Browse files

Fixed #6097 -- Fixed some broken RST markup. Thanks, Simeon.

git-svn-id: bcc190cf-cafb-0310-a4f2-bffc1f526a37
  • Loading branch information...
1 parent 0c1ba46 commit 04a20c0226117f186e1486ce09dd536cbe4bde6d @malcolmt malcolmt committed Dec 2, 2007
Showing with 3 additions and 1 deletion.
  1. +3 −1 docs/templates.txt
@@ -340,7 +340,7 @@ That would result in a rendered template like this::
Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
into your Web pages, because a malicious user could use this kind of hole to
do potentially bad things. This type of security exploit is called a
-Cross Site Scripting`_ (XSS) attack.
+`Cross Site Scripting`_ (XSS) attack.
To avoid this problem, you have two options:
@@ -367,6 +367,8 @@ are escaped:
Again, we stress that this behavior is on by default. If you're using Django's
template system, you're protected.
+.. _Cross Site Scripting:
How to turn it off

0 comments on commit 04a20c0

Please sign in to comment.