Submitter : c2a
Date: 30 January 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.flawminers.com/index.php/2024/01/30/from-empty-page-to-post-based-json-xss/
Submitter : c2a
Date: 30 January 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.flawminers.com/index.php/2024/01/30/from-empty-page-to-post-based-json-xss/