From 14280087bd3b5898b9cea1a5f919eb80e4fc12e1 Mon Sep 17 00:00:00 2001 From: Sebastian Pipping Date: Fri, 26 Sep 2025 11:59:08 +0200 Subject: [PATCH] gh-127502: Fix typo in XML security notes (GH-139335) (cherry picked from commit 6fa1e552e06063b668e02540ba1c31a4d87bbb17) Co-authored-by: Sebastian Pipping --- Doc/library/xml.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Doc/library/xml.rst b/Doc/library/xml.rst index 28465219a1ac18..3f745573474405 100644 --- a/Doc/library/xml.rst +++ b/Doc/library/xml.rst @@ -55,7 +55,7 @@ An attacker can abuse XML features to carry out denial of service attacks, access local files, generate network connections to other machines, or circumvent firewalls. -Expat versions lower that 2.6.0 may be vulnerable to "billion laughs", +Expat versions lower than 2.6.0 may be vulnerable to "billion laughs", "quadratic blowup" and "large tokens". Python may be vulnerable if it uses such older versions of Expat as a system-provided library. Check :const:`!pyexpat.EXPAT_VERSION`.