even more clean up.
parent
63d8787101
commit
5e1b7d8c0f
|
@ -27,7 +27,7 @@ run
|
|||
|
||||
**NodeJS**
|
||||
|
||||
This attack looks to inject a payload into javascript by terminating a URL path string.
|
||||
This attack injects a payload into javascript by terminating a URL path string.
|
||||
|
||||
|
||||
```
|
||||
|
@ -41,7 +41,7 @@ run
|
|||
|
||||
**PHP**
|
||||
|
||||
This attack looks to inject a payload into PHP multiline comment area.
|
||||
This attack injects a payload into PHP multiline comment area.
|
||||
|
||||
|
||||
```
|
||||
|
@ -54,7 +54,7 @@ run
|
|||
|
||||
**ruby**
|
||||
|
||||
This attack looks to inject a payload into ruby multiline comment area.
|
||||
This attack injects a payload into ruby multiline comment area.
|
||||
|
||||
|
||||
```
|
||||
|
@ -67,7 +67,7 @@ run
|
|||
|
||||
**Java**
|
||||
|
||||
This attack looks to inject a payload into javascript by terminating a URL path string, and placing code inline without causing runtime errors.
|
||||
This attack injects a payload into Java by terminating a URL path string.
|
||||
|
||||
|
||||
```
|
||||
|
|
Loading…
Reference in New Issue