Submitter : c2a
Date: 30 January 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@arthbajpai277/2fa-bypass-by-changing-request-method-to-delete-500fd0ed12b8
Submitter : c2a
Date: 30 January 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@arthbajpai277/2fa-bypass-by-changing-request-method-to-delete-500fd0ed12b8