Submitter : c2a
Date: 27 January 2019
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@nahoragg/chaining-tricky-oauth-exploitation-to-stored-xss-b67eaea4aabd
Submitter : c2a
Date: 27 January 2019
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@nahoragg/chaining-tricky-oauth-exploitation-to-stored-xss-b67eaea4aabd