Submitter : c2a
Date: 8 September 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.legitsecurity.com/blog/bypassing-github-required-reviewers-to-submit-malicious-code
Submitter : c2a
Date: 8 September 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.legitsecurity.com/blog/bypassing-github-required-reviewers-to-submit-malicious-code