File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed
apps/site/pages/en/blog/vulnerability Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -72,7 +72,7 @@ One of the most commonly used hash tables in V8 is the [string table](https://ch
7272 <mo >=</mo >
7373 <mtext >hash</mtext >
7474 <mspace width = " 0.3em" />
75- <mo >{ ' & ' } </mo >
75+ <mo >& amp ; </mo >
7676 <mspace width = " 0.3em" />
7777 <mo stretchy = " false" >(</mo >
7878 <mtext >capacity</mtext >
@@ -109,7 +109,7 @@ One of the most commonly used hash tables in V8 is the [string table](https://ch
109109 <mi >k</mi >
110110 <mo stretchy = " false" >)</mo >
111111 <mspace width = " 0.3em" />
112- <mo >{ ' & ' } </mo >
112+ <mo >& amp ; </mo >
113113 <mspace width = " 0.3em" />
114114 <mo stretchy = " false" >(</mo >
115115 <mtext >capacity</mtext >
@@ -254,13 +254,13 @@ The search for bijective integer hash functions led us to Christopher Wellons' [
254254 <mi >x</mi >
255255 <mi >i</mi >
256256 </msub >
257- <mo >⊕ </mo >
257+ <mo >&#x 2295 ; </mo >
258258 <mo stretchy = " false" >(</mo >
259259 <msub >
260260 <mi >x</mi >
261261 <mi >i</mi >
262262 </msub >
263- <mo >{ ' >> ' } </mo >
263+ <mo >& gt ;& gt ; </mo >
264264 <mi >k</mi >
265265 <mo stretchy = " false" >)</mo >
266266 </math >
@@ -284,7 +284,7 @@ The search for bijective integer hash functions led us to Christopher Wellons' [
284284 <mn >1</mn >
285285 </mrow >
286286 </msub >
287- <mo >⊕ </mo >
287+ <mo >&#x 2295 ; </mo >
288288 <mo stretchy = " false" >(</mo >
289289 <msub >
290290 <mi >x</mi >
@@ -294,7 +294,7 @@ The search for bijective integer hash functions led us to Christopher Wellons' [
294294 <mn >1</mn >
295295 </mrow >
296296 </msub >
297- <mo >{ ' >> ' } </mo >
297+ <mo >& gt ;& gt ; </mo >
298298 <mi >k</mi >
299299 <mo stretchy = " false" >)</mo >
300300 </math >
You can’t perform that action at this time.
0 commit comments