Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit a6b28ab

Browse files
[po] auto sync
1 parent cb6d79b commit a6b28ab

1 file changed

Lines changed: 11 additions & 7 deletions

File tree

library/cgi.po

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -446,33 +446,33 @@ msgstr "增加了 *separator* 形参。"
446446
msgid ""
447447
"Parse a MIME header (such as :mailheader:`Content-Type`) into a main value "
448448
"and a dictionary of parameters."
449-
msgstr ""
449+
msgstr "将一个 MIME 标头 (例如 :mailheader:`Content-Type`) 解析为一个主值和一个参数字典。"
450450

451451
#: ../../library/cgi.rst:318
452452
msgid ""
453453
"Robust test CGI script, usable as main program. Writes minimal HTTP headers "
454454
"and formats all information provided to the script in HTML format."
455-
msgstr ""
455+
msgstr "对 CGI 执行健壮性检测,适于作为主程序。 写入最小化的 HTTP 标头并以 HTML 格式来格式化提供给脚本的所有信息。"
456456

457457
#: ../../library/cgi.rst:324
458458
msgid "Format the shell environment in HTML."
459-
msgstr ""
459+
msgstr "以 HTML 格式来格式化 shell 环境。"
460460

461461
#: ../../library/cgi.rst:329
462462
msgid "Format a form in HTML."
463-
msgstr ""
463+
msgstr "以 HTML 格式来格式化表单。"
464464

465465
#: ../../library/cgi.rst:334
466466
msgid "Format the current directory in HTML."
467-
msgstr ""
467+
msgstr "以 HTML 格式来格式化当前目录。"
468468

469469
#: ../../library/cgi.rst:339
470470
msgid "Print a list of useful (used by CGI) environment variables in HTML."
471-
msgstr ""
471+
msgstr "以 HTML 格式打印有用的环境变量列表(供 CGI 使用)。"
472472

473473
#: ../../library/cgi.rst:345
474474
msgid "Caring about security"
475-
msgstr ""
475+
msgstr "对于安全性的关注"
476476

477477
#: ../../library/cgi.rst:349
478478
msgid ""
@@ -484,6 +484,10 @@ msgid ""
484484
"invoke arbitrary shell commands. Even parts of the URL or field names "
485485
"cannot be trusted, since the request doesn't have to come from your form!"
486486
msgstr ""
487+
"有一条重要的规则:如果你发起调用一个外部程序(通过 :func:`os.system`, :func:`os.popen` "
488+
"或其他具有类似功能的函数),需要非常确定你不会把从客户端接收的任意字符串直接传给 shell。 "
489+
"这是一个著名的安全漏洞,网络中聪明的黑客可以通过它来利用容易上当的 CGI 脚本发起调用任何 shell 命令。 即便 URL "
490+
"的一部分或字段名称也是不可信任的,因为请求并不一定是来自你的表单!"
487491

488492
#: ../../library/cgi.rst:357
489493
msgid ""

0 commit comments

Comments
 (0)