paths derived from untrusted inputs.</p>
<note type="warning"><title>Security</title>
-UNC paths accessed outside of request processing, such as during startup,
+<p>UNC paths accessed outside of request processing, such as during startup,
are not checked against the hosts configured with this directive.</p>
</note>
</usage>
</tr>
<tr>
<td>UnsafePrefixStat</td>
- <td>Allows potentially unsafe substitutions from a leading variable or backreference to a filesystem path.</td>
+ <td>Allows potentially unsafe substitutions from a leading variable or backreference to a filesystem path.
<em><a href="../rewrite/flags.html#flag_unsafe_prefix_stat">details ...</a></em>
</td>
</tr>
re-processing (including subsequent rounds of mod_rewrite processing).
The <code>L</code> flag can be useful in this context to end the
<em>current</em> round of mod_rewrite processing.</p>
+</section>
<section id="flag_unsafe_allow_3f"><title>UnsafeAllow3F</title>
<p> Setting this flag is required to allow a rewrite to continue If the