This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Revision history of "Unicode Transformations: Finding Elusive Vulnerabilities"

Jump to: navigation, search

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • (cur | prev) 20:43, 3 August 2009Jeremy.long (talk | contribs). . (1,626 bytes) (+1,626). . (Created page with '== The presentation == rightThe complex landscape of Unicode provides many angles for exploiting software and end users. We've known about some …')