A XSS payload was detected to bypass the Cloudflare WAF. The payload used was '"><track/onerror='confirm\%601\%60'>'. This payload executes a confirmation dialogue box. For more details, visit https://t.co/1dJ7ax19Hw
For more insights, check out the original tweet here: https://twitter.com/MahinMosharrof/status/1781028826304385399
Subscribe for the latest news: