Return to Article Details Bug Bounty Hunting: A Case Study of Successful Vulnerability Discovery and Disclosure Download Download PDF