mirror of
https://github.com/danielmiessler/SecLists
synced 2026-04-27 09:21:44 +02:00
Add the payload "42*42" to the fuzzing list in order to cover the "Code context" detection point mentioned in the https://portswigger.net/web-security/server-side-template-injection training
7 lines
66 B
Text
7 lines
66 B
Text
42*42
|
|
{42*42}
|
|
{{42*42}}
|
|
{{{42*42}}}
|
|
#{42*42}
|
|
${42*42}
|
|
<%=42*42 %>
|