Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Detecting and exploiting mass-assignments in order to manipulate user columns and read private messages |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Detecting and exploiting mass-assignments in order to manipulate user columns and read private messages |