-
‘The attack is to use [Unicode] control characters embedded in comments and strings to reorder source code characters in a way that changes its logic.’
(tags: unicode characters encoding source-code exploits vulnerabilities)
ramblings about scalability, software development, the web
‘The attack is to use [Unicode] control characters embedded in comments and strings to reorder source code characters in a way that changes its logic.’
(tags: unicode characters encoding source-code exploits vulnerabilities)