Submitter : c2a
Date: 8 March 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://medium.com/@mrempy/how-i-managed-to-make-a-ddos-attack-by-exploiting-a-companys-service-bug-bounty-bfd25a178b45