Submitter : c2a
Date: 1 January 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://snapsec.co/blog/Abusing-Business-logic-of-an-application-to-create-backdoor-in-APP/
Submitter : c2a
Date: 1 January 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://snapsec.co/blog/Abusing-Business-logic-of-an-application-to-create-backdoor-in-APP/