Loading docs/howto/custom-file-storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -93,6 +93,6 @@ to the ``get_valid_name()`` method described above. extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the destination etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. docs/ref/files/storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -92,7 +92,7 @@ The Storage Class extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. Loading Loading
docs/howto/custom-file-storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -93,6 +93,6 @@ to the ``get_valid_name()`` method described above. extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the destination etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack.
docs/ref/files/storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -92,7 +92,7 @@ The Storage Class extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. Loading