mirror of
https://github.com/django/django.git
synced 2025-03-31 19:46:42 +00:00
[1.6.x] Fixed spelling mistake in file docs.
Backport of a3e88e64a4 from master
This commit is contained in:
parent
fa76275e8a
commit
adb0c535a9
@ -90,7 +90,7 @@ to the ``get_valid_name()`` method described above.
|
|||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the destination
|
etc.) was appended to the filename until an available name in the destination
|
||||||
directory was found. A malicious user could exploit this deterministic
|
directory was found. A malicious user could exploit this deterministic
|
||||||
algorithm to create a denial-of-service attack. This change was also made
|
algorithm to create a denial-of-service attack. This change was also made
|
||||||
in Django 1.5.9 and 1.4.14.
|
in Django 1.5.9 and 1.4.14.
|
||||||
|
@ -88,7 +88,7 @@ The Storage Class
|
|||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the
|
etc.) was appended to the filename until an available name in the
|
||||||
destination directory was found. A malicious user could exploit this
|
destination directory was found. A malicious user could exploit this
|
||||||
deterministic algorithm to create a denial-of-service attack. This
|
deterministic algorithm to create a denial-of-service attack. This
|
||||||
change was also made in Django 1.5.9 and 1.4.14.
|
change was also made in Django 1.5.9 and 1.4.14.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user