Fixed spelling mistake in file docs.
This commit is contained in:
parent
2b66878a47
commit
a3e88e64a4
|
@ -97,7 +97,7 @@ to the ``get_valid_name()`` method described above.
|
||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the destination
|
etc.) was appended to the filename until an available name in the destination
|
||||||
directory was found. A malicious user could exploit this deterministic
|
directory was found. A malicious user could exploit this deterministic
|
||||||
algorithm to create a denial-of-service attack. This change was also made
|
algorithm to create a denial-of-service attack. This change was also made
|
||||||
in Django 1.6.6, 1.5.9, and 1.4.14.
|
in Django 1.6.6, 1.5.9, and 1.4.14.
|
||||||
|
|
|
@ -119,7 +119,7 @@ The Storage Class
|
||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the
|
etc.) was appended to the filename until an available name in the
|
||||||
destination directory was found. A malicious user could exploit this
|
destination directory was found. A malicious user could exploit this
|
||||||
deterministic algorithm to create a denial-of-service attack. This
|
deterministic algorithm to create a denial-of-service attack. This
|
||||||
change was also made in Django 1.6.6, 1.5.9, and 1.4.14.
|
change was also made in Django 1.6.6, 1.5.9, and 1.4.14.
|
||||||
|
|
Loading…
Reference in New Issue