-
‘The attack is to use [Unicode] control characters embedded in comments and strings to reorder source code characters in a way that changes its logic.’
(tags: unicode characters encoding source-code exploits vulnerabilities)
(Things I found interesting recently.)
‘The attack is to use [Unicode] control characters embedded in comments and strings to reorder source code characters in a way that changes its logic.’
(tags: unicode characters encoding source-code exploits vulnerabilities)