Updated various links in docs
This commit is contained in:
parent
a3830f6d66
commit
e9c5c39631
|
@ -106,4 +106,4 @@ There *may* be minor stylistic differences between supported browsers—for
|
||||||
example, some browsers may not support rounded corners. These are considered
|
example, some browsers may not support rounded corners. These are considered
|
||||||
acceptable variations in rendering.
|
acceptable variations in rendering.
|
||||||
|
|
||||||
.. _YUI's A-grade: http://yuilibrary.com/yui/docs/tutorials/gbs/
|
.. _YUI's A-grade: https://github.com/yui/yui3/wiki/Graded-Browser-Support
|
||||||
|
|
|
@ -10,7 +10,7 @@ Windows Authentication or Apache and `mod_authnz_ldap`_, `CAS`_, `Cosign`_,
|
||||||
`WebAuth`_, `mod_auth_sspi`_, etc.
|
`WebAuth`_, `mod_auth_sspi`_, etc.
|
||||||
|
|
||||||
.. _mod_authnz_ldap: http://httpd.apache.org/docs/2.2/mod/mod_authnz_ldap.html
|
.. _mod_authnz_ldap: http://httpd.apache.org/docs/2.2/mod/mod_authnz_ldap.html
|
||||||
.. _CAS: https://www.apereo.org/cas
|
.. _CAS: https://www.apereo.org/projects/cas
|
||||||
.. _Cosign: http://weblogin.org
|
.. _Cosign: http://weblogin.org
|
||||||
.. _WebAuth: http://www.stanford.edu/services/webauth/
|
.. _WebAuth: http://www.stanford.edu/services/webauth/
|
||||||
.. _mod_auth_sspi: http://sourceforge.net/projects/mod-auth-sspi
|
.. _mod_auth_sspi: http://sourceforge.net/projects/mod-auth-sspi
|
||||||
|
|
|
@ -45,7 +45,7 @@ The `django-jython`_ project contains database backends and management commands
|
||||||
for Django/Jython development. Note that the builtin Django backends won't work
|
for Django/Jython development. Note that the builtin Django backends won't work
|
||||||
on top of Jython.
|
on top of Jython.
|
||||||
|
|
||||||
.. _`django-jython`: http://code.google.com/p/django-jython/
|
.. _`django-jython`: https://github.com/beachmachine/django-jython
|
||||||
|
|
||||||
To install it, follow the `installation instructions`_ detailed on the project
|
To install it, follow the `installation instructions`_ detailed on the project
|
||||||
Web site. Also, read the `database backends`_ documentation there.
|
Web site. Also, read the `database backends`_ documentation there.
|
||||||
|
|
|
@ -62,7 +62,7 @@ If you use some other installation process, you might have to manually
|
||||||
:ref:`uninstall the old Django version <removing-old-versions-of-django>` and
|
:ref:`uninstall the old Django version <removing-old-versions-of-django>` and
|
||||||
should look at the complete installation instructions.
|
should look at the complete installation instructions.
|
||||||
|
|
||||||
.. _pip: http://www.pip-installer.org/
|
.. _pip: https://pip.pypa.io/
|
||||||
.. _virtualenv: http://www.virtualenv.org/
|
.. _virtualenv: http://www.virtualenv.org/
|
||||||
|
|
||||||
Testing
|
Testing
|
||||||
|
|
|
@ -39,7 +39,7 @@ your Python version and follow the installation instructions given there.
|
||||||
Install PIP
|
Install PIP
|
||||||
===========
|
===========
|
||||||
|
|
||||||
`PIP <http://www.pip-installer.org/>`_ is a package manager for Python that
|
`PIP <https://pip.pypa.io/>`_ is a package manager for Python that
|
||||||
uses the `Python Package Index <https://pypi.python.org>`_ to install Python
|
uses the `Python Package Index <https://pypi.python.org>`_ to install Python
|
||||||
packages. PIP will later be used to install Django from PyPI. If you've
|
packages. PIP will later be used to install Django from PyPI. If you've
|
||||||
installed Python 3.4, ``pip`` is included so you may skip this section.
|
installed Python 3.4, ``pip`` is included so you may skip this section.
|
||||||
|
@ -48,7 +48,7 @@ Open a command prompt and execute ``easy_install pip``. This will install
|
||||||
``pip`` on your system. This command will work if you have successfully
|
``pip`` on your system. This command will work if you have successfully
|
||||||
installed Setuptools.
|
installed Setuptools.
|
||||||
|
|
||||||
Alternatively, go to `<http://www.pip-installer.org/en/latest/installing.html>`_
|
Alternatively, go to `<https://pip.pypa.io/en/latest/installing.html>`_
|
||||||
for installing/upgrading instructions.
|
for installing/upgrading instructions.
|
||||||
|
|
||||||
Install Django
|
Install Django
|
||||||
|
|
|
@ -176,7 +176,7 @@ Django's Git repository:
|
||||||
commit message, GitHub will close the pull request, but the Trac plugin
|
commit message, GitHub will close the pull request, but the Trac plugin
|
||||||
will also close the same numbered ticket in Trac.
|
will also close the same numbered ticket in Trac.
|
||||||
|
|
||||||
.. _Trac plugin: https://github.com/aaugustin/trac-github
|
.. _Trac plugin: https://github.com/trac-hacks/trac-github
|
||||||
|
|
||||||
* If your commit references a ticket in the Django `ticket tracker`_ but
|
* If your commit references a ticket in the Django `ticket tracker`_ but
|
||||||
does *not* close the ticket, include the phrase "Refs #xxxxx", where "xxxxx"
|
does *not* close the ticket, include the phrase "Refs #xxxxx", where "xxxxx"
|
||||||
|
|
|
@ -183,7 +183,7 @@ associated tests will be skipped.
|
||||||
.. _gettext: http://www.gnu.org/software/gettext/manual/gettext.html
|
.. _gettext: http://www.gnu.org/software/gettext/manual/gettext.html
|
||||||
.. _selenium: https://pypi.python.org/pypi/selenium
|
.. _selenium: https://pypi.python.org/pypi/selenium
|
||||||
.. _sqlparse: https://pypi.python.org/pypi/sqlparse
|
.. _sqlparse: https://pypi.python.org/pypi/sqlparse
|
||||||
.. _pip requirements files: http://www.pip-installer.org/en/latest/user_guide.html#requirements-files
|
.. _pip requirements files: https://pip.pypa.io/en/latest/user_guide.html#requirements-files
|
||||||
|
|
||||||
Code coverage
|
Code coverage
|
||||||
~~~~~~~~~~~~~
|
~~~~~~~~~~~~~
|
||||||
|
|
|
@ -52,7 +52,7 @@ Journal-World`_ of Lawrence, Kansas, USA.
|
||||||
.. _soundslice: https://www.soundslice.com/
|
.. _soundslice: https://www.soundslice.com/
|
||||||
.. _simon willison: http://simonwillison.net/
|
.. _simon willison: http://simonwillison.net/
|
||||||
.. _web-development blog: `simon willison`_
|
.. _web-development blog: `simon willison`_
|
||||||
.. _jacob kaplan-moss: http://jacobian.org/
|
.. _jacob kaplan-moss: https://jacobian.org/
|
||||||
.. _revolution systems: http://revsys.com/
|
.. _revolution systems: http://revsys.com/
|
||||||
.. _wilson miner: http://wilsonminer.com/
|
.. _wilson miner: http://wilsonminer.com/
|
||||||
.. _heroku: https://heroku.com/
|
.. _heroku: https://heroku.com/
|
||||||
|
@ -151,7 +151,7 @@ Karen Tracey
|
||||||
.. _Jannis Leidel: https://jezdez.com/
|
.. _Jannis Leidel: https://jezdez.com/
|
||||||
.. _Bauhaus-University Weimar: http://www.uni-weimar.de/
|
.. _Bauhaus-University Weimar: http://www.uni-weimar.de/
|
||||||
.. _virtualenv: http://www.virtualenv.org/
|
.. _virtualenv: http://www.virtualenv.org/
|
||||||
.. _pip: http://www.pip-installer.org/
|
.. _pip: https://pip.pypa.io/
|
||||||
.. _Mozilla: https://www.mozilla.org/
|
.. _Mozilla: https://www.mozilla.org/
|
||||||
|
|
||||||
`Andrew Godwin`_
|
`Andrew Godwin`_
|
||||||
|
@ -232,7 +232,7 @@ Tim Graham
|
||||||
things Django and Python.
|
things Django and Python.
|
||||||
|
|
||||||
.. _Idan Gazit: http://idan.gazit.me
|
.. _Idan Gazit: http://idan.gazit.me
|
||||||
.. _photographer: http://flickr.com/photos/idangazit
|
.. _photographer: https://flickr.com/photos/idangazit
|
||||||
.. _Pixane: http://pixane.com
|
.. _Pixane: http://pixane.com
|
||||||
.. _Skills: http://skillsapp.com
|
.. _Skills: http://skillsapp.com
|
||||||
|
|
||||||
|
@ -421,8 +421,8 @@ Daniele Procida
|
||||||
that goal in mind. Erik lives in Amsterdam, The Netherlands.
|
that goal in mind. Erik lives in Amsterdam, The Netherlands.
|
||||||
|
|
||||||
.. _Erik Romijn: http://erik.io/
|
.. _Erik Romijn: http://erik.io/
|
||||||
.. _Solid Links: http://solidlinks.nl/
|
.. _Solid Links: https://solidlinks.nl/
|
||||||
.. _Erik's Pony Checkup: http://ponycheckup.com/
|
.. _Erik's Pony Checkup: https://ponycheckup.com/
|
||||||
|
|
||||||
`Loïc Bistuer`_
|
`Loïc Bistuer`_
|
||||||
Loïc studied telecommunications engineering and works as an independent
|
Loïc studied telecommunications engineering and works as an independent
|
||||||
|
@ -537,7 +537,7 @@ Daniele Procida
|
||||||
|
|
||||||
.. _Tomek Paczkowski: https://hauru.eu
|
.. _Tomek Paczkowski: https://hauru.eu
|
||||||
.. _DjangoCon Europe 2013: http://love.djangocircus.com
|
.. _DjangoCon Europe 2013: http://love.djangocircus.com
|
||||||
.. _Django Girls: http://djangogirls.org
|
.. _Django Girls: https://djangogirls.org
|
||||||
.. _Squirrel: http://squirrel.me
|
.. _Squirrel: http://squirrel.me
|
||||||
|
|
||||||
`Ola Sitarska`_
|
`Ola Sitarska`_
|
||||||
|
@ -558,8 +558,8 @@ Daniele Procida
|
||||||
.. _Ola Sitarska: http://ola.sitarska.com/
|
.. _Ola Sitarska: http://ola.sitarska.com/
|
||||||
.. _DjangoCon Europe 2013: http://love.djangocircus.com
|
.. _DjangoCon Europe 2013: http://love.djangocircus.com
|
||||||
.. _Django Girls Tutorial: http://tutorial.djangogirls.org
|
.. _Django Girls Tutorial: http://tutorial.djangogirls.org
|
||||||
.. _Django Girls: http://djangogirls.org
|
.. _Django Girls: https://djangogirls.org
|
||||||
.. _Potato: http://p.ota.to
|
.. _Potato: https://p.ota.to
|
||||||
|
|
||||||
Past team members
|
Past team members
|
||||||
=================
|
=================
|
||||||
|
|
|
@ -35,7 +35,7 @@ load the resource in a frame if the request originated from the same site. If
|
||||||
the header is set to ``DENY`` then the browser will block the resource from
|
the header is set to ``DENY`` then the browser will block the resource from
|
||||||
loading in a frame no matter which site made the request.
|
loading in a frame no matter which site made the request.
|
||||||
|
|
||||||
.. _X-Frame-Options: https://developer.mozilla.org/en/The_X-FRAME-OPTIONS_response_header
|
.. _X-Frame-Options: https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options
|
||||||
|
|
||||||
Django provides a few simple ways to include this header in responses from your
|
Django provides a few simple ways to include this header in responses from your
|
||||||
site:
|
site:
|
||||||
|
@ -127,5 +127,5 @@ See also
|
||||||
|
|
||||||
A `complete list`_ of browsers supporting ``X-Frame-Options``.
|
A `complete list`_ of browsers supporting ``X-Frame-Options``.
|
||||||
|
|
||||||
.. _complete list: https://developer.mozilla.org/en/The_X-FRAME-OPTIONS_response_header#Browser_compatibility
|
.. _complete list: https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options#Browser_compatibility
|
||||||
.. _other clickjacking prevention techniques: https://en.wikipedia.org/wiki/Clickjacking#Prevention
|
.. _other clickjacking prevention techniques: https://en.wikipedia.org/wiki/Clickjacking#Prevention
|
||||||
|
|
|
@ -22,7 +22,7 @@ to raster (image) data.
|
||||||
some of the capabilities of OGR and GDAL's raster features at this time.
|
some of the capabilities of OGR and GDAL's raster features at this time.
|
||||||
|
|
||||||
__ http://www.gdal.org/
|
__ http://www.gdal.org/
|
||||||
__ http://www.gdal.org/ogr/
|
__ http://www.gdal.org/ogr_arch.html
|
||||||
|
|
||||||
Overview
|
Overview
|
||||||
========
|
========
|
||||||
|
@ -94,7 +94,7 @@ each feature in that layer.
|
||||||
|
|
||||||
Returns the name of the data source.
|
Returns the name of the data source.
|
||||||
|
|
||||||
__ http://www.gdal.org/ogr/ogr_formats.html
|
__ http://www.gdal.org/ogr_formats.html
|
||||||
|
|
||||||
``Layer``
|
``Layer``
|
||||||
---------
|
---------
|
||||||
|
@ -455,7 +455,7 @@ systems and coordinate transformation::
|
||||||
reading vector data from :class:`Layer` (which is in turn a part of
|
reading vector data from :class:`Layer` (which is in turn a part of
|
||||||
a :class:`DataSource`).
|
a :class:`DataSource`).
|
||||||
|
|
||||||
__ http://www.gdal.org/ogr/classOGRGeometry.html
|
__ http://www.gdal.org/classOGRGeometry.html
|
||||||
|
|
||||||
.. classmethod:: from_bbox(bbox)
|
.. classmethod:: from_bbox(bbox)
|
||||||
|
|
||||||
|
|
|
@ -263,4 +263,4 @@ the GDAL library. For example::
|
||||||
It is easier to install the shifting files now, then to have debug a
|
It is easier to install the shifting files now, then to have debug a
|
||||||
problem caused by their absence later.
|
problem caused by their absence later.
|
||||||
.. [#] Specifically, GeoDjango provides support for the `OGR
|
.. [#] Specifically, GeoDjango provides support for the `OGR
|
||||||
<http://gdal.org/ogr>`_ library, a component of GDAL.
|
<http://gdal.org/ogr_arch.html>`_ library, a component of GDAL.
|
||||||
|
|
|
@ -234,15 +234,12 @@ Foundation, however, this is not required.
|
||||||
Python
|
Python
|
||||||
^^^^^^
|
^^^^^^
|
||||||
|
|
||||||
Although OS X comes with Python installed, users can use framework
|
Although OS X comes with Python installed, users can use `framework
|
||||||
installers (`2.7`__, `3.2`__ and `3.3`__ are available) provided by
|
installers`__ provided by the Python Software Foundation. An advantage to
|
||||||
the Python Software Foundation. An advantage to using the installer is
|
using the installer is that OS X's Python will remain "pristine" for internal
|
||||||
that OS X's Python will remain "pristine" for internal operating system
|
operating system use.
|
||||||
use.
|
|
||||||
|
|
||||||
__ https://python.org/ftp/python/2.7.5/
|
__ https://www.python.org/ftp/python/
|
||||||
__ https://python.org/ftp/python/3.2.5/
|
|
||||||
__ https://python.org/ftp/python/3.3.2/
|
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
|
|
|
@ -174,5 +174,5 @@ Measurement API
|
||||||
|
|
||||||
.. rubric:: Footnotes
|
.. rubric:: Footnotes
|
||||||
.. [#] `Robert Coup <https://koordinates.com/>`_ is the initial author of the measure objects,
|
.. [#] `Robert Coup <https://koordinates.com/>`_ is the initial author of the measure objects,
|
||||||
and was inspired by Brian Beck's work in `geopy <http://code.google.com/p/geopy/>`_
|
and was inspired by Brian Beck's work in `geopy <https://github.com/geopy/geopy/>`_
|
||||||
and Geoff Biggs' PhD work on dimensioned units for robotics.
|
and Geoff Biggs' PhD work on dimensioned units for robotics.
|
||||||
|
|
|
@ -118,7 +118,7 @@ are not.
|
||||||
|
|
||||||
Most people are familiar with using latitude and longitude to reference a
|
Most people are familiar with using latitude and longitude to reference a
|
||||||
location on the earth's surface. However, latitude and longitude are angles,
|
location on the earth's surface. However, latitude and longitude are angles,
|
||||||
not distances. [#fnharvard]_ In other words, while the shortest path between two points on
|
not distances. In other words, while the shortest path between two points on
|
||||||
a flat surface is a straight line, the shortest path between two points on a curved
|
a flat surface is a straight line, the shortest path between two points on a curved
|
||||||
surface (such as the earth) is an *arc* of a `great circle`__. [#fnthematic]_ Thus,
|
surface (such as the earth) is an *arc* of a `great circle`__. [#fnthematic]_ Thus,
|
||||||
additional computation is required to obtain distances in planar units (e.g.,
|
additional computation is required to obtain distances in planar units (e.g.,
|
||||||
|
@ -281,7 +281,6 @@ for example::
|
||||||
.. [#fnogc] OpenGIS Consortium, Inc., `Simple Feature Specification For SQL <http://www.opengeospatial.org/standards/sfs>`_.
|
.. [#fnogc] OpenGIS Consortium, Inc., `Simple Feature Specification For SQL <http://www.opengeospatial.org/standards/sfs>`_.
|
||||||
.. [#fnogcsrid] *See id.* at Ch. 2.3.8, p. 39 (Geometry Values and Spatial Reference Systems).
|
.. [#fnogcsrid] *See id.* at Ch. 2.3.8, p. 39 (Geometry Values and Spatial Reference Systems).
|
||||||
.. [#fnsrid] Typically, SRID integer corresponds to an EPSG (`European Petroleum Survey Group <http://www.epsg.org>`_) identifier. However, it may also be associated with custom projections defined in spatial database's spatial reference systems table.
|
.. [#fnsrid] Typically, SRID integer corresponds to an EPSG (`European Petroleum Survey Group <http://www.epsg.org>`_) identifier. However, it may also be associated with custom projections defined in spatial database's spatial reference systems table.
|
||||||
.. [#fnharvard] Harvard Graduate School of Design, `An Overview of Geodesy and Geographic Referencing Systems <http://www.gsd.harvard.edu/gis/manual/projections/fundamentals/>`_. This is an excellent resource for an overview of principles relating to geographic and Cartesian coordinate systems.
|
|
||||||
.. [#fnthematic] Terry A. Slocum, Robert B. McMaster, Fritz C. Kessler, & Hugh H. Howard, *Thematic Cartography and Geographic Visualization* (Prentice Hall, 2nd edition), at Ch. 7.1.3.
|
.. [#fnthematic] Terry A. Slocum, Robert B. McMaster, Fritz C. Kessler, & Hugh H. Howard, *Thematic Cartography and Geographic Visualization* (Prentice Hall, 2nd edition), at Ch. 7.1.3.
|
||||||
.. [#fndist] This limitation does not apply to PostGIS.
|
.. [#fndist] This limitation does not apply to PostGIS.
|
||||||
.. [#fngeography] Please refer to the `PostGIS Geography Type <http://postgis.net/docs/manual-2.1/using_postgis_dbmanagement.html#PostGIS_Geography>`_ documentation for more details.
|
.. [#fngeography] Please refer to the `PostGIS Geography Type <http://postgis.net/docs/manual-2.1/using_postgis_dbmanagement.html#PostGIS_Geography>`_ documentation for more details.
|
||||||
|
|
|
@ -79,8 +79,8 @@ see `the admin`_ below for more details.
|
||||||
A contributor to djangosnippets__ has written a script that'll `scan your
|
A contributor to djangosnippets__ has written a script that'll `scan your
|
||||||
models.py and generate a corresponding admin.py`__.
|
models.py and generate a corresponding admin.py`__.
|
||||||
|
|
||||||
__ http://www.djangosnippets.org/
|
__ https://www.djangosnippets.org/
|
||||||
__ http://www.djangosnippets.org/snippets/603/
|
__ https://www.djangosnippets.org/snippets/603/
|
||||||
|
|
||||||
Example
|
Example
|
||||||
~~~~~~~
|
~~~~~~~
|
||||||
|
|
|
@ -122,7 +122,7 @@ The admin sports a modern, flat design. It still provides a fully-functional
|
||||||
experience to `YUI's A-grade`_ browsers. Older browser may experience varying
|
experience to `YUI's A-grade`_ browsers. Older browser may experience varying
|
||||||
levels of graceful degradation.
|
levels of graceful degradation.
|
||||||
|
|
||||||
.. _YUI's A-grade: http://yuilibrary.com/yui/docs/tutorials/gbs/
|
.. _YUI's A-grade: https://github.com/yui/yui3/wiki/Graded-Browser-Support
|
||||||
|
|
||||||
Minor features
|
Minor features
|
||||||
~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~
|
||||||
|
|
|
@ -42,7 +42,7 @@ issued at the time and CVEs may not have been assigned.
|
||||||
August 16, 2006 - CVE-2007-0404
|
August 16, 2006 - CVE-2007-0404
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2007-0404 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0404&cid=3>`_: Filename validation issue in translation framework. `Full description <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
|
`CVE-2007-0404 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0404&cid=3>`_: Filename validation issue in translation framework. `Full description <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -54,7 +54,7 @@ Versions affected
|
||||||
January 21, 2007 - CVE-2007-0405
|
January 21, 2007 - CVE-2007-0405
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2007-0405 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0405&cid=3>`_: Apparent "caching" of authenticated user. `Full description <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
|
`CVE-2007-0405 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0405&cid=3>`_: Apparent "caching" of authenticated user. `Full description <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -70,7 +70,7 @@ security process. These are listed below.
|
||||||
October 26, 2007 - CVE-2007-5712
|
October 26, 2007 - CVE-2007-5712
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2007-5712 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5712&cid=3>`_: Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
|
`CVE-2007-5712 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5712&cid=3>`_: Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -82,7 +82,7 @@ Versions affected
|
||||||
May 14, 2008 - CVE-2008-2302
|
May 14, 2008 - CVE-2008-2302
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2008-2302 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2302&cid=3>`_: XSS via admin login redirect. `Full description <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
|
`CVE-2008-2302 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2302&cid=3>`_: XSS via admin login redirect. `Full description <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -94,7 +94,7 @@ Versions affected
|
||||||
September 2, 2008 - CVE-2008-3909
|
September 2, 2008 - CVE-2008-3909
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2008-3909 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3909&cid=3>`_: CSRF via preservation of POST data during admin login. `Full description <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
|
`CVE-2008-3909 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3909&cid=3>`_: CSRF via preservation of POST data during admin login. `Full description <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -106,7 +106,7 @@ Versions affected
|
||||||
July 28, 2009 - CVE-2009-2659
|
July 28, 2009 - CVE-2009-2659
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2009-2659 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2659&cid=3>`_: Directory-traversal in development server media handler. `Full description <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
|
`CVE-2009-2659 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2659&cid=3>`_: Directory-traversal in development server media handler. `Full description <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -117,7 +117,7 @@ Versions affected
|
||||||
October 9, 2009 - CVE-2009-3965
|
October 9, 2009 - CVE-2009-3965
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2009-3965 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3695&cid=3>`_: Denial-of-service via pathological regular expression performance. `Full description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
|
`CVE-2009-3965 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3695&cid=3>`_: Denial-of-service via pathological regular expression performance. `Full description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -128,7 +128,7 @@ Versions affected
|
||||||
September 8, 2010 - CVE-2010-3082
|
September 8, 2010 - CVE-2010-3082
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2010-3082 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3082&cid=3>`_: XSS via trusting unsafe cookie value. `Full description <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
|
`CVE-2010-3082 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3082&cid=3>`_: XSS via trusting unsafe cookie value. `Full description <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -138,7 +138,7 @@ Versions affected
|
||||||
December 22, 2010 - CVE-2010-4534
|
December 22, 2010 - CVE-2010-4534
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2010-4534 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4534&cid=3>`_: Information leakage in administrative interface. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
|
`CVE-2010-4534 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4534&cid=3>`_: Information leakage in administrative interface. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -149,7 +149,7 @@ Versions affected
|
||||||
December 22, 2010 - CVE-2010-4535
|
December 22, 2010 - CVE-2010-4535
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2010-4535 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4535&cid=2>`_: Denial-of-service in password-reset mechanism. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
|
`CVE-2010-4535 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4535&cid=2>`_: Denial-of-service in password-reset mechanism. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -160,7 +160,7 @@ Versions affected
|
||||||
February 8, 2011 - CVE-2011-0696
|
February 8, 2011 - CVE-2011-0696
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-0696 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0696&cid=2>`_: CSRF via forged HTTP headers. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
`CVE-2011-0696 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0696&cid=2>`_: CSRF via forged HTTP headers. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -171,7 +171,7 @@ Versions affected
|
||||||
February 8, 2011 - CVE-2011-0697
|
February 8, 2011 - CVE-2011-0697
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-0697 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0697&cid=2>`_: XSS via unsanitized names of uploaded files. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
`CVE-2011-0697 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0697&cid=2>`_: XSS via unsanitized names of uploaded files. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -182,7 +182,7 @@ Versions affected
|
||||||
February 8, 2011 - CVE-2011-0698
|
February 8, 2011 - CVE-2011-0698
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-0698 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0698&cid=2>`_: Directory-traversal on Windows via incorrect path-separator handling. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
`CVE-2011-0698 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0698&cid=2>`_: Directory-traversal on Windows via incorrect path-separator handling. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -193,7 +193,7 @@ Versions affected
|
||||||
September 9, 2011 - CVE-2011-4136
|
September 9, 2011 - CVE-2011-4136
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-4136 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4136&cid=2>`_: Session manipulation when using memory-cache-backed session. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
`CVE-2011-4136 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4136&cid=2>`_: Session manipulation when using memory-cache-backed session. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -204,7 +204,7 @@ Versions affected
|
||||||
September 9, 2011 - CVE-2011-4137
|
September 9, 2011 - CVE-2011-4137
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-4137 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4137&cid=2>`_: Denial-of-service via via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
`CVE-2011-4137 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4137&cid=2>`_: Denial-of-service via via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -215,7 +215,7 @@ Versions affected
|
||||||
September 9, 2011 - CVE-2011-4138
|
September 9, 2011 - CVE-2011-4138
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-4138 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4138&cid=2>`_: Information leakage/arbitrary request issuance via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
`CVE-2011-4138 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4138&cid=2>`_: Information leakage/arbitrary request issuance via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -226,7 +226,7 @@ Versions affected
|
||||||
September 9, 2011 - CVE-2011-4139
|
September 9, 2011 - CVE-2011-4139
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-4139 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4139&cid=2>`_: ``Host`` header cache poisoning. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
`CVE-2011-4139 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4139&cid=2>`_: ``Host`` header cache poisoning. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -237,7 +237,7 @@ Versions affected
|
||||||
September 9, 2011 - CVE-2011-4140
|
September 9, 2011 - CVE-2011-4140
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2011-4140 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4140&cid=2>`_: Potential CSRF via ``Host`` header. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
`CVE-2011-4140 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4140&cid=2>`_: Potential CSRF via ``Host`` header. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -250,7 +250,7 @@ This notification was an advisory only, so no patches were issued.
|
||||||
July 30, 2012 - CVE-2012-3442
|
July 30, 2012 - CVE-2012-3442
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2012-3442 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3442&cid=2>`_: XSS via failure to validate redirect scheme. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
`CVE-2012-3442 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3442&cid=2>`_: XSS via failure to validate redirect scheme. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -261,7 +261,7 @@ Versions affected
|
||||||
July 30, 2012 - CVE-2012-3443
|
July 30, 2012 - CVE-2012-3443
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2012-3443 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3443&cid=2>`_: Denial-of-service via compressed image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
`CVE-2012-3443 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3443&cid=2>`_: Denial-of-service via compressed image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -272,7 +272,7 @@ Versions affected
|
||||||
July 30, 2012 - CVE-2012-3444
|
July 30, 2012 - CVE-2012-3444
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2012-3444 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3444&cid=2>`_: Denial-of-service via large image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
`CVE-2012-3444 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3444&cid=2>`_: Denial-of-service via large image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -283,7 +283,7 @@ Versions affected
|
||||||
October 17, 2012 - CVE-2012-4520
|
October 17, 2012 - CVE-2012-4520
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2012-4520 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4520&cid=2>`_: ``Host`` header poisoning. `Full description <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
|
`CVE-2012-4520 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4520&cid=2>`_: ``Host`` header poisoning. `Full description <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -327,7 +327,7 @@ Versions affected
|
||||||
February 19, 2013 - CVE-2013-1664/1665
|
February 19, 2013 - CVE-2013-1664/1665
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-1664 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1664&cid=2>`_ and `CVE-2013-1665 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1665&cid=2>`_: Entity-based attacks against Python XML libraries. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
`CVE-2013-1664 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1664&cid=2>`_ and `CVE-2013-1665 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1665&cid=2>`_: Entity-based attacks against Python XML libraries. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -338,7 +338,7 @@ Versions affected
|
||||||
February 19, 2013 - CVE-2013-0305
|
February 19, 2013 - CVE-2013-0305
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-0305 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0305&cid=2>`_: Information leakage via admin history log. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
`CVE-2013-0305 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0305&cid=2>`_: Information leakage via admin history log. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -349,7 +349,7 @@ Versions affected
|
||||||
February 19, 2013 - CVE-2013-0306
|
February 19, 2013 - CVE-2013-0306
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-0306 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0306&cid=2>`_: Denial-of-service via formset ``max_num`` bypass. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
`CVE-2013-0306 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0306&cid=2>`_: Denial-of-service via formset ``max_num`` bypass. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -360,7 +360,7 @@ Versions affected
|
||||||
August 13, 2013 - CVE-2013-4249
|
August 13, 2013 - CVE-2013-4249
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-4249 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4249&cid=2>`_: XSS via admin trusting ``URLField`` values. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
|
`CVE-2013-4249 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4249&cid=2>`_: XSS via admin trusting ``URLField`` values. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -370,7 +370,7 @@ Versions affected
|
||||||
August 13, 2013 - CVE-2013-6044
|
August 13, 2013 - CVE-2013-6044
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-6044 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6044&cid=2>`_: Possible XSS via unvalidated URL redirect schemes. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
|
`CVE-2013-6044 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6044&cid=2>`_: Possible XSS via unvalidated URL redirect schemes. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -381,7 +381,7 @@ Versions affected
|
||||||
September 10, 2013 - CVE-2013-4315
|
September 10, 2013 - CVE-2013-4315
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2013-4315 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4315&cid=2>`_ Directory-traversal via ``ssi`` template tag. `Full description <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
|
`CVE-2013-4315 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4315&cid=2>`_ Directory-traversal via ``ssi`` template tag. `Full description <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -403,7 +403,7 @@ Versions affected
|
||||||
April 21, 2014 - CVE-2014-0472
|
April 21, 2014 - CVE-2014-0472
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0472 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0472&cid=2>`_: Unexpected code execution using ``reverse()``. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
`CVE-2014-0472 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0472&cid=2>`_: Unexpected code execution using ``reverse()``. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -416,7 +416,7 @@ Versions affected
|
||||||
April 21, 2014 - CVE-2014-0473
|
April 21, 2014 - CVE-2014-0473
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0473 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0473&cid=2>`_: Caching of anonymous pages could reveal CSRF token. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
`CVE-2014-0473 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0473&cid=2>`_: Caching of anonymous pages could reveal CSRF token. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -429,7 +429,7 @@ Versions affected
|
||||||
April 21, 2014 - CVE-2014-0474
|
April 21, 2014 - CVE-2014-0474
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0474 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0474&cid=2>`_: MySQL typecasting causes unexpected query results. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
`CVE-2014-0474 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0474&cid=2>`_: MySQL typecasting causes unexpected query results. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -442,7 +442,7 @@ Versions affected
|
||||||
May 18, 2014 - CVE-2014-1418
|
May 18, 2014 - CVE-2014-1418
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-1418 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1418&cid=2>`_: Caches may be allowed to store and serve private data. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
|
`CVE-2014-1418 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1418&cid=2>`_: Caches may be allowed to store and serve private data. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -455,7 +455,7 @@ Versions affected
|
||||||
May 18, 2014 - CVE-2014-3730
|
May 18, 2014 - CVE-2014-3730
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-3730 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3730&cid=2>`_: Malformed URLs from user input incorrectly validated. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
|
`CVE-2014-3730 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3730&cid=2>`_: Malformed URLs from user input incorrectly validated. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -468,7 +468,7 @@ Versions affected
|
||||||
August 20, 2014 - CVE-2014-0480
|
August 20, 2014 - CVE-2014-0480
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0480 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0480&cid=2>`_: reverse() can generate URLs pointing to other hosts. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
`CVE-2014-0480 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0480&cid=2>`_: reverse() can generate URLs pointing to other hosts. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -481,7 +481,7 @@ Versions affected
|
||||||
August 20, 2014 - CVE-2014-0481
|
August 20, 2014 - CVE-2014-0481
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0481 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0481&cid=2>`_: File upload denial of service. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
`CVE-2014-0481 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0481&cid=2>`_: File upload denial of service. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -494,7 +494,7 @@ Versions affected
|
||||||
August 20, 2014 - CVE-2014-0482
|
August 20, 2014 - CVE-2014-0482
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0482 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0482&cid=2>`_: RemoteUserMiddleware session hijacking. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
`CVE-2014-0482 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0482&cid=2>`_: RemoteUserMiddleware session hijacking. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -507,7 +507,7 @@ Versions affected
|
||||||
August 20, 2014 - CVE-2014-0483
|
August 20, 2014 - CVE-2014-0483
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2014-0483 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0483&cid=2>`_: Data leakage via querystring manipulation in admin. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
`CVE-2014-0483 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0483&cid=2>`_: Data leakage via querystring manipulation in admin. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -520,7 +520,7 @@ Versions affected
|
||||||
January 13, 2015 - CVE-2015-0219
|
January 13, 2015 - CVE-2015-0219
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-0219 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0219&cid=2>`_:
|
`CVE-2015-0219 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0219&cid=2>`_:
|
||||||
WSGI header spoofing via underscore/dash conflation.
|
WSGI header spoofing via underscore/dash conflation.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
||||||
|
|
||||||
|
@ -534,7 +534,7 @@ Versions affected
|
||||||
January 13, 2015 - CVE-2015-0220
|
January 13, 2015 - CVE-2015-0220
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-0220 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0220&cid=2>`_: Mitigated possible XSS attack via user-supplied redirect URLs. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
`CVE-2015-0220 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0220&cid=2>`_: Mitigated possible XSS attack via user-supplied redirect URLs. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
||||||
|
|
||||||
Versions affected
|
Versions affected
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -546,7 +546,7 @@ Versions affected
|
||||||
January 13, 2015 - CVE-2015-0221
|
January 13, 2015 - CVE-2015-0221
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-0221 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0221&cid=2>`_:
|
`CVE-2015-0221 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0221&cid=2>`_:
|
||||||
Denial-of-service attack against ``django.views.static.serve()``.
|
Denial-of-service attack against ``django.views.static.serve()``.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
||||||
|
|
||||||
|
@ -560,7 +560,7 @@ Versions affected
|
||||||
January 13, 2015 - CVE-2015-0222
|
January 13, 2015 - CVE-2015-0222
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-0222 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0222&cid=2>`_:
|
`CVE-2015-0222 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0222&cid=2>`_:
|
||||||
Database denial-of-service with ``ModelMultipleChoiceField``.
|
Database denial-of-service with ``ModelMultipleChoiceField``.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
|
||||||
|
|
||||||
|
@ -573,7 +573,7 @@ Versions affected
|
||||||
March 9, 2015 - CVE-2015-2241
|
March 9, 2015 - CVE-2015-2241
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-2241 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2241&cid=2>`_:
|
`CVE-2015-2241 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2241&cid=2>`_:
|
||||||
XSS attack via properties in ``ModelAdmin.readonly_fields``.
|
XSS attack via properties in ``ModelAdmin.readonly_fields``.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/mar/09/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/mar/09/security-releases/>`__
|
||||||
|
|
||||||
|
@ -586,7 +586,7 @@ Versions affected
|
||||||
March 18, 2015 - CVE-2015-2316
|
March 18, 2015 - CVE-2015-2316
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-2316 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2316&cid=2>`_:
|
`CVE-2015-2316 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2316&cid=2>`_:
|
||||||
Denial-of-service possibility with ``strip_tags()``.
|
Denial-of-service possibility with ``strip_tags()``.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
|
||||||
|
|
||||||
|
@ -600,7 +600,7 @@ Versions affected
|
||||||
March 18, 2015 - CVE-2015-2317
|
March 18, 2015 - CVE-2015-2317
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-2317 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2317&cid=2>`_:
|
`CVE-2015-2317 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2317&cid=2>`_:
|
||||||
Mitigated possible XSS attack via user-supplied redirect URLs.
|
Mitigated possible XSS attack via user-supplied redirect URLs.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
|
||||||
|
|
||||||
|
@ -615,7 +615,7 @@ Versions affected
|
||||||
May 20, 2015 - CVE-2015-3982
|
May 20, 2015 - CVE-2015-3982
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-3982 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3982&cid=2>`_:
|
`CVE-2015-3982 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3982&cid=2>`_:
|
||||||
Fixed session flushing in the cached_db backend.
|
Fixed session flushing in the cached_db backend.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/may/20/security-release/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/may/20/security-release/>`__
|
||||||
|
|
||||||
|
@ -627,7 +627,7 @@ Versions affected
|
||||||
July 8, 2015 - CVE-2015-5143
|
July 8, 2015 - CVE-2015-5143
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-5143 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5143&cid=2>`_:
|
`CVE-2015-5143 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5143&cid=2>`_:
|
||||||
Denial-of-service possibility by filling session store.
|
Denial-of-service possibility by filling session store.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
||||||
|
|
||||||
|
@ -641,7 +641,7 @@ Versions affected
|
||||||
July 8, 2015 - CVE-2015-5144
|
July 8, 2015 - CVE-2015-5144
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-5144 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5144&cid=2>`_:
|
`CVE-2015-5144 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5144&cid=2>`_:
|
||||||
Header injection possibility since validators accept newlines in input.
|
Header injection possibility since validators accept newlines in input.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
||||||
|
|
||||||
|
@ -655,7 +655,7 @@ Versions affected
|
||||||
July 8, 2015 - CVE-2015-5145
|
July 8, 2015 - CVE-2015-5145
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
`CVE-2015-5145 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5145&cid=2>`_:
|
`CVE-2015-5145 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5145&cid=2>`_:
|
||||||
Denial-of-service possibility in URL validation.
|
Denial-of-service possibility in URL validation.
|
||||||
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
`Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
|
||||||
|
|
||||||
|
|
|
@ -184,10 +184,10 @@ This is the recommended way to install Django.
|
||||||
privileges, and this will install Django in the virtualenv's
|
privileges, and this will install Django in the virtualenv's
|
||||||
``site-packages`` directory.
|
``site-packages`` directory.
|
||||||
|
|
||||||
.. _pip: http://www.pip-installer.org/
|
.. _pip: https://pip.pypa.io/
|
||||||
.. _virtualenv: http://www.virtualenv.org/
|
.. _virtualenv: http://www.virtualenv.org/
|
||||||
.. _virtualenvwrapper: http://virtualenvwrapper.readthedocs.org/en/latest/
|
.. _virtualenvwrapper: http://virtualenvwrapper.readthedocs.org/en/latest/
|
||||||
.. _standalone pip installer: http://www.pip-installer.org/en/latest/installing.html#install-pip
|
.. _standalone pip installer: https://pip.pypa.io/en/latest/installing.html#install-pip
|
||||||
|
|
||||||
Installing an official release manually
|
Installing an official release manually
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
|
@ -245,7 +245,7 @@ consequence, the following pattern is sometimes necessary::
|
||||||
|
|
||||||
Be cautious if you have to `index bytestrings`_.
|
Be cautious if you have to `index bytestrings`_.
|
||||||
|
|
||||||
.. _index bytestrings: https://docs.python.org/3/howto/pyporting.html#indexing-bytes-objects
|
.. _index bytestrings: https://docs.python.org/3/howto/pyporting.html#text-versus-binary-data
|
||||||
|
|
||||||
Exceptions
|
Exceptions
|
||||||
~~~~~~~~~~
|
~~~~~~~~~~
|
||||||
|
|
|
@ -271,4 +271,4 @@ security protection of the Web server, operating system and other components.
|
||||||
* It is a good idea to limit the accessibility of your caching system and
|
* It is a good idea to limit the accessibility of your caching system and
|
||||||
database using a firewall.
|
database using a firewall.
|
||||||
|
|
||||||
.. _LimitRequestBody: http://httpd.apache.org/docs/2.2/mod/core.html#limitrequestbody
|
.. _LimitRequestBody: http://httpd.apache.org/docs/2.4/mod/core.html#limitrequestbody
|
||||||
|
|
Loading…
Reference in New Issue