Fixed #6097 -- Fixed some broken RST markup. Thanks, Simeon.

git-svn-id: http://code.djangoproject.com/svn/django/trunk@6828 bcc190cf-cafb-0310-a4f2-bffc1f526a37
This commit is contained in:
Malcolm Tredinnick 2007-12-02 15:03:36 +00:00
parent 0c1ba467ae
commit 04a20c0226
1 changed files with 3 additions and 1 deletions

View File

@ -340,7 +340,7 @@ That would result in a rendered template like this::
Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
into your Web pages, because a malicious user could use this kind of hole to
do potentially bad things. This type of security exploit is called a
Cross Site Scripting`_ (XSS) attack.
`Cross Site Scripting`_ (XSS) attack.
To avoid this problem, you have two options:
@ -367,6 +367,8 @@ are escaped:
Again, we stress that this behavior is on by default. If you're using Django's
template system, you're protected.
.. _Cross Site Scripting: http://en.wikipedia.org/wiki/Cross-site_scripting
How to turn it off
------------------