2016-09-17 05:53:47 +00:00
|
|
|
Django==1.9.7
|
2015-10-16 17:36:58 +00:00
|
|
|
django-appconf==1.0.1
|
2017-04-01 06:38:47 +00:00
|
|
|
django-model-utils>=2.6.1
|
2016-02-27 22:35:06 +00:00
|
|
|
django-reversion==1.10.1
|
2017-03-26 00:36:11 +00:00
|
|
|
django-sitetree>=1.7.0
|
2016-02-27 22:35:06 +00:00
|
|
|
django-taggit==0.18.0
|
2017-03-30 12:09:50 +00:00
|
|
|
django-timezone-field>=2.0
|
2016-02-27 22:35:06 +00:00
|
|
|
easy-thumbnails==2.3
|
Sanitize user input on markdown fields
This is an XSS vulnribilitiy.
This also blocks a number of MD attributes that a user might attempt to
use.
The following are the allowed attributes.
['a', 'abbr', 'acronym', 'b', 'blockquote', 'code', 'em', 'i', 'li',
'ol', 'p', 'pre', 'strong', 'ul']
I belive this to be acceptable, as honeslty, a speaker using H1 is going
to stomp all over the page and make it harder for the reviewer to parse.
UX wise, it's less than great. A user can do # title and be left with
<h1> in the sanitized output.
2017-04-21 00:34:48 +00:00
|
|
|
bleach
|
2016-02-27 22:35:06 +00:00
|
|
|
markdown==2.6.5
|
|
|
|
pytz==2015.7
|
2016-12-22 01:00:23 +00:00
|
|
|
django-ical==1.4
|