbrain.org> |
removed superflous README for bundled plugin
|
9e8bcd5f | 10-Dec-2013 |
Andreas Gohr <gohr@cosmocode.de> |
fix possible XSS vulnerability in Plugin Manager
The plugin manager echos raw URLs in error messages, this could allow to construct an XSS attack. However the affected form is CSRF protected, so an
fix possible XSS vulnerability in Plugin Manager
The plugin manager echos raw URLs in error messages, this could allow to construct an XSS attack. However the affected form is CSRF protected, so an attacker would require another XSS vulnerability to get the needed token, rendering this attack unneeded. So this should not be exploitable.
show more ...
|
ccfec560 | 07-Dec-2013 |
Anika Henke <anika@selfthinker.org> |
crlf 2 lf whitespace fixes |
6593db43 | 07-Dec-2013 |
Myeongjin <aranet100@gmail.com> |
translation update |
7c586cd8 | 05-Dec-2013 |
anjianshi <anjianshi@gmail.com> |
translation update |
2c01be2f | 03-Dec-2013 |
zamroni <therons@ymail.com> |
translation update |
6b1ab5ac | 02-Dec-2013 |
Antonio Bueno <atnbueno@gmail.com> |
translation update |
1da08fca | 01-Dec-2013 |
Christopher Smith <chris@jalakai.co.uk> |
remove incorrect 'private' restriction from tset method |
3946d216 | 01-Dec-2013 |
Christopher Smith <chris@jalakai.co.uk> |
comment (hide) incomplete export with filter test |