Filtered by vendor Bitcoin Subscriptions
Total 55 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2019-25220 1 Bitcoin 1 Bitcoin Core 2025-05-22 7.5 High
Bitcoin Core before 24.0.1 allows remote attackers to cause a denial of service (daemon crash) via a flood of low-difficulty header chains (aka a "Chain Width Expansion" attack) because a node does not first verify that a presented chain has enough work before committing to store it.
CVE-2024-55563 1 Bitcoin 1 Bitcoin Core 2025-05-22 5.3 Medium
Bitcoin Core through 27.2 allows transaction-relay jamming via an off-chain protocol attack, a related issue to CVE-2024-52913. For example, the outcome of an HTLC (Hashed Timelock Contract) can be changed because a flood of transaction traffic prevents propagation of certain Lightning channel transactions.
CVE-2024-35202 1 Bitcoin 2 Bitcoin, Bitcoin Core 2025-05-22 7.5 High
Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.
CVE-2024-52922 1 Bitcoin 1 Bitcoin Core 2025-04-30 6.5 Medium
In Bitcoin Core before 25.1, an attacker can cause a node to not download the latest block, because there can be minutes of delay when an announcing peer stalls instead of complying with the peer-to-peer protocol specification.
CVE-2024-52920 1 Bitcoin 1 Bitcoin Core 2025-04-30 7.5 High
Bitcoin Core before 0.20.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed GETDATA message.
CVE-2024-52921 1 Bitcoin 1 Bitcoin Core 2025-04-30 5.3 Medium
In Bitcoin Core before 25.0, a peer can affect the download state of other peers by sending a mutated block.
CVE-2024-52919 1 Bitcoin 1 Bitcoin Core 2025-04-30 6.5 Medium
Bitcoin Core before 22.0 has a CAddrMan nIdCount integer overflow and resultant assertion failure (and daemon exit) via a flood of addr messages.
CVE-2024-52917 1 Bitcoin 1 Bitcoin Core 2025-04-30 6.5 Medium
Bitcoin Core before 22.0 has a miniupnp infinite loop in which it allocates memory on the basis of random data received over the network, e.g., large M-SEARCH replies from a fake UPnP device.
CVE-2024-52916 1 Bitcoin 1 Bitcoin Core 2025-04-30 7.5 High
Bitcoin Core before 0.15.0 allows a denial of service (OOM kill of a daemon process) via a flood of minimum difficulty headers.
CVE-2024-52915 1 Bitcoin 1 Bitcoin Core 2025-04-30 7.5 High
Bitcoin Core before 0.20.0 allows remote attackers to cause a denial of service (memory consumption) via a crafted INV message.
CVE-2024-52914 1 Bitcoin 1 Bitcoin Core 2025-04-30 7.5 High
In Bitcoin Core before 0.18.0, a node could be stalled for hours when processing the orphans of a crafted unconfirmed transaction.
CVE-2024-52913 1 Bitcoin 1 Bitcoin Core 2025-04-30 5.3 Medium
In Bitcoin Core before 0.21.0, an attacker could prevent a node from seeing a specific unconfirmed transaction, because transaction re-requests are mishandled.
CVE-2024-52912 1 Bitcoin 1 Bitcoin Core 2025-04-30 7.5 High
Bitcoin Core before 0.21.0 allows a network split that is resultant from an integer overflow (calculating the time offset for newly connecting peers) and an abs64 logic bug.
CVE-2017-9230 1 Bitcoin 1 Bitcoin 2025-04-20 7.5 High
The Bitcoin Proof-of-Work algorithm does not consider a certain attack methodology related to 80-byte block headers with a variety of initial 64-byte chunks followed by the same 16-byte chunk, multiple candidate root values ending with the same 4 bytes, and calculations involving sqrt numbers. This violates the security assumptions of (1) the choice of input, outside of the dedicated nonce area, fed into the Proof-of-Work function should not change its difficulty to evaluate and (2) every Proof-of-Work function execution should be independent. NOTE: a number of persons feel that this methodology is a benign mining optimization, not a vulnerability
CVE-2013-4165 1 Bitcoin 1 Bitcoin Core 2025-04-11 N/A
The HTTPAuthorized function in bitcoinrpc.cpp in bitcoind 0.8.1 provides information about authentication failure upon detecting the first incorrect byte of a password, which makes it easier for remote attackers to determine passwords via a timing side-channel attack.
CVE-2013-3220 1 Bitcoin 4 Bitcoin-qt, Bitcoin Core, Bitcoind and 1 more 2025-04-11 N/A
bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block's size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking.
CVE-2012-1910 2 Bitcoin, Microsoft 3 Bitcoin-qt, Bitcoin Core, Windows 2025-04-11 N/A
Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages.
CVE-2013-2293 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2025-04-11 N/A
The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain.
CVE-2013-2292 1 Bitcoin 3 Bitcoin-qt, Bitcoin Core, Bitcoind 2025-04-11 N/A
bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes.
CVE-2012-1909 1 Bitcoin 2 Bitcoin Core, Wxbitcoin 2025-04-11 N/A
The Bitcoin protocol, as used in bitcoind before 0.4.4, wxBitcoin, Bitcoin-Qt, and other programs, does not properly handle multiple transactions with the same identifier, which allows remote attackers to cause a denial of service (unspendable transaction) by leveraging the ability to create a duplicate coinbase transaction.