A bypass for XSS filters in Firefox has been discovered using the payload: <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;" >. This payload can be used to evade WAF and filters. Security professionals should be aware of this vulnerability. #infosec #cybersec #bugbountytips
For more insights, check out the original tweet here: https://twitter.com/0x0SojalSec/status/1853532671508689058. And don’t forget to follow @0x0SojalSec for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: