Submitter : c2a
Date: 20 September 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.cidersecurity.io/blog/research/how-we-abused-repository-webhooks-to-access-internal-ci-systems-at-scale/