diff --git a/XSS Injection/README.md b/XSS Injection/README.md
index 7e47f1a..c329727 100644
--- a/XSS Injection/README.md
+++ b/XSS Injection/README.md
@@ -384,6 +384,8 @@ vbscript:msgbox("XSS")
### XSS in SVG
+Simple script. Codename: green triangle
+
```xml
@@ -396,6 +398,29 @@ vbscript:msgbox("XSS")
```
+More comprehensive payload with svg tag attribute, desc script, foreignObject script, foreignObject iframe, title script, animatetransform event and simple script. Codename: red lignthning. Author: noraj.
+
+```xml
+
+
+
+
+```
+
+
+
### XSS in SVG (short)
```javascript
@@ -406,6 +431,43 @@ vbscript:msgbox("XSS")
```
+### XSS in SVG (nesting)
+
+Including a remote SVG image in a SVG works but won't trigger the XSS embedded in the remote SVG. Author: noraj.
+
+SVG 1.x (xlink:href)
+
+```xml
+
+```
+
+Including a remote SVG fragment in a SVG works but won't trigger the XSS embedded in the remote SVG element because it's impossible to add vulnerable attribute on a polygon/rect/etc sicne the `style` attribute is no longer a vector on modern browsers. Author: noraj.
+
+SVG 1.x (xlink:href)
+
+```xml
+
+```
+
+However, including svg tags in SVG documents works and allows XSS execution from sub-SVGs. Codename: french flag. Author: noraj.
+
+```xml
+
+```
+
### XSS in Markdown
```csharp