/dports/www/p5-HTML-StripScripts-Parser/HTML-StripScripts-Parser-1.03/t/ |
H A D | 70xss.t | 40 q{'';!--"<XSS>=&\{()\}}, 113 <STYLE>li \{list-style-image: url("javascript:alert('XSS')");\}</STYLE><UL><LI>XSS}, 168 q{<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">}, 172 q{<XSS STYLE="xss:expression(alert('XSS'))">}, 176 q{<STYLE>.XSS\{background-image:url("javascript:alert('XSS')");\}</STYLE><A CLASS=XSS></A>}, 300 q{\";alert('XSS');//}, 376 q{<SCRIPT>a=/XSS/}, 413 q{<a>XSS</a>}, 417 q{<a>XSS</a>}, 421 q{<a>XSS</a>}, [all …]
|
/dports/security/jbrofuzz/jbrofuzz/fuzzers/ |
H A D | fuzzers.jbrf | 251 P:015-XSS-101:XSS 101:9 264 P:016-XSS-102:XSS 102:10 278 P:017-XSS-JSB:XSS JS Breaks:11 293 P:018-XSS-4IE:XSS Internet Explorer:38 335 P:019-XSS-GEK:XSS Gecko:11 350 P:020-XSS-INJ:XSS Style Injection:14 368 P:021-XSS-HTM:XSS HTML Breaking:7 379 P:022-XSS-EMB:XSS Embed/Evade:10 393 P:023-XSS-IMG:XSS Image Tag:10 416 P:025-XSS-XML:XSS XML Injection:6 [all …]
|
/dports/www/nginx-naxsi/naxsi-1.3/t/ |
H A D | 26improved-matchzones.t | 35 CheckRule "$XSS >= 8" BLOCK; 62 CheckRule "$XSS >= 8" BLOCK; 90 CheckRule "$XSS >= 8" BLOCK; 117 CheckRule "$XSS >= 8" BLOCK; 144 CheckRule "$XSS >= 8" BLOCK; 171 CheckRule "$XSS >= 8" BLOCK; 198 CheckRule "$XSS >= 8" BLOCK; 225 CheckRule "$XSS >= 8" BLOCK; 252 CheckRule "$XSS >= 8" BLOCK; 279 CheckRule "$XSS >= 8" BLOCK; [all …]
|
H A D | 11naxsi_newstyle_config.t | 33 check_rule "$XSS >= 8" BLOCK; 44 === TEST 2: DENY : Obvious GET XSS 93 check_rule "$XSS >= 8" BLOCK; 152 check_rule "$XSS >= 8" BLOCK; 211 check_rule "$XSS >= 8" BLOCK; 270 check_rule "$XSS >= 8" BLOCK; 329 check_rule "$XSS >= 8" BLOCK; 388 check_rule "$XSS >= 8" BLOCK; 447 check_rule "$XSS >= 8" BLOCK; 511 check_rule "$XSS >= 8" BLOCK; [all …]
|
H A D | 20sqlmap.t | 27 CheckRule "$XSS >= 8" BLOCK; 49 CheckRule "$XSS >= 8" BLOCK; 71 CheckRule "$XSS >= 8" BLOCK; 93 CheckRule "$XSS >= 8" BLOCK; 115 CheckRule "$XSS >= 8" BLOCK; 137 CheckRule "$XSS >= 8" BLOCK; 159 CheckRule "$XSS >= 8" BLOCK; 181 CheckRule "$XSS >= 8" BLOCK; 203 CheckRule "$XSS >= 8" BLOCK; 225 CheckRule "$XSS >= 8" BLOCK; [all …]
|
H A D | 09sqlmap_tamper.t | 29 CheckRule "$XSS >= 8" BLOCK; 59 CheckRule "$XSS >= 8" BLOCK; 89 CheckRule "$XSS >= 8" BLOCK; 119 CheckRule "$XSS >= 8" BLOCK; 149 CheckRule "$XSS >= 8" BLOCK; 179 CheckRule "$XSS >= 8" BLOCK; 209 CheckRule "$XSS >= 8" BLOCK; 239 CheckRule "$XSS >= 8" BLOCK; 269 CheckRule "$XSS >= 8" BLOCK; 299 CheckRule "$XSS >= 8" BLOCK; [all …]
|
/dports/www/nginx-full/naxsi-1.3/t/ |
H A D | 26improved-matchzones.t | 35 CheckRule "$XSS >= 8" BLOCK; 62 CheckRule "$XSS >= 8" BLOCK; 90 CheckRule "$XSS >= 8" BLOCK; 117 CheckRule "$XSS >= 8" BLOCK; 144 CheckRule "$XSS >= 8" BLOCK; 171 CheckRule "$XSS >= 8" BLOCK; 198 CheckRule "$XSS >= 8" BLOCK; 225 CheckRule "$XSS >= 8" BLOCK; 252 CheckRule "$XSS >= 8" BLOCK; 279 CheckRule "$XSS >= 8" BLOCK; [all …]
|
H A D | 11naxsi_newstyle_config.t | 33 check_rule "$XSS >= 8" BLOCK; 44 === TEST 2: DENY : Obvious GET XSS 93 check_rule "$XSS >= 8" BLOCK; 152 check_rule "$XSS >= 8" BLOCK; 211 check_rule "$XSS >= 8" BLOCK; 270 check_rule "$XSS >= 8" BLOCK; 329 check_rule "$XSS >= 8" BLOCK; 388 check_rule "$XSS >= 8" BLOCK; 447 check_rule "$XSS >= 8" BLOCK; 511 check_rule "$XSS >= 8" BLOCK; [all …]
|
H A D | 20sqlmap.t | 27 CheckRule "$XSS >= 8" BLOCK; 49 CheckRule "$XSS >= 8" BLOCK; 71 CheckRule "$XSS >= 8" BLOCK; 93 CheckRule "$XSS >= 8" BLOCK; 115 CheckRule "$XSS >= 8" BLOCK; 137 CheckRule "$XSS >= 8" BLOCK; 159 CheckRule "$XSS >= 8" BLOCK; 181 CheckRule "$XSS >= 8" BLOCK; 203 CheckRule "$XSS >= 8" BLOCK; 225 CheckRule "$XSS >= 8" BLOCK; [all …]
|
H A D | 09sqlmap_tamper.t | 29 CheckRule "$XSS >= 8" BLOCK; 59 CheckRule "$XSS >= 8" BLOCK; 89 CheckRule "$XSS >= 8" BLOCK; 119 CheckRule "$XSS >= 8" BLOCK; 149 CheckRule "$XSS >= 8" BLOCK; 179 CheckRule "$XSS >= 8" BLOCK; 209 CheckRule "$XSS >= 8" BLOCK; 239 CheckRule "$XSS >= 8" BLOCK; 269 CheckRule "$XSS >= 8" BLOCK; 299 CheckRule "$XSS >= 8" BLOCK; [all …]
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/html5lib/tests/sanitizer-testdata/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>" 28 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 58 "input": "<img src=`javascript:alert('XSS')` />", 64 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 70 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 202 "input": "<img src=\"javascript:alert('XSS');\" />", 208 "input": "<img src=javascript:alert('XSS') />", 244 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 292 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/testing/web-platform/tests/tools/third_party/html5lib/html5lib/tests/sanitizer-testdata/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>" 28 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 58 "input": "<img src=`javascript:alert('XSS')` />", 64 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 70 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 202 "input": "<img src=\"javascript:alert('XSS');\" />", 208 "input": "<img src=javascript:alert('XSS') />", 244 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 292 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/www/firefox/firefox-99.0/testing/web-platform/tests/tools/third_party/html5lib/html5lib/tests/sanitizer-testdata/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>" 28 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 58 "input": "<img src=`javascript:alert('XSS')` />", 64 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 70 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 202 "input": "<img src=\"javascript:alert('XSS');\" />", 208 "input": "<img src=javascript:alert('XSS') />", 244 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 292 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/testing/web-platform/tests/tools/third_party/html5lib/html5lib/tests/sanitizer-testdata/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>" 28 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 58 "input": "<img src=`javascript:alert('XSS')` />", 64 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 70 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 202 "input": "<img src=\"javascript:alert('XSS');\" />", 208 "input": "<img src=javascript:alert('XSS') />", 244 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 292 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/testing/web-platform/tests/tools/third_party/html5lib/html5lib/tests/sanitizer-testdata/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>" 28 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 58 "input": "<img src=`javascript:alert('XSS')` />", 64 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 70 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 202 "input": "<img src=\"javascript:alert('XSS');\" />", 208 "input": "<img src=javascript:alert('XSS') />", 244 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 292 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/lang/spidermonkey60/firefox-60.9.0/testing/web-platform/tests/tools/html5lib/html5lib/tests/testdata/sanitizer/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>", 31 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 64 "input": "<img src=`javascript:alert('XSS')` />", 71 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 78 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 227 "input": "<img src=\"javascript:alert('XSS');\" />", 234 "input": "<img src=javascript:alert('XSS') />", 276 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 332 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/testing/web-platform/tests/tools/html5lib/html5lib/tests/testdata/sanitizer/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>", 31 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 64 "input": "<img src=`javascript:alert('XSS')` />", 71 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 78 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 227 "input": "<img src=\"javascript:alert('XSS');\" />", 234 "input": "<img src=javascript:alert('XSS') />", 276 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 332 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/testing/web-platform/tests/tools/html5lib/html5lib/tests/testdata/sanitizer/ |
H A D | tests1.dat | 10 "input": "<![if !IE 5]><script>alert('XSS');</script><![endif]>", 11 "output": "<script>alert('XSS');</script>", 31 "input": "<bgsound src=\"javascript:alert('XSS');\" />", 64 "input": "<img src=`javascript:alert('XSS')` />", 71 "input": "<img dynsrc=\"javascript:alert('XSS')\" />", 78 "input": "<img src='vbscript:msgbox(\"XSS\")' />", 227 "input": "<img src=\"javascript:alert('XSS');\" />", 234 "input": "<img src=javascript:alert('XSS') />", 276 "input": "<img src=\"JaVaScRiPt:alert('XSS')\" />", 332 "input": "<img src=\"javascript:alert('XSS')\"", [all …]
|
/dports/www/elixir-html_sanitize_ex/html_sanitize_ex-1.3.0/test/ |
H A D | strip_tags_test.exs | 98 "<a href=javascript:alert('XSS')>text here</a>", 99 "<a href=JaVaScRiPt:alert('XSS')>text here</a>", 147 "<IMG SRC=\"javascript:alert('XSS');\">", 148 "<IMG SRC=javascript:alert('XSS')>", 149 "<IMG SRC=JaVaScRiPt:alert('XSS')>", 150 "<IMG SRC=javascript:alert("XSS")>", 155 "<IMG SRC=\"jav\tascript:alert('XSS');\">", 160 "<IMG SRC=\"javascript:alert('XSS');\">", 175 assert "alert(\"XSS\")" == strip_tags("<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>") 184 assert "<alert(\"XSS\");//<" == strip_tags "<<SCRIPT>alert(\"XSS\");//<</SCRIPT>" [all …]
|
H A D | basic_html_test.exs | 124 "<a href=javascript:alert('XSS')>text here</a>", 125 "<a href=JaVaScRiPt:alert('XSS')>text here</a>", 233 "<IMG SRC=\"javascript:alert('XSS');\">", 234 "<IMG SRC=javascript:alert('XSS')>", 235 "<IMG SRC=JaVaScRiPt:alert('XSS')>", 236 "<IMG SRC=javascript:alert("XSS")>", 241 "<IMG SRC=\"jav\tascript:alert('XSS');\">", 246 "<IMG SRC=\"javascript:alert('XSS');\">", 262 expected = "<img />alert(\"XSS\")\">" 268 assert "alert(\"XSS\")" == basic_html_sanitize("<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>") [all …]
|
H A D | markdown_html_test.exs | 153 "<a href=javascript:alert('XSS')>text here</a>", 154 "<a href=JaVaScRiPt:alert('XSS')>text here</a>", 262 "<IMG SRC=\"javascript:alert('XSS');\">", 263 "<IMG SRC=javascript:alert('XSS')>", 264 "<IMG SRC=JaVaScRiPt:alert('XSS')>", 265 "<IMG SRC=javascript:alert("XSS")>", 270 "<IMG SRC=\"jav\tascript:alert('XSS');\">", 275 "<IMG SRC=\"javascript:alert('XSS');\">", 291 expected = "<img />alert(\"XSS\")\">" 297 assert "alert(\"XSS\")" == sanitize("<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>") [all …]
|
/dports/devel/py-lxml/lxml-4.7.1/src/lxml/html/tests/hackers-org-data/ |
H A D | style-url-js.data | 5 <div><STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A></div> 7 <div><style>.XSS{background-image:url("");}</style><a class="XSS"></a></div>
|
/dports/security/modsecurity3-apache/ModSecurity-apache-0.0.9-beta1-20-gf692ea99/tests/regression/misc/ |
H A D | 25-libinjection.t | 59 comment => "libinjection XSS - with XSS", 69 error => [ qr/detected XSS using libinjection/, 1], 70 debug => [ qr/detected XSS using libinjection/, 1 ], 86 comment => "libinjection XSS - without XSS", 96 -error => [ qr/detected XSS using libinjection/, 1], 97 -debug => [ qr/detected XSS using libinjection/, 1 ],
|
/dports/www/mod_security/modsecurity-2.9.3/tests/regression/misc/ |
H A D | 25-libinjection.t | 59 comment => "libinjection XSS - with XSS", 69 error => [ qr/detected XSS using libinjection/, 1], 70 debug => [ qr/detected XSS using libinjection/, 1 ], 86 comment => "libinjection XSS - without XSS", 96 -error => [ qr/detected XSS using libinjection/, 1], 97 -debug => [ qr/detected XSS using libinjection/, 1 ],
|
/dports/security/nmap/nmap-7.91/scripts/ |
H A D | http-vuln-cve2013-6786.nse | 2 Detects a URL redirection and reflected XSS vulnerability in Allegro RomPager 20 -- | URL redirection and reflected XSS vulnerability in Allegro RomPager Web server 25 -- | and reflected XSS. If Referer header in a request to a non existing page, data 27 -- | untrusted website and XSS injection. 47 title = 'URL redirection and reflected XSS vulnerability in Allegro RomPager Web server', 51 and reflected XSS. If Referer header in a request to a non existing page, data 53 untrusted website and XSS injection.]], 67 local header = { ["Referer"] = '"><script>alert("XSS")</script><"' } 71 if open_session.body:match('"><script>alert%("XSS"%)</script><"') then
|