Submitter : c2a
Date: 27 December 2018
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@aniltom/from-hunting-for-a-laptop-to-hunting-down-remote-code-execution-72cce2761846