A tweet mentioning a bypass using the payload 'onerrora=confirm()' for an unknown WAF vendor. The tweet suggests that the bypass is not related to DOM clobbering and points out that 'onerrora' is not a valid attribute. More details would be needed to analyze further.
For more insights, check out the original tweet here: https://twitter.com/Akhmad_Yudha/status/1788520110522802583. And don’t forget to follow @Akhmad_Yudha for more exciting updates in the world of cybersecurity.