This page contains a set of DOM XSSes where the vulnerability is caused by a user-controllable URL. While most of the sinks support URIs with the JavaScript scheme (e.g. javascript:alert(document.domain)), some sinks use the user provided URL to fetch and execute external resources.
In the examples presented below, the value inside location.hash is assigned to various URL-based JavaScript sinks.
JSONP endpoint is provided here. Redirection service is provided here.
Assignment of location.hash to various URL-based JavaScript sinks.
Assignment of location.search to various URL-based JavaScript sinks.
Assignment of location.hash to various sinks that supports resource URIs
Assignment of location.hash concatenated with various hard-coded values to the src attribute of a script element.