This document contains several examples of malicious URLs that could potentially exploit vulnerabilities on a user's system or browser. The URLs attempt to execute JavaScript alerts, access local files, or exploit cross-origin resource sharing issues. Users should exercise caution when interacting with or clicking links from unknown or untrusted sources.