The **Hack To Me** team is developing a Custom WAF tool for XSS protection. However, a bypass was found using the payload '<svg onload=alert(1)>'. This payload triggers an alert(1) and bypasses the WAF protection. To report bypasses, contact [email protected]. #bugbounty #hacking #pentesting
Hi #bugbounty community! The **Hack To Me** team is developing a WAF tool and requires your help (We pay bounties!). So far we have prepared a WAF for XSS that we need you to verify, if you find any bypass, report it by DM or to [email protected]. #hacking #pentesting pic.twitter.com/2bGsQLop8v
— Hack to me! (@hack_tome) April 11, 2024