A new attack method can be used to circumvent web application firewalls (WAFs) of various vendors and infiltrate systems, potentially enabling attackers to gain access to sensitive business and customer information. Web application firewalls are akey line of defenseto help filter, monitor, and block HTTP(S) traffic to and from a web application, and safeguard against attacks such as cross-site