mirror of
https://github.com/danielmiessler/SecLists
synced 2026-01-02 22:26:52 +01:00
Add the payload "42*42" to the fuzzing list in order to cover the "Code context" detection point mentioned in the https://portswigger.net/web-security/server-side-template-injection training
7 lines
66 B
Text
7 lines
66 B
Text
42*42
|
|
{42*42}
|
|
{{42*42}}
|
|
{{{42*42}}}
|
|
#{42*42}
|
|
${42*42}
|
|
<%=42*42 %>
|