Submitter : c2a
Date: 23 April 2019
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://soroush.secproject.com/blog/2019/04/yet-other-examples-of-abusing-csrf-in-logout/
Submitter : c2a
Date: 23 April 2019
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://soroush.secproject.com/blog/2019/04/yet-other-examples-of-abusing-csrf-in-logout/