Submitter : c2a
Date: 2 January 2018
Bounty : 1,000
Vulnerabilities :
Programs :
Authors :
Link : https://www.jonbottarini.com/2018/01/02/abusing-internal-api-to-achieve-idor-in-new-relic/
Submitter : c2a
Date: 2 January 2018
Bounty : 1,000
Vulnerabilities :
Programs :
Authors :
Link : https://www.jonbottarini.com/2018/01/02/abusing-internal-api-to-achieve-idor-in-new-relic/