<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Dark C0d3rs - All Forums]]></title>
		<link>https://darkcoders.wiki/</link>
		<description><![CDATA[Dark C0d3rs - https://darkcoders.wiki]]></description>
		<pubDate>Sat, 09 May 2026 11:03:37 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-05-08]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-08</link>
			<pubDate>Sat, 09 May 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-08</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3511998' style='color: #4aa3ff;' target='new'>Private circle can be added to another circle via API despite visibility restriction</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/vidang04?type=user' style='color: #4aa3ff;' target='new'> <strong> Dang Hung Vi</strong></a> was disclosed at May 8, 2026, 12:55 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Insecure Direct Object Reference (IDOR)</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered where private circles could be added to other circles via the API, despite visibility restrictions. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3304830' style='color: #4aa3ff;' target='new'>Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner </a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/0x0doteth?type=user' style='color: #4aa3ff;' target='new'> <strong> 0x0.eth</strong></a> was disclosed at May 8, 2026, 11:08 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Insecure Direct Object Reference (IDOR)</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3521434' style='color: #4aa3ff;' target='new'>View-only guests could see deleted Collectives pages in the trashbin</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/yoyomiski?type=user' style='color: #4aa3ff;' target='new'> <strong> _dha</strong></a> was disclosed at May 8, 2026, 8:35 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered where view-only guests could see deleted Collectives pages in the trashbin. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3511998' style='color: #4aa3ff;' target='new'>Private circle can be added to another circle via API despite visibility restriction</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/vidang04?type=user' style='color: #4aa3ff;' target='new'> <strong> Dang Hung Vi</strong></a> was disclosed at May 8, 2026, 12:55 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Insecure Direct Object Reference (IDOR)</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered where private circles could be added to other circles via the API, despite visibility restrictions. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3304830' style='color: #4aa3ff;' target='new'>Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner </a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/0x0doteth?type=user' style='color: #4aa3ff;' target='new'> <strong> 0x0.eth</strong></a> was disclosed at May 8, 2026, 11:08 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Insecure Direct Object Reference (IDOR)</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3521434' style='color: #4aa3ff;' target='new'>View-only guests could see deleted Collectives pages in the trashbin</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/yoyomiski?type=user' style='color: #4aa3ff;' target='new'> <strong> _dha</strong></a> was disclosed at May 8, 2026, 8:35 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered where view-only guests could see deleted Collectives pages in the trashbin. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-05-07]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-07</link>
			<pubDate>Fri, 08 May 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-07</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/000/022/5e2b46658c8b86bed62f574d8e1793f353cbbc63_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3580511' style='color: #4aa3ff;' target='new'>ActiveStorage Disk Service Path Traversal via Custom Blob Key Injection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/ksw9722?type=user' style='color: #4aa3ff;' target='new'> <strong> kim siwong</strong></a> was disclosed at May 7, 2026, 2:04 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Path Traversal</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the ActiveStorage Disk Service component of Ruby on Rails. The vulnerability allowed an attacker to achieve arbitrary file write, read, and delete on the server's filesystem by injecting a malicious blob key. The vulnerability was due to insufficient validation of the blob key parameter before constructing file paths. This could be exploited by an attacker who could influence the hash passed to the `.attach()` method. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/000/022/5e2b46658c8b86bed62f574d8e1793f353cbbc63_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3580511' style='color: #4aa3ff;' target='new'>ActiveStorage Disk Service Path Traversal via Custom Blob Key Injection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/ksw9722?type=user' style='color: #4aa3ff;' target='new'> <strong> kim siwong</strong></a> was disclosed at May 7, 2026, 2:04 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Path Traversal</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the ActiveStorage Disk Service component of Ruby on Rails. The vulnerability allowed an attacker to achieve arbitrary file write, read, and delete on the server's filesystem by injecting a malicious blob key. The vulnerability was due to insufficient validation of the blob key parameter before constructing file paths. This could be exploited by an attacker who could influence the hash passed to the `.attach()` method. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-05-06]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-06</link>
			<pubDate>Thu, 07 May 2026 07:00:06 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-06</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/007/731/55634f7fcd917725c7a5771cc6e7c9b4d5fe0c22_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #dc3545; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Critical</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3307874' style='color: #4aa3ff;' target='new'>Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node Paralysis</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/rorkh?type=user' style='color: #4aa3ff;' target='new'> <strong> rorkh</strong></a> was disclosed at May 6, 2026, 5:13 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Uncontrolled Resource Consumption</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A deadlock vulnerability was discovered in the Monero JSON-RPC interface that allowed a remote, unauthenticated attacker to completely paralyze any Monero node with a single HTTP request containing specific batch methods, leading to permanent denial of service. The vulnerability affected all releases of Monero up to version 0.18.4.2 and likely previous versions, across all operating systems. The vulnerability was rated as critical, with a CVSS 3.0 score of 10.0. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/007/731/55634f7fcd917725c7a5771cc6e7c9b4d5fe0c22_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #dc3545; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Critical</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3307874' style='color: #4aa3ff;' target='new'>Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node Paralysis</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/rorkh?type=user' style='color: #4aa3ff;' target='new'> <strong> rorkh</strong></a> was disclosed at May 6, 2026, 5:13 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Uncontrolled Resource Consumption</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A deadlock vulnerability was discovered in the Monero JSON-RPC interface that allowed a remote, unauthenticated attacker to completely paralyze any Monero node with a single HTTP request containing specific batch methods, leading to permanent denial of service. The vulnerability affected all releases of Monero up to version 0.18.4.2 and likely previous versions, across all operating systems. The vulnerability was rated as critical, with a CVSS 3.0 score of 10.0. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-05-05]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-05</link>
			<pubDate>Wed, 06 May 2026 07:00:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-05</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/015/252/60e8778f4f1fee57ea2b164a7d2ec1e2d2dd7bc8_original./3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3625600' style='color: #4aa3ff;' target='new'>Out of scope: Improper Input Validation Order on /api-internal/login via password field leads to unnecessary resource consumption</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bereza4321?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at May 5, 2026, 3:07 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A security issue was discovered in the /api-internal/login authentication endpoint of the internal login interface of Burp Suite DAST (Enterprise). The issue was caused by improper input validation order, where the application processed user-supplied input before enforcing field-level validation. This allowed extremely large payloads in the password field to be buffered and parsed prior to rejection, resulting in unnecessary resource consumption. The application fully processed the requests before applying validation, violating the fail-fast principle. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/015/252/60e8778f4f1fee57ea2b164a7d2ec1e2d2dd7bc8_original./3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3625600' style='color: #4aa3ff;' target='new'>Out of scope: Improper Input Validation Order on /api-internal/login via password field leads to unnecessary resource consumption</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bereza4321?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at May 5, 2026, 3:07 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A security issue was discovered in the /api-internal/login authentication endpoint of the internal login interface of Burp Suite DAST (Enterprise). The issue was caused by improper input validation order, where the application processed user-supplied input before enforcing field-level validation. This allowed extremely large payloads in the password field to be buffered and parsed prior to rejection, resulting in unnecessary resource consumption. The application fully processed the requests before applying validation, violating the fail-fast principle. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-05-01]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-01</link>
			<pubDate>Sat, 02 May 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-05-01</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3320669' style='color: #4aa3ff;' target='new'>Double fdrop on a socket through sys_netcontrol</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/slidybat?type=user' style='color: #4aa3ff;' target='new'> <strong> SlidyBat</strong></a> was disclosed at May 1, 2026, 1:41 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Double Free</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The netcontrol syscall in the kernel had a vulnerability where the socket file descriptor was not properly validated when removing a socket from a netevent structure. This allowed an attacker to cause a double fdrop on a socket, potentially leading to a use-after-free condition. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3320669' style='color: #4aa3ff;' target='new'>Double fdrop on a socket through sys_netcontrol</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/slidybat?type=user' style='color: #4aa3ff;' target='new'> <strong> SlidyBat</strong></a> was disclosed at May 1, 2026, 1:41 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Double Free</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The netcontrol syscall in the kernel had a vulnerability where the socket file descriptor was not properly validated when removing a socket from a netevent structure. This allowed an attacker to cause a double fdrop on a socket, potentially leading to a use-after-free condition. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-30]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-30</link>
			<pubDate>Fri, 01 May 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-30</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3320669' style='color: #4aa3ff;' target='new'>Double fdrop on a socket through sys_netcontrol</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/slidybat?type=user' style='color: #4aa3ff;' target='new'> <strong> SlidyBat</strong></a> was disclosed at May 1, 2026, 1:41 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Double Free</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The netcontrol syscall in the kernel had a vulnerability where the socket file descriptor was not properly validated when removing a socket from a netevent structure. This allowed an attacker to cause a double fdrop on a socket, potentially leading to a use-after-free condition. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3320669' style='color: #4aa3ff;' target='new'>Double fdrop on a socket through sys_netcontrol</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/slidybat?type=user' style='color: #4aa3ff;' target='new'> <strong> SlidyBat</strong></a> was disclosed at May 1, 2026, 1:41 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Double Free</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The netcontrol syscall in the kernel had a vulnerability where the socket file descriptor was not properly validated when removing a socket from a netevent structure. This allowed an attacker to cause a double fdrop on a socket, potentially leading to a use-after-free condition. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-29]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-29</link>
			<pubDate>Thu, 30 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-29</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3697719' style='color: #4aa3ff;' target='new'>CVE-2026-7168: cross-proxy Digest auth state leak</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/xkilua?type=user' style='color: #4aa3ff;' target='new'> <strong> kilua</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Exposure of Data Element to Wrong Session</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3694390' style='color: #4aa3ff;' target='new'>CVE-2026-7009: OCSP stapling bypass with Apple SecTrust</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/3lcarry?type=user' style='color: #4aa3ff;' target='new'> <strong> Carlos Carrillo Boj</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Certificate Validation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3669637' style='color: #4aa3ff;' target='new'>CVE-2026-6253: proxy credentials leak over redirect-to proxy</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/joesephdiver?type=user' style='color: #4aa3ff;' target='new'> <strong> Dwij Mehta</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3642555' style='color: #4aa3ff;' target='new'>CVE-2026-5545: wrong reuse of HTTP Negotiate connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/quaccws?type=user' style='color: #4aa3ff;' target='new'> <strong> quaccws</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Authentication Bypass by Primary Weakness</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3671818' style='color: #4aa3ff;' target='new'>CVE-2026-6276: stale custom cookie host causes cookie leak</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/arkss?type=user' style='color: #4aa3ff;' target='new'> <strong> areksa</strong></a> was disclosed at April 29, 2026, 7:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Exposure of Data Element to Wrong Session</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3677759' style='color: #4aa3ff;' target='new'>CVE-2026-6429: netrc credential leak with reused proxy connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nobcoderr?type=user' style='color: #4aa3ff;' target='new'> <strong> pesudonmy</strong></a> was disclosed at April 29, 2026, 7:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Information Exposure Through Sent Data</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3621851' style='color: #4aa3ff;' target='new'>CVE-2026-4873: connection reuse ignores TLS requirement</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bonaire?type=user' style='color: #4aa3ff;' target='new'> <strong> Arkadi Vainbrand</strong></a> was disclosed at April 29, 2026, 6:47 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cleartext Transmission of Sensitive Information</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in libcurl's connection reuse for cleartext-upgrade mail protocols. The vulnerability was that the later transfer's CURLOPT_USE_SSL option was not properly included if a plaintext connection was already open and reusable. This affected the smtp://, pop3://, and imap:// protocols. The vulnerability could allow a later TLS-required mail transfer to be sent over a previously established plaintext connection, contrary to expectation. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3650689' style='color: #4aa3ff;' target='new'>CVE-2026-5773: wrong reuse of SMB connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/osama-hamad?type=user' style='color: #4aa3ff;' target='new'> <strong> Osama Hamad</strong></a> was disclosed at April 29, 2026, 6:11 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in curl version 8.19.0 and earlier versions that support SMB. The vulnerability was due to the incorrect reuse of SMB connections across different shares on the same server. This led to data spoofing and access control bypass. The issue was caused by the lack of verification of the target share name when reusing an existing connection. As a result, the application could silently fetch data from an unintended share. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3452696' style='color: #4aa3ff;' target='new'>PS4 BD-J privilege escalation using nested JAR</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/gezine?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at April 29, 2026, 5:09 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privilege Escalation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A PS4 vulnerability was discovered in the Blu-ray Disc Java (BD-J) privilege escalation using nested JAR files. The vulnerability was found in the PS4 system software versions 13.00 to the latest version 13.02. The vulnerability was caused by a discrepancy between the security policy's path canonicalization and the actual class loading path. The security policy granted AllPermission to code that appeared to be loaded from a trusted directory, while the actual code was loaded from an untrusted nested JAR on the Blu-ray disc. This resulted in a Time-of-Check/Time-of-Use (TOCTOU) vulnerability that allowed untrusted code to obtain AllPermission. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3697719' style='color: #4aa3ff;' target='new'>CVE-2026-7168: cross-proxy Digest auth state leak</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/xkilua?type=user' style='color: #4aa3ff;' target='new'> <strong> kilua</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Exposure of Data Element to Wrong Session</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3694390' style='color: #4aa3ff;' target='new'>CVE-2026-7009: OCSP stapling bypass with Apple SecTrust</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/3lcarry?type=user' style='color: #4aa3ff;' target='new'> <strong> Carlos Carrillo Boj</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Certificate Validation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3669637' style='color: #4aa3ff;' target='new'>CVE-2026-6253: proxy credentials leak over redirect-to proxy</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/joesephdiver?type=user' style='color: #4aa3ff;' target='new'> <strong> Dwij Mehta</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3642555' style='color: #4aa3ff;' target='new'>CVE-2026-5545: wrong reuse of HTTP Negotiate connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/quaccws?type=user' style='color: #4aa3ff;' target='new'> <strong> quaccws</strong></a> was disclosed at April 29, 2026, 7:15 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Authentication Bypass by Primary Weakness</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3671818' style='color: #4aa3ff;' target='new'>CVE-2026-6276: stale custom cookie host causes cookie leak</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/arkss?type=user' style='color: #4aa3ff;' target='new'> <strong> areksa</strong></a> was disclosed at April 29, 2026, 7:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Exposure of Data Element to Wrong Session</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3677759' style='color: #4aa3ff;' target='new'>CVE-2026-6429: netrc credential leak with reused proxy connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nobcoderr?type=user' style='color: #4aa3ff;' target='new'> <strong> pesudonmy</strong></a> was disclosed at April 29, 2026, 7:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Information Exposure Through Sent Data</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3621851' style='color: #4aa3ff;' target='new'>CVE-2026-4873: connection reuse ignores TLS requirement</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bonaire?type=user' style='color: #4aa3ff;' target='new'> <strong> Arkadi Vainbrand</strong></a> was disclosed at April 29, 2026, 6:47 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cleartext Transmission of Sensitive Information</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in libcurl's connection reuse for cleartext-upgrade mail protocols. The vulnerability was that the later transfer's CURLOPT_USE_SSL option was not properly included if a plaintext connection was already open and reusable. This affected the smtp://, pop3://, and imap:// protocols. The vulnerability could allow a later TLS-required mail transfer to be sent over a previously established plaintext connection, contrary to expectation. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3650689' style='color: #4aa3ff;' target='new'>CVE-2026-5773: wrong reuse of SMB connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/osama-hamad?type=user' style='color: #4aa3ff;' target='new'> <strong> Osama Hamad</strong></a> was disclosed at April 29, 2026, 6:11 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in curl version 8.19.0 and earlier versions that support SMB. The vulnerability was due to the incorrect reuse of SMB connections across different shares on the same server. This led to data spoofing and access control bypass. The issue was caused by the lack of verification of the target share name when reusing an existing connection. As a result, the application could silently fetch data from an unintended share. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3452696' style='color: #4aa3ff;' target='new'>PS4 BD-J privilege escalation using nested JAR</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/gezine?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at April 29, 2026, 5:09 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privilege Escalation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A PS4 vulnerability was discovered in the Blu-ray Disc Java (BD-J) privilege escalation using nested JAR files. The vulnerability was found in the PS4 system software versions 13.00 to the latest version 13.02. The vulnerability was caused by a discrepancy between the security policy's path canonicalization and the actual class loading path. The security policy granted AllPermission to code that appeared to be loaded from a trusted directory, while the actual code was loaded from an untrusted nested JAR on the Blu-ray disc. This resulted in a Time-of-Check/Time-of-Use (TOCTOU) vulnerability that allowed untrusted code to obtain AllPermission. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-28]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-28</link>
			<pubDate>Wed, 29 Apr 2026 07:00:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-28</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3621851' style='color: #4aa3ff;' target='new'>CVE-2026-4873: connection reuse ignores TLS requirement</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bonaire?type=user' style='color: #4aa3ff;' target='new'> <strong> Arkadi Vainbrand</strong></a> was disclosed at April 29, 2026, 6:47 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cleartext Transmission of Sensitive Information</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in libcurl's connection reuse for cleartext-upgrade mail protocols. The vulnerability was that the later transfer's CURLOPT_USE_SSL option was not properly included if a plaintext connection was already open and reusable. This affected the smtp://, pop3://, and imap:// protocols. The vulnerability could allow a later TLS-required mail transfer to be sent over a previously established plaintext connection, contrary to expectation. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3650689' style='color: #4aa3ff;' target='new'>CVE-2026-5773: wrong reuse of SMB connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/osama-hamad?type=user' style='color: #4aa3ff;' target='new'> <strong> Osama Hamad</strong></a> was disclosed at April 29, 2026, 6:11 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in curl version 8.19.0 and earlier versions that support SMB. The vulnerability was due to the incorrect reuse of SMB connections across different shares on the same server. This led to data spoofing and access control bypass. The issue was caused by the lack of verification of the target share name when reusing an existing connection. As a result, the application could silently fetch data from an unintended share. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3452696' style='color: #4aa3ff;' target='new'>PS4 BD-J privilege escalation using nested JAR</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/gezine?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at April 29, 2026, 5:09 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privilege Escalation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A PS4 vulnerability was discovered in the Blu-ray Disc Java (BD-J) privilege escalation using nested JAR files. The vulnerability was found in the PS4 system software versions 13.00 to the latest version 13.02. The vulnerability was caused by a discrepancy between the security policy's path canonicalization and the actual class loading path. The security policy granted AllPermission to code that appeared to be loaded from a trusted directory, while the actual code was loaded from an untrusted nested JAR on the Blu-ray disc. This resulted in a Time-of-Check/Time-of-Use (TOCTOU) vulnerability that allowed untrusted code to obtain AllPermission. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3621851' style='color: #4aa3ff;' target='new'>CVE-2026-4873: connection reuse ignores TLS requirement</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/bonaire?type=user' style='color: #4aa3ff;' target='new'> <strong> Arkadi Vainbrand</strong></a> was disclosed at April 29, 2026, 6:47 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cleartext Transmission of Sensitive Information</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in libcurl's connection reuse for cleartext-upgrade mail protocols. The vulnerability was that the later transfer's CURLOPT_USE_SSL option was not properly included if a plaintext connection was already open and reusable. This affected the smtp://, pop3://, and imap:// protocols. The vulnerability could allow a later TLS-required mail transfer to be sent over a previously established plaintext connection, contrary to expectation. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/035/663/2faf4c279d437d64bfda6d23d62ce1833813a4d9_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3650689' style='color: #4aa3ff;' target='new'>CVE-2026-5773: wrong reuse of SMB connection</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/osama-hamad?type=user' style='color: #4aa3ff;' target='new'> <strong> Osama Hamad</strong></a> was disclosed at April 29, 2026, 6:11 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in curl version 8.19.0 and earlier versions that support SMB. The vulnerability was due to the incorrect reuse of SMB connections across different shares on the same server. This led to data spoofing and access control bypass. The issue was caused by the lack of verification of the target share name when reusing an existing connection. As a result, the application could silently fetch data from an unintended share. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/8uyqZE6d69UGEYq8qwzS4Z3Q/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3452696' style='color: #4aa3ff;' target='new'>PS4 BD-J privilege escalation using nested JAR</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/gezine?type=user' style='color: #4aa3ff;' target='new'> <strong> </strong></a> was disclosed at April 29, 2026, 5:09 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privilege Escalation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A PS4 vulnerability was discovered in the Blu-ray Disc Java (BD-J) privilege escalation using nested JAR files. The vulnerability was found in the PS4 system software versions 13.00 to the latest version 13.02. The vulnerability was caused by a discrepancy between the security policy's path canonicalization and the actual class loading path. The security policy granted AllPermission to code that appeared to be loaded from a trusted directory, while the actual code was loaded from an untrusted nested JAR on the Blu-ray disc. This resulted in a Time-of-Check/Time-of-Use (TOCTOU) vulnerability that allowed untrusted code to obtain AllPermission. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-27]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-27</link>
			<pubDate>Tue, 28 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-27</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/002/060/c9c3633edc1081446038c76237344b51696334da_original.jpg/d9695107bfcd68eeb1c9e0912b109cdae9a6c00c0bda6fd4cbd6d9bdb828840a' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3340797' style='color: #4aa3ff;' target='new'>IBM Aspera HTTP Gateway stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/jhon1231248e?type=user' style='color: #4aa3ff;' target='new'> <strong> Jh0n </strong></a> was disclosed at April 27, 2026, 1:29 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Information Disclosure</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The IBM Aspera HTTP Gateway stored sensitive information in clear text in easily obtainable files, which could be read by an unauthenticated user. The issue was submitted to IBM, analyzed, and remediated. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/0p8e6gg8xoy45dhjxs5wh4iti6k8/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3279441' style='color: #4aa3ff;' target='new'>Bypass of Restricted Keyword "Mozilla" in Display Name Field via Unicode Homoglyphs on addons.allizom.org</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/icecream_23?type=user' style='color: #4aa3ff;' target='new'> <strong> Aman Bhuiyan</strong></a> was disclosed at April 27, 2026, 9:43 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Input Validation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A restricted keyword bypass vulnerability was discovered on the Firefox Add-ons platform that allowed an attacker to register a display name visually identical to "Mozilla" by using a Unicode homoglyph character. This circumvented the intended restriction and could have been used to impersonate official accounts. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3100570' style='color: #4aa3ff;' target='new'>Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aaqibhussain?type=user' style='color: #4aa3ff;' target='new'> <strong> Aaqib Hussain</strong></a> was disclosed at April 27, 2026, 4:00 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the messaging system of Pixiv.net. The vulnerability allowed any user to bypass the inbox privacy settings and send messages to another user who had disabled their inbox. The vulnerability was triggered by manipulating the id parameter in the message-sending POST request. Additionally, the lack of rate limiting or duplicate request validation allowed attackers to spam users by repeatedly sending the same or modified requests. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3183520' style='color: #4aa3ff;' target='new'>Non-premium user can disable Ads in japanese version of dic.pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/lainkusanagi?type=user' style='color: #4aa3ff;' target='new'> <strong> Luis G. Moret Hernandez</strong></a> was disclosed at April 27, 2026, 3:58 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Business Logic Errors</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was identified in the Japanese version of the pixiv dictionary website where non-premium users could disable advertisements. Normally, the ability to disable ads was restricted to premium users only. However, due to improper access control, any authenticated user could modify their ad display preferences without verification of premium status. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/002/060/c9c3633edc1081446038c76237344b51696334da_original.jpg/d9695107bfcd68eeb1c9e0912b109cdae9a6c00c0bda6fd4cbd6d9bdb828840a' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3340797' style='color: #4aa3ff;' target='new'>IBM Aspera HTTP Gateway stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/jhon1231248e?type=user' style='color: #4aa3ff;' target='new'> <strong> Jh0n </strong></a> was disclosed at April 27, 2026, 1:29 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Information Disclosure</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> The IBM Aspera HTTP Gateway stored sensitive information in clear text in easily obtainable files, which could be read by an unauthenticated user. The issue was submitted to IBM, analyzed, and remediated. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/0p8e6gg8xoy45dhjxs5wh4iti6k8/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3279441' style='color: #4aa3ff;' target='new'>Bypass of Restricted Keyword "Mozilla" in Display Name Field via Unicode Homoglyphs on addons.allizom.org</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/icecream_23?type=user' style='color: #4aa3ff;' target='new'> <strong> Aman Bhuiyan</strong></a> was disclosed at April 27, 2026, 9:43 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Input Validation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A restricted keyword bypass vulnerability was discovered on the Firefox Add-ons platform that allowed an attacker to register a display name visually identical to "Mozilla" by using a Unicode homoglyph character. This circumvented the intended restriction and could have been used to impersonate official accounts. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3100570' style='color: #4aa3ff;' target='new'>Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aaqibhussain?type=user' style='color: #4aa3ff;' target='new'> <strong> Aaqib Hussain</strong></a> was disclosed at April 27, 2026, 4:00 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the messaging system of Pixiv.net. The vulnerability allowed any user to bypass the inbox privacy settings and send messages to another user who had disabled their inbox. The vulnerability was triggered by manipulating the id parameter in the message-sending POST request. Additionally, the lack of rate limiting or duplicate request validation allowed attackers to spam users by repeatedly sending the same or modified requests. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3183520' style='color: #4aa3ff;' target='new'>Non-premium user can disable Ads in japanese version of dic.pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/lainkusanagi?type=user' style='color: #4aa3ff;' target='new'> <strong> Luis G. Moret Hernandez</strong></a> was disclosed at April 27, 2026, 3:58 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Business Logic Errors</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was identified in the Japanese version of the pixiv dictionary website where non-premium users could disable advertisements. Normally, the ability to disable ads was restricted to premium users only. However, due to improper access control, any authenticated user could modify their ad display preferences without verification of premium status. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-26]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-26</link>
			<pubDate>Mon, 27 Apr 2026 07:00:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-26</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3100570' style='color: #4aa3ff;' target='new'>Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aaqibhussain?type=user' style='color: #4aa3ff;' target='new'> <strong> Aaqib Hussain</strong></a> was disclosed at April 27, 2026, 4:00 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the messaging system of Pixiv.net. The vulnerability allowed any user to bypass the inbox privacy settings and send messages to another user who had disabled their inbox. The vulnerability was triggered by manipulating the id parameter in the message-sending POST request. Additionally, the lack of rate limiting or duplicate request validation allowed attackers to spam users by repeatedly sending the same or modified requests. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3183520' style='color: #4aa3ff;' target='new'>Non-premium user can disable Ads in japanese version of dic.pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/lainkusanagi?type=user' style='color: #4aa3ff;' target='new'> <strong> Luis G. Moret Hernandez</strong></a> was disclosed at April 27, 2026, 3:58 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Business Logic Errors</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was identified in the Japanese version of the pixiv dictionary website where non-premium users could disable advertisements. Normally, the ability to disable ads was restricted to premium users only. However, due to improper access control, any authenticated user could modify their ad display preferences without verification of premium status. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3100570' style='color: #4aa3ff;' target='new'>Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aaqibhussain?type=user' style='color: #4aa3ff;' target='new'> <strong> Aaqib Hussain</strong></a> was disclosed at April 27, 2026, 4:00 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the messaging system of Pixiv.net. The vulnerability allowed any user to bypass the inbox privacy settings and send messages to another user who had disabled their inbox. The vulnerability was triggered by manipulating the id parameter in the message-sending POST request. Additionally, the lack of rate limiting or duplicate request validation allowed attackers to spam users by repeatedly sending the same or modified requests. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/zwZW6NWs5m7fkL6SV9jkncqW/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3183520' style='color: #4aa3ff;' target='new'>Non-premium user can disable Ads in japanese version of dic.pixiv.net</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/lainkusanagi?type=user' style='color: #4aa3ff;' target='new'> <strong> Luis G. Moret Hernandez</strong></a> was disclosed at April 27, 2026, 3:58 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Business Logic Errors</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was identified in the Japanese version of the pixiv dictionary website where non-premium users could disable advertisements. Normally, the ability to disable ads was restricted to premium users only. However, due to improper access control, any authenticated user could modify their ad display preferences without verification of premium status. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-23]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-23</link>
			<pubDate>Fri, 24 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-23</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/022/984/e600648ace4a8553247bce967d461a030aa81d49_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3556769' style='color: #4aa3ff;' target='new'>Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoS</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/mbarbs?type=user' style='color: #4aa3ff;' target='new'> <strong> mbarbs</strong></a> was disclosed at April 23, 2026, 10:21 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A flaw was discovered in the Node.js TLS error handling that left SNICallback invocations unprotected against synchronous exceptions. This represented an incomplete fix of the prior CVE-2026-21637 vulnerability, where the equivalent ALPN and PSK callbacks were already addressed. The issue could lead to a Remote Denial of Service when an SNICallback threw synchronously on unexpected input, causing the exception to bypass TLS error handlers and propagate as an uncaught exception, crashing the Node.js process. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/019/858/ada6c92a338715afad123af214dd6e22fd8dc6ff_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3589551' style='color: #4aa3ff;' target='new'>RBAC bypass on App log endpoints via `permissionRequired` typo — any authenticated user reads admin-only Enterprise App logs</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/arccode?type=user' style='color: #4aa3ff;' target='new'> <strong> Arccode</strong></a> was disclosed at April 23, 2026, 9:45 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/022/984/e600648ace4a8553247bce967d461a030aa81d49_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #fd7e14; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>High</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3556769' style='color: #4aa3ff;' target='new'>Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoS</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/mbarbs?type=user' style='color: #4aa3ff;' target='new'> <strong> mbarbs</strong></a> was disclosed at April 23, 2026, 10:21 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A flaw was discovered in the Node.js TLS error handling that left SNICallback invocations unprotected against synchronous exceptions. This represented an incomplete fix of the prior CVE-2026-21637 vulnerability, where the equivalent ALPN and PSK callbacks were already addressed. The issue could lead to a Remote Denial of Service when an SNICallback threw synchronously on unexpected input, causing the exception to bypass TLS error handlers and propagate as an uncaught exception, crashing the Node.js process. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/019/858/ada6c92a338715afad123af214dd6e22fd8dc6ff_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3589551' style='color: #4aa3ff;' target='new'>RBAC bypass on App log endpoints via `permissionRequired` typo — any authenticated user reads admin-only Enterprise App logs</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/arccode?type=user' style='color: #4aa3ff;' target='new'> <strong> Arccode</strong></a> was disclosed at April 23, 2026, 9:45 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Improper Access Control - Generic</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-22]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-22</link>
			<pubDate>Thu, 23 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-22</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/019/858/ada6c92a338715afad123af214dd6e22fd8dc6ff_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #dc3545; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Critical</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3564655' style='color: #4aa3ff;' target='new'>Complete authentication bypass to admin permissions</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/npc?type=user' style='color: #4aa3ff;' target='new'> <strong> Nicholas Carlini</strong></a> was disclosed at April 22, 2026, 9:01 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>SQL Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/019/858/ada6c92a338715afad123af214dd6e22fd8dc6ff_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #dc3545; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Critical</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3564655' style='color: #4aa3ff;' target='new'>Complete authentication bypass to admin permissions</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/npc?type=user' style='color: #4aa3ff;' target='new'> <strong> Nicholas Carlini</strong></a> was disclosed at April 22, 2026, 9:01 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>SQL Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'>  </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-20]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-20</link>
			<pubDate>Tue, 21 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-20</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3486747' style='color: #4aa3ff;' target='new'>SVG filter primitives bypass remote image blocking, enabling email tracking without consent.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:57 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privacy Violation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail application. The sanitizer did not properly handle the `<feImage>` SVG filter primitive, allowing external resources to be loaded even when the "Block remote images" setting was enabled. This vulnerability could be used to track email opens and obtain the recipient's IP address without the user's consent. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590586' style='color: #4aa3ff;' target='new'>position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:04 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Resource Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the CSS sanitization process of the Roundcube webmail application. The sanitizer failed to properly handle the "position: fixed !important" CSS declaration, allowing an attacker to bypass the mitigation for fixed-position overlays. This could enable the creation of full-viewport phishing overlays. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590583' style='color: #4aa3ff;' target='new'>Unquoted body background attribute enables CSS injection that bypasses remote image blocking</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:03 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Resource Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in Roundcube's HTML sanitizer that enabled CSS injection when the `allow_remote` option was set to `false`. The sanitizer failed to quote the value of the `background` attribute from the email's `<body>` element, allowing a crafted `data:` URI to terminate the `url()` function and inject arbitrary CSS properties. This bypass allowed external resources to be loaded even when remote image blocking was enabled. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590576' style='color: #4aa3ff;' target='new'>SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:03 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Remote File Inclusion</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail client. The vulnerability allowed attackers to bypass the "Block remote images" security feature by using SMIL animation attributes to load arbitrary external resources without validation. This could have enabled email tracking without the user's consent. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3486747' style='color: #4aa3ff;' target='new'>SVG filter primitives bypass remote image blocking, enabling email tracking without consent.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:57 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Privacy Violation</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail application. The sanitizer did not properly handle the `<feImage>` SVG filter primitive, allowing external resources to be loaded even when the "Block remote images" setting was enabled. This vulnerability could be used to track email opens and obtain the recipient's IP address without the user's consent. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590586' style='color: #4aa3ff;' target='new'>position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:04 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Resource Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the CSS sanitization process of the Roundcube webmail application. The sanitizer failed to properly handle the "position: fixed !important" CSS declaration, allowing an attacker to bypass the mitigation for fixed-position overlays. This could enable the creation of full-viewport phishing overlays. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590583' style='color: #4aa3ff;' target='new'>Unquoted body background attribute enables CSS injection that bypasses remote image blocking</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:03 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Resource Injection</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in Roundcube's HTML sanitizer that enabled CSS injection when the `allow_remote` option was set to `false`. The sanitizer failed to quote the value of the `background` attribute from the email's `<body>` element, allowing a crafted `data:` URI to terminate the `url()` function and inject arbitrary CSS properties. This bypass allowed external resources to be loaded even when remote image blocking was enabled. </p>
              </div><br><div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3590576' style='color: #4aa3ff;' target='new'>SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/nullcathedral?type=user' style='color: #4aa3ff;' target='new'> <strong> _NULL</strong></a> was disclosed at April 20, 2026, 12:03 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Remote File Inclusion</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail client. The vulnerability allowed attackers to bypass the "Block remote images" security feature by using SMIL animation attributes to load arbitrary external resources without validation. This could have enabled email tracking without the user's consent. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-19]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-19</link>
			<pubDate>Mon, 20 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-19</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3594137' style='color: #4aa3ff;' target='new'>Stored XSS in attachment-display exploitable through SameSite</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aikido_security?type=user' style='color: #4aa3ff;' target='new'> <strong> Aikido Security</strong></a> was disclosed at April 19, 2026, 9:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cross-site Scripting (XSS) - Stored</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A stored XSS vulnerability was discovered in the attachment-display feature of Roundcube. By uploading an HTML file and opening it through the display-attachment endpoint, the embedded script could execute under the Roundcube origin. The issue was caused by the lack of a restrictive Content Security Policy in the attachment display flow, unlike the general attachment viewer. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/hsgut1vi1cv8housqai9cm9383yx/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #ffc107; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Medium</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3594137' style='color: #4aa3ff;' target='new'>Stored XSS in attachment-display exploitable through SameSite</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/aikido_security?type=user' style='color: #4aa3ff;' target='new'> <strong> Aikido Security</strong></a> was disclosed at April 19, 2026, 9:14 am &nbsp; | &nbsp; <span style='color: #ff6b6b;'>Cross-site Scripting (XSS) - Stored</span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A stored XSS vulnerability was discovered in the attachment-display feature of Roundcube. By uploading an HTML file and opening it through the display-attachment endpoint, the embedded script could execute under the Roundcube origin. The issue was caused by the lack of a restrictive Content Security Policy in the attachment display flow, unlike the general attachment viewer. </p>
              </div><br>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackerOne Disclosed Reports - 2026-04-18]]></title>
			<link>https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-18</link>
			<pubDate>Sun, 19 Apr 2026 07:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-HackerOne-Disclosed-Reports-2026-04-18</guid>
			<description><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/000/022/5e2b46658c8b86bed62f574d8e1793f353cbbc63_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3601655' style='color: #4aa3ff;' target='new'>Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split j‌avascript: URLs</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/smlee?type=user' style='color: #4aa3ff;' target='new'> <strong> smlee</strong></a> was disclosed at April 18, 2026, 3:27 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the `Rails::HTML::Sanitizer.allowed_uri?` method of the `rails-html-sanitizer` library. The method incorrectly returned `true` for entity-encoded control-character-split `j‌avascript:` URLs, which could lead to potential security issues if the application relied on the method's result to make security decisions. </p>
              </div><br>]]></description>
			<content:encoded><![CDATA[<div style='background: #1e1e1e;padding: 15px;border-radius: 8px;box-shadow: 0px 2px 5px rgba(0, 0, 0, 0.2);margin: auto;'>
                <div style='display: flex; justify-content: space-between; align-items: center;'>
                    <div> <img src='https://profile-photos.hackerone-user-content.com/variants/000/000/022/5e2b46658c8b86bed62f574d8e1793f353cbbc63_original.png/3f1ab5c6a9b6dadada1e6c8121700b884388bd0a43471fee1897a38ce57d0b2c' alt='Logo' style='width: 40px; height: 40px; border-radius: 50%;'> </div>
                    <div style='display: flex; gap: 5px;'>
                        <span style='background: #17a2b8; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>Low</span><br />
                        <span style='background: #28a745; color: white; padding: 5px 10px; border-radius: 12px; font-size: 12px;'>resolved</span><br />
                    </div>
                </div>
                <h2 style='color: #4aa3ff;font-size: 18px;margin-top: 10px;'> <a href='https://hackerone.com/reports/3601655' style='color: #4aa3ff;' target='new'>Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split j‌avascript: URLs</a></h2><br />
                <p style='font-size: 14px;color: #bbb;margin-top: 5px;'> Bug reported by <a href='https://hackerone.com/smlee?type=user' style='color: #4aa3ff;' target='new'> <strong> smlee</strong></a> was disclosed at April 18, 2026, 3:27 pm &nbsp; | &nbsp; <span style='color: #ff6b6b;'></span> </p>
                <p style='font-size: 14px; color: #aaa; margin-top: 10px;'> A vulnerability was discovered in the `Rails::HTML::Sanitizer.allowed_uri?` method of the `rails-html-sanitizer` library. The method incorrectly returned `true` for entity-encoded control-character-split `j‌avascript:` URLs, which could lead to potential security issues if the application relied on the method's result to make security decisions. </p>
              </div><br>]]></content:encoded>
		</item>
	</channel>
</rss>