Submitter : c2a
Date: 7 March 2020
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@secureITmania/how-i-exploit-the-json-csrf-with-method-override-technique-71c0a9a7f3b0