Hello,
After mitigation of all submitted XSS Vulnerabilities i was able to detect another XSS and bypass the XSS Filters
in the FAQ Site while generating an HTML Export.
Lets see :)
This is th XSS Paylaod with XSS Ahmed 2
Only XSS Ahmed 2 will work !
Now lets export in in HTML5 and open the file the xss alert will be fired.
As you can see this is the XSS Payload lets refresh its stored
Thank you for watching :)