Vulnerabilities (CVE)

Filtered by vendor Bitcoin Subscribe
Filtered by product Bitcoin-qt
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-10725 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Bitcoin Core before v0.13.0, a non-final alert is able to block the special "final alert" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
CVE-2016-10724 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 7.8 HIGH 7.5 HIGH
Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
CVE-2013-5700 1 Bitcoin 2 Bitcoin-qt, Bitcoin Core 2024-11-21 5.0 MEDIUM N/A
The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages.
CVE-2013-3220 1 Bitcoin 4 Bitcoin-qt, Bitcoin Core, Bitcoind and 1 more 2024-11-21 6.4 MEDIUM N/A
bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block's size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking.
CVE-2013-2293 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 5.0 MEDIUM N/A
The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain.
CVE-2013-2292 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 7.8 HIGH N/A
bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes.
CVE-2013-2273 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 5.0 MEDIUM N/A
bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction.
CVE-2013-2272 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2024-11-21 5.0 MEDIUM N/A
The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees.
CVE-2012-4684 1 Bitcoin 4 Bitcoin-qt, Bitcoin Core, Bitcoind and 1 more 2024-11-21 7.8 HIGH N/A
The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert.
CVE-2012-1910 2 Bitcoin, Microsoft 3 Bitcoin-qt, Bitcoin Core, Windows 2024-11-21 7.5 HIGH N/A
Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages.