We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 093514f commit 4ad7356Copy full SHA for 4ad7356
1 file changed
Doc/library/xml.rst
@@ -57,13 +57,11 @@ circumvent firewalls.
57
58
Expat versions lower that 2.6.0 may be vulnerable to "billion laughs",
59
"quadratic blowup" and "large tokens". Python may be vulnerable if it uses such
60
-older versions of Expat as a system-provided library, it may be vulnerable.
+older versions of Expat as a system-provided library.
61
Check :const:`!pyexpat.EXPAT_VERSION`.
62
63
-xmlrpc is **vulnerable** to "decompression bomb".
+:mod:`xmlrpc` is **vulnerable** to the "decompression bomb" attack.
64
65
-Since Python 3.7.1, external general entities are no longer processed by
66
-default.
67
68
billion laughs / exponential entity expansion
69
The `Billion Laughs`_ attack -- also known as exponential entity expansion --
0 commit comments