Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Critical Bug Bounty Reports: Part 1 | |||
Reflected XSS Through Insecure Dynamic Loading | |||
Executing CSRF With Phone Validation | |||
Exploiting Imported Libraries to Bypass WAF |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Critical Bug Bounty Reports: Part 1 | |||
Reflected XSS Through Insecure Dynamic Loading | |||
Executing CSRF With Phone Validation | |||
Exploiting Imported Libraries to Bypass WAF |