{"uuid": "38a46d13-cce2-4fd4-ac31-52124af2afe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55563", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6460", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55563\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Bitcoin Core through 27.2 allows transaction-relay jamming via an off-chain protocol attack, a related issue to CVE-2024-52913. For example, the outcome of an HTLC (Hashed Timelock Contract) can be changed because a flood of transaction traffic prevents propagation of certain Lightning channel transactions.\n\ud83d\udccf Published: 2024-12-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-04T21:33:22.130Z\n\ud83d\udd17 References:\n1. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures\n2. https://bitcoincore.org\n3. https://delvingbitcoin.org/t/full-disclosure-transaction-relay-throughput-overflow-attacks-against-off-chain-protocols/1305\n4. https://gnusha.org/pi/bitcoindev/CALZpt+EptER=p+P7VN3QAb9n=dODA9_LnR9xZwWpRsdAwedv=w@mail.gmail.com/T/#u\n5. https://ariard.github.io", "creation_timestamp": "2025-03-04T22:33:34.000000Z"}