The tweet mentions a cool XSS finding using 2 reflections inside a JS script context to bypass Server-Side Sanitizer, Double quote escaper, and a Strict WAF. More details can be found in the tweet: https://t.co/q0s8tJhavr
For more insights, check out the original tweet here: https://twitter.com/RenwaX23/status/1889817031589110124. And don’t forget to follow @RenwaX23 for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: