Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Generally, programs should validate UTF-8 data before performing other checks. The following table lists the well-formed UTF-8 byte sequences.

Code Points1st First Byte2nd Second Byte3rd Third Byte4th Fourth Byte
U+0000..U+007F00..7F   
U+0080..U+07FFC2..DF80..BF  
U+0800..U+0FFFE0A0..BF80..BF 
U+1000..U+CFFFE1..EC80..BF80..BF 
U+D000..U+D7FFED80..9F80..BF 
U+E000..U+FFFFEE..EF80..BF80..BF 
U+10000..U+3FFFFF090..BF80..BF80..BF
U+40000..U+FFFFFF1..F380..BF80..BF80..BF
U+100000..U+10FFFFF480..8F80..BF80..BF

...

Tool

Version

Checker

Description

LDRA tool suite

Include Page
LDRA_V
LDRA_V

176 S
376 S

Fully implemented.

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

...