From adeedddbb53083add5f9e66041b072ad716a2aab Mon Sep 17 00:00:00 2001 From: Ethan Rogers Date: Fri, 11 Mar 2016 10:06:00 -0700 Subject: [PATCH] Fix minor typo in security doc --- docs/security.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/security.rst b/docs/security.rst index 3e97834d..52dccfab 100644 --- a/docs/security.rst +++ b/docs/security.rst @@ -73,7 +73,7 @@ them knowing. Say you have a specific URL that, when you sent ``POST`` requests to will delete a user's profile (say ``http://example.com/user/delete``). If an attacker now creates a page that sends a post request to that page with -some JavaScript they just has to trick some users to load that page and +some JavaScript they just have to trick some users to load that page and their profiles will end up being deleted. Imagine you were to run Facebook with millions of concurrent users and