A bypass for XSS vulnerability was found in an unknown WAF. The payload used was '</a<script>alert(document.cookie</script>'. This payload successfully executed an alert with the document's cookie. It's important to always be cautious of input validation to prevent XSS attacks. #BugBounty #CyberSecurity #WAFBypass
For more details, check out the original tweet here: https://twitter.com/seke4l/status/1829181745536839818