Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
POST to XSS: Leveraging Pseudo Protocols to Gain JavaScript Evaluation in SSO Flows |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
POST to XSS: Leveraging Pseudo Protocols to Gain JavaScript Evaluation in SSO Flows |