summaryrefslogtreecommitdiff
path: root/docs/ref/request-response.txt
diff options
context:
space:
mode:
authorNick Pope <nick@nickpope.me.uk>2021-04-29 19:29:08 +0100
committerGitHub <noreply@github.com>2021-04-29 20:29:08 +0200
commit2161db0792f2e4d3deef3e09cd72f7a08340cafe (patch)
tree94ffd28dc91c0c7b3aae5cc53a8f1233a7b277c1 /docs/ref/request-response.txt
parent907d3a7ff4e12ad4ccc86af26a728007fe4d6fa2 (diff)
Fixed capitalization of "ECMAScript" and "JavaScript".
Diffstat (limited to 'docs/ref/request-response.txt')
-rw-r--r--docs/ref/request-response.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/ref/request-response.txt b/docs/ref/request-response.txt
index cc8006f5f7..ab1e6ce65d 100644
--- a/docs/ref/request-response.txt
+++ b/docs/ref/request-response.txt
@@ -1099,7 +1099,7 @@ Without passing ``safe=False``, a :exc:`TypeError` will be raised.
it was possible to poison the JavaScript ``Array`` constructor. For this
reason, Django does not allow passing non-dict objects to the
:class:`~django.http.JsonResponse` constructor by default. However, most
- modern browsers implement EcmaScript 5 which removes this attack vector.
+ modern browsers implement ECMAScript 5 which removes this attack vector.
Therefore it is possible to disable this security precaution.
Changing the default JSON encoder