Submitter : c2a
Date: 5 February 2018
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.securitybreached.org/2018/02/05/how-i-found-idor-on-twitters-acquisition-mopub-com/
Submitter : c2a
Date: 5 February 2018
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.securitybreached.org/2018/02/05/how-i-found-idor-on-twitters-acquisition-mopub-com/