Submitter : c2a
Date: 20 February 2015
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://web.archive.org/web/20210423154459/https://yassineaboukir.com/blog/neglected-dns-records-exploited-to-takeover-subdomains/