DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
- https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/
No PoCs found on GitHub currently.