A new XSS payload has been discovered for bypassing WAF. The payload is <a/href="javascript:Reflect.get(frames,'ale'+'rt')(Reflect.get(document,'coo'+'kie'))">ClickMe. This can bypass WAF protections for XSS vulnerabilities. Security researchers are advised to be aware of this new payload. #bugbountytips #bugbounty #cybersecurity #hacking #bugbountyhunter #hacker #ethicalhacking #infosec
Original tweet: https://twitter.com/grumpzsux/status/1782484714437169564
Subscribe for the latest news: