This page contains a set of DOM XSSes where the vulnerability is caused by a user-controllable URL. While most of the sinks support URIs with the JavaScript scheme (e.g. javascript:alert(document.domain)), some sinks use the user provided URL to fetch and execute external resources.

In the examples presented below, the value inside location.hash is assigned to various URL-based JavaScript sinks.

JSONP endpoint is provided here.
Redirection service is provided here.

Sinks supporting JavaScript URI

Assignment of location.hash to various URL-based JavaScript sinks.

Assignment of location.search to various URL-based JavaScript sinks.

Sinks supporting resource URIs

Assignment of location.hash to various sinks that supports resource URIs

Assignment of location.hash concatenated with various hard-coded values to the src attribute of a script element.