From 04a20c0226117f186e1486ce09dd536cbe4bde6d Mon Sep 17 00:00:00 2001 From: Malcolm Tredinnick Date: Sun, 2 Dec 2007 15:03:36 +0000 Subject: [PATCH] Fixed #6097 -- Fixed some broken RST markup. Thanks, Simeon. git-svn-id: http://code.djangoproject.com/svn/django/trunk@6828 bcc190cf-cafb-0310-a4f2-bffc1f526a37 --- docs/templates.txt | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/docs/templates.txt b/docs/templates.txt index daddc1534c..a32ab27e34 100644 --- a/docs/templates.txt +++ b/docs/templates.txt @@ -340,7 +340,7 @@ That would result in a rendered template like this:: Clearly, user-submitted data shouldn't be trusted blindly and inserted directly into your Web pages, because a malicious user could use this kind of hole to do potentially bad things. This type of security exploit is called a -Cross Site Scripting`_ (XSS) attack. +`Cross Site Scripting`_ (XSS) attack. To avoid this problem, you have two options: @@ -367,6 +367,8 @@ are escaped: Again, we stress that this behavior is on by default. If you're using Django's template system, you're protected. +.. _Cross Site Scripting: http://en.wikipedia.org/wiki/Cross-site_scripting + How to turn it off ------------------