Submitter : c2a
Date: 4 January 2018
Bounty : 3,000
Vulnerabilities :
Programs :
Authors :
Link : https://blog.securitybreached.org/2018/02/04/hunting-insecure-direct-object-reference-vulnerabilities-for-fun-and-profit-part-1/