Scan to download
BTC $74,758.67 +5.43%
ETH $2,381.91 +8.57%
BNB $615.21 +2.87%
XRP $1.37 +3.15%
SOL $86.01 +4.61%
TRX $0.3212 +0.21%
DOGE $0.0935 +2.62%
ADA $0.2448 +2.48%
BCH $436.90 +2.62%
LINK $9.23 +5.34%
HYPE $44.70 +8.30%
AAVE $100.43 +3.11%
SUI $0.9470 +4.51%
XLM $0.1554 +2.77%
ZEC $365.99 +0.82%
BTC $74,758.67 +5.43%
ETH $2,381.91 +8.57%
BNB $615.21 +2.87%
XRP $1.37 +3.15%
SOL $86.01 +4.61%
TRX $0.3212 +0.21%
DOGE $0.0935 +2.62%
ADA $0.2448 +2.48%
BCH $436.90 +2.62%
LINK $9.23 +5.34%
HYPE $44.70 +8.30%
AAVE $100.43 +3.11%
SUI $0.9470 +4.51%
XLM $0.1554 +2.77%
ZEC $365.99 +0.82%

Bitcoin Core developers: The vulnerability exploited by inscriptions in the Bitcoin Core client has been assigned the identifier CVE-2023-50428

2023-12-10 12:16:00
Collection

ChainCatcher news, Bitcoin Core developer Luke Dashjr posted on platform X that the "inscriptions" exploit has been assigned the identifier CVE-2023-50428 due to a vulnerability in the Bitcoin Core client.

Previously reported, Luke Dashjr indicated that inscriptions are exploiting a vulnerability in the Bitcoin Core client to send spam to the blockchain. Since 2013, Bitcoin Core has allowed users to set an additional data size limit ('-datacarriersize') when forwarding or mining transactions. Inscriptions bypassed this limit by disguising their data as program code.

app_icon
ChainCatcher Building the Web3 world with innovations.