Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

Fixed #6097 -- Fixed some broken RST markup. Thanks, Simeon.

git-svn-id: http://code.djangoproject.com/svn/django/trunk@6828 bcc190cf-cafb-0310-a4f2-bffc1f526a37
  • Loading branch information...
commit 04a20c0226117f186e1486ce09dd536cbe4bde6d 1 parent 0c1ba46
Malcolm Tredinnick authored December 02, 2007

Showing 1 changed file with 3 additions and 1 deletion. Show diff stats Hide diff stats

  1. 4  docs/templates.txt
4  docs/templates.txt
@@ -340,7 +340,7 @@ That would result in a rendered template like this::
340 340
 Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
341 341
 into your Web pages, because a malicious user could use this kind of hole to
342 342
 do potentially bad things. This type of security exploit is called a
343  
-Cross Site Scripting`_ (XSS) attack.
  343
+`Cross Site Scripting`_ (XSS) attack.
344 344
 
345 345
 To avoid this problem, you have two options:
346 346
 
@@ -367,6 +367,8 @@ are escaped:
367 367
 Again, we stress that this behavior is on by default. If you're using Django's
368 368
 template system, you're protected.
369 369
 
  370
+.. _Cross Site Scripting: http://en.wikipedia.org/wiki/Cross-site_scripting
  371
+
370 372
 How to turn it off
371 373
 ------------------
372 374
 

0 notes on commit 04a20c0

Please sign in to comment.
Something went wrong with that request. Please try again.