![]() |
|
HackerOne Disclosed Reports - 2025-10-18 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-10-18 (/Thread-HackerOne-Disclosed-Reports-2025-10-18) |
HackerOne disclosed reports - 2025-10-18 - hashXploiter - 10-19-2025
High
resolved Application Level DoS - Large Markdown Payload in Reply Section Leading to Resource ExhaustionBug reported by Anindya Roy was disclosed at October 18, 2025, 4:47 pm | Uncontrolled Resource Consumption A Denial of Service (DoS) vulnerability was identified in the reply section of the web application. Submitting an excessively large markup payload (approximately 800,000 characters) resulted in the server taking 30 seconds to respond before returning an HTTP/2 502 Bad Gateway error, indicating potential resource exhaustion or backend service failure.
Medium
resolved Blu-ray Disc Java Sandbox Escape via two vulnerabilitiesBug reported by Andy Nguyen was disclosed at October 18, 2025, 12:35 am | Execution with Unnecessary Privileges Two vulnerabilities in Blu-ray Disc Java (bd-j) related to the Inter-Xlet Communication (Ixc) implementation were discovered. The first vulnerability allowed invoking methods in privileged context by registering a remote object that implements an interface extending java.rmi.Remote. The second vulnerability enabled privileged method invocation by setting a custom method in the stub class generated for remote object registration. Together, these vulnerabilities could be exploited to disable the Java sandbox. |