We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9c0d8a4 commit 9754d1cCopy full SHA for 9754d1c
1 file changed
src/pentesting-web/file-upload/README.md
@@ -212,7 +212,7 @@ Note that **another option** you may be thinking of to bypass this check is to m
212
213
## From File upload to other vulnerabilities
214
215
-- Set **filename** to `../../../tmp/lol.png` and try to achieve a **path traversal`
+- Set **filename** to `../../../tmp/lol.png` and try to achieve a **path traversal**
216
- Set **filename** to `sleep(10)-- -.jpg` and you may be able to achieve a **SQL injection**
217
- Set **filename** to `<svg onload=alert(document.domain)>` to achieve a XSS
218
- Set **filename** to `; sleep 10;` to test some command injection (more [command injections tricks here](../command-injection.md))
0 commit comments