Loading docs/howto/custom-file-storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -97,7 +97,7 @@ to the ``get_valid_name()`` method described above. extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the destination etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. This change was also made in Django 1.6.6, 1.5.9, and 1.4.14. docs/ref/files/storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -119,7 +119,7 @@ The Storage Class extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. This change was also made in Django 1.6.6, 1.5.9, and 1.4.14. Loading Loading
docs/howto/custom-file-storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -97,7 +97,7 @@ to the ``get_valid_name()`` method described above. extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the destination etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. This change was also made in Django 1.6.6, 1.5.9, and 1.4.14.
docs/ref/files/storage.txt +1 −1 Original line number Diff line number Diff line Loading @@ -119,7 +119,7 @@ The Storage Class extension. Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``, etc.) was appended to the filename until an avaible name in the etc.) was appended to the filename until an available name in the destination directory was found. A malicious user could exploit this deterministic algorithm to create a denial-of-service attack. This change was also made in Django 1.6.6, 1.5.9, and 1.4.14. Loading