![]() |
|
HackerOne Disclosed Reports - 2026-05-06 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2026-05-06 (/Thread-HackerOne-Disclosed-Reports-2026-05-06) |
HackerOne disclosed reports - 2026-05-06 - hashXploiter - 05-07-2026
Critical
resolved Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node ParalysisBug reported by rorkh was disclosed at May 6, 2026, 5:13 pm | Uncontrolled Resource Consumption A deadlock vulnerability was discovered in the Monero JSON-RPC interface that allowed a remote, unauthenticated attacker to completely paralyze any Monero node with a single HTTP request containing specific batch methods, leading to permanent denial of service. The vulnerability affected all releases of Monero up to version 0.18.4.2 and likely previous versions, across all operating systems. The vulnerability was rated as critical, with a CVSS 3.0 score of 10.0. |