diff options
| author | David Smith <smithdc@gmail.com> | 2021-07-23 07:48:16 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-07-29 06:24:12 +0200 |
| commit | 1024b5e74a7166313ad4e4975a15e90dccd3ec5f (patch) | |
| tree | 05d75177f183de5e3c58dbf25a3f71ff4a5c820a /docs/ref/templates/language.txt | |
| parent | acde91745656a852a15db7611c08cabf93bb735b (diff) | |
Fixed 32956 -- Lowercased spelling of "web" and "web framework" where appropriate.
Diffstat (limited to 'docs/ref/templates/language.txt')
| -rw-r--r-- | docs/ref/templates/language.txt | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/ref/templates/language.txt b/docs/ref/templates/language.txt index 04b363c0cf..ffddd7435a 100644 --- a/docs/ref/templates/language.txt +++ b/docs/ref/templates/language.txt @@ -471,10 +471,10 @@ That would result in a rendered template like this:: Hello, <b>username -...which, in turn, would result in the remainder of the Web page being bolded! +...which, in turn, would result in the remainder of the web page being bolded! Clearly, user-submitted data shouldn't be trusted blindly and inserted directly -into your Web pages, because a malicious user could use this kind of hole to +into your web pages, because a malicious user could use this kind of hole to do potentially bad things. This type of security exploit is called a `Cross Site Scripting`_ (XSS) attack. |
