<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luke-jr</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luke-jr"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Luke-jr"/>
	<updated>2026-05-21T14:49:54Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Consensus_versions&amp;diff=71035</id>
		<title>Consensus versions</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Consensus_versions&amp;diff=71035"/>
		<updated>2026-04-14T21:11:40Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add RDTS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! TENTATIVE semantic version number || Software release || Change type || BIP(s)&lt;br /&gt;
|-&lt;br /&gt;
| 0.1.0 || wxBitcoin 0.1.0 || original&lt;br /&gt;
|-&lt;br /&gt;
| 0.2.0 || wxBitcoin 0.1.6 || softfork || added nLockTime enforcement&amp;lt;ref&amp;gt;[https://bitcoin.stackexchange.com/a/99104/21052 Was the addition of nLockTime timelocks a hard fork?]&amp;lt;br&amp;gt;Bitcoin StackExchange&amp;lt;br&amp;gt;Retrieved 2020-09-21&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0.2.1 || wxBitcoin 0.3.1 || softfork || mostly-redundant 1 MB block size limit&lt;br /&gt;
|-&lt;br /&gt;
| 0.2.2 || wxBitcoin 0.3.5 || softfork || fixes CVE-2010-5141&lt;br /&gt;
|-&lt;br /&gt;
| 0.3.0 || wxBitcoin 0.3.6 || hardfork || OP_NOPs added&amp;lt;ref&amp;gt;https://github.com/bitcoin/bitcoin/blob/ec82517c8919f9cb7194511dc322a2575745e39e/script.cpp#L798&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0.4.0 || wxBitcoin 0.3.7 || hardfork || scriptSig + scriptPubKey evaluations separated &amp;lt;ref&amp;gt;https://bitcoin.stackexchange.com/questions/111673/was-bitcoin-0-3-7-actually-hard-forking&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0.4.1 || wxBitcoin 0.3.10 || softfork || fixes CVE-2010-5137 and CVE-2010-5139&lt;br /&gt;
|-&lt;br /&gt;
| 0.4.2 || wxBitcoin 0.3.12 || softfork || fixes CVE-2010-5138&lt;br /&gt;
|-&lt;br /&gt;
| 0.4.3 || wxBitcoin 0.3.13 || softfork || Treat multisig with more than 20 keys invalid after block 84000 &amp;lt;ref&amp;gt;https://github.com/bitcoin/bitcoin/commit/a790fa46f40d751307f86c37a709eb119768ce5b#diff-27496895958ca30c47bbb873299a2ad7a7ea1003a9faa96b317250e3b7aa1fef&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0 || Bitcoin Core 0.6.0 || softfork || fixes CVE-2012-1909&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0 || Bitcoin Core 0.6.0 || softfork || BIP16&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1 || Bitcoin Core 0.7.0 || softfork || BIP34&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2 || Bitcoin Core 0.8.1 || softfork || fixes CVE-2013-3220 by adding txid change limit&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.0 || Bitcoin Core 0.8.1 || hardfork || removed BDB lock limit &amp;amp; txid change limit&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1 || Bitcoin Core 0.9.2 || softfork || BIP42&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.0 || Bitcoin Core 0.10.0 || softfork || BIP66&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.0 || Bitcoin Core 0.10.4 || softfork || BIP65&lt;br /&gt;
|-&lt;br /&gt;
| 2.3.0 || Bitcoin Core 0.12.1 || softfork || BIP68, BIP112, BIP113&lt;br /&gt;
|-&lt;br /&gt;
| 2.4.0 || Bitcoin Core 0.13.1 || softfork || BIP141, BIP143, BIP147&lt;br /&gt;
|-&lt;br /&gt;
| 2.4.1 || Bitcoin Core UASF 0.14.0 || softfork || BIP148&lt;br /&gt;
|-&lt;br /&gt;
| 2.4.2 || Bitcoin Core 0.16.3 || softfork || fixes CVE-2018-17144&lt;br /&gt;
|-&lt;br /&gt;
| 2.5.0 || Bitcoin Core-based Taproot Client 0.21.0 || softfork || BIP341, BIP342, BIP343&lt;br /&gt;
|-&lt;br /&gt;
| 2.5.1 (pending) || Bitcoin Knots plus BIP110 || softfork || BIP110&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=70807</id>
		<title>DEMAND</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=70807"/>
		<updated>2025-08-21T18:35:26Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Corrections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{infobox company|&lt;br /&gt;
|founder= Alejandro De La Torre, CEO Co-Founder&lt;br /&gt;
Filippo Merli, CTO, Co-Founder&lt;br /&gt;
|foundation= 2023&lt;br /&gt;
|industry=[[Mining Pool]]&lt;br /&gt;
|website=https://www.DMND.WORK}}&lt;br /&gt;
[https://WWW.DMND.WORK DMND] is an upcoming [[Stratum v2|Stratum V2]] Bitcoin [[Mining Pool|mining pool]]. Both lottery and pooled mining are planned.&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
* Website: https://www.DMND.WORK/&lt;br /&gt;
&lt;br /&gt;
[[Category:Services]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70747</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70747"/>
		<updated>2025-05-23T16:50:25Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&amp;lt;br&amp;gt;Bitcoin Core/Knots prior to 0.11.2&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.15.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.18.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-getdata-cpu/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=lime| CPU usage&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Infinite loop via p2p&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-bip70-crash/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=yellow| Recipient&amp;lt;ref name=&amp;quot;Recipient&amp;quot;&amp;gt;Can only be exploited by the recipient the victim intends to pay&amp;lt;/ref&amp;gt;&lt;br /&gt;
| OOM via malicious BIP72 URI&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.1&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.2&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/31/disclose-upnp-oom/ CVE-2024-52917]&lt;br /&gt;
| 2024-07-31&lt;br /&gt;
| Bitcoin Core/Knots prior to 22.0 with UPnP enabled&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| OOM via LAN spam&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow/ CVE-2024-52919]&lt;br /&gt;
| 2024-07-31&lt;br /&gt;
| Bitcoin Core/Knots prior to 22.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via p2p spam&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/09/18/disclose-headers-oom/ CVE-2019-25220]&lt;br /&gt;
| 2024-09-18&lt;br /&gt;
| Bitcoin Core prior to 24.0.1&amp;lt;br&amp;gt;(Bitcoin Knots unaffected)&lt;br /&gt;
| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
| Memory DoS due to headers spam&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/10/08/disclose-mutated-blocks-hindering-propagation/ CVE-2024-52921]&lt;br /&gt;
| 2024-10-09&lt;br /&gt;
| Bitcoin Core/Knots prior to 25.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Hindered block propagation due to mutated blocks&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/10/08/disclose-large-inv-to-send/ TBD]&lt;br /&gt;
| 2024-10-09&lt;br /&gt;
| Bitcoin Core/Knots prior to 25.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| DoS due to inv-to-send sets growing too large&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/ CVE-2024-35202]&lt;br /&gt;
| 2024-10-09&lt;br /&gt;
| Bitcoin Core/Knots prior to 25.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/11/05/cb-stall-hindering-propagation/ CVE-2024-52922]&lt;br /&gt;
| 2024-11-05&lt;br /&gt;
| Bitcoin Core/Knots prior to 25.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Tonal_Bitcoin&amp;diff=70636</id>
		<title>Tonal Bitcoin</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Tonal_Bitcoin&amp;diff=70636"/>
		<updated>2025-05-15T02:32:50Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: /* Number system */ Fix link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tonal Bitcoin is a representation of the Bitcoin system aimed toward people who prefer the Tonal number system.&lt;br /&gt;
&lt;br /&gt;
== Number system ==&lt;br /&gt;
&lt;br /&gt;
The Tonal number system is an alternative to the decimal and SI (&amp;quot;metric&amp;quot;) system, which improves usability by allowing for infinite binary division (note that Bitcoin protocol support is still finite).&lt;br /&gt;
Instead of counting: one, two, three, four, five, six, seven, eight, nine, ten, eleven, etc...&lt;br /&gt;
In tonal, you would count: an, de, ti, go, su, by, ra, me, ni, ko, hu, vy, la, po, fy, ton, ton-an, etc...&lt;br /&gt;
This means you get common binary divisions like one sixteenth (0.0625 in decimal) as a clean number: 0.1 in tonal.&lt;br /&gt;
The tonal number system, prior to Bitcoin, already defines everyday units of measure including [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA30#v=onepage&amp;amp;q&amp;amp;f=false lengths], [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA32#v=onepage&amp;amp;q&amp;amp;f=false time], [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA37#v=onepage&amp;amp;q&amp;amp;f=false capacity, weight], [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA38#v=onepage&amp;amp;q&amp;amp;f=false power, gold/silver coinage], [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA43#v=onepage&amp;amp;q&amp;amp;f=false calendar], [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA44#v=onepage&amp;amp;q&amp;amp;f=false temperature], and even [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA42#v=onepage&amp;amp;q&amp;amp;f=false postage stamps] and [http://books.google.com/books?id=aNYGAAAAYAAJ&amp;amp;pg=PA45#v=onepage&amp;amp;q&amp;amp;f=false music].&lt;br /&gt;
&lt;br /&gt;
For more information on the Tonal system in general, please see [https://www.lulu.com/shop/john-w-nystrom/tonal-system/ebook/product-1j9r9y6v.html?page=1&amp;amp;pageSize=4 the book].&lt;br /&gt;
&lt;br /&gt;
== As an altcoin ==&lt;br /&gt;
&lt;br /&gt;
While Tonal Bitcoin shares a common blockchain and network with decimal Bitcoin (BTC), it is still also considered to be alternative cryptocurrency (&amp;quot;altcoin&amp;quot;) since the units are non-trivially presented differently.&lt;br /&gt;
That is, merchants who wish to advertise their product to TBC users would be best to advertise an equivalent TBC price alongside the BTC price.&lt;br /&gt;
Additionally, had a separate [[block chain]] (&amp;quot;altchain&amp;quot;) been created for TBC, there would have been no advantage to it, and instead enabled a number of abuses and reduced compatibility.&lt;br /&gt;
Therefore, as an altcoin, TBC demonstrates an ideal way to extend Bitcoin without needing to resort to unnecessary complications.&lt;br /&gt;
&lt;br /&gt;
From the altcoin perspective, TBC is seen to have a number of benefits over more common altchain-based altcoins:&lt;br /&gt;
* It shares the same blockchain as BTC, so benefits from the full security and difficulty backing the Bitcoin blockchain.&lt;br /&gt;
* TBC is mined together with BTC - unlike ordinary merged mining, you don&#039;t get BTC plus TBC, just one or the other at your choice.&lt;br /&gt;
* TBC is completely compatible with all Bitcoin addresses: if you send BTC to a TBC client&#039;s address, it will automatically get converted and vice-versa.&lt;br /&gt;
&lt;br /&gt;
Tonal Bitcoin is also notably the first altcoin ever, having been created in 2011 January.&lt;br /&gt;
&lt;br /&gt;
== Specification ==&lt;br /&gt;
&lt;br /&gt;
Please note, that all numbers of TBC and its divisions/multipliers are written in [http://en.wikipedia.org/wiki/Tonal_System Tonal], not decimal.&lt;br /&gt;
This means that instead of counting 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10-- you count: &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;0&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;1&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;2&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;3&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;4&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;5&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;6&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;7&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;8&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;9&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;, &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;10&amp;lt;/span&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:right;font-family:Console, Luxi Mono, fixed&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background-color:silver&amp;quot;&lt;br /&gt;
! Abbreviation&lt;br /&gt;
! Pronunciation&lt;br /&gt;
! [[Tonal Bitcoin|Tonal (TBC)]]&lt;br /&gt;
! Decimal (BTC)&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Tam-Bitcoin&lt;br /&gt;
| 1 0000 0000&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 2 814 749.767 106 56&lt;br /&gt;
|-&lt;br /&gt;
| ᵇTBC&lt;br /&gt;
| Bong-Bitcoin&lt;br /&gt;
| 1 0000&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 42.949 672 96&lt;br /&gt;
|-&lt;br /&gt;
| ᵐTBC&lt;br /&gt;
| Mill-Bitcoin&lt;br /&gt;
| 1000&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 2.684 354 56&lt;br /&gt;
|-&lt;br /&gt;
| ˢTBC&lt;br /&gt;
| San-Bitcoin&lt;br /&gt;
| 100&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 0.167 772 16&lt;br /&gt;
|-&lt;br /&gt;
| ᵗTBC&lt;br /&gt;
| Ton-Bitcoin&lt;br /&gt;
| 10&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 0.010 485 76&lt;br /&gt;
|-&lt;br /&gt;
| TBC&lt;br /&gt;
| Bitcoin*&lt;br /&gt;
| 1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 0.000 655 36&lt;br /&gt;
|-&lt;br /&gt;
| TBCᵗ&lt;br /&gt;
| Bitcoin-ton&lt;br /&gt;
| 0.1&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 0.000 040 96&lt;br /&gt;
|-&lt;br /&gt;
| TBCˢ&lt;br /&gt;
| Bitcoin-san&lt;br /&gt;
| 0.01&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| 0.000 002 56&lt;br /&gt;
|-&lt;br /&gt;
| TBCᵐ&lt;br /&gt;
| Bitcoin-mill&lt;br /&gt;
| 0.001&amp;amp;nbsp;&lt;br /&gt;
| 0.000 000 16&lt;br /&gt;
|-&lt;br /&gt;
| TBCᵇ&lt;br /&gt;
| Bitcoin-bong&lt;br /&gt;
| 0.0001&lt;br /&gt;
| 0.000 000 01&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;small&amp;gt;* Tonal Bitcoin and Decimal Bitcoin can be differentiated by the pronunciation of the numbers. &amp;quot;One bitcoin&amp;quot;, &amp;quot;two bitcoin&amp;quot;, etc is decimal, but &amp;quot;an bitcoin&amp;quot;, &amp;quot;de bitcoin&amp;quot; is tonal.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The total number of Tonal Bitcoins ever (analogous to the 21mil BTC in decimal representation) is just over &amp;lt;span class=&amp;quot;tonal&amp;quot;&amp;gt;7.75059&amp;lt;/span&amp;gt; tam-bitcoin.&lt;br /&gt;
&lt;br /&gt;
== Compatible Clients ==&lt;br /&gt;
&lt;br /&gt;
While all Bitcoin clients will correctly approximate values in decimal bitcoin, actual Tonal compatibility is sparse.&lt;br /&gt;
&lt;br /&gt;
* [[Bitcoin Knots]] has native TBC support.&lt;br /&gt;
* Patches exist for [[Bitcoin Core]] to support TBC (for example, [https://github.com/luke-jr/bitcoin/commit/tbc Luke Dashjr&#039;s TBC patch for Bitcoin Core master]).&lt;br /&gt;
* [[Spesmilo]], despite its name, could be configured to display TBC. However, it is no longer maintained and does not work with recent versions of Bitcoin Core.&lt;br /&gt;
&lt;br /&gt;
== Guessing TBC or BTC ==&lt;br /&gt;
&lt;br /&gt;
Given variable &#039;value&#039; in base units (uBTCents/TBCᵇ), one can guess whether it is properly Decimal Bitcoin or Tonal Bitcoin with the following pseudo-code:&lt;br /&gt;
&lt;br /&gt;
 if ( ! ( this % 0x10000 ) )&lt;br /&gt;
 	Choose Tonal Bitcoin&lt;br /&gt;
 if ( ! ( this % 1000000 ) )&lt;br /&gt;
 	Choose Decimal Bitcoin&lt;br /&gt;
 if ( ! ( this % 0x100 ) )&lt;br /&gt;
 	Choose Tonal Bitcoin&lt;br /&gt;
&lt;br /&gt;
=== Python ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;import math&lt;br /&gt;
&lt;br /&gt;
def formatBTC(n, addSign = False):&lt;br /&gt;
	s = &amp;quot;%0.2f BTC&amp;quot; % (math.ceil(n * 100) / 100.,)&lt;br /&gt;
	if addSign and n &amp;gt;= 0:&lt;br /&gt;
		s = &amp;quot;+&amp;quot; + s&lt;br /&gt;
	return s&lt;br /&gt;
&lt;br /&gt;
def Bitcoin2BTC(n):&lt;br /&gt;
	return n / 100000000.&lt;br /&gt;
&lt;br /&gt;
toTonalDict = dict(((57, u&#039;\ue9d9&#039;), (65, u&#039;\ue9da&#039;), (66, u&#039;\ue9db&#039;), (67, u&#039;\ue9dc&#039;), (68, u&#039;\ue9dd&#039;), (69, u&#039;\ue9de&#039;), (70, u&#039;\ue9df&#039;), (97, u&#039;\ue9da&#039;), (98, u&#039;\ue9db&#039;), (99, u&#039;\ue9dc&#039;), (100, u&#039;\ue9dd&#039;), (101, u&#039;\ue9de&#039;), (102, u&#039;\ue9df&#039;)))&lt;br /&gt;
&lt;br /&gt;
def formatTBC(n, addSign = False):&lt;br /&gt;
	s = &amp;quot;%x&amp;quot; % n&lt;br /&gt;
	n %= 1&lt;br /&gt;
	if n:&lt;br /&gt;
		s += &#039;.&#039;&lt;br /&gt;
		while n:&lt;br /&gt;
			n *= 16&lt;br /&gt;
			s += &amp;quot;%x&amp;quot; % n&lt;br /&gt;
			n %= 1&lt;br /&gt;
	s = unicode(s).translate(toTonalDict)&lt;br /&gt;
	s += &amp;quot; TBC&amp;quot;&lt;br /&gt;
	if addSign and n &amp;gt;= 0:&lt;br /&gt;
		s = &amp;quot;+&amp;quot; + s&lt;br /&gt;
	return s&lt;br /&gt;
&lt;br /&gt;
def Bitcoin2TBC(n):&lt;br /&gt;
	return n / 65536.&lt;br /&gt;
&lt;br /&gt;
def formatBitcoin(n, addSign = False):&lt;br /&gt;
	if not n % 0x10000:&lt;br /&gt;
		return formatTBC(Bitcoin2TBC(n), addSign);&lt;br /&gt;
	if not n % 1000000:&lt;br /&gt;
		return formatBTC(Bitcoin2BTC(n), addSign);&lt;br /&gt;
	if not n % 0x100:&lt;br /&gt;
		return formatTBC(Bitcoin2TBC(n), addSign);&lt;br /&gt;
	s = &amp;quot;%d uBTCents&amp;quot; % (n,);&lt;br /&gt;
	if addSign and n &amp;gt; 0:&lt;br /&gt;
		s = &amp;quot;+&amp;quot; + s;&lt;br /&gt;
	return s;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Criticism ==&lt;br /&gt;
&lt;br /&gt;
=== Hexadecimal could be done without new fonts as characters ===&lt;br /&gt;
&lt;br /&gt;
The tonal notation is not supported by fonts bundled with popular operating systems, and so usually requires extra fonts to use.&lt;br /&gt;
Within the programming community there is a widely accepted convention for hexadecimal notation: use A-F for the higher order digits.  Thus, one counts 0,1,2,3, ... , 9,A,B,C,D,E,F,10,11 ....  There are even two conventions, (which are lacking in tonal notation) for distinguishing a base-16 number from a decimal.  The C convention prefixes 0x and the Motorola convention suffixes h.  So, the number san, 256 (decimal) would be written 0x100 or 100h.  In tonal notation, it would only be written 100, and thus potentially confused with decimal 100 which is 0x64, though this confusion is less of a problem for Bitcoin since the context is always explicit (SI/BTC vs Tonal/TBC units).&lt;br /&gt;
&lt;br /&gt;
Thus hexadecimal notation accomplishes most of the same goals as tonal notation, at least for Bitcoin, with no requirement for changing fonts, thus is more suited to wider usage.  Further the prefix and suffix conventions lead to less ambiguity within the tonal community.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;However,&#039;&#039;&#039; the goal of Tonal Bitcoin is to bring Bitcoin to Tonal, not to redefine Tonal (which is older than hexadecimal) or advocate change to the number system itself, so this is out of scope.&lt;br /&gt;
Additionally, hexadecimal would make referring to &amp;quot;a bitcoin&amp;quot; ambiguous - such a value could mean the equivalent of either one or ten in decimal!&lt;br /&gt;
&lt;br /&gt;
=== Not relevant to Bitcoin ===&lt;br /&gt;
&lt;br /&gt;
Contrary to common myth, Bitcoin is not all about anonymity (and in fact, Bitcoin is &#039;&#039;not&#039;&#039; even anonymous itself).&lt;br /&gt;
Most people in the world don&#039;t care about anonymity, and Bitcoin would never get off the ground if it had a niche one-issue purpose.&lt;br /&gt;
Bitcoin is many things to many people, and not everyone has the same ideals or goals in mind.&lt;br /&gt;
For people who use the Tonal number system, Bitcoin&#039;s ability to adapt to it is a &amp;quot;killer feature&amp;quot;, and gives them reason to prefer it over their local fiat currencies.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=File:Bitcoinknots.png&amp;diff=70621</id>
		<title>File:Bitcoinknots.png</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=File:Bitcoinknots.png&amp;diff=70621"/>
		<updated>2025-05-04T22:07:25Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Luke-jr uploaded a new version of File:Bitcoinknots.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Bitcoin Knots logo&lt;br /&gt;
== Licensing ==&lt;br /&gt;
{{Copyrighted free use}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Covenants_support&amp;diff=70390</id>
		<title>Covenants support</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Covenants_support&amp;diff=70390"/>
		<updated>2024-12-04T16:29:07Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Merge edit by ReardenCode&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;This list is incomplete and under construction.&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| {{Evaluating}} || Not sure. Still evaluating the idea&lt;br /&gt;
|-&lt;br /&gt;
| {{No}} || Doesn&#039;t support (but might or might not go along with it with sufficient community support)&lt;br /&gt;
|-&lt;br /&gt;
| {{Deficient}} || Okay with the idea, but considers it to have insufficient community support&lt;br /&gt;
|-&lt;br /&gt;
| {{Weak}} || Better than nothing at all&lt;br /&gt;
|-&lt;br /&gt;
| {{Wanting}} || Positively likes the idea, but considers it to have insufficient community support&lt;br /&gt;
|-&lt;br /&gt;
| {{Acceptable}} || It is a workable solution&lt;br /&gt;
|-&lt;br /&gt;
| {{Prefer}} || The best option all things considered&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
! Developer&lt;br /&gt;
! Affiliation&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; | LNHANCE&lt;br /&gt;
! OP_CAT&lt;br /&gt;
! OP_CCV&lt;br /&gt;
! OP_VAULT&lt;br /&gt;
! OP_TXHASH&lt;br /&gt;
! SIGHASH_APO&lt;br /&gt;
|-&lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! OP_CTV&lt;br /&gt;
! OP_CSFS&lt;br /&gt;
! OP_PAIRCOMMIT&lt;br /&gt;
! OP_INTERNALKEY&lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
| 1440000bytes || joinstr || {{Prefer}} || {{Acceptable}} || {{No}} || {{Acceptable}} || {{Deficient}} || {{Evaluating}}|| {{Acceptable}} || {{No}} || {{No}}&lt;br /&gt;
|-&lt;br /&gt;
| Jon Atack || Bitcoin Core || {{Acceptable}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}}&lt;br /&gt;
|-&lt;br /&gt;
| Luke Dashjr || Bitcoin Knots || {{Acceptable}} || {{Wanting}} || {{Evaluating}} || {{No}} || {{Deficient}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Acceptable}}&lt;br /&gt;
|-&lt;br /&gt;
| moonsettler || LNhance || {{Prefer}} || {{Prefer}} || {{Prefer}} || {{Prefer}} || {{Wanting}} || {{Wanting}} || {{Wanting}} || {{Wanting}} || {{Weak}}&lt;br /&gt;
|-&lt;br /&gt;
| matthewjablack || Atomic Finance || {{Prefer}} || {{Acceptable}} || {{Weak}} || {{Acceptable}} || {{Wanting}} || {{Evaluating}} || {{Acceptable}} || {{Weak}} || {{Weak}}&lt;br /&gt;
|-&lt;br /&gt;
| reardencode || LNHANCE || {{Prefer}} || {{Prefer}} || {{Acceptable}} || {{Prefer}} || {{Wanting}} || {{Wanting}} || {{Wanting}} || {{Deficient}} || {{No}}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Covenants_support&amp;diff=70388</id>
		<title>Covenants support</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Covenants_support&amp;diff=70388"/>
		<updated>2024-12-03T22:12:26Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add me&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;This list is incomplete and under construction.&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| {{Evaluating}} || Not sure. Still evaluating the idea&lt;br /&gt;
|-&lt;br /&gt;
| {{No}} || Doesn&#039;t support (but might or might not go along with it with sufficient community support)&lt;br /&gt;
|-&lt;br /&gt;
| {{Deficient}} || Okay with the idea, but considers it to have insufficient community support&lt;br /&gt;
|-&lt;br /&gt;
| {{Weak}} || Better than nothing at all&lt;br /&gt;
|-&lt;br /&gt;
| {{Wanting}} || Positively likes the idea, but considers it to have insufficient community support&lt;br /&gt;
|-&lt;br /&gt;
| {{Acceptable}} || It is a workable solution&lt;br /&gt;
|-&lt;br /&gt;
| {{Prefer}} || The best option all things considered&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
! Developer&lt;br /&gt;
! Affiliation&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; | LNHANCE&lt;br /&gt;
! OP_CAT&lt;br /&gt;
! OP_CCV&lt;br /&gt;
! OP_VAULT&lt;br /&gt;
! OP_TXHASH&lt;br /&gt;
! SIGHASH_APO&lt;br /&gt;
|-&lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! OP_CTV&lt;br /&gt;
! OP_CSFS&lt;br /&gt;
! OP_PAIRCOMMIT&lt;br /&gt;
! OP_INTERNALKEY&lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
| 1440000bytes || joinstr || {{Prefer}} || {{Acceptable}} || {{No}} || {{Acceptable}} || {{Deficient}} || {{Evaluating}}|| {{Acceptable}} || {{No}} || {{No}}&lt;br /&gt;
|-&lt;br /&gt;
| Luke Dashjr || Bitcoin Knots || {{Acceptable}} || {{Wanting}} || {{Evaluating}} || {{No}} || {{Deficient}} || {{Evaluating}} || {{Evaluating}} || {{Evaluating}} || {{Acceptable}}&lt;br /&gt;
|-&lt;br /&gt;
| moonsettler || LNhance || {{Prefer}} || {{Prefer}} || {{Prefer}} || {{Prefer}} || {{Wanting}} || {{Wanting}} || {{Wanting}} || {{Wanting}} || {{Weak}}&lt;br /&gt;
|-&lt;br /&gt;
| matthewjablack || Atomic Finance || {{Prefer}} || {{Acceptable}} || {{Weak}} || {{Acceptable}} || {{Wanting}} || {{Evaluating}} || {{Acceptable}} || {{Weak}} || {{Weak}}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Taproot_activation_proposals&amp;diff=70322</id>
		<title>Taproot activation proposals</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Taproot_activation_proposals&amp;diff=70322"/>
		<updated>2024-09-14T06:07:47Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page summarizes several technical proposals for activating the taproot soft fork defined by BIPs 340-343. The goal is to succinctly reference the tradeoffs inherent in each class of proposals so that the development community can choose and implement an activation method that users will find acceptable.&lt;br /&gt;
&lt;br /&gt;
Note that a common theme in many of the proposals is dealing with the case where an insufficient percentage of hashrate signals readiness to enforce taproot.  This is a reaction to the difficulty activating segwit.  However, there is currently no indication that there will be difficulty activating taproot---miners may offer it the same support that they offered other non-controversial soft forks such as BIP34 height in coinbase, BIP66 strict DER, BIP65 &amp;lt;code&amp;gt;OP_CHECKLOCKTIMEVERIFY&amp;lt;/code&amp;gt;, and BIPs 68/112/113 relative locktimes.&lt;br /&gt;
&lt;br /&gt;
== Notes on BIP8 ==&lt;br /&gt;
&lt;br /&gt;
At the time this document is being written, [https://github.com/bitcoin/bips/blob/master/bip-0008.mediawiki BIP8] has been drafted based on lessons learned in 2017.&lt;br /&gt;
One notable change following BIPs 9+148 is that forced activation is now based on block height rather than median time past; a second notable change is that forced activation is a boolean parameter chosen when a soft fork’s activation parameters are set either for the initial deployment or updated in a later deployment.&lt;br /&gt;
&lt;br /&gt;
BIP8 without forced activation is very similar to [https://github.com/bitcoin/bips/blob/master/bip-0009.mediawiki BIP9] &#039;&#039;version bits with timeout and delay&#039;&#039;, with the only significant difference being BIP8’s use of block heights compared to BIP9’s use of median time past. This setting allows the attempt to fail (but it can be retried later).&lt;br /&gt;
&lt;br /&gt;
BIP8 with forced activation concludes with a mandatory signaling period where all blocks produced in compliance with its rules must signal readiness for the soft fork in a way that will trigger activation in an earlier deployment of the same soft fork with non-mandatory activation. In other words, if node version x is released without forced activation and, later, version y is released that successfully forces miners to begin signaling readiness within the same time period, both versions will begin enforcing the new consensus rules at the same time.&lt;br /&gt;
&lt;br /&gt;
This flexibility of the revised BIP8 proposal makes it possible to express some other ideas in terms of what they would look like using BIP8. This provides a common factor to use for categorizing many different proposals.&lt;br /&gt;
&lt;br /&gt;
== Prior to 2021 ==&lt;br /&gt;
&lt;br /&gt;
=== Proposal overview ===&lt;br /&gt;
&lt;br /&gt;
Nomenclature: &amp;lt;code&amp;gt;BIP8(lockinontimeout, timeout)&amp;lt;/code&amp;gt;. The &amp;lt;code&amp;gt;lockinontimeout&amp;lt;/code&amp;gt; parameter is a bool specifying whether the attempt will conclude with a flag day activation (true) or a failure to activate (false). The &amp;lt;code&amp;gt;timeout&amp;lt;/code&amp;gt; parameter specifies how many months (m) or years (y) until either the attempt fails or in mandatory activated. Columns with empty stages appear when no action is specified in advance (but any action with broad user support is still possible).&lt;br /&gt;
&lt;br /&gt;
Precise time parameters are still under discussion, with some people advocating moderately longer durations and some advocating moderately shorter durations. The entries below are examples meant to reflect the general idea behind a class of proposals.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- please sort table by the step in the first period; false before&lt;br /&gt;
true (alphabetically), then shorter duration before longer duration --&amp;gt;&lt;br /&gt;
{|&lt;br /&gt;
!| Short name&lt;br /&gt;
!| Variation&lt;br /&gt;
!| First stage&lt;br /&gt;
!| Second stage&lt;br /&gt;
!| Third stage&lt;br /&gt;
|-&lt;br /&gt;
| Let’s see what happens&lt;br /&gt;
| Default&lt;br /&gt;
| BIP8(false, 3m)&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| BIP9 equivalent&lt;br /&gt;
| Default&lt;br /&gt;
| BIP8(false, 1y)&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Modern Soft Fork Activation&lt;br /&gt;
| No issues&lt;br /&gt;
| BIP8(false, 1y)&lt;br /&gt;
| &#039;&#039;No action, 6m&#039;&#039;&lt;br /&gt;
| BIP8(true, 2y)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| Issue discovered&lt;br /&gt;
| BIP8(false, 1y)&lt;br /&gt;
| &#039;&#039;Abandon attempt&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Decreasing Threshold Soft Fork Activation&lt;br /&gt;
| No issues&lt;br /&gt;
| BIP8(false, 1y)&lt;br /&gt;
| &#039;&#039;No action, 6m&#039;&#039;&lt;br /&gt;
| BIP8(true, 2.5y), decreasing threshold&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| Issue discovered&lt;br /&gt;
| BIP8(false, 1y)&lt;br /&gt;
| &#039;&#039;Abandon attempt&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Start now, improve later&lt;br /&gt;
| No additional action&lt;br /&gt;
| BIP8(false, 2y)&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| Commit to activation&lt;br /&gt;
| &amp;lt;s&amp;gt;BIP8(false, 2y)&amp;lt;/s&amp;gt;&lt;br /&gt;
| BIP8(true, 2y)&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| Commit to accelerated activation&lt;br /&gt;
| &amp;lt;s&amp;gt;BIP8(false, 2y)&amp;lt;/s&amp;gt;&lt;br /&gt;
| BIP8(true, 1y)&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Gently discourage apathy&lt;br /&gt;
| Default&lt;br /&gt;
| BIP8(true, 2y)&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| Accelerate activation&lt;br /&gt;
| &amp;lt;s&amp;gt;BIP8(true, 2y)&amp;lt;/s&amp;gt;&lt;br /&gt;
| BIP8(true, 1y)&lt;br /&gt;
| N/A&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The same proposals as above graphed over time:&lt;br /&gt;
&lt;br /&gt;
[[File:Activation-timeline.png|frame|none|alt=|Activation timeline]]&lt;br /&gt;
&lt;br /&gt;
=== Proposals ===&lt;br /&gt;
&lt;br /&gt;
==== Let’s see what happens, BIP8(false, 3m) ====&lt;br /&gt;
&lt;br /&gt;
Proposed as a low-risk way to see if miners are willing to activate taproot as quickly as they activated BIP65 CLTV (two months) and BIP68 consensus-enforced sequence numbers (one month).&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Non-committal:&#039;&#039;&#039; if a problem is discovered with taproot before miner activation, or there’s a lack of user support for the proposal, the attempt can safely fail without further intervention.&lt;br /&gt;
* &#039;&#039;&#039;Short duration:&#039;&#039;&#039; if it fails unnecessarily, we’ll only have lost three months plus deployment time.&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it works, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary failure risk (3 months):&#039;&#039;&#039; if it fails for no good reason, we’ll have wasted three months, plus its deployment time, plus the time to choose and deploy another activation method.&lt;br /&gt;
* &#039;&#039;&#039;Single-shot:&#039;&#039;&#039; if it fails, anyone who ran the 3-month release must upgrade in order to enforce any subsequent attempts. Compare to the &#039;&#039;start now, improve later&#039;&#039; proposal where early releases can be triggered to activate by later releases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== BIP9 equivalent, BIP8(false, 1y) ====&lt;br /&gt;
&lt;br /&gt;
Some people think that the lack of miner readiness signaling during the first several months of segwit availability was an aberration specific to the political context of the block size debate, segwit’s interference with covert ASICBoost, or some other factor. These people may wish to try BIP9 again. BIP8(false, 1y) is essentially BIP9 but using block heights rather than median time past to guarantee a specified number of signaling periods.&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Non-committal:&#039;&#039;&#039; if a problem is discovered with taproot before miner activation, or there’s a lack of user support for the proposal, the attempt can safely fail without further intervention.&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it works, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary failure risk (1 year):&#039;&#039;&#039; if it fails for no good reason, we’ll have wasted an entire year, plus its deployment time, plus the time to choose and deploy another activation method.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Modern Soft Fork Activation, BIP8(false, 1y)+quiet(6m)+BIP8(true, 2y) ====&lt;br /&gt;
&lt;br /&gt;
Proposed in a [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2020-January/017547.html mailing list post], the goals of this idea are to ensure users truly want a soft fork and that it’s activated in a way that minimizes the risk of disruption.&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Non-committal (initial deployment):&#039;&#039;&#039; if a problem is discovered with taproot during the first two stages, or there’s a lack of user support for the proposal, the attempt can safely fail without further intervention.&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it activates quickly, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
* &#039;&#039;&#039;Far-off flag day:&#039;&#039;&#039; if mandatory activation is needed, there’s a long time (2 years) for users to upgrade to mandatory enforcement nodes. This minimizes the chance that only a small number of users will enact mandatory enforcement and then be tricked into accepting bitcoins that most other users won’t consider valid.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Committal (subsequent deployment):&#039;&#039;&#039; if a problem is discovered with taproot during the final stage, users and developers may need to intervene to prevent the problem from being exploited.&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary delay:&#039;&#039;&#039; without miner cooperation, it will take almost three years to get the taproot features, which may delay other useful Bitcoin work or cause developers to spend time implementing unnecessary intermediate solutions (e.g. 2pECDSA rather than MuSig).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Decreasing Threshold Soft-Fork Activation, BIP8(false, 6m)+NoAction(1y)+BIP8(true, 2.5y) ====&lt;br /&gt;
&lt;br /&gt;
A [slight variation][bip-dectresh] on the Modern Soft Fork Activation method, the final period in this proposal steadily decreases the percentage of hashrate that needs to signal readiness for the soft fork before it activates. For example, normally 95% of blocks in a difficulty period need to signal for a BIP8 soft fork in order to activate it; however, near the end of the final signaling period, it might only require 60% of hash rate to signal readiness. This lower threshold is reasonable because it’s expected that most users will be ready to enforce the proposal at that time. Even if miners still aren’t signaling in sufficient numbers, the proposal can mandatory activate at the end of its final stage.&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Non-committal (initial deployment):&#039;&#039;&#039; if a problem is discovered with taproot during the first two stages, the attempt can safely fail without further intervention.&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it activates quickly, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
* &#039;&#039;&#039;Far-off flag day:&#039;&#039;&#039; if mandatory activation is needed, there’s a long time (months or years) for users to upgrade to nodes that accept reduced threshold signaling or mandatory activation. This minimizes the chance that only a small number of users will enact mandatory enforcement and then be tricked into accepting bitcoins that most other users won’t consider valid.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Committal (subsequent deployment):&#039;&#039;&#039; if a problem is discovered with taproot during the final stage, users and developers may need to intervene to prevent the problem from being exploited.&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary delay:&#039;&#039;&#039; without miner cooperation, it will take almost four years to get the taproot features, which may delay other useful Bitcoin work or cause developers to spend time implementing unnecessary intermediate solutions (e.g. 2pECDSA rather than MuSig).&lt;br /&gt;
* &#039;&#039;&#039;No reference implementation:&#039;&#039;&#039; no implementation of this proposal yet exists, although it is not believed that creating one would be particularly difficult.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Start now, improve later, BIP8(false, 2y) ====&lt;br /&gt;
&lt;br /&gt;
Proposed as an option that maximizes flexibility, this allows miners to signal readiness to enforce taproot quickly but also makes it easy for users to force taproot activation later. For example, after several months of miners not activating taproot for no good reason, an updated node could be published that used the same BIP8 parameters except &amp;lt;code&amp;gt;lockinontimeout=true&amp;lt;/code&amp;gt;, requiring activation at the end of the two years. Or &amp;lt;code&amp;gt;true&amp;lt;/code&amp;gt; could be set and the timeout deadline could be shortened, allowing activation within 6 or 12 more months.&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Non-committal:&#039;&#039;&#039; if a problem is discovered with taproot before miner activation, or there’s a lack of user support for the proposal, the attempt can safely fail without further intervention.&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it activates quickly, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
* &#039;&#039;&#039;Enough time for second deployment:&#039;&#039;&#039; the two year duration probably gives users and developers enough time to deploy an alternative that sets &amp;lt;code&amp;gt;lockintimeout=true&amp;lt;/code&amp;gt;, allowing all nodes compatible with either deployment to activate simultaneously.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary failure risk (2 years):&#039;&#039;&#039; if it fails for no good reason, we’ll have wasted two years, plus its deployment time, plus the time to choose and deploy another activation method.&lt;br /&gt;
* &#039;&#039;&#039;Chaos risk:&#039;&#039;&#039; if some users later decide to &amp;lt;code&amp;gt;lockinontimeout=true&amp;lt;/code&amp;gt; with a date before the original two-year end, they all need to choose the same date or users choosing a date with insufficient support could be tricked into accepting non-spendable bitcoins. It may be possible to mitigate this by building support for an acceleration target date even before the initial &amp;lt;code&amp;gt;lockinontimeout=false&amp;lt;/code&amp;gt; version is released.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Gently discourage apathy, BIP8(true, 2y) ====&lt;br /&gt;
&lt;br /&gt;
Proposed as a way to ensure miners eventually need to signal, so they don’t defer doing so out of apathy, this method requires activation after a long delay.&lt;br /&gt;
&lt;br /&gt;
Pros:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Useful data:&#039;&#039;&#039; if it activates quickly, it will add evidence to the theory that segwit activation was an aberration and users, developers, and miners can continue working together to upgrade the consensus protocol with minimal fuss.&lt;br /&gt;
* &#039;&#039;&#039;Far-off flag day:&#039;&#039;&#039; if mandatory activation is needed, there’s a long time (months or years) for users to upgrade to nodes that accept reduced threshold signaling or mandatory activation. This minimizes the chance that only a small number of users will enact mandatory enforcement and then be tricked into accepting bitcoins that most other users won’t consider valid.&lt;br /&gt;
* &#039;&#039;&#039;Enough time for second deployment:&#039;&#039;&#039; the two year duration may gives users and developers enough time to deploy additional soft fork rules that fix any problems in the initial proposal.&lt;br /&gt;
&lt;br /&gt;
Cons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Committal:&#039;&#039;&#039; if a problem is discovered with taproot before activation, users and developers may need to intervene to prevent the problem from being exploited.&lt;br /&gt;
* &#039;&#039;&#039;Unnecessary delay:&#039;&#039;&#039; without miner cooperation, it will take two years to get the taproot features, which may delay other useful Bitcoin work or cause developers to spend time implementing unnecessary intermediate solutions (e.g. 2pECDSA rather than MuSig).&lt;br /&gt;
* &#039;&#039;&#039;Chaos risk:&#039;&#039;&#039; if some users later decide to &amp;lt;code&amp;gt;lockinontimeout=true&amp;lt;/code&amp;gt; with a date before the original two-year end, they all need to choose the same date or users choosing a date with insufficient support could be tricked into accepting non-spendable bitcoins. It may be possible to mitigate this by building support for an acceleration target date even before the initial version is released.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Solo.ckpool&amp;diff=70311</id>
		<title>Solo.ckpool</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Solo.ckpool&amp;diff=70311"/>
		<updated>2024-08-01T04:30:42Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Remove false advertising&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;:&#039;&#039;This article is about the mining pool. For other uses, see [[Ckpool (disambiguation)]].&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;solo.ckpool.org&#039;&#039;&#039; is a mining pool that doesn&#039;t divide the reward among other participants.&lt;br /&gt;
Despite its deceptive name, it is *not* the same thing as solo mining.&lt;br /&gt;
&lt;br /&gt;
solo.ckpool was started on the 31. August 2014 &amp;lt;ref&amp;gt;[https://bitcointalk.org/index.php?topic=763510.msg8604106#msg8604106 (∞ YH) solo.ckpool.org 0.5% fee anonymous bitcoin and free testnet mining!]&amp;lt;/ref&amp;gt;. For developers there is also a testnet implementation available.&lt;br /&gt;
&lt;br /&gt;
Pool code created and operated by Con Kolivas, creator of [[cgminer]] and [[ckpool]].&lt;br /&gt;
&lt;br /&gt;
== Servers to use ==&lt;br /&gt;
* [[Stratum]] - Use for ALL stratum capable Bitcoin mining software&lt;br /&gt;
 stratum+tcp://solo.ckpool.org:3333&lt;br /&gt;
 stratum+tcp://solo.ckpool.org:443&lt;br /&gt;
&lt;br /&gt;
Miners closer to Europe please use one of:&lt;br /&gt;
 stratum+tcp://de.ckpool.org:3333&lt;br /&gt;
 stratum+tcp://de.ckpool.org:443&lt;br /&gt;
&lt;br /&gt;
If you use an incompatible rental service that refuses to work on port 3333 try the following:&lt;br /&gt;
 stratum+tcp://solo.ckpool.org:3334&lt;br /&gt;
&lt;br /&gt;
If you have an asicminer tube/prisma, you can use a custom port 3335 (only accepts usernames without worker extensions) eg:&lt;br /&gt;
 stratum+tcp://solo.ckpool.org:3335&lt;br /&gt;
&lt;br /&gt;
Set your username to your btcaddress with any or even no worker extension, and any password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Testnet]]&lt;br /&gt;
 stratum+tcp://testnet.ckpool.org:3333&lt;br /&gt;
Note this is mining worthless testnet coins only! Also, you must be using a testnet bitcoin address on this edition.&lt;br /&gt;
&lt;br /&gt;
==Reward distribution==&lt;br /&gt;
&lt;br /&gt;
* If you find a block, 99% of the 6.25 BTC + transaction fees get generated directly at your bitcoin address.&lt;br /&gt;
* 1% goes to the operator to operate the pool and contribute to further ckpool code development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For testnet:&lt;br /&gt;
* If you find a block, 100% of the testnet coins + transaction fees get generated directly at your bitcoin address.&lt;br /&gt;
&lt;br /&gt;
==Extra features==&lt;br /&gt;
&lt;br /&gt;
* No overheads of running a full bitcoin node&lt;br /&gt;
* Connected to high speed low latency bitcoin nodes for rapid block change notification and propagation.&lt;br /&gt;
* No transaction-free blocks due to the ultra-scaleable code which has miners on both new blocks and transactions concurrently.&lt;br /&gt;
* No registration required, no payment schemes, no pool operator wallets&lt;br /&gt;
* The miner remains anonymous apart from his BTC address.&lt;br /&gt;
&lt;br /&gt;
==How to run miners ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CGMiner [https://bitcointalk.org/index.php?topic=28402.0 Forum]&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
cgminer -o stratum+tcp://solo.ckpool.org:3333 -u 1YOUROWNBITCOINADDRESS.0 -p x&lt;br /&gt;
If you enter an invalid address you will be rejected.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
* [[Comparison of mining pools]]&lt;br /&gt;
* [[Pooled Mining]]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
&lt;br /&gt;
* [http://solo.ckpool.org/ solo.ckpool] web site&lt;br /&gt;
* [http://testnet.ckpool.org/ solo.ckpool testnet] web site&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pool Operators]]&lt;br /&gt;
{{Pools}}&lt;br /&gt;
{{lowercase}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70310</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70310"/>
		<updated>2024-07-31T17:40:13Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2 new disclosures&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&amp;lt;br&amp;gt;Bitcoin Core/Knots prior to 0.11.2&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.15.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.18.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-getdata-cpu/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=lime| CPU usage&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Infinite loop via p2p&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-bip70-crash/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=yellow| Recipient&amp;lt;ref name=&amp;quot;Recipient&amp;quot;&amp;gt;Can only be exploited by the recipient the victim intends to pay&amp;lt;/ref&amp;gt;&lt;br /&gt;
| OOM via malicious BIP72 URI&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.1&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.2&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/31/disclose-upnp-oom/ TBD]&lt;br /&gt;
| 2024-07-31&lt;br /&gt;
| Bitcoin Core/Knots prior to 22.0 with UPnP enabled&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| OOM via LAN spam&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow/ TBD]&lt;br /&gt;
| 2024-07-31&lt;br /&gt;
| Bitcoin Core/Knots prior to 22.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via p2p spam&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70282</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70282"/>
		<updated>2024-07-04T03:40:59Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&amp;lt;br&amp;gt;Bitcoin Core/Knots prior to 0.11.2&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.15.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.18.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-getdata-cpu/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=lime| CPU usage&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Infinite loop via p2p&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-bip70-crash/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=yellow| Recipient&amp;lt;ref name=&amp;quot;Recipient&amp;quot;&amp;gt;Can only be exploited by the recipient the victim intends to pay&amp;lt;/ref&amp;gt;&lt;br /&gt;
| OOM via malicious BIP72 URI&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.1&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.2&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70281</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70281"/>
		<updated>2024-07-04T03:34:02Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-bip70-crash (needs CVE)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.14.3&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-getdata-cpu/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=lime| CPU usage&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Infinite loop via p2p&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-bip70-crash/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=yellow| Recipient&amp;lt;ref name=&amp;quot;Recipient&amp;quot;&amp;gt;Can only be exploited by the recipient the victim intends to pay&amp;lt;/ref&amp;gt;&lt;br /&gt;
| OOM via malicious BIP72 URI&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.1&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70280</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70280"/>
		<updated>2024-07-04T03:29:24Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-getdata-cpu (needs CVE)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.14.3&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-getdata-cpu/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=lime| CPU usage&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Infinite loop via p2p&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.1&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70279</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70279"/>
		<updated>2024-07-04T03:25:17Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-header-spam (needs CVE)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-header-spam/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.14.3&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Easy&lt;br /&gt;
| OOM via fake block headers&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.1&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70278</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70278"/>
		<updated>2024-07-04T03:22:20Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-inv-buffer-blowup (needs CVE)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-inv-buffer-blowup/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.19.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Network buffer OOM&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.1&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70277</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70277"/>
		<updated>2024-07-04T03:17:42Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.20.1&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70276</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70276"/>
		<updated>2024-07-04T03:16:56Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Description for 2024/07/03/disclose-orphan-dos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.17.2&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Orphan transaction CPU tieup&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.21.0&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70275</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70275"/>
		<updated>2024-07-04T03:15:09Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-timestamp-overflow (needs CVE)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.18.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-timestamp-overflow/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.21.0&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Varies&lt;br /&gt;
| Adjusted time manipulation&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70274</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70274"/>
		<updated>2024-07-04T03:10:26Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add 2024/07/03/disclose-orphan-dos (needs CVE assignment)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-orphan-dos/ TBD]&lt;br /&gt;
| 2024-07-03&lt;br /&gt;
| Bitcoin Core/Knots prior to 0.18.0&lt;br /&gt;
|bgcolor=yellow| DoS&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70273</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70273"/>
		<updated>2024-07-04T03:05:23Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Link disclosure of CVE-2020-14198&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose-unbounded-banlist/ CVE-2020-14198]&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70272</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70272"/>
		<updated>2024-07-04T02:37:43Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Update CVE-2015-3641&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| [https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom/ CVE-2015-3641]&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OOM via p2p&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2020-14198&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70271</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70271"/>
		<updated>2024-07-04T02:30:25Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add CVE-2015-6031 due to its proximity to Bitcoin node software&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-3641&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Yet) Unspecified DoS&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-6031&lt;br /&gt;
| 2015-09-15&lt;br /&gt;
| MiniUPnPc&lt;br /&gt;
|bgcolor=pink| Anything&lt;br /&gt;
|bgcolor=yellow| LAN&lt;br /&gt;
| Buffer overflow&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2020-14198&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Stratum_mining_protocol&amp;diff=70246</id>
		<title>Stratum mining protocol</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Stratum_mining_protocol&amp;diff=70246"/>
		<updated>2024-05-29T16:30:06Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Use archive link since Braiins killed the doc&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [[stratum]] overlay protocol was extended to support pooled mining as a replacement for obsolete [[Getwork|getwork]] protocol in late 2012.&lt;br /&gt;
The mining service specification was initially announced via [[Slush&#039;s pool]]&#039;s website&amp;lt;ref&amp;gt;[https://web.archive.org/web/20150307191254/http://mining.bitcoin.cz/stratum-mining Stratum mining protocol specification at slush&#039;s pool&#039;s website]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
Shortly thereafter, alternative &amp;quot;cheat sheet&amp;quot; style documentation was provided by [[BTCGuild]]&amp;lt;ref&amp;gt;[https://www.btcguild.com/new_protocol.php Stratum mining protocol cheat sheet at BTCGuild&#039;s website]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
As the extension lacks a formal [[BIP]] describing an official standard, it has further developed only by discussion and implementation&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=108533.0 Stratum discussion thread on BitcoinTalk Forum]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Protocol==&lt;br /&gt;
&lt;br /&gt;
===Overview===&lt;br /&gt;
[http://mining.bitcoin.cz/stratum-mining/#example See also: Original example on slush&#039;s pool site]&lt;br /&gt;
&lt;br /&gt;
===Methods (client to server)===&lt;br /&gt;
&lt;br /&gt;
====mining.authorize====&lt;br /&gt;
 mining.authorize(&amp;quot;username&amp;quot;, &amp;quot;password&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The result from an authorize request is usually true (successful), or false.&lt;br /&gt;
The password may be omitted if the server does not require passwords.&lt;br /&gt;
&lt;br /&gt;
====mining.capabilities (DRAFT)====&lt;br /&gt;
NOTE: This is a draft extension proposal. It is not yet in use, and may change at any moment.&lt;br /&gt;
&lt;br /&gt;
 mining.capabilities({&amp;quot;notify&amp;quot;:[], &amp;quot;set_difficulty&amp;quot;:{}, &amp;quot;set_goal&amp;quot;:{}, &amp;quot;suggested_target&amp;quot;: &amp;quot;hex target&amp;quot;})&lt;br /&gt;
&lt;br /&gt;
The client may send this to inform the server of its capabilities and options.&lt;br /&gt;
The singleton parameter is an Object describing capabilities;&lt;br /&gt;
by default, it is considered as {&amp;quot;notify&amp;quot;:{}, &amp;quot;set_difficulty&amp;quot;:[]}, but as soon as this method is used these must be explicitly included if desired.&lt;br /&gt;
The &amp;quot;suggested_target&amp;quot; key may supersede the mining.suggest_target method.&lt;br /&gt;
&lt;br /&gt;
Note that most of the keys do not have any meaningful value at this time, and the values thereof should be ignored (ie, only their presence matters).&lt;br /&gt;
&lt;br /&gt;
====mining.extranonce.subscribe====&lt;br /&gt;
 mining.extranonce.subscribe()&lt;br /&gt;
&lt;br /&gt;
Indicates to the server that the client supports the mining.set_extranonce method.&lt;br /&gt;
&lt;br /&gt;
====mining.get_transactions====&lt;br /&gt;
 mining.get_transactions(&amp;quot;job id&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Server should send back an array with a hexdump of each transaction in the block specified for the given job id.&lt;br /&gt;
&lt;br /&gt;
====mining.submit====&lt;br /&gt;
 mining.submit(&amp;quot;username&amp;quot;, &amp;quot;job id&amp;quot;, &amp;quot;ExtraNonce2&amp;quot;, &amp;quot;nTime&amp;quot;, &amp;quot;nOnce&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Miners submit shares using the method &amp;quot;mining.submit&amp;quot;.&lt;br /&gt;
Client submissions contain:&lt;br /&gt;
# &#039;&#039;Worker Name.&#039;&#039;&lt;br /&gt;
# &#039;&#039;Job ID.&#039;&#039;&lt;br /&gt;
# &#039;&#039;ExtraNonce2.&#039;&#039;&lt;br /&gt;
# &#039;&#039;nTime.&#039;&#039;&lt;br /&gt;
# &#039;&#039;nOnce.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Server response is result: true for accepted, false for rejected (or you may get an error with more details).&lt;br /&gt;
&lt;br /&gt;
====mining.subscribe====&lt;br /&gt;
 mining.subscribe(&amp;quot;user agent/version&amp;quot;, &amp;quot;extranonce1&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The optional second parameter specifies a mining.notify subscription id the client wishes to resume working with (possibly due to a dropped connection).&lt;br /&gt;
If provided, a server MAY (at its option) issue the connection the same extranonce1.&lt;br /&gt;
Note that the extranonce1 may be the same (allowing a resumed connection) even if the subscription id is changed!&lt;br /&gt;
&lt;br /&gt;
The client receives a result:&lt;br /&gt;
 [[[&amp;quot;mining.set_difficulty&amp;quot;, &amp;quot;subscription id 1&amp;quot;], [&amp;quot;mining.notify&amp;quot;, &amp;quot;subscription id 2&amp;quot;]], &amp;quot;extranonce1&amp;quot;, extranonce2_size]&lt;br /&gt;
The result contains three items:&lt;br /&gt;
* &#039;&#039;Subscriptions.&#039;&#039; - An array of 2-item tuples, each with a subscription type and id.&lt;br /&gt;
* &#039;&#039;ExtraNonce1.&#039;&#039; - Hex-encoded, per-connection unique string which will be used for creating generation transactions later.&lt;br /&gt;
* &#039;&#039;ExtraNonce2_size.&#039;&#039; - The number of bytes that the miner users for its ExtraNonce2 counter.&lt;br /&gt;
&lt;br /&gt;
====mining.suggest_difficulty====&lt;br /&gt;
 mining.suggest_difficulty(preferred share difficulty Number)&lt;br /&gt;
&lt;br /&gt;
Used to indicate a preference for share difficulty to the pool.&lt;br /&gt;
Servers are not required to honour this request, even if they support the stratum method.&lt;br /&gt;
&lt;br /&gt;
====mining.suggest_target====&lt;br /&gt;
 mining.suggest_target(&amp;quot;full hex share target&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Used to indicate a preference for share target to the pool, usually prior to mining.subscribe.&lt;br /&gt;
Servers are not required to honour this request, even if they support the stratum method.&lt;br /&gt;
&lt;br /&gt;
===Methods (server to client)===&lt;br /&gt;
&lt;br /&gt;
====client.get_version====&lt;br /&gt;
 client.get_version()&lt;br /&gt;
&lt;br /&gt;
The client should send a result String with its name and version.&lt;br /&gt;
&lt;br /&gt;
====client.reconnect====&lt;br /&gt;
 client.reconnect(&amp;quot;hostname&amp;quot;, port, waittime)&lt;br /&gt;
&lt;br /&gt;
The client should disconnect, wait &#039;&#039;waittime&#039;&#039; seconds (if provided), then connect to the given host/port (which defaults to the current server).&lt;br /&gt;
Note that for security purposes, clients may ignore such requests if the destination is not the same or similar.&lt;br /&gt;
&lt;br /&gt;
====client.show_message====&lt;br /&gt;
 client.show_message(&amp;quot;human-readable message&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The client should display the message to its user in some reasonable way.&lt;br /&gt;
&lt;br /&gt;
====mining.notify====&lt;br /&gt;
 mining.notify(...)&lt;br /&gt;
&lt;br /&gt;
Fields in order:&lt;br /&gt;
# &#039;&#039;Job ID.&#039;&#039; This is included when miners submit a results so work can be matched with proper transactions.&lt;br /&gt;
# &#039;&#039;Hash of previous block.&#039;&#039; Used to build the header.&lt;br /&gt;
# &#039;&#039;Generation transaction (part 1).&#039;&#039; The miner inserts ExtraNonce1 and ExtraNonce2 after this section of the transaction data.&lt;br /&gt;
# &#039;&#039;Generation transaction (part 2).&#039;&#039; The miner appends this after the first part of the transaction data and the two ExtraNonce values.&lt;br /&gt;
# &#039;&#039;List of merkle branches.&#039;&#039; The generation transaction is hashed against the merkle branches to build the final merkle root.&lt;br /&gt;
# &#039;&#039;Bitcoin block version.&#039;&#039; Used in the block header.&lt;br /&gt;
# &#039;&#039;nBits.&#039;&#039; The encoded network difficulty. Used in the block header.&lt;br /&gt;
# &#039;&#039;nTime.&#039;&#039; The current time. nTime rolling should be supported, but should not increase faster than actual time.&lt;br /&gt;
# &#039;&#039;Clean Jobs.&#039;&#039; If true, miners should abort their current work and immediately use the new job, even if it degrades hashrate in the short term. If false, they can still use the current job, but should move to the new one as soon as possible without impacting hashrate.&lt;br /&gt;
&lt;br /&gt;
====mining.set_difficulty====&lt;br /&gt;
 mining.set_difficulty(difficulty)&lt;br /&gt;
&lt;br /&gt;
The server can adjust the difficulty required for miner shares with the &amp;quot;mining.set_difficulty&amp;quot; method.&lt;br /&gt;
The miner should begin enforcing the new difficulty on the next job received.&lt;br /&gt;
Some pools may force a new job out when set_difficulty is sent, using clean_jobs to force the miner to begin using the new difficulty immediately.&lt;br /&gt;
&lt;br /&gt;
====mining.set_extranonce====&lt;br /&gt;
 mining.set_extranonce(&amp;quot;extranonce1&amp;quot;, extranonce2_size)&lt;br /&gt;
&lt;br /&gt;
These values, when provided, replace the initial subscription values beginning with the next mining.notify job.&lt;br /&gt;
&lt;br /&gt;
====mining.set_goal (DRAFT)====&lt;br /&gt;
NOTE: This is a draft extension proposal. It is not yet in use, and may change at any moment.&lt;br /&gt;
&lt;br /&gt;
 mining.set_goal(&amp;quot;goal name&amp;quot;, {&amp;quot;malgo&amp;quot;: &amp;quot;SHA256d&amp;quot;, ...})&lt;br /&gt;
&lt;br /&gt;
Informs the client that future jobs will be working on a specific named goal, with various parameters (currently only &amp;quot;malgo&amp;quot; is defined as the mining algorithm).&lt;br /&gt;
Miners may assume goals with the same name are equivalent, but should recognise parameter changes in case a goal varies its parameters.&lt;br /&gt;
&lt;br /&gt;
==Software support==&lt;br /&gt;
&lt;br /&gt;
Tables showing miner/server support for Stratum mining protocol:&lt;br /&gt;
* [[Mining software]]&lt;br /&gt;
* [[Poolservers]]&lt;br /&gt;
&lt;br /&gt;
==Criticism==&lt;br /&gt;
&lt;br /&gt;
===Closed development===&lt;br /&gt;
&lt;br /&gt;
The mining extensions have been criticised as having been developed behind closed doors without input from the wider development and mining community, resulting in various obvious problems that could have been addressed had it followed the standard [[BIP]] drafting process&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=557991.msg6079772#msg6079772 BitcoinTalk: Criticism of stratum&#039;s closed creation]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Displacing GBT===&lt;br /&gt;
&lt;br /&gt;
The mining extensions were announced after the community had spent months developing a mostly superior open standard protocol for mining ([[getblocktemplate]])&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=557991.msg6105355#msg6105355 BitcoinTalk: Criticism of stratum displacing GBT]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
Because stratum&#039;s mining extensions launched backed by a major mining pool, GBT adoption suffered, and decentralised mining is often neglected while stratum is deployed.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Stratum_mining_protocol&amp;diff=70245</id>
		<title>Stratum mining protocol</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Stratum_mining_protocol&amp;diff=70245"/>
		<updated>2024-05-29T16:26:22Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: /* mining.notify */ fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [[stratum]] overlay protocol was extended to support pooled mining as a replacement for obsolete [[Getwork|getwork]] protocol in late 2012.&lt;br /&gt;
The mining service specification was initially announced via [[Slush&#039;s pool]]&#039;s website&amp;lt;ref&amp;gt;[http://mining.bitcoin.cz/stratum-mining/ Stratum mining protocol specification at slush&#039;s pool&#039;s website]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
Shortly thereafter, alternative &amp;quot;cheat sheet&amp;quot; style documentation was provided by [[BTCGuild]]&amp;lt;ref&amp;gt;[https://www.btcguild.com/new_protocol.php Stratum mining protocol cheat sheet at BTCGuild&#039;s website]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
As the extension lacks a formal [[BIP]] describing an official standard, it has further developed only by discussion and implementation&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=108533.0 Stratum discussion thread on BitcoinTalk Forum]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Protocol==&lt;br /&gt;
&lt;br /&gt;
===Overview===&lt;br /&gt;
[http://mining.bitcoin.cz/stratum-mining/#example See also: Original example on slush&#039;s pool site]&lt;br /&gt;
&lt;br /&gt;
===Methods (client to server)===&lt;br /&gt;
&lt;br /&gt;
====mining.authorize====&lt;br /&gt;
 mining.authorize(&amp;quot;username&amp;quot;, &amp;quot;password&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The result from an authorize request is usually true (successful), or false.&lt;br /&gt;
The password may be omitted if the server does not require passwords.&lt;br /&gt;
&lt;br /&gt;
====mining.capabilities (DRAFT)====&lt;br /&gt;
NOTE: This is a draft extension proposal. It is not yet in use, and may change at any moment.&lt;br /&gt;
&lt;br /&gt;
 mining.capabilities({&amp;quot;notify&amp;quot;:[], &amp;quot;set_difficulty&amp;quot;:{}, &amp;quot;set_goal&amp;quot;:{}, &amp;quot;suggested_target&amp;quot;: &amp;quot;hex target&amp;quot;})&lt;br /&gt;
&lt;br /&gt;
The client may send this to inform the server of its capabilities and options.&lt;br /&gt;
The singleton parameter is an Object describing capabilities;&lt;br /&gt;
by default, it is considered as {&amp;quot;notify&amp;quot;:{}, &amp;quot;set_difficulty&amp;quot;:[]}, but as soon as this method is used these must be explicitly included if desired.&lt;br /&gt;
The &amp;quot;suggested_target&amp;quot; key may supersede the mining.suggest_target method.&lt;br /&gt;
&lt;br /&gt;
Note that most of the keys do not have any meaningful value at this time, and the values thereof should be ignored (ie, only their presence matters).&lt;br /&gt;
&lt;br /&gt;
====mining.extranonce.subscribe====&lt;br /&gt;
 mining.extranonce.subscribe()&lt;br /&gt;
&lt;br /&gt;
Indicates to the server that the client supports the mining.set_extranonce method.&lt;br /&gt;
&lt;br /&gt;
====mining.get_transactions====&lt;br /&gt;
 mining.get_transactions(&amp;quot;job id&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Server should send back an array with a hexdump of each transaction in the block specified for the given job id.&lt;br /&gt;
&lt;br /&gt;
====mining.submit====&lt;br /&gt;
 mining.submit(&amp;quot;username&amp;quot;, &amp;quot;job id&amp;quot;, &amp;quot;ExtraNonce2&amp;quot;, &amp;quot;nTime&amp;quot;, &amp;quot;nOnce&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Miners submit shares using the method &amp;quot;mining.submit&amp;quot;.&lt;br /&gt;
Client submissions contain:&lt;br /&gt;
# &#039;&#039;Worker Name.&#039;&#039;&lt;br /&gt;
# &#039;&#039;Job ID.&#039;&#039;&lt;br /&gt;
# &#039;&#039;ExtraNonce2.&#039;&#039;&lt;br /&gt;
# &#039;&#039;nTime.&#039;&#039;&lt;br /&gt;
# &#039;&#039;nOnce.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Server response is result: true for accepted, false for rejected (or you may get an error with more details).&lt;br /&gt;
&lt;br /&gt;
====mining.subscribe====&lt;br /&gt;
 mining.subscribe(&amp;quot;user agent/version&amp;quot;, &amp;quot;extranonce1&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The optional second parameter specifies a mining.notify subscription id the client wishes to resume working with (possibly due to a dropped connection).&lt;br /&gt;
If provided, a server MAY (at its option) issue the connection the same extranonce1.&lt;br /&gt;
Note that the extranonce1 may be the same (allowing a resumed connection) even if the subscription id is changed!&lt;br /&gt;
&lt;br /&gt;
The client receives a result:&lt;br /&gt;
 [[[&amp;quot;mining.set_difficulty&amp;quot;, &amp;quot;subscription id 1&amp;quot;], [&amp;quot;mining.notify&amp;quot;, &amp;quot;subscription id 2&amp;quot;]], &amp;quot;extranonce1&amp;quot;, extranonce2_size]&lt;br /&gt;
The result contains three items:&lt;br /&gt;
* &#039;&#039;Subscriptions.&#039;&#039; - An array of 2-item tuples, each with a subscription type and id.&lt;br /&gt;
* &#039;&#039;ExtraNonce1.&#039;&#039; - Hex-encoded, per-connection unique string which will be used for creating generation transactions later.&lt;br /&gt;
* &#039;&#039;ExtraNonce2_size.&#039;&#039; - The number of bytes that the miner users for its ExtraNonce2 counter.&lt;br /&gt;
&lt;br /&gt;
====mining.suggest_difficulty====&lt;br /&gt;
 mining.suggest_difficulty(preferred share difficulty Number)&lt;br /&gt;
&lt;br /&gt;
Used to indicate a preference for share difficulty to the pool.&lt;br /&gt;
Servers are not required to honour this request, even if they support the stratum method.&lt;br /&gt;
&lt;br /&gt;
====mining.suggest_target====&lt;br /&gt;
 mining.suggest_target(&amp;quot;full hex share target&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Used to indicate a preference for share target to the pool, usually prior to mining.subscribe.&lt;br /&gt;
Servers are not required to honour this request, even if they support the stratum method.&lt;br /&gt;
&lt;br /&gt;
===Methods (server to client)===&lt;br /&gt;
&lt;br /&gt;
====client.get_version====&lt;br /&gt;
 client.get_version()&lt;br /&gt;
&lt;br /&gt;
The client should send a result String with its name and version.&lt;br /&gt;
&lt;br /&gt;
====client.reconnect====&lt;br /&gt;
 client.reconnect(&amp;quot;hostname&amp;quot;, port, waittime)&lt;br /&gt;
&lt;br /&gt;
The client should disconnect, wait &#039;&#039;waittime&#039;&#039; seconds (if provided), then connect to the given host/port (which defaults to the current server).&lt;br /&gt;
Note that for security purposes, clients may ignore such requests if the destination is not the same or similar.&lt;br /&gt;
&lt;br /&gt;
====client.show_message====&lt;br /&gt;
 client.show_message(&amp;quot;human-readable message&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
The client should display the message to its user in some reasonable way.&lt;br /&gt;
&lt;br /&gt;
====mining.notify====&lt;br /&gt;
 mining.notify(...)&lt;br /&gt;
&lt;br /&gt;
Fields in order:&lt;br /&gt;
# &#039;&#039;Job ID.&#039;&#039; This is included when miners submit a results so work can be matched with proper transactions.&lt;br /&gt;
# &#039;&#039;Hash of previous block.&#039;&#039; Used to build the header.&lt;br /&gt;
# &#039;&#039;Generation transaction (part 1).&#039;&#039; The miner inserts ExtraNonce1 and ExtraNonce2 after this section of the transaction data.&lt;br /&gt;
# &#039;&#039;Generation transaction (part 2).&#039;&#039; The miner appends this after the first part of the transaction data and the two ExtraNonce values.&lt;br /&gt;
# &#039;&#039;List of merkle branches.&#039;&#039; The generation transaction is hashed against the merkle branches to build the final merkle root.&lt;br /&gt;
# &#039;&#039;Bitcoin block version.&#039;&#039; Used in the block header.&lt;br /&gt;
# &#039;&#039;nBits.&#039;&#039; The encoded network difficulty. Used in the block header.&lt;br /&gt;
# &#039;&#039;nTime.&#039;&#039; The current time. nTime rolling should be supported, but should not increase faster than actual time.&lt;br /&gt;
# &#039;&#039;Clean Jobs.&#039;&#039; If true, miners should abort their current work and immediately use the new job, even if it degrades hashrate in the short term. If false, they can still use the current job, but should move to the new one as soon as possible without impacting hashrate.&lt;br /&gt;
&lt;br /&gt;
====mining.set_difficulty====&lt;br /&gt;
 mining.set_difficulty(difficulty)&lt;br /&gt;
&lt;br /&gt;
The server can adjust the difficulty required for miner shares with the &amp;quot;mining.set_difficulty&amp;quot; method.&lt;br /&gt;
The miner should begin enforcing the new difficulty on the next job received.&lt;br /&gt;
Some pools may force a new job out when set_difficulty is sent, using clean_jobs to force the miner to begin using the new difficulty immediately.&lt;br /&gt;
&lt;br /&gt;
====mining.set_extranonce====&lt;br /&gt;
 mining.set_extranonce(&amp;quot;extranonce1&amp;quot;, extranonce2_size)&lt;br /&gt;
&lt;br /&gt;
These values, when provided, replace the initial subscription values beginning with the next mining.notify job.&lt;br /&gt;
&lt;br /&gt;
====mining.set_goal (DRAFT)====&lt;br /&gt;
NOTE: This is a draft extension proposal. It is not yet in use, and may change at any moment.&lt;br /&gt;
&lt;br /&gt;
 mining.set_goal(&amp;quot;goal name&amp;quot;, {&amp;quot;malgo&amp;quot;: &amp;quot;SHA256d&amp;quot;, ...})&lt;br /&gt;
&lt;br /&gt;
Informs the client that future jobs will be working on a specific named goal, with various parameters (currently only &amp;quot;malgo&amp;quot; is defined as the mining algorithm).&lt;br /&gt;
Miners may assume goals with the same name are equivalent, but should recognise parameter changes in case a goal varies its parameters.&lt;br /&gt;
&lt;br /&gt;
==Software support==&lt;br /&gt;
&lt;br /&gt;
Tables showing miner/server support for Stratum mining protocol:&lt;br /&gt;
* [[Mining software]]&lt;br /&gt;
* [[Poolservers]]&lt;br /&gt;
&lt;br /&gt;
==Criticism==&lt;br /&gt;
&lt;br /&gt;
===Closed development===&lt;br /&gt;
&lt;br /&gt;
The mining extensions have been criticised as having been developed behind closed doors without input from the wider development and mining community, resulting in various obvious problems that could have been addressed had it followed the standard [[BIP]] drafting process&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=557991.msg6079772#msg6079772 BitcoinTalk: Criticism of stratum&#039;s closed creation]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Displacing GBT===&lt;br /&gt;
&lt;br /&gt;
The mining extensions were announced after the community had spent months developing a mostly superior open standard protocol for mining ([[getblocktemplate]])&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=557991.msg6105355#msg6105355 BitcoinTalk: Criticism of stratum displacing GBT]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
Because stratum&#039;s mining extensions launched backed by a major mining pool, GBT adoption suffered, and decentralised mining is often neglected while stratum is deployed.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70162</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=70162"/>
		<updated>2024-05-01T01:14:40Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add CVE-2024-34149&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-3641&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Yet) Unspecified DoS&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2020-14198&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2024-34149|CVE-2024-34149]]&lt;br /&gt;
| 2024-03-30&lt;br /&gt;
| Bitcoin Core 0.21.1 and newer (not fixed)&amp;lt;br&amp;gt;Bitcoin Knots 0.21.1 - 0.23.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Script size limit not enforced for Tapscript&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2024-34149 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2024-03-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Script size limit not enforced for Tapscript&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.21.1 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.21.1 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || ?&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Genesis_block&amp;diff=70083</id>
		<title>Genesis block</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Genesis_block&amp;diff=70083"/>
		<updated>2024-03-21T15:15:41Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by Ihsan3789 (talk) to last revision by Diegorodriguezv&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A &#039;&#039;&#039;genesis block&#039;&#039;&#039; is the first block of a [[block chain]]. Modern versions of Bitcoin number it as &#039;&#039;&#039;block 0&#039;&#039;&#039;, though very early versions counted it as block 1. The genesis block is almost always hardcoded into the software of the applications that utilize its block chain. It is a special case in that it does not reference a previous block, and for [[Bitcoin]] and almost all of its derivatives, it produces an unspendable subsidy.&lt;br /&gt;
&lt;br /&gt;
== Main network genesis block ==&lt;br /&gt;
Here is a representation of the genesis block&amp;lt;ref name=&amp;quot;block&amp;quot;&amp;gt;{{cite block|hash=000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f|0|year=2009|month=01|day=03}}&amp;lt;/ref&amp;gt; as it appeared in a comment in an old version of Bitcoin ([http://sourceforge.net/p/bitcoin/code/133/tree/trunk/main.cpp#l1613 line 1613]). The first section defines exactly all of the variables necessary to recreate the block. The second section is the block in standard printblock format, which contains shortened versions of the data in the first section.&lt;br /&gt;
&lt;br /&gt;
 GetHash()      = 0x000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f&lt;br /&gt;
 hashMerkleRoot = 0x4a5e1e4baab89f3a32518a88c31bc87f618f76673e2cc77ab2127b7afdeda33b&lt;br /&gt;
 txNew.vin[0].scriptSig     = 486604799 4 0x736B6E616220726F662074756F6C69616220646E6F63657320666F206B6E697262206E6F20726F6C6C65636E61684320393030322F6E614A2F33302073656D695420656854&lt;br /&gt;
 txNew.vout[0].nValue       = 5000000000&lt;br /&gt;
 txNew.vout[0].scriptPubKey = 0x5F1DF16B2B704C8A578D0BBAF74D385CDE12C11EE50455F3C438EF4C3FBCF649B6DE611FEAE06279A60939E028A8D65C10B73071A6F16719274855FEB0FD8A6704 OP_CHECKSIG&lt;br /&gt;
 block.nVersion = 1&lt;br /&gt;
 block.nTime    = 1231006505&lt;br /&gt;
 block.nBits    = 0x1d00ffff&lt;br /&gt;
 block.nNonce   = 2083236893&lt;br /&gt;
 &lt;br /&gt;
 CBlock(hash=000000000019d6, ver=1, hashPrevBlock=00000000000000, hashMerkleRoot=4a5e1e, nTime=1231006505, nBits=1d00ffff, nNonce=2083236893, vtx=1)&lt;br /&gt;
   CTransaction(hash=4a5e1e, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
     CTxIn(COutPoint(000000, -1), coinbase 04ffff001d0104455468652054696d65732030332f4a616e2f32303039204368616e63656c6c6f72206f6e206272696e6b206f66207365636f6e64206261696c6f757420666f722062616e6b73)&lt;br /&gt;
     CTxOut(nValue=50.00000000, scriptPubKey=0x5F1DF16B2B704C8A578D0B)&lt;br /&gt;
   vMerkleTree: 4a5e1e&lt;br /&gt;
===Hash===&lt;br /&gt;
The hash of the genesis block, &#039;&#039;&#039;000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f&#039;&#039;&#039;,&amp;lt;ref name=&amp;quot;block&amp;quot;/&amp;gt; has two more leading hex zeroes than were required for an early block.&lt;br /&gt;
&lt;br /&gt;
===Coinbase===&lt;br /&gt;
[[File:jonny1000thetimes.png|thumb|256px|The Times 03/Jan/2009]]&lt;br /&gt;
The [[coinbase]] parameter (seen above in hex) contains, along with the normal data, the following text:&amp;lt;ref&amp;gt;[http://web.archive.org/web/20140309004338/http://uk.reuters.com/article/2009/01/03/idUKPTIP32510920090103 Reuters&#039; reference on The Financial Times article (archive.org cached copy)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The Times 03/Jan/2009 Chancellor on brink of second bailout for banks&amp;lt;ref name=&amp;quot;block&amp;quot;/&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This was probably intended as proof that the block was created on or after January 3, 2009, as well as a comment on the instability caused by fractional-reserve banking. Additionally, it suggests that [[Satoshi Nakamoto]] may have lived in the United Kingdom.&amp;lt;ref&amp;gt;{{cite web|author=Davis, J.|year=2011|title=The Crypto-Currency|publisher=&#039;&#039;The New Yorker&#039;&#039;|url=http://www.newyorker.com/magazine/2011/10/10/the-crypto-currency}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The detail &amp;quot;second bailout for banks&amp;quot; could also suggest that in a supposedly liberal and capitalist system, rescuing banks like that was a problem for Satoshi. The chosen topic could hint at bitcoin&#039;s purpose.&lt;br /&gt;
&lt;br /&gt;
===Block reward===&lt;br /&gt;
The first 50 BTC block reward went to [[address]] &#039;&#039;1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa&#039;&#039;,&amp;lt;ref name=&amp;quot;block&amp;quot;/&amp;gt; though this reward can&#039;t be spent due to a quirk in the way that the genesis block is expressed in the code. It is not known if this was done intentionally or accidentally.&amp;lt;ref&amp;gt;http://bitcoin.stackexchange.com/questions/10009/why-can-t-the-genesis-block-coinbase-be-spent&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.reddit.com/r/Bitcoin/comments/1nc13r/the_first_50btc_block_reward_cant_be_spend_why/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://github.com/bitcoin/bitcoin/blob/9546a977d354b2ec6cd8455538e68fe4ba343a44/src/main.cpp#L1668 - Genesis block transaction treated as a special case in the reference code&amp;lt;/ref&amp;gt; It is believed that other outputs sent to this address are spendable, but it is unknown if Satoshi Nakamoto has the private key for this particular address, if one existed at all.&lt;br /&gt;
&lt;br /&gt;
===Timestamp===&lt;br /&gt;
Although the average time between Bitcoin blocks is 10 minutes, the [[block timestamp|timestamp]] of the next block is a full 6 days after the genesis block. One interpretation is that Satoshi was working on bitcoin for some time beforehand and the &#039;&#039;The Times&#039;&#039; front page prompted him to release it to the public. He then mined the genesis block with a timestamp in the past to match the headline. It is also possible that, since the block&#039;s hash is so low, he may have spent 6 days mining it with the same timestamp before proceeding to block 1. The [[prenet hypothesis]] suggests that the genesis block was solved on January 3, but the software was tested by Satoshi Nakamoto using that genesis block until January 9, when all the test blocks were deleted and the genesis block was reused for the main network.&lt;br /&gt;
&lt;br /&gt;
===Raw block data===&lt;br /&gt;
&lt;br /&gt;
The [https://bitcointalk.org/index.php?topic=52706 raw hex version] of the Genesis block looks like:&lt;br /&gt;
 00000000   01 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................&lt;br /&gt;
 00000010   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................&lt;br /&gt;
 00000020   00 00 00 00 3B A3 ED FD  7A 7B 12 B2 7A C7 2C 3E   ....;£íýz{.²zÇ,&amp;gt;&lt;br /&gt;
 00000030   67 76 8F 61 7F C8 1B C3  88 8A 51 32 3A 9F B8 AA   gv.a.È.ÃˆŠQ2:Ÿ¸ª&lt;br /&gt;
 00000040   4B 1E 5E 4A 29 AB 5F 49  FF FF 00 1D 1D AC 2B 7C   K.^J)«_Iÿÿ...¬+|&lt;br /&gt;
 00000050   01 01 00 00 00 01 00 00  00 00 00 00 00 00 00 00   ................&lt;br /&gt;
 00000060   00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00   ................&lt;br /&gt;
 00000070   00 00 00 00 00 00 FF FF  FF FF 4D 04 FF FF 00 1D   ......ÿÿÿÿM.ÿÿ..&lt;br /&gt;
 00000080   01 04 45 54 68 65 20 54  69 6D 65 73 20 30 33 2F   ..EThe Times 03/&lt;br /&gt;
 00000090   4A 61 6E 2F 32 30 30 39  20 43 68 61 6E 63 65 6C   Jan/2009 Chancel&lt;br /&gt;
 000000A0   6C 6F 72 20 6F 6E 20 62  72 69 6E 6B 20 6F 66 20   lor on brink of &lt;br /&gt;
 000000B0   73 65 63 6F 6E 64 20 62  61 69 6C 6F 75 74 20 66   second bailout f&lt;br /&gt;
 000000C0   6F 72 20 62 61 6E 6B 73  FF FF FF FF 01 00 F2 05   or banksÿÿÿÿ..ò.&lt;br /&gt;
 000000D0   2A 01 00 00 00 43 41 04  67 8A FD B0 FE 55 48 27   *....CA.gŠý°þUH&#039;&lt;br /&gt;
 000000E0   19 67 F1 A6 71 30 B7 10  5C D6 A8 28 E0 39 09 A6   .gñ¦q0·.\Ö¨(à9.¦&lt;br /&gt;
 000000F0   79 62 E0 EA 1F 61 DE B6  49 F6 BC 3F 4C EF 38 C4   ybàê.aÞ¶Iö¼?Lï8Ä&lt;br /&gt;
 00000100   F3 55 04 E5 1E C1 12 DE  5C 38 4D F7 BA 0B 8D 57   óU.å.Á.Þ\8M÷º..W&lt;br /&gt;
 00000110   8A 4C 70 2B 6B F1 1D 5F  AC 00 00 00 00            ŠLp+kñ._¬....&lt;br /&gt;
&lt;br /&gt;
Broken down it looks like this:&lt;br /&gt;
&lt;br /&gt;
 01000000 - version&lt;br /&gt;
 0000000000000000000000000000000000000000000000000000000000000000 - prev block&lt;br /&gt;
 3BA3EDFD7A7B12B27AC72C3E67768F617FC81BC3888A51323A9FB8AA4B1E5E4A - merkle root&lt;br /&gt;
 29AB5F49 - timestamp&lt;br /&gt;
 FFFF001D - bits&lt;br /&gt;
 1DAC2B7C - nonce&lt;br /&gt;
 01 - number of transactions&lt;br /&gt;
 01000000 - version&lt;br /&gt;
 01 - input&lt;br /&gt;
 0000000000000000000000000000000000000000000000000000000000000000FFFFFFFF - prev output&lt;br /&gt;
 4D - script length&lt;br /&gt;
 04FFFF001D0104455468652054696D65732030332F4A616E2F32303039204368616E63656C6C6F72206F6E206272696E6B206F66207365636F6E64206261696C6F757420666F722062616E6B73 - scriptsig&lt;br /&gt;
 FFFFFFFF - sequence&lt;br /&gt;
 01 - outputs&lt;br /&gt;
 00F2052A01000000 - 50 BTC&lt;br /&gt;
 43 - pk_script length&lt;br /&gt;
 4104678AFDB0FE5548271967F1A67130B7105CD6A828E03909A67962E0EA1F61DEB649F6BC3F4CEF38C4F35504E51EC112DE5C384DF7BA0B8D578A4C702B6BF11D5FAC - pk_script&lt;br /&gt;
 00000000 - lock time&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[zh-cn:创世block]]&lt;br /&gt;
[[es:Bloque Génesis]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Wladimir_van_der_Laan&amp;diff=69987</id>
		<title>Wladimir van der Laan</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Wladimir_van_der_Laan&amp;diff=69987"/>
		<updated>2023-12-30T17:52:54Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{infobox person&lt;br /&gt;
|name=Wladimir van der Laan&lt;br /&gt;
|names=Wlad, laanwj&lt;br /&gt;
|active=2011–present&lt;br /&gt;
|residence=Eindhoven, The Netherlands&lt;br /&gt;
|knownfor=Contributions to [[Bitcoin Core]]&lt;br /&gt;
|notableworks=[[Visucore]]&amp;lt;!-- was bitcoin-qt started by laan? --&amp;gt;&lt;br /&gt;
|twitter=orionwl&lt;br /&gt;
}}&#039;&#039;&#039;Wladimir J. van der Laan&#039;&#039;&#039; is the current [[Core maintainer|maintainer]] of [[Bitcoin Core]].&lt;br /&gt;
&lt;br /&gt;
On April 7, 2014, [[Gavin Andresen]] stepped down from the position of Core maintainer and nominated Laan as his successor.&amp;lt;ref&amp;gt;{{cite web|title=Bitcoin Core Maintainer: Wladimir van der Laan|work=[[Bitcoin Foundation]]|date=7 April 2014|url=https://bitcoinfoundation.org/2014/04/bitcoin-core-maintainer-wladimir-van-der-laan/|author=[[Gavin Andresen|Andresen, Gavin]]|accessdate=19 September 2014}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On January 21st, 2021, Wlad announced that he would be delegating his tasks.&amp;lt;ref&amp;gt;[https://laanwj.github.io/2021/01/21/decentralize.html The Widening Gyre on Lannwj&#039;s blog]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wladimir gradualy stepped down in the following 2 years. On February 2023 Wladimir removed his own merge privileges. &amp;lt;ref&amp;gt;[https://github.com/bitcoin/bitcoin/pull/27054 Bitcoin Core pull request #27054]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
{{s-start|Bitcoin [[Core maintainer]]|[[Gavin Andresen]]|2014–2022|No more &amp;quot;lead maintainer&amp;quot;}}&lt;br /&gt;
{{developers}}{{stub}}&lt;br /&gt;
[[Category:Core committers]]&lt;br /&gt;
[[Category:Core developers]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_broadcasting&amp;diff=69986</id>
		<title>Transaction broadcasting</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_broadcasting&amp;diff=69986"/>
		<updated>2023-12-30T17:51:55Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by Bitlabs (talk) to last revision by BitTools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{seealso|Satoshi Client Transaction Exchange}}&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Transaction accelerator]]&lt;br /&gt;
&lt;br /&gt;
Third party sites to (re-)submit a raw, signed transaction to the network; sometimes referred to as &amp;quot;pushtx&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
* https://bitaps.com/broadcast&lt;br /&gt;
* https://btc.network/broadcast&lt;br /&gt;
* https://blockchair.com/broadcast&lt;br /&gt;
* https://live.blockcypher.com/btc/pushtx/&lt;br /&gt;
* https://btc.com/tools/tx/publish&lt;br /&gt;
* https://www.viabtc.com/tools/broadcast&lt;br /&gt;
* https://www.blockchain.com/explorer/assets/btc/broadcast-transaction&lt;br /&gt;
* https://blockstream.info/tx/push&lt;br /&gt;
* https://coinb.in/#broadcast&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
[[Category:Developer]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69985</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69985"/>
		<updated>2023-12-30T17:49:56Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by Bitlabs (talk) to last revision by BitTools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.     &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, The Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69955</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69955"/>
		<updated>2023-12-10T16:26:00Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69954</id>
		<title>Comparison of mining pools</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69954"/>
		<updated>2023-12-10T16:24:34Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by Luke-jr (talk) to last revision by Alejandrobitcoin&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reward types &amp;amp; explanation:&lt;br /&gt;
* &#039;&#039;&#039;CPPSRB&#039;&#039;&#039; - Capped Pay Per Share with Recent Backpay. [http://eligius.st/wiki/index.php/Capped_PPS_with_Recent_Backpay]&lt;br /&gt;
* &#039;&#039;&#039;DGM&#039;&#039;&#039; - Double Geometric Method.  A hybrid between PPLNS and Geometric reward types that enables to operator to absorb some of the variance risk.  Operator receives portion of payout on short rounds and returns it on longer rounds to normalize payments. [https://bitcointalk.org/index.php?topic=39497.0]&lt;br /&gt;
* &#039;&#039;&#039;ESMPPS&#039;&#039;&#039; - Equalized Shared Maximum Pay Per Share. Like SMPPS, but equalizes payments fairly among all those who are owed. [http://bitcointalk.org/index.php?topic=12181.msg378851#msg378851]&lt;br /&gt;
* &#039;&#039;&#039;POT&#039;&#039;&#039; - Pay On Target. A high variance PPS variant that pays on the difficulty of work returned to pool rather than the difficulty of work served by pool [https://bitcointalk.org/index.php?topic=131376.0]&lt;br /&gt;
* &#039;&#039;&#039;PPLNS&#039;&#039;&#039; - Pay Per Last N Shares. Similar to proportional, but instead of looking at the number of shares in the round, instead looks at the last N shares, regardless of round boundaries.&lt;br /&gt;
* &#039;&#039;&#039;PPLNSG&#039;&#039;&#039; - Pay Per Last N Groups (or shifts). Similar to PPLNS, but shares are grouped into &amp;quot;shifts&amp;quot; which are paid as a whole.&lt;br /&gt;
* &#039;&#039;&#039;PPS&#039;&#039;&#039; - Pay Per Share. Each submitted share is worth certain amount of BTC. Since finding a block requires &amp;lt;current difficulty&amp;gt; shares &#039;&#039;on average&#039;&#039;, a PPS method with 0% fee would be 6.25 BTC divided by &amp;lt;current difficulty&amp;gt;. It is risky for pool operators, hence the fee is highest.&lt;br /&gt;
* &#039;&#039;&#039;Prop.&#039;&#039;&#039; - Proportional. When block is found, the reward is distributed among all workers proportionally to how much shares each of them has found.&lt;br /&gt;
* &#039;&#039;&#039;RSMPPS&#039;&#039;&#039; - Recent Shared Maximum Pay Per Share. Like SMPPS, but system aims to prioritize the most recent miners first. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;Score&#039;&#039;&#039; - Score based system: a proportional reward, but weighed by time submitted. Each submitted share is worth more in the function of time &#039;&#039;t&#039;&#039; since start of current round. For each share score is updated by: score += exp(t/C). This makes later shares worth much more than earlier shares, thus the miner&#039;s score quickly diminishes when they stop mining on the pool. Rewards are calculated proportionally to scores (and not to shares). (at slush&#039;s pool C=300 seconds, and every hour scores are normalized)&lt;br /&gt;
* &#039;&#039;&#039;SMPPS&#039;&#039;&#039; - Shared Maximum Pay Per Share. Like Pay Per Share, but never pays more than the pool earns. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;FPPS&#039;&#039;&#039; - Full Pay Per Share. Similar to PPS，but not only divide regular block reward (6.25 BTC for now) but also some of the transaction fees.  Calculate a standard transaction fee within a certain period and distribute it to miners according to their hash power contributions in the pool. It will increase the miners&#039; earnings by sharing some of the transaction fees.&lt;br /&gt;
* &#039;&#039;&#039;TIDES&#039;&#039;&#039; - Transparent Index of Distinct Extended Shares. As blocks are being mined, they generate the reward by a weighted percentage of effort to the most recently found proofs. The proof period funds are distributed across has been chosen such that each proof should be paid on average 8 times. Instead of a set amount of bitcoins per proof, the block reward is divided by percent, so transaction fees are included.&lt;br /&gt;
&lt;br /&gt;
A statistically valid analysis of some pools and their payout methods: [http://organofcorti.blogspot.com/ Bitcoin network and pool analysis]&lt;br /&gt;
&lt;br /&gt;
== Operational Pools ==&lt;br /&gt;
&lt;br /&gt;
The following mining pools are still running and paying out their users:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[AntPool]]         || China                || Large || No       || PPLNS &amp;amp; PPS             || {{PoolFees}}    || 2.5%  || 0%      || {{Yes}} || {{No}}&lt;br /&gt;
| ?          || ?                            || [https://bitcointalk.org/index.php?topic=855548 link]  || [https://www.antpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTC.com]]         || {{flag|cn}}{{flag|us|}}{{flag|eu}}               || Medium || [[NMC]]      || FPPS           || {{SharedFees}}    || 0%  || 4%      || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-09-13          ||      User                     || [https://bitcointalk.org/index.php?topic=1827718.0 link]  || [https://pool.btc.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[DEMAND]]         || Global || Small || No  || SOLO                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{No}}&lt;br /&gt;
| 2023-11-27 ||   || [https://bitcointalk.org/index.php?topic=5476679.0 link] || [http://DMND.WORK link]&lt;br /&gt;
|-&lt;br /&gt;
| [[F2Pool]]          || {{flag|us|}}{{flag|eu|}}{{flag|cn|}}                || Large || NMC, SYS, EMC || PPS+                     || {{SharedFees}}    || 2.5%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-05-05 || Dynamic               || [https://bitcointalk.org/index.php?topic=700411.0 link] || [https://www.f2pool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Golden Nonce Pool]]         || {{flag|us}}{{flag|eu}}|| Small || No      || DGM                || {{PoolFees}}     ||      ||      0% || {{Yes}} || &lt;br /&gt;
| 2018-03-27 || Dynamic || [https://bitcointalk.org/index.php?topic=3208073;all  link]   || [https://goldennoncepool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[KanoPool]]         || {{flag|us}}{{flag|sg}}{{flag|de}}{{flag|jp}}{{flag|nl}} || Medium || No      || PPLNSG                || {{SharedFees}}     ||      ||      0.9% || {{Yes}} || {{No}}&lt;br /&gt;
| 2014-09-20 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 18SPM || [https://bitcointalk.org/index.php?topic=789369.0 link]   || [http://www.kano.is link]&lt;br /&gt;
|-&lt;br /&gt;
| [[P2Pool]]          || Global (p2p)          ||   Small || Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis &amp;lt;ref name=&amp;quot;solomm&amp;quot;/&amp;gt; || PPLNS  || {{SharedFees}}   ||      ||      | 0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-17 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=18313  link] ||&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [[Poolin]]          || Global                ||   Medium ||[[NMC]] VCASH || FPPS  || {{SharedFees}}   ||    2.5% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2017-10-01 || Dynamic || [https://bitcointalk.org/index.php?topic=5169994.0  link] ||  [https://poolin.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[SBICrypto Pool]]          || Global                ||   Medium || No       || FPPS  || {{SharedFees}}   ||    0% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2020-11-03 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic ||                                             ||  [https://sbicrypto.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Slush Pool]]&lt;br /&gt;
|                        Global               || Medium || [[NMC]] || Score                   || {{SharedFees}}   ||      ||      2% || {{Yes}} || {{No}}&lt;br /&gt;
| 2010-11-27 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=1976   link] || [https://slushpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luxor]]       || {{flag|us|label=1}}||    Medium || No || FPPS &amp;amp; PPS                     || {{SharedFees}} || 2% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2018-01-01 || VarDiff                       ||                                             || [https://mining.luxor.tech// link]&lt;br /&gt;
|-&lt;br /&gt;
| [[OCEAN]]         || {{flag|us|label=1}}|| Small || No  || TIDES                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-04-27 || Dynamic  || || [http://ocean.xyz link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Defunct Pools ==&lt;br /&gt;
&lt;br /&gt;
The following pools were once operational but have since shut down. They are listed for historical purposes only.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[BCMonster.com]]        ||{{flag|us|}}{{flag|eu}}{{flag|cn|}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-01-13 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1327077.0  link]                                || [http://www.bcmonster.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BitcoinAffiliateNetwork]]     || {{flag|us|}}{{flag|eu}}{{flag|cn|}}{{flag|nl|}}{{flag|au|}}      ||   ?   || [[NMC]] || ?         || {{PoolFees}}     ||   ? ||    ?    ||    {{Yes}}     ||&lt;br /&gt;
| 2014-07-15 || User/Dynamic           || [https://bitcointalk.org/index.php?topic=722202.0  link] || [http://mining.bitcoinaffiliatenetwork.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BitMinter]]       || {{flag|us}}{{flag|ca|label=1}}{{flag|eu}}          || Small || [[NMC]] || PPLNSG                  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-26 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic || [https://bitcointalk.org/?topic=788753  link] || [https://bitminter.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCDig]]         || {{flag|us|label=1}}||    Small || No      || DGM                   || {{PoolFees}}     ||      ||      0% ||  {{Yes}}     ||&lt;br /&gt;
| 2013-07-04 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 20SPM                      || [https://bitcointalk.org/index.php?topic=249627   link] || [http://btcdig.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcmp.com]]       || {{flag|de|label=1}}||    Small || No      || PPS                     || {{PoolFees}}     ||   4% ||  || {{Yes}} ||&lt;br /&gt;
| 2011-06-28 || Diff 1                       ||                                             || [http://www.btcmp.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCC Pool]]            || China, Japan       || Large     || [[NMC]]       || PPS                       || {{PoolFees}}    || 2.0%     || 0%       || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2014-10-21           ||  Dynamic                            || ?                                      || [https://pool.btcc.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcZPool.com]]       || {{flag|us|label=1}}||    Large || BitCoinZ      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-06-25 || VarDiff                       ||                                             || [http://www.btcZPool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [[BW Mining]]      || China                || Medium || ?       || PPLNS &amp;amp; PPS             || ?               || ?     || ?       || {{Yes}} ||&lt;br /&gt;
| ?          || ?                            || ?                                           || [https://www.bw.com/pool link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Eligius]]         || {{flag|us|label=1}}|| Small || [[NMC]]  || CPPSRB                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2011-04-27 || Dynamic: 32 shares/m         || [https://bitcointalk.org/?topic=441465  link] || [http://eligius.st link]&lt;br /&gt;
|-&lt;br /&gt;
| [[EMCD Pool]]          || CIS, EU, KZ, IR, China || Medium || - || FPPS+                     || {{SharedFees}}    || 1%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2018-01-26 || Dynamic               ||  || [https://pool.emcd.io link]&lt;br /&gt;
|-&lt;br /&gt;
| [[GHash.IO]]        || {{flag|nl|label=1}}|| Small || [[NMC]], IXC, [[Devcoin]]      || PPLNS                  || {{SharedFees}}   ||       ||      0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-07-01 ||           User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||   [https://support.cex.io  link]                                || [https://ghash.io/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Give Me COINS]]   || {{flag|us}}{{flag|eu}}          || Small || [[NMC]]   || PPLNS                  || {{SharedFees}}     ||    ||  0%|| {{Yes}} || {{Yes}}&lt;br /&gt;
| 2013-08-12 || Dynamic         || [https://bitcointalk.org/index.php?topic=272017.0  link] || [http://give-me-coins.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Jonny Bravo&#039;s Mining Emporium]]        ||{{flag|us|}}{{flag|eu}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2015-11-19 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1330452.0  link]                                || [http://www.bravo-mining.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[kmdPool.org]]       || {{flag|us|label=1}}||    Large || Komodo      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-11-25 || VarDiff                       ||                                             || [http://www.kmdPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[MergeMining]]          || Global          ||   Small || CRW, DVC, HUC, I0C, IXC, XMY/MYR, NMC, SYS, UNO, TRC, ARG, EMC || PPLNS  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-12-01|| User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||  || [https://mergemining.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Multipool]]          || {{flag|us}}{{flag|eu}}      ||   Small || [[NMC]] || Score                     || {{SharedFees}}     ||      ||      1.5% ||     {{Yes}}     || {{No}}&lt;br /&gt;
| 2012-03-15 || User                       || [https://bitcointalk.org/index.php?topic=311067.0  link] || [https://www.multipool.us/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[ZenPool.org]]       || {{flag|us|label=1}}||    Large || ZenCash      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-10-25 || VarDiff                       ||                                             || [http://www.ZenPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SPV Mining / Old Bitcoin Core ==&lt;br /&gt;
&lt;br /&gt;
The following pools are known or strongly suspected to be mining on top of blocks before fully validating them with Bitcoin Core 0.9.5 or later.  Miners doing this have already lost over $50,000 USD during the 4 July 2015 fork and have created a situation where small numbers of confirmations are much less useful than they normally are.&lt;br /&gt;
&lt;br /&gt;
* BTC Nuggets&lt;br /&gt;
* [https://www.f2pool.com/ F2Pool]&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot;&amp;gt;[https://bitcointalk.org/index.php?topic=700411.msg11790734#msg11790734 Intention to continue SPV mining], Wang Chun, 4 July 2015&amp;lt;/ref&amp;gt;&lt;br /&gt;
* AntPool&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following pools are believed to be currently fully validating blocks with Bitcoin Core 0.9.5 or later (0.10.2 or later recommended due to DoS vulnerabilities):&lt;br /&gt;
&lt;br /&gt;
* [[BitMinter]]&lt;br /&gt;
* BTC China (described as SPV mining&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;, but they&#039;re performing effective valiation)&lt;br /&gt;
* [[BTC Public Mining Pool]]&lt;br /&gt;
* [[CKPool]]&lt;br /&gt;
* [[Eligius]]&lt;br /&gt;
* [[Golden Nonce Pool]]&lt;br /&gt;
* [[P2Pool]]&lt;br /&gt;
* [[Bitcoin Pooled Mining|Slush Pool]]&lt;br /&gt;
* [[BCMonster.com]]&lt;br /&gt;
* [[Jonny Bravo&#039;s Mining Emporium]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;&amp;gt;Note that pool hashrate is largely irrelevant but can be seen as a popularity measurement. It is a theoretical security issue if one pool gains above 50% of the total computational power of the network, thus consider joining a pool based on other metrics. The pool&#039;s total hash rate is very dynamic on most pools. Over time, as the network grows, so does most pool&#039;s hash rates. The displayed values are the pool&#039;s relative sizes based on the network: Small: less than 2%, Medium: 2%-10% Large: greater than 10% of the network.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;merged&amp;quot;&amp;gt;Merged mining allows miners to mine on multiple [[block chains]] at the same time with the same hashing.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;changeable&amp;quot;&amp;gt;The difficulty of the shares can be changed by the user.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;solomm&amp;quot;&amp;gt;Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis (payouts in the merged chain are not pooled).&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Pooled mining]]&lt;br /&gt;
* [https://www.blocktrail.com/BTC/pools Pool Distribution Summary]&lt;br /&gt;
* [https://www.bitcoinmining.com/ Bitcoin Mining]&lt;br /&gt;
* [https://www.youtube.com/watch?v=GmOzih6I1zs Video: What is Bitcoin Mining]&lt;br /&gt;
* [https://www.bitcoinmining.com/bitcoin-mining-pools/ Bitcoin Mining Pools]&lt;br /&gt;
* [https://bitcoinchain.com/pools Bitcoin Mining Pools Comparison]&lt;br /&gt;
[[Category:Mining]]&lt;br /&gt;
{{Pools}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=69953</id>
		<title>DEMAND</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=69953"/>
		<updated>2023-12-10T16:24:23Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by Luke-jr (talk) to last revision by Alejandrobitcoin&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{infobox company|&lt;br /&gt;
|founder= Alejandro De La Torre, CEO Co-Founder&lt;br /&gt;
Filippo Merli, Technical Lead, Co-Founder&lt;br /&gt;
|foundation= 2023&lt;br /&gt;
|industry=[[Mining Pool]]&lt;br /&gt;
|website=https://www.DMND.WORK}}&lt;br /&gt;
[https://WWW.DMND.WORK DEMAND] is the first Stratum V2, bitcoin [[Mining Pool|mining pool]]. Both Solo and Pooled mining available. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
* Website: https://www.DMND.WORK/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Services]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=69952</id>
		<title>DEMAND</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=DEMAND&amp;diff=69952"/>
		<updated>2023-12-10T16:24:15Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Pools are not solo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{infobox company|&lt;br /&gt;
|founder= Alejandro De La Torre, CEO Co-Founder&lt;br /&gt;
Filippo Merli, Technical Lead, Co-Founder&lt;br /&gt;
|foundation= 2023&lt;br /&gt;
|industry=[[Mining Pool]]&lt;br /&gt;
|website=https://www.DMND.WORK}}&lt;br /&gt;
[https://WWW.DMND.WORK DEMAND] is the first Stratum V2, bitcoin [[Mining Pool|mining pool]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
* Website: https://www.DMND.WORK/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Services]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69951</id>
		<title>Comparison of mining pools</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69951"/>
		<updated>2023-12-10T16:24:00Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Pools are not solo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reward types &amp;amp; explanation:&lt;br /&gt;
* &#039;&#039;&#039;CPPSRB&#039;&#039;&#039; - Capped Pay Per Share with Recent Backpay. [http://eligius.st/wiki/index.php/Capped_PPS_with_Recent_Backpay]&lt;br /&gt;
* &#039;&#039;&#039;DGM&#039;&#039;&#039; - Double Geometric Method.  A hybrid between PPLNS and Geometric reward types that enables to operator to absorb some of the variance risk.  Operator receives portion of payout on short rounds and returns it on longer rounds to normalize payments. [https://bitcointalk.org/index.php?topic=39497.0]&lt;br /&gt;
* &#039;&#039;&#039;ESMPPS&#039;&#039;&#039; - Equalized Shared Maximum Pay Per Share. Like SMPPS, but equalizes payments fairly among all those who are owed. [http://bitcointalk.org/index.php?topic=12181.msg378851#msg378851]&lt;br /&gt;
* &#039;&#039;&#039;POT&#039;&#039;&#039; - Pay On Target. A high variance PPS variant that pays on the difficulty of work returned to pool rather than the difficulty of work served by pool [https://bitcointalk.org/index.php?topic=131376.0]&lt;br /&gt;
* &#039;&#039;&#039;PPLNS&#039;&#039;&#039; - Pay Per Last N Shares. Similar to proportional, but instead of looking at the number of shares in the round, instead looks at the last N shares, regardless of round boundaries.&lt;br /&gt;
* &#039;&#039;&#039;PPLNSG&#039;&#039;&#039; - Pay Per Last N Groups (or shifts). Similar to PPLNS, but shares are grouped into &amp;quot;shifts&amp;quot; which are paid as a whole.&lt;br /&gt;
* &#039;&#039;&#039;PPS&#039;&#039;&#039; - Pay Per Share. Each submitted share is worth certain amount of BTC. Since finding a block requires &amp;lt;current difficulty&amp;gt; shares &#039;&#039;on average&#039;&#039;, a PPS method with 0% fee would be 6.25 BTC divided by &amp;lt;current difficulty&amp;gt;. It is risky for pool operators, hence the fee is highest.&lt;br /&gt;
* &#039;&#039;&#039;Prop.&#039;&#039;&#039; - Proportional. When block is found, the reward is distributed among all workers proportionally to how much shares each of them has found.&lt;br /&gt;
* &#039;&#039;&#039;RSMPPS&#039;&#039;&#039; - Recent Shared Maximum Pay Per Share. Like SMPPS, but system aims to prioritize the most recent miners first. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;Score&#039;&#039;&#039; - Score based system: a proportional reward, but weighed by time submitted. Each submitted share is worth more in the function of time &#039;&#039;t&#039;&#039; since start of current round. For each share score is updated by: score += exp(t/C). This makes later shares worth much more than earlier shares, thus the miner&#039;s score quickly diminishes when they stop mining on the pool. Rewards are calculated proportionally to scores (and not to shares). (at slush&#039;s pool C=300 seconds, and every hour scores are normalized)&lt;br /&gt;
* &#039;&#039;&#039;SMPPS&#039;&#039;&#039; - Shared Maximum Pay Per Share. Like Pay Per Share, but never pays more than the pool earns. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;FPPS&#039;&#039;&#039; - Full Pay Per Share. Similar to PPS，but not only divide regular block reward (6.25 BTC for now) but also some of the transaction fees.  Calculate a standard transaction fee within a certain period and distribute it to miners according to their hash power contributions in the pool. It will increase the miners&#039; earnings by sharing some of the transaction fees.&lt;br /&gt;
* &#039;&#039;&#039;TIDES&#039;&#039;&#039; - Transparent Index of Distinct Extended Shares. As blocks are being mined, they generate the reward by a weighted percentage of effort to the most recently found proofs. The proof period funds are distributed across has been chosen such that each proof should be paid on average 8 times. Instead of a set amount of bitcoins per proof, the block reward is divided by percent, so transaction fees are included.&lt;br /&gt;
&lt;br /&gt;
A statistically valid analysis of some pools and their payout methods: [http://organofcorti.blogspot.com/ Bitcoin network and pool analysis]&lt;br /&gt;
&lt;br /&gt;
== Operational Pools ==&lt;br /&gt;
&lt;br /&gt;
The following mining pools are still running and paying out their users:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[AntPool]]         || China                || Large || No       || PPLNS &amp;amp; PPS             || {{PoolFees}}    || 2.5%  || 0%      || {{Yes}} || {{No}}&lt;br /&gt;
| ?          || ?                            || [https://bitcointalk.org/index.php?topic=855548 link]  || [https://www.antpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTC.com]]         || {{flag|cn}}{{flag|us|}}{{flag|eu}}               || Medium || [[NMC]]      || FPPS           || {{SharedFees}}    || 0%  || 4%      || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-09-13          ||      User                     || [https://bitcointalk.org/index.php?topic=1827718.0 link]  || [https://pool.btc.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[DEMAND]]         || Global || Small || No  ||                   || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{No}}&lt;br /&gt;
| 2023-11-27 ||   || [https://bitcointalk.org/index.php?topic=5476679.0 link] || [http://DMND.WORK link]&lt;br /&gt;
|-&lt;br /&gt;
| [[F2Pool]]          || {{flag|us|}}{{flag|eu|}}{{flag|cn|}}                || Large || NMC, SYS, EMC || PPS+                     || {{SharedFees}}    || 2.5%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-05-05 || Dynamic               || [https://bitcointalk.org/index.php?topic=700411.0 link] || [https://www.f2pool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Golden Nonce Pool]]         || {{flag|us}}{{flag|eu}}|| Small || No      || DGM                || {{PoolFees}}     ||      ||      0% || {{Yes}} || &lt;br /&gt;
| 2018-03-27 || Dynamic || [https://bitcointalk.org/index.php?topic=3208073;all  link]   || [https://goldennoncepool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[KanoPool]]         || {{flag|us}}{{flag|sg}}{{flag|de}}{{flag|jp}}{{flag|nl}} || Medium || No      || PPLNSG                || {{SharedFees}}     ||      ||      0.9% || {{Yes}} || {{No}}&lt;br /&gt;
| 2014-09-20 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 18SPM || [https://bitcointalk.org/index.php?topic=789369.0 link]   || [http://www.kano.is link]&lt;br /&gt;
|-&lt;br /&gt;
| [[P2Pool]]          || Global (p2p)          ||   Small || Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis &amp;lt;ref name=&amp;quot;solomm&amp;quot;/&amp;gt; || PPLNS  || {{SharedFees}}   ||      ||      | 0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-17 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=18313  link] ||&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [[Poolin]]          || Global                ||   Medium ||[[NMC]] VCASH || FPPS  || {{SharedFees}}   ||    2.5% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2017-10-01 || Dynamic || [https://bitcointalk.org/index.php?topic=5169994.0  link] ||  [https://poolin.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[SBICrypto Pool]]          || Global                ||   Medium || No       || FPPS  || {{SharedFees}}   ||    0% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2020-11-03 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic ||                                             ||  [https://sbicrypto.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Slush Pool]]&lt;br /&gt;
|                        Global               || Medium || [[NMC]] || Score                   || {{SharedFees}}   ||      ||      2% || {{Yes}} || {{No}}&lt;br /&gt;
| 2010-11-27 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=1976   link] || [https://slushpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luxor]]       || {{flag|us|label=1}}||    Medium || No || FPPS &amp;amp; PPS                     || {{SharedFees}} || 2% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2018-01-01 || VarDiff                       ||                                             || [https://mining.luxor.tech// link]&lt;br /&gt;
|-&lt;br /&gt;
| [[OCEAN]]         || {{flag|us|label=1}}|| Small || No  || TIDES                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-04-27 || Dynamic  || || [http://ocean.xyz link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Defunct Pools ==&lt;br /&gt;
&lt;br /&gt;
The following pools were once operational but have since shut down. They are listed for historical purposes only.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[BCMonster.com]]        ||{{flag|us|}}{{flag|eu}}{{flag|cn|}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-01-13 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1327077.0  link]                                || [http://www.bcmonster.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BitcoinAffiliateNetwork]]     || {{flag|us|}}{{flag|eu}}{{flag|cn|}}{{flag|nl|}}{{flag|au|}}      ||   ?   || [[NMC]] || ?         || {{PoolFees}}     ||   ? ||    ?    ||    {{Yes}}     ||&lt;br /&gt;
| 2014-07-15 || User/Dynamic           || [https://bitcointalk.org/index.php?topic=722202.0  link] || [http://mining.bitcoinaffiliatenetwork.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BitMinter]]       || {{flag|us}}{{flag|ca|label=1}}{{flag|eu}}          || Small || [[NMC]] || PPLNSG                  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-26 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic || [https://bitcointalk.org/?topic=788753  link] || [https://bitminter.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCDig]]         || {{flag|us|label=1}}||    Small || No      || DGM                   || {{PoolFees}}     ||      ||      0% ||  {{Yes}}     ||&lt;br /&gt;
| 2013-07-04 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 20SPM                      || [https://bitcointalk.org/index.php?topic=249627   link] || [http://btcdig.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcmp.com]]       || {{flag|de|label=1}}||    Small || No      || PPS                     || {{PoolFees}}     ||   4% ||  || {{Yes}} ||&lt;br /&gt;
| 2011-06-28 || Diff 1                       ||                                             || [http://www.btcmp.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCC Pool]]            || China, Japan       || Large     || [[NMC]]       || PPS                       || {{PoolFees}}    || 2.0%     || 0%       || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2014-10-21           ||  Dynamic                            || ?                                      || [https://pool.btcc.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcZPool.com]]       || {{flag|us|label=1}}||    Large || BitCoinZ      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-06-25 || VarDiff                       ||                                             || [http://www.btcZPool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [[BW Mining]]      || China                || Medium || ?       || PPLNS &amp;amp; PPS             || ?               || ?     || ?       || {{Yes}} ||&lt;br /&gt;
| ?          || ?                            || ?                                           || [https://www.bw.com/pool link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Eligius]]         || {{flag|us|label=1}}|| Small || [[NMC]]  || CPPSRB                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2011-04-27 || Dynamic: 32 shares/m         || [https://bitcointalk.org/?topic=441465  link] || [http://eligius.st link]&lt;br /&gt;
|-&lt;br /&gt;
| [[EMCD Pool]]          || CIS, EU, KZ, IR, China || Medium || - || FPPS+                     || {{SharedFees}}    || 1%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2018-01-26 || Dynamic               ||  || [https://pool.emcd.io link]&lt;br /&gt;
|-&lt;br /&gt;
| [[GHash.IO]]        || {{flag|nl|label=1}}|| Small || [[NMC]], IXC, [[Devcoin]]      || PPLNS                  || {{SharedFees}}   ||       ||      0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-07-01 ||           User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||   [https://support.cex.io  link]                                || [https://ghash.io/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Give Me COINS]]   || {{flag|us}}{{flag|eu}}          || Small || [[NMC]]   || PPLNS                  || {{SharedFees}}     ||    ||  0%|| {{Yes}} || {{Yes}}&lt;br /&gt;
| 2013-08-12 || Dynamic         || [https://bitcointalk.org/index.php?topic=272017.0  link] || [http://give-me-coins.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Jonny Bravo&#039;s Mining Emporium]]        ||{{flag|us|}}{{flag|eu}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2015-11-19 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1330452.0  link]                                || [http://www.bravo-mining.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[kmdPool.org]]       || {{flag|us|label=1}}||    Large || Komodo      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-11-25 || VarDiff                       ||                                             || [http://www.kmdPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[MergeMining]]          || Global          ||   Small || CRW, DVC, HUC, I0C, IXC, XMY/MYR, NMC, SYS, UNO, TRC, ARG, EMC || PPLNS  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-12-01|| User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||  || [https://mergemining.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Multipool]]          || {{flag|us}}{{flag|eu}}      ||   Small || [[NMC]] || Score                     || {{SharedFees}}     ||      ||      1.5% ||     {{Yes}}     || {{No}}&lt;br /&gt;
| 2012-03-15 || User                       || [https://bitcointalk.org/index.php?topic=311067.0  link] || [https://www.multipool.us/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[ZenPool.org]]       || {{flag|us|label=1}}||    Large || ZenCash      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-10-25 || VarDiff                       ||                                             || [http://www.ZenPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SPV Mining / Old Bitcoin Core ==&lt;br /&gt;
&lt;br /&gt;
The following pools are known or strongly suspected to be mining on top of blocks before fully validating them with Bitcoin Core 0.9.5 or later.  Miners doing this have already lost over $50,000 USD during the 4 July 2015 fork and have created a situation where small numbers of confirmations are much less useful than they normally are.&lt;br /&gt;
&lt;br /&gt;
* BTC Nuggets&lt;br /&gt;
* [https://www.f2pool.com/ F2Pool]&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot;&amp;gt;[https://bitcointalk.org/index.php?topic=700411.msg11790734#msg11790734 Intention to continue SPV mining], Wang Chun, 4 July 2015&amp;lt;/ref&amp;gt;&lt;br /&gt;
* AntPool&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following pools are believed to be currently fully validating blocks with Bitcoin Core 0.9.5 or later (0.10.2 or later recommended due to DoS vulnerabilities):&lt;br /&gt;
&lt;br /&gt;
* [[BitMinter]]&lt;br /&gt;
* BTC China (described as SPV mining&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;, but they&#039;re performing effective valiation)&lt;br /&gt;
* [[BTC Public Mining Pool]]&lt;br /&gt;
* [[CKPool]]&lt;br /&gt;
* [[Eligius]]&lt;br /&gt;
* [[Golden Nonce Pool]]&lt;br /&gt;
* [[P2Pool]]&lt;br /&gt;
* [[Bitcoin Pooled Mining|Slush Pool]]&lt;br /&gt;
* [[BCMonster.com]]&lt;br /&gt;
* [[Jonny Bravo&#039;s Mining Emporium]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;&amp;gt;Note that pool hashrate is largely irrelevant but can be seen as a popularity measurement. It is a theoretical security issue if one pool gains above 50% of the total computational power of the network, thus consider joining a pool based on other metrics. The pool&#039;s total hash rate is very dynamic on most pools. Over time, as the network grows, so does most pool&#039;s hash rates. The displayed values are the pool&#039;s relative sizes based on the network: Small: less than 2%, Medium: 2%-10% Large: greater than 10% of the network.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;merged&amp;quot;&amp;gt;Merged mining allows miners to mine on multiple [[block chains]] at the same time with the same hashing.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;changeable&amp;quot;&amp;gt;The difficulty of the shares can be changed by the user.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;solomm&amp;quot;&amp;gt;Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis (payouts in the merged chain are not pooled).&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Pooled mining]]&lt;br /&gt;
* [https://www.blocktrail.com/BTC/pools Pool Distribution Summary]&lt;br /&gt;
* [https://www.bitcoinmining.com/ Bitcoin Mining]&lt;br /&gt;
* [https://www.youtube.com/watch?v=GmOzih6I1zs Video: What is Bitcoin Mining]&lt;br /&gt;
* [https://www.bitcoinmining.com/bitcoin-mining-pools/ Bitcoin Mining Pools]&lt;br /&gt;
* [https://bitcoinchain.com/pools Bitcoin Mining Pools Comparison]&lt;br /&gt;
[[Category:Mining]]&lt;br /&gt;
{{Pools}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=69944</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=69944"/>
		<updated>2023-12-10T02:50:20Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-3641&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Yet) Unspecified DoS&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2020-14198&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2023-50428|CVE-2023-50428]]&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=69943</id>
		<title>Common Vulnerabilities and Exposures</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Common_Vulnerabilities_and_Exposures&amp;diff=69943"/>
		<updated>2023-12-10T02:49:56Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add CVE-2023-50428&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!style=&amp;quot;width:16ex&amp;quot;| CVE&lt;br /&gt;
! Announced !! Affects !! Severity !! Attack is... !! Flaw !! Net&lt;br /&gt;
|-&lt;br /&gt;
| Pre-BIP protocol changes&lt;br /&gt;
| n/a&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| [[Consensus versions|Various hardforks and softforks]]&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5137|CVE-2010-5137]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;&amp;gt;Attacker can disable some functionality, for example by crashing clients&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_LSHIFT crash&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5141|CVE-2010-5141]]&lt;br /&gt;
| 2010-07-28&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;Theft&amp;quot;&amp;gt;Attacker can take coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| OP_RETURN could be used to spend any output.&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5138|CVE-2010-5138]]&lt;br /&gt;
| 2010-07-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Unlimited SigOp DoS&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2010-5139]]&#039;&#039;&#039;&lt;br /&gt;
| 2010-08-15&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;&amp;gt;Attacker can create coins outside known network rules&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Combined output overflow&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2010-5140|CVE-2010-5140]]&lt;br /&gt;
| 2010-09-29&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Never confirming transactions&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2011-4447|CVE-2011-4447]]&lt;br /&gt;
| 2011-11-11&lt;br /&gt;
| wxBitcoin and bitcoind&lt;br /&gt;
|bgcolor=pink| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;&amp;gt;Attacker can access user data outside known acceptable methods&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Wallet non-encryption&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2011-4447.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1909|CVE-2012-1909]]&lt;br /&gt;
| 2012-03-07&lt;br /&gt;
| Bitcoin protocol and all clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;&amp;gt;Attacker can create multiple views of the network, enabling [[double-spending]] with over 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Very hard&lt;br /&gt;
| Transaction overwriting&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1909.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-1910|CVE-2012-1910]]&lt;br /&gt;
| 2012-03-17&lt;br /&gt;
| bitcoind &amp;amp; Bitcoin-Qt for Windows&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;&amp;gt;Extent of possible abuse is unknown&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Non-thread safe MingW exceptions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-1910.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0016|BIP 0016]]&lt;br /&gt;
| 2012-04-01&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: P2SH&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0016.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-2459|CVE-2012-2459]]&lt;br /&gt;
| 2012-05-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Block hash collision (via merkle root)&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-2459.html 100%]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-3584|CVE-2012-3584]]&lt;br /&gt;
| 2012-06-16&lt;br /&gt;
| Bitcoin p2p protocol&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Poor miner incentives&lt;br /&gt;
| (no fix)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-3789]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-06-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Lack of) orphan txn resource limits&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20123789 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2012-4682|CVE-2012-4682]]&lt;br /&gt;
| &lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4682.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4683]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-23&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/CVE-2012-4683.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2012-4684]]&#039;&#039;&#039;&lt;br /&gt;
| 2012-08-24&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
| bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
| bgcolor=pink| Easy&lt;br /&gt;
| Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20124684 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2272|CVE-2013-2272]]&lt;br /&gt;
| 2013-01-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132272 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2273|CVE-2013-2273]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=lime| Exposure&amp;lt;ref name=&amp;quot;Exposure&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Predictable change output&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132273 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-2292|CVE-2013-2292]]&lt;br /&gt;
| 2013-01-30&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| A transaction that takes at least 3 minutes to verify&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132292 0%]&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;[[CVE-2013-2293]]&#039;&#039;&#039;&lt;br /&gt;
| 2013-02-14&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Continuous hard disk seek&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20132293 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3219|CVE-2013-3219]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.0&lt;br /&gt;
|bgcolor=pink| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Unenforced block protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133219 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-3220|CVE-2013-3220]]&lt;br /&gt;
| 2013-03-11&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Inconsistent BDB lock limit interactions&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20133220 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0034|BIP 0034]]&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Height in coinbase&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/BIP-0034.html 100%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#BIP-0050|BIP 0050]]&lt;br /&gt;
| 2013-05-15&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=pink| Netsplit&amp;lt;ref name=&amp;quot;Netsplit&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Implicit&amp;lt;ref name=&amp;quot;hardfork&amp;quot;&amp;gt;This is a protocol &amp;quot;hard-fork&amp;quot; that old clients will reject as invalid and must therefore not be used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Hard fork to remove txid limit protocol rule&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?50 99.99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4627|CVE-2013-4627]]&lt;br /&gt;
| 2013-06-??&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Easy&lt;br /&gt;
| Memory exhaustion with excess tx message data&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134627 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-4165|CVE-2013-4165]]&lt;br /&gt;
| 2013-07-20&lt;br /&gt;
| bitcoind and Bitcoin-Qt&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| Timing leak in RPC authentication&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20134165 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2013-5700|CVE-2013-5700]]&lt;br /&gt;
| 2013-09-04&lt;br /&gt;
| bitcoind and Bitcoin-Qt 0.8.x&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote p2p crash via bloom filters&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2014-0160|CVE-2014-0160]]&lt;br /&gt;
| 2014-04-07&lt;br /&gt;
| Anything using OpenSSL for TLS&lt;br /&gt;
|bgcolor=pink| Unknown&amp;lt;ref name=&amp;quot;Unknown&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote memory leak via payment protocol&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2015-3641&lt;br /&gt;
| 2014-07-07&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.10.2&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| (Yet) Unspecified DoS&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20135700 99.9%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 66&lt;br /&gt;
| 2015-02-13&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Strict DER signatures&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?66 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIP 65&lt;br /&gt;
| 2015-11-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: OP_CHECKLOCKTIMEVERIFY&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?65 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 68, 112 &amp;amp; 113&lt;br /&gt;
| 2016-04-11&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softforks: Rel locktime, CSV &amp;amp; MTP locktime&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?68 99%]&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 141, 143 &amp;amp; 147&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?141 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2016-8889|CVE-2016-8889]]&lt;br /&gt;
| 2016-10-27&lt;br /&gt;
| Bitcoin Knots GUI 0.11.0 - 0.13.0&lt;br /&gt;
|bgcolor=yellow| Exposure&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Debug console history storing sensitive info&lt;br /&gt;
|bgcolor=lime| 100%&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2017-9230&lt;br /&gt;
| ?&lt;br /&gt;
| Bitcoin&lt;br /&gt;
| ?&lt;br /&gt;
| ?&lt;br /&gt;
| ASICBoost&lt;br /&gt;
|bgcolor=pink| 0%&lt;br /&gt;
|-&lt;br /&gt;
| BIP 148&lt;br /&gt;
| 2017-03-12&lt;br /&gt;
| All Bitcoin clients&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Segwit UASF&lt;br /&gt;
| ?&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-12842|CVE-2017-12842]]&lt;br /&gt;
| 2018-06-09&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| No commitment to block merkle tree depth&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10724]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Alert memory exhaustion&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html CVE-2016-10725]&lt;br /&gt;
| 2018-07-02&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.13.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Keyholders&amp;lt;ref name=&amp;quot;KeyholderEasy&amp;quot;&amp;gt;Attacking requires signing with the publicly-disclosed alert key&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Final alert cancellation&lt;br /&gt;
|bgcolor=lime| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201610724 99%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-17144|CVE-2018-17144]]&lt;br /&gt;
| 2018-09-17&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.16.3&lt;br /&gt;
|bgcolor=pink| Inflation&amp;lt;ref name=&amp;quot;inflation&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;/&amp;gt;&lt;br /&gt;
| Missing check for duplicate inputs&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817144 80%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b CVE-2018-20587]&lt;br /&gt;
| 2019-02-08&lt;br /&gt;
| Bitcoin Knots prior to 0.17.1, and all current Bitcoin Core releases&lt;br /&gt;
|bgcolor=pink| Theft&amp;lt;ref name=&amp;quot;theft-local-timing&amp;quot;&amp;gt;Local attacker could potentially determine the RPC passphrase via a timing sidechannel.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=lime| Local&lt;br /&gt;
| No alert for RPC service binding failure&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820587 &amp;lt;1%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2017-18350|CVE-2017-18350]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.15.1&lt;br /&gt;
|bgcolor=pink| Unknown&lt;br /&gt;
|bgcolor=pink| Varies&amp;lt;ref&amp;gt;Depends on software configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Buffer overflow from SOCKS proxy&lt;br /&gt;
|bgcolor=yellow| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201718350 94%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2018-20586|CVE-2018-20586]]&lt;br /&gt;
| 2019-06-22&lt;br /&gt;
| bitcoind and Bitcoin-Qt prior to 0.17.1&lt;br /&gt;
|bgcolor=lime| Deception&lt;br /&gt;
|bgcolor=lime| RPC access&lt;br /&gt;
| Debug log injection via unauthenticated RPC&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201820586 77%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12998]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| c-lightning prior to 0.7.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-12999]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| lnd prior to 0.7&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO amount&lt;br /&gt;
|-&lt;br /&gt;
| [https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html CVE-2019-13000]&lt;br /&gt;
| 2019-08-30&lt;br /&gt;
| eclair prior to 0.3&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing check of channel funding UTXO&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-14199|CVE-2020-14199]]&lt;br /&gt;
| 2020-06-03&lt;br /&gt;
| Trezor and others&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&amp;lt;ref&amp;gt;User must be tricked into cooperating (social engineering)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Double-signing can enable unintended fees&lt;br /&gt;
|-&lt;br /&gt;
| [https://invdos.net/ CVE-2018-17145]&lt;br /&gt;
| 2020-09-09&lt;br /&gt;
| Bitcoin Core prior to 0.16.2&amp;lt;br&amp;gt;Bitcoin Knots prior to 0.16.1&amp;lt;br&amp;gt;Bcoin prior to 1.0.2&amp;lt;br&amp;gt;Btcd prior to 0.21.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| p2p memory blow-up&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?201817145 87%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26895|CVE-2020-26895]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.10&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Missing low-S normalization for HTLC signatures&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2020-26896|CVE-2020-26896]]&lt;br /&gt;
| 2020-10-08&lt;br /&gt;
| lnd prior to 0.11&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=yellow | Varies&amp;lt;ref&amp;gt;Depends on node configuration, only affects routable merchants, requires external knowledge of receiver&#039;s invoices and/or luck to identify receiver, only works against single-shot HTLCs (legacy or MPP)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Invoice preimage extraction via forwarded HTLC&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2020-14198&lt;br /&gt;
| &lt;br /&gt;
| Bitcoin Core 0.20.0&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Remote DoS&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?202014198 93%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-3401|CVE-2021-3401]]&lt;br /&gt;
| 2021-02-01&lt;br /&gt;
| Bitcoin Core GUI prior to 0.19.0&amp;lt;br&amp;gt;Bitcoin Knots GUI prior to 0.18.1&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Hard&lt;br /&gt;
| Qt5 remote execution&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?20213401 64%]&lt;br /&gt;
|-&lt;br /&gt;
| [[#CVE-2021-31876|CVE-2021-31876]]&lt;br /&gt;
| 2021-05-06&lt;br /&gt;
| Various wallets&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41591&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41592&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2021-41593&lt;br /&gt;
| 2021-10-04&lt;br /&gt;
| Lightning software&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| BIPs 341-343&lt;br /&gt;
| 2021-11-13&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| Fake Conf&amp;lt;ref name=&amp;quot;FakeConf&amp;quot;&amp;gt;Attacker can double-spend with 1 confirmation&amp;lt;/ref&amp;gt;&lt;br /&gt;
|bgcolor=yellow| Miners&amp;lt;ref name=&amp;quot;MinerEasy&amp;quot;&amp;gt;Attacking requires mining block(s)&amp;lt;/ref&amp;gt;&lt;br /&gt;
| Softfork: Taproot&lt;br /&gt;
|bgcolor=pink| [http://luke.dashjr.org/programs/bitcoin/files/charts/security.html?343 57%]&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 CVE-2022-31246]&lt;br /&gt;
| 2022-06-07&lt;br /&gt;
| Electrum 2.1 until before 4.2.2&lt;br /&gt;
|bgcolor=pink| Theft&lt;br /&gt;
|bgcolor=lime| Social&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2023-50428&lt;br /&gt;
| 2023&lt;br /&gt;
| All Bitcoin nodes&lt;br /&gt;
|bgcolor=yellow| DoS&amp;lt;ref name=&amp;quot;DoS&amp;quot;/&amp;gt;&lt;br /&gt;
|bgcolor=pink| Easy&lt;br /&gt;
| Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5137 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; OP_LSHIFT crash&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One caused bitcoin to crash on some machines when processing a transaction containing an OP_LSHIFT. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5137 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5141 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-28&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; ?&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.4 || 0.3.5&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 28 2010, two bugs were discovered and demonstrated on the test network. One exploited a bug in the transaction handling code and allowed an attacker to spend coins that they did not own. This was never exploited on the main network, and was fixed by Bitcoin version 0.3.5.&lt;br /&gt;
&lt;br /&gt;
After these bugs were discovered, many currently-unused script words were disabled for safety.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5141 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5138 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-07-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unlimited SigOp DoS&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.? || 0.3.?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On July 29 2010, it was discovered that block [http://blockexplorer.com/block/00000000000997f9fd2fe1ee376293ef8c42ad09193a5d2086dddf8e5c426b56 71036] contained several transactions with a ton of OP_CHECKSIG commands. There should only ever be one such command. This caused every node to do extra unnecessary work, and it could have been used as a denial-of-service attack. A new version of Bitcoin was quickly released. The new version did not cause a fork on the main network, though it did cause one on the test network (where someone had played around with the attack more).&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5138 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5139 ==&lt;br /&gt;
{{main|CVE-2010-5139}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-08-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Combined output overflow&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.10 || 0.3.11&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On August 15 2010, it was [http://bitcointalk.org/index.php?topic=822.0 discovered] that block 74638 contained a transaction that created over 184 billion bitcoins for two different addresses. This was possible because the code used for checking transactions before including them in a block didn&#039;t account for the case of outputs so large that they overflowed when summed. A new version was published within a few hours of the discovery. The block chain had to be forked. Although many unpatched nodes continued to build on the &amp;quot;bad&amp;quot; block chain, the &amp;quot;good&amp;quot; block chain overtook it at a block height of 74691. The bad transaction no longer exists for people using the longest chain.&lt;br /&gt;
&lt;br /&gt;
The block and transaction:&lt;br /&gt;
&amp;lt;pre&amp;gt;CBlock(hash=0000000000790ab3, ver=1, hashPrevBlock=0000000000606865, hashMerkleRoot=618eba,&lt;br /&gt;
nTime=1281891957, nBits=1c00800e, nNonce=28192719, vtx=2)&lt;br /&gt;
  CTransaction(hash=012cd8, ver=1, vin.size=1, vout.size=1, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(000000, -1), coinbase 040e80001c028f00)&lt;br /&gt;
    CTxOut(nValue=50.51000000, scriptPubKey=0x4F4BA55D1580F8C3A8A2C7)&lt;br /&gt;
  CTransaction(hash=1d5e51, ver=1, vin.size=1, vout.size=2, nLockTime=0)&lt;br /&gt;
    CTxIn(COutPoint(237fe8, 0), scriptSig=0xA87C02384E1F184B79C6AC)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0xB7A7)&lt;br /&gt;
    CTxOut(nValue=92233720368.54275808, scriptPubKey=OP_DUP OP_HASH160 0x1512)&lt;br /&gt;
  vMerkleTree: 012cd8 1d5e51 618eba&lt;br /&gt;
&lt;br /&gt;
Block hash: 0000000000790ab3f22ec756ad43b6ab569abf0bddeb97c67a6f7b1470a7ec1c&lt;br /&gt;
Transaction hash: 1d5e512a9723cbef373b970eb52f1e9598ad67e7408077a82fdac194b65333c9&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=822.0 Discovery]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5139 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2010-5140 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2010-09-29&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Never confirming transactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || * - 0.3.12 || 0.3.13&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Around September 29, 2010, people started [https://bitcointalk.org/index.php?topic=1306.0 reporting] that their sent transactions would not confirm. This happened because people modified Bitcoin to send sub-0.01 transactions without any fees. A 0.01 fee was at that time required by the network for such transactions (essentially prohibiting them), so the transactions remained at 0 confirmations forever. This became a more serious issue because Bitcoin would send transactions using bitcoins gotten from transactions with 0 confirmations, and these resulting transactions would also never confirm. Because Bitcoin tends to prefer sending smaller coins, these invalid transactions quickly multiplied, contaminating the wallets of everyone who received them.&lt;br /&gt;
&lt;br /&gt;
Bitcoin was changed to only select coins with at least 1 confirmation. The remaining sub-0.01 transactions were cleared by generators who modified their version of Bitcoin to not require the micropayment fee. It took a while for everything to get cleared, though, because many of the intermediate transactions had been forgotten by the network by this point and had to be rebroadcast by the original senders.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=1306.0 Initial reports]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5140 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2011-4447 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2011-11-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Wallet non-encryption&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind&amp;lt;br&amp;gt;wxBitcoin || 0.4.0 - 0.4.1rc6 || 0.4.1&amp;lt;br&amp;gt;0.5.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51604.0 Announcement]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=51474.0 Finding]&lt;br /&gt;
* [http://bitcoin.org/releases/2011/11/21/v0.5.0.html 0.5.0]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4447 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1909 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-07&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Transaction overwriting&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin protocol || Before March 15th, 2012 || BIP 30&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.4rc2&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc2 || 0.4.4&amp;lt;br&amp;gt;0.5.0.4&amp;lt;br&amp;gt;0.5.3&amp;lt;br&amp;gt;0.6.0rc3&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=67738.0 Announcement]&lt;br /&gt;
* [https://en.bitcoin.it/wiki/BIP_0030 Fix]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=407793 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1909 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-1910 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-03-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Non-thread safe MingW exceptions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| bitcoind for Windows&amp;lt;br&amp;gt;Bitcoin-Qt for Windows || 0.5.0rc1 - 0.5.0.4&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3.0&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0rc3 || 0.5.0.5&amp;lt;br&amp;gt;0.5.3.1&amp;lt;br&amp;gt;0.5.4&amp;lt;br&amp;gt;0.6.0rc4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=69120.0 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1910 US-CERT/NIST]&lt;br /&gt;
* [http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html Full disclosure]&lt;br /&gt;
&lt;br /&gt;
== BIP-0016 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-04-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory P2SH protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.0.5&amp;lt;br&amp;gt;0.5.1rc1 - 0.5.3&amp;lt;br&amp;gt;0.6.0rc1 || 0.4.5&amp;lt;br&amp;gt;0.5.0.6&amp;lt;br&amp;gt;0.5.4rc1&amp;lt;br&amp;gt;0.6.0rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0016]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-2459 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-05-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Block hash collision (via merkle tree)&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.6rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.5rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.7rc1&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.1rc1 || 0.4.6&amp;lt;br&amp;gt;0.5.5&amp;lt;br&amp;gt;0.6.0.7&amp;lt;br&amp;gt;0.6.1rc2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Block hash collisions can easily be made by duplicating transactions in the merkle tree.&lt;br /&gt;
Such a collision is invalid, but if recorded (as Bitcoin-Qt and bitcoind prior to 0.6.1 did) would prevent acceptance of the legitimate block with the same hash.&lt;br /&gt;
This could be used to fork the blockchain, including deep double-spend attacks.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/?topic=81749 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=415973 Gentoo bug tracker]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2459 US-CERT/NIST]&lt;br /&gt;
* [https://bitcointalk.org/?topic=102395 Full Disclosure]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-3789 ==&lt;br /&gt;
{{main|CVE-2012-3789}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-06-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; (Lack of) orphan txn resource limits&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-3789]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=88734 0.6.3rc1 Announcement]&lt;br /&gt;
* [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3789 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4682 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; &lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.4.7rc3&amp;lt;br&amp;gt;0.5.6rc3&amp;lt;br&amp;gt;0.6.0.9rc1&amp;lt;br&amp;gt;0.6.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4682]]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4683 ==&lt;br /&gt;
{{main|CVE-2012-4683}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-23&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Targeted DoS by CPU exhaustion using alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4683]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148038.0 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=435216 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2012-4684 ==&lt;br /&gt;
{{main|CVE-2012-4684}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2012-08-24&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Network-wide DoS using malleable signatures in alerts&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7rc2&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.6rc2&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.8rc2&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.2.2 - 0.6.3rc1 || 0.7.0 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2012-4684]]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=148109.0 Announcement]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2272 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote discovery of node&#039;s wallet addresses&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bitcointalk.org/?topic=135856 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2273 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Predictable change output&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.8rc4&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.10rc4&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.4rc4&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.2 || 0.4.9rc1&amp;lt;br&amp;gt;0.5.8rc1&amp;lt;br&amp;gt;0.6.0.11rc1&amp;lt;br&amp;gt;0.6.5rc1&amp;lt;br&amp;gt;0.7.3rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2292 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-01-30&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; A transaction that takes at least 3 minutes to verify&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 0%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || All versions || No fix yet&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[CVE-2013-2292]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=140078 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-2293 ==&lt;br /&gt;
{{main|CVE-2013-2293}}&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-02-14&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Continuous hard disk seek&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.7.3rc1 || No fix yet (0.8.0 unaffected)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [[CVE-2013-2293]]&lt;br /&gt;
* [https://bitcointalk.org/?topic=144122 Announcement]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=462046 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3219 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Unenforced block protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.0 || 0.8.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-3220 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-11&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Inconsistent BDB lock limit interactions&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050|BIP 50]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0034 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-03-25&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Mandatory block protocol update&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.7&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.7&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.0.9&amp;lt;br&amp;gt;0.6.1rc1 - 0.6.3 || 0.4.8rc1&amp;lt;br&amp;gt;0.5.7rc1&amp;lt;br&amp;gt;0.6.0.10rc1&amp;lt;br&amp;gt;0.6.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0034]]&lt;br /&gt;
&lt;br /&gt;
== BIP-0050 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-05-15&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Hard fork to remove txid limit protocol rule&lt;br /&gt;
 &amp;lt;b&amp;gt;Deployment:&amp;lt;/b&amp;gt; 99.99%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc1&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc1&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc1&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc1 || 0.4.9rc2&amp;lt;br&amp;gt;0.5.8rc2&amp;lt;br&amp;gt;0.6.5rc2&amp;lt;br&amp;gt;0.7.3rc2&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [[BIP 0050]]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4627 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-06-??&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Memory exhaustion with excess tx message data&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-4165 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-07-20&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Timing leak in RPC authentication&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || * - 0.4.9rc3&amp;lt;br&amp;gt;0.5.0rc1 - 0.5.8rc3&amp;lt;br&amp;gt;0.6.0rc1 - 0.6.5rc3&amp;lt;br&amp;gt;0.7.0rc1 - 0.7.3rc3&amp;lt;br&amp;gt;0.8.0rc1 - 0.8.3 || 0.4.9rc4&amp;lt;br&amp;gt;0.5.8rc4&amp;lt;br&amp;gt;0.6.5rc4&amp;lt;br&amp;gt;0.7.3rc4&amp;lt;br&amp;gt;0.8.4rc1&lt;br /&gt;
|-&lt;br /&gt;
| wxBitcoin || ALL || NONE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/issues/2838 The initial bug report]&lt;br /&gt;
&lt;br /&gt;
== CVE-2013-5700 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2013-09-04&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Remote p2p crash via bloom filters&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 99.9%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.8.0rc1 - 0.8.3 || 0.8.4rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=287351 Bitcoin-Qt 0.8.4 release notes]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/commit/37c6389c5a0ca63ae3573440ecdfe95d28ad8f07 The fix]&lt;br /&gt;
* [https://github.com/bitcoin/bitcoin/pull/18515 An added test]&lt;br /&gt;
&lt;br /&gt;
== CVE-2016-8889 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2016-10-27&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug console history storing sensitive info&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 100%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI || 0.11.0 - 0.13.0 || 0.13.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.13.1.knots20161027/doc/release-notes.md Bitcoin Knots 0.16.1.knots20161027 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2016-8889 US-CERT/NIST]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-12842 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-06-09&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; No commitment to block merkle tree depth&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/ Explanation by Sergio Demian Lerner]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html Further elaboration by Suhas Daftuar]&lt;br /&gt;
&lt;br /&gt;
== CVE-2017-18350 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Buffer overflow from SOCKS proxy&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.7.0rc1 - 0.15.0 || 0.15.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 Disclosure of details]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-17144 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2018-09-17&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing check for duplicate inputs&lt;br /&gt;
 &amp;lt;b&amp;gt;Fix Deployment:&amp;lt;/b&amp;gt; 31%&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.14.0rc1 - 0.14.2&amp;lt;br&amp;gt;0.15.0rc1 - 0.15.1&amp;lt;br&amp;gt;0.16.0rc1 - 0.16.2 || 0.14.3&amp;lt;br&amp;gt;0.15.2&amp;lt;br&amp;gt;0.16.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/20/notice/ Full disclosure by Bitcoin Core]&lt;br /&gt;
* [https://bitcoincore.org/en/2018/09/18/release-0.16.3/ Bitcoin Core 0.16.3 release notes]&lt;br /&gt;
* [https://github.com/bitcoinknots/bitcoin/blob/v0.16.3.knots20180918/doc/release-notes.md Bitcoin Knots 0.16.3.knots20180918 release notes]&lt;br /&gt;
* [https://nvd.nist.gov/vuln/detail/CVE-2018-17144 US-CERT/NIST]&lt;br /&gt;
* [https://bugs.gentoo.org/show_bug.cgi?id=666669 Gentoo bug]&lt;br /&gt;
&lt;br /&gt;
== CVE-2018-20586 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2019-06-22&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Debug log injection via unauthenticated RPC&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin-Qt&amp;lt;br&amp;gt;bitcoind || 0.12.0rc1 - 0.17.0 || 0.17.1rc1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-14199 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-06-03&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Double-signing can enable unintended fees&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Trezor One ||  || 1.9.1&lt;br /&gt;
|-&lt;br /&gt;
| Trezor Model T ||  || 2.3.1&lt;br /&gt;
|-&lt;br /&gt;
| ???&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd Disclosure of details by Trezor team]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26895 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Missing low-S normalization for HTLC signatures.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.10.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html CVE-2020-26895: LND Low-S Tx-Relay Standardness]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html Full Disclosure: Full Disclosure: CVE-2020-26895 LND &amp;quot;Hodl my Shitsig&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2020-26896 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2020-10-08&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Invoice preimage extraction via forwarded HTLC.&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| lnd ||  || 0.11.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html CVE-2020-26896: LND Invoice Preimage Extraction]&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html Full Disclosure: CVE-2020-26896 LND &amp;quot;The (un)covert channel&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-3401 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-02-01&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Qt5 remote execution&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core GUI ||  || 0.19.0&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots GUI ||  || 0.18.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== CVE-2021-31876 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2021-05-06&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
&lt;br /&gt;
* [https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core&#039;s bip125 logic]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
* [https://achow101.com/2021/02/0.18-uri-vuln URI Argument Injection Vulnerability in Bitcoin Core 0.18 and Earlier]&lt;br /&gt;
&lt;br /&gt;
==Definitions==&lt;br /&gt;
&lt;br /&gt;
A critical vulnerability is one that will have disastrous consequences if it is exploited.  A serious vulnerability is one that will have serious consequences if it is exploited&amp;lt;ref&amp;gt;[http://bitcointalk.org/index.php?topic=88892.0 http://bitcointalk.org/index.php?topic=88892.0]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Changelog]]&lt;br /&gt;
* https://blog.bitmex.com/bitcoins-consensus-forks/&lt;br /&gt;
&lt;br /&gt;
== CVE-2023-50428 ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; 2023&lt;br /&gt;
 &amp;lt;b&amp;gt;Summary:&amp;lt;/b&amp;gt; Bypass of datacarriersize limit using OP_FALSE,OP_IF&lt;br /&gt;
&lt;br /&gt;
{| class=&#039;wikitable&#039;&lt;br /&gt;
!colspan=&#039;2&#039;| Affected !! Fix&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Core || 0.9 and later || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| Bitcoin Knots || 0.9 - 23.0 || 25.1.knots20231115&lt;br /&gt;
|-&lt;br /&gt;
| btcd || ? || NOT FIXED&lt;br /&gt;
|-&lt;br /&gt;
| libbitcoin || ? || NOT FIXED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
{{Bitcoin Core documentation}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69930</id>
		<title>Comparison of mining pools</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Comparison_of_mining_pools&amp;diff=69930"/>
		<updated>2023-12-02T04:22:46Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Add OCEAN and TIDES&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reward types &amp;amp; explanation:&lt;br /&gt;
* &#039;&#039;&#039;CPPSRB&#039;&#039;&#039; - Capped Pay Per Share with Recent Backpay. [http://eligius.st/wiki/index.php/Capped_PPS_with_Recent_Backpay]&lt;br /&gt;
* &#039;&#039;&#039;DGM&#039;&#039;&#039; - Double Geometric Method.  A hybrid between PPLNS and Geometric reward types that enables to operator to absorb some of the variance risk.  Operator receives portion of payout on short rounds and returns it on longer rounds to normalize payments. [https://bitcointalk.org/index.php?topic=39497.0]&lt;br /&gt;
* &#039;&#039;&#039;ESMPPS&#039;&#039;&#039; - Equalized Shared Maximum Pay Per Share. Like SMPPS, but equalizes payments fairly among all those who are owed. [http://bitcointalk.org/index.php?topic=12181.msg378851#msg378851]&lt;br /&gt;
* &#039;&#039;&#039;POT&#039;&#039;&#039; - Pay On Target. A high variance PPS variant that pays on the difficulty of work returned to pool rather than the difficulty of work served by pool [https://bitcointalk.org/index.php?topic=131376.0]&lt;br /&gt;
* &#039;&#039;&#039;PPLNS&#039;&#039;&#039; - Pay Per Last N Shares. Similar to proportional, but instead of looking at the number of shares in the round, instead looks at the last N shares, regardless of round boundaries.&lt;br /&gt;
* &#039;&#039;&#039;PPLNSG&#039;&#039;&#039; - Pay Per Last N Groups (or shifts). Similar to PPLNS, but shares are grouped into &amp;quot;shifts&amp;quot; which are paid as a whole.&lt;br /&gt;
* &#039;&#039;&#039;PPS&#039;&#039;&#039; - Pay Per Share. Each submitted share is worth certain amount of BTC. Since finding a block requires &amp;lt;current difficulty&amp;gt; shares &#039;&#039;on average&#039;&#039;, a PPS method with 0% fee would be 6.25 BTC divided by &amp;lt;current difficulty&amp;gt;. It is risky for pool operators, hence the fee is highest.&lt;br /&gt;
* &#039;&#039;&#039;Prop.&#039;&#039;&#039; - Proportional. When block is found, the reward is distributed among all workers proportionally to how much shares each of them has found.&lt;br /&gt;
* &#039;&#039;&#039;RSMPPS&#039;&#039;&#039; - Recent Shared Maximum Pay Per Share. Like SMPPS, but system aims to prioritize the most recent miners first. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;Score&#039;&#039;&#039; - Score based system: a proportional reward, but weighed by time submitted. Each submitted share is worth more in the function of time &#039;&#039;t&#039;&#039; since start of current round. For each share score is updated by: score += exp(t/C). This makes later shares worth much more than earlier shares, thus the miner&#039;s score quickly diminishes when they stop mining on the pool. Rewards are calculated proportionally to scores (and not to shares). (at slush&#039;s pool C=300 seconds, and every hour scores are normalized)&lt;br /&gt;
* &#039;&#039;&#039;SMPPS&#039;&#039;&#039; - Shared Maximum Pay Per Share. Like Pay Per Share, but never pays more than the pool earns. [http://eligius.st/wiki/index.php/Shared_Maximum_PPS]&lt;br /&gt;
* &#039;&#039;&#039;FPPS&#039;&#039;&#039; - Full Pay Per Share. Similar to PPS，but not only divide regular block reward (6.25 BTC for now) but also some of the transaction fees.  Calculate a standard transaction fee within a certain period and distribute it to miners according to their hash power contributions in the pool. It will increase the miners&#039; earnings by sharing some of the transaction fees.&lt;br /&gt;
* &#039;&#039;&#039;TIDES&#039;&#039;&#039; - Transparent Index of Distinct Extended Shares. As blocks are being mined, they generate the reward by a weighted percentage of effort to the most recently found proofs. The proof period funds are distributed across has been chosen such that each proof should be paid on average 8 times. Instead of a set amount of bitcoins per proof, the block reward is divided by percent, so transaction fees are included.&lt;br /&gt;
&lt;br /&gt;
A statistically valid analysis of some pools and their payout methods: [http://organofcorti.blogspot.com/ Bitcoin network and pool analysis]&lt;br /&gt;
&lt;br /&gt;
== Operational Pools ==&lt;br /&gt;
&lt;br /&gt;
The following mining pools are still running and paying out their users:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[AntPool]]         || China                || Large || No       || PPLNS &amp;amp; PPS             || {{PoolFees}}    || 2.5%  || 0%      || {{Yes}} || {{No}}&lt;br /&gt;
| ?          || ?                            || [https://bitcointalk.org/index.php?topic=855548 link]  || [https://www.antpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BCMonster.com]]        ||{{flag|us|}}{{flag|eu}}{{flag|cn|}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-01-13 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1327077.0  link]                                || [http://www.bcmonster.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTC.com]]         || {{flag|cn}}{{flag|us|}}{{flag|eu}}               || Medium || [[NMC]]      || FPPS           || {{SharedFees}}    || 0%  || 4%      || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-09-13          ||      User                     || [https://bitcointalk.org/index.php?topic=1827718.0 link]  || [https://pool.btc.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCC Pool]]            || China, Japan       || Large     || [[NMC]]       || PPS                       || {{PoolFees}}    || 2.0%     || 0%       || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2014-10-21           ||  Dynamic                            || ?                                      || [https://pool.btcc.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BW Mining]]      || China                || Medium || ?       || PPLNS &amp;amp; PPS             || ?               || ?     || ?       || {{Yes}} ||&lt;br /&gt;
| ?          || ?                            || ?                                           || [https://www.bw.com/pool link]&lt;br /&gt;
|-&lt;br /&gt;
| [[F2Pool]]          || {{flag|us|}}{{flag|eu|}}{{flag|cn|}}                || Large || NMC, SYS, EMC || PPS+                     || {{SharedFees}}    || 2.5%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-05-05 || Dynamic               || [https://bitcointalk.org/index.php?topic=700411.0 link] || [https://www.f2pool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Golden Nonce Pool]]         || {{flag|us}}{{flag|eu}}|| Small || No      || DGM                || {{PoolFees}}     ||      ||      0% || {{Yes}} || &lt;br /&gt;
| 2018-03-27 || Dynamic || [https://bitcointalk.org/index.php?topic=3208073;all  link]   || [https://goldennoncepool.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[KanoPool]]         || {{flag|us}}{{flag|sg}}{{flag|de}}{{flag|jp}}{{flag|nl}} || Medium || No      || PPLNSG                || {{SharedFees}}     ||      ||      0.9% || {{Yes}} || {{No}}&lt;br /&gt;
| 2014-09-20 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 18SPM || [https://bitcointalk.org/index.php?topic=789369.0 link]   || [http://www.kano.is link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Merge Mining Pool]]      || {{flag|us|label=1}}|| Small || [[NMC]], IXC, [[Devcoin]]&lt;br /&gt;
|                                                                    DGM                     || {{SharedFees}}     ||      || 1.5%    || {{Yes}}    || {{No}}&lt;br /&gt;
| 2012-01-08 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=57148  link] || [http://mmpool.org link]&lt;br /&gt;
|-&lt;br /&gt;
| [[P2Pool]]          || Global (p2p)          ||   Small || Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis &amp;lt;ref name=&amp;quot;solomm&amp;quot;/&amp;gt; || PPLNS  || {{SharedFees}}   ||      ||      0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-17 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=18313  link] ||&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [[Poolin]]          || Global                ||   Large ||[[NMC]] VCASH || FPPS  || {{SharedFees}}   ||    2.5% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2017-10-01 || Dynamic || [https://bitcointalk.org/index.php?topic=5169994.0  link] ||  [https://poolin.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[SBICrypto Pool]]          || Global                ||   Medium || No       || FPPS  || {{SharedFees}}   ||    0% ||      0% || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2020-11-03 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic ||                                             ||  [https://sbicrypto.com/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Slush Pool]]&lt;br /&gt;
|                        Global               || Medium || [[NMC]] || Score                   || {{SharedFees}}   ||      ||      2% || {{Yes}} || {{No}}&lt;br /&gt;
| 2010-11-27 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; || [http://bitcointalk.org/?topic=1976   link] || [https://slushpool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luxor]]       || {{flag|us|label=1}}||    Medium || No || FPPS &amp;amp; PPS                     || {{SharedFees}} || 2% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2018-01-01 || VarDiff                       ||                                             || [https://mining.luxor.tech// link]&lt;br /&gt;
|-&lt;br /&gt;
| [[OCEAN]]         || {{flag|us|label=1}}|| Small || No  || TIDES                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-04-27 || Dynamic  || || [http://ocean.xyz link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Defunct Pools ==&lt;br /&gt;
&lt;br /&gt;
The following pools were once operational but have since shut down. They are listed for historical purposes only.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name                !! Location             !! Size&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                         Merged Mining&amp;lt;ref name=&amp;quot;merged&amp;quot;/&amp;gt;&lt;br /&gt;
!                                                                    Reward Type             !! Transaction fees!!PPS Fee!!Other Fee!! [[File:Stm.png|link=Stratum_mining_protocol]] !! [[getblocktemplate|GBT]]&lt;br /&gt;
! Launched   !! Variance                     !! Forum                                       !! Website&lt;br /&gt;
|-&lt;br /&gt;
| [[BitcoinAffiliateNetwork]]     || {{flag|us|}}{{flag|eu}}{{flag|cn|}}{{flag|nl|}}{{flag|au|}}      ||   ?   || [[NMC]] || ?         || {{PoolFees}}     ||   ? ||    ?    ||    {{Yes}}     ||&lt;br /&gt;
| 2014-07-15 || User/Dynamic           || [https://bitcointalk.org/index.php?topic=722202.0  link] || [http://mining.bitcoinaffiliatenetwork.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BitMinter]]       || {{flag|us}}{{flag|ca|label=1}}{{flag|eu}}          || Small || [[NMC]] || PPLNSG                  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2011-06-26 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic || [https://bitcointalk.org/?topic=788753  link] || [https://bitminter.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[BTCDig]]         || {{flag|us|label=1}}||    Small || No      || DGM                   || {{PoolFees}}     ||      ||      0% ||  {{Yes}}     ||&lt;br /&gt;
| 2013-07-04 || User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt;/Dynamic 20SPM                      || [https://bitcointalk.org/index.php?topic=249627   link] || [http://btcdig.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcmp.com]]       || {{flag|de|label=1}}||    Small || No      || PPS                     || {{PoolFees}}     ||   4% ||  || {{Yes}} ||&lt;br /&gt;
| 2011-06-28 || Diff 1                       ||                                             || [http://www.btcmp.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[btcZPool.com]]       || {{flag|us|label=1}}||    Large || BitCoinZ      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-06-25 || VarDiff                       ||                                             || [http://www.btcZPool.com/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Eligius]]         || {{flag|us|label=1}}|| Small || [[NMC]]  || CPPSRB                  || {{SharedFees}}   ||    ||     0%    || {{Yes}} || {{Yes}}&lt;br /&gt;
| 2011-04-27 || Dynamic: 32 shares/m         || [https://bitcointalk.org/?topic=441465  link] || [http://eligius.st link]&lt;br /&gt;
|-&lt;br /&gt;
| [[EMCD Pool]]          || CIS, EU, KZ, IR, China || Medium || - || FPPS+                     || {{SharedFees}}    || 1%    ||    0%     || {{Yes}} || {{No}}&lt;br /&gt;
| 2018-01-26 || Dynamic               ||  || [https://pool.emcd.io link]&lt;br /&gt;
|-&lt;br /&gt;
| [[GHash.IO]]        || {{flag|nl|label=1}}|| Small || [[NMC]], IXC, [[Devcoin]]      || PPLNS                  || {{SharedFees}}   ||       ||      0% || {{Yes}} || {{No}}&lt;br /&gt;
| 2013-07-01 ||           User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||   [https://support.cex.io  link]                                || [https://ghash.io/  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Give Me COINS]]   || {{flag|us}}{{flag|eu}}          || Small || [[NMC]]   || PPLNS                  || {{SharedFees}}     ||    ||  0%|| {{Yes}} || {{Yes}}&lt;br /&gt;
| 2013-08-12 || Dynamic         || [https://bitcointalk.org/index.php?topic=272017.0  link] || [http://give-me-coins.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Jonny Bravo&#039;s Mining Emporium]]        ||{{flag|us|}}{{flag|eu}} || Small || No      || PPLNS                  || {{SharedFees}}   ||       ||      0.5% || {{Yes}} || {{No}}&lt;br /&gt;
| 2015-11-19 ||   Dynamic ||   [https://bitcointalk.org/index.php?topic=1330452.0  link]                                || [http://www.bravo-mining.com  link]&lt;br /&gt;
|-&lt;br /&gt;
| [[kmdPool.org]]       || {{flag|us|label=1}}||    Large || Komodo      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-11-25 || VarDiff                       ||                                             || [http://www.kmdPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[MergeMining]]          || Global          ||   Small || CRW, DVC, HUC, I0C, IXC, XMY/MYR, NMC, SYS, UNO, TRC, ARG, EMC || PPLNS  || {{SharedFees}}   ||      ||      1% || {{Yes}} || {{No}}&lt;br /&gt;
| 2016-12-01|| User&amp;lt;ref name=&amp;quot;changeable&amp;quot;/&amp;gt; ||  || [https://mergemining.com link]&lt;br /&gt;
|-&lt;br /&gt;
| [[Multipool]]          || {{flag|us}}{{flag|eu}}      ||   Small || [[NMC]] || Score                     || {{SharedFees}}     ||      ||      1.5% ||     {{Yes}}     || {{No}}&lt;br /&gt;
| 2012-03-15 || User                       || [https://bitcointalk.org/index.php?topic=311067.0  link] || [https://www.multipool.us/ link]&lt;br /&gt;
|-&lt;br /&gt;
| [[ZenPool.org]]       || {{flag|us|label=1}}||    Large || ZenCash      || PPLNS                     || {{SharedFees}} || 1% ||      0% ||  {{Yes}} ||&lt;br /&gt;
| 2017-10-25 || VarDiff                       ||                                             || [http://www.ZenPool.org/ link]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SPV Mining / Old Bitcoin Core ==&lt;br /&gt;
&lt;br /&gt;
The following pools are known or strongly suspected to be mining on top of blocks before fully validating them with Bitcoin Core 0.9.5 or later.  Miners doing this have already lost over $50,000 USD during the 4 July 2015 fork and have created a situation where small numbers of confirmations are much less useful than they normally are.&lt;br /&gt;
&lt;br /&gt;
* BTC Nuggets&lt;br /&gt;
* [https://www.f2pool.com/ F2Pool]&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot;&amp;gt;[https://bitcointalk.org/index.php?topic=700411.msg11790734#msg11790734 Intention to continue SPV mining], Wang Chun, 4 July 2015&amp;lt;/ref&amp;gt;&lt;br /&gt;
* AntPool&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following pools are believed to be currently fully validating blocks with Bitcoin Core 0.9.5 or later (0.10.2 or later recommended due to DoS vulnerabilities):&lt;br /&gt;
&lt;br /&gt;
* [[BitMinter]]&lt;br /&gt;
* BTC China (described as SPV mining&amp;lt;ref name=&amp;quot;spv_despite_incident&amp;quot; /&amp;gt;, but they&#039;re performing effective valiation)&lt;br /&gt;
* [[BTC Public Mining Pool]]&lt;br /&gt;
* [[CKPool]]&lt;br /&gt;
* [[Eligius]]&lt;br /&gt;
* [[Golden Nonce Pool]]&lt;br /&gt;
* [[P2Pool]]&lt;br /&gt;
* [[Bitcoin Pooled Mining|Slush Pool]]&lt;br /&gt;
* [[BCMonster.com]]&lt;br /&gt;
* [[Jonny Bravo&#039;s Mining Emporium]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;hashrate2&amp;quot;&amp;gt;Note that pool hashrate is largely irrelevant but can be seen as a popularity measurement. It is a theoretical security issue if one pool gains above 50% of the total computational power of the network, thus consider joining a pool based on other metrics. The pool&#039;s total hash rate is very dynamic on most pools. Over time, as the network grows, so does most pool&#039;s hash rates. The displayed values are the pool&#039;s relative sizes based on the network: Small: less than 2%, Medium: 2%-10% Large: greater than 10% of the network.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;merged&amp;quot;&amp;gt;Merged mining allows miners to mine on multiple [[block chains]] at the same time with the same hashing.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;changeable&amp;quot;&amp;gt;The difficulty of the shares can be changed by the user.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;solomm&amp;quot;&amp;gt;Merged mining can be done on a &amp;quot;solo mining&amp;quot; basis (payouts in the merged chain are not pooled).&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Pooled mining]]&lt;br /&gt;
* [https://www.blocktrail.com/BTC/pools Pool Distribution Summary]&lt;br /&gt;
* [https://www.bitcoinmining.com/ Bitcoin Mining]&lt;br /&gt;
* [https://www.youtube.com/watch?v=GmOzih6I1zs Video: What is Bitcoin Mining]&lt;br /&gt;
* [https://www.bitcoinmining.com/bitcoin-mining-pools/ Bitcoin Mining Pools]&lt;br /&gt;
* [https://bitcoinchain.com/pools Bitcoin Mining Pools Comparison]&lt;br /&gt;
[[Category:Mining]]&lt;br /&gt;
{{Pools}}&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69904</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69904"/>
		<updated>2023-10-12T20:21:32Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69885</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69885"/>
		<updated>2023-08-28T02:57:24Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69884</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69884"/>
		<updated>2023-08-28T02:56:56Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Undo revision 69883 by Apichmedmam (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average. &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tool/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69867</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69867"/>
		<updated>2023-08-23T14:40:07Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69860</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69860"/>
		<updated>2023-08-22T20:00:30Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69850</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69850"/>
		<updated>2023-08-19T14:25:06Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Do not add sites that do not meet the new criteria.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: As editors, we strive to present you with the most reliable accelerators in the industry. However, we strongly encourage you to conduct your own research by reviewing authentic feedback and verifying the legitimacy of the businesses. It&#039;s important to be aware that there are numerous purported transaction accelerators that are, unfortunately, fraudulent schemes. Some of these claim to collaborate with mining pools on your behalf. Yet, due to the challenges in verifying such claims and the past contentious discussions around providing an exhaustive list, we have refined our approach.&lt;br /&gt;
&lt;br /&gt;
Hence, we are now exclusively listing accelerators that are definitively and verifiably operated by established pools or miners, possessing a minimum of 0.1% of the total network hash rate. This stringent criterion has been adopted to ensure the accuracy and reliability of the information we present.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69840</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69840"/>
		<updated>2023-08-17T12:50:35Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: There are many supposed transaction accelerators that are outright scams. Some claim to work with pools on your behalf, but this wiki&#039;s editors cannot verify claims, and the prior attempt to provide a more comprehensive list was too heated. Therefore, only accelerators verifiably officially run by a pool or miner with at least 0.1% of network hashrate may be added to the list below.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69837</id>
		<title>Transaction accelerator</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Transaction_accelerator&amp;diff=69837"/>
		<updated>2023-08-17T02:03:10Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: /* Bitcoin transaction accelerators */ Limit list to official mining pool accelerators&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=What to Do if Your Bitcoin Transaction Gets &amp;quot;Stuck&amp;quot;=&lt;br /&gt;
&lt;br /&gt;
The number of transactions on the Bitcoin network has steadily increased over the years. This means more blocks are filling up. And as not all transactions can be included in the blockchain straight away, backlogs form in miners’ “mempools” (a sort of “transaction queue.”)&lt;br /&gt;
&lt;br /&gt;
Miners typically pick the transactions that pay the most fees and include these in their blocks first. Transactions that include lower fees are “outbid” on the so called “fee market,” and remain in miners’ mempools until a new block is found. If the transaction is outbid again, it has to wait until the next block.&lt;br /&gt;
&lt;br /&gt;
This can lead to a suboptimal user experience. Transactions with too low a fee can take hours or even days to confirm, and sometimes never confirm at all.&lt;br /&gt;
&lt;br /&gt;
==Fee Bumping==&lt;br /&gt;
&lt;br /&gt;
The recommended approach to &amp;quot;accelerating&amp;quot; a transaction is to perform a [[fee bumping]] methods, either [[replace by fee|replace-by-fee]] (RBF), or [[Transaction fees#Feerates_for_dependent_transactions_.28child-pays-for-parent.29|child-pays-for-parent]] (CPFP), which are available to:&lt;br /&gt;
&lt;br /&gt;
* Sender of the Bitcoin transaction: Replace-by-fee (RBF), and Child-pays-for-parent (CPFP) &lt;br /&gt;
* Recipient of the Bitcoin transaction: Child-pays-for-parent (CPFP)&lt;br /&gt;
&lt;br /&gt;
==Bitcoin transaction accelerators==&lt;br /&gt;
&lt;br /&gt;
Caution: There are many supposed transaction accelerators that are outright scams. Some claim to work with pools on your behalf, but this wiki&#039;s editors cannot verify claims, and the prior attempt to provide a more comprehensive list was too heated. Therefore, only accelerators verifiably officially run by a pool or miner with at least 0.1% of network hashrate may be added to the list below.&lt;br /&gt;
&lt;br /&gt;
===Mining Pool Accelerators===&lt;br /&gt;
&lt;br /&gt;
A mining pool may offer a premium service in which they will prioritize a transaction, usually for a fee.  The ability for that pool to get a transaction confirmed is limited to their ability to get a block confirmed -- and most pools have a tiny [https://www.blockchain.com/pools fraction of the hashrate].  For example, if a pool has 10% of the hashrate, they mine about a block every 100 minutes (1 hour and 40 minutes), on average.  If a pool has 5% of the hashrate, then they mine one block about every 200 minutes (3 hours and 20 minutes), on average.        &lt;br /&gt;
&lt;br /&gt;
* [https://binance.com Binance Pool] - is a prominent cryptocurrency mining pool operated by Binance, one of the world&#039;s leading blockchain and cryptocurrency exchange platforms. In addition to its mining services, Binance Pool offers exclusive transaction acceleration services for VIP users, ensuring swift confirmation of their cryptocurrency transactions.&lt;br /&gt;
&lt;br /&gt;
* [https://pool.viabtc.com/tools/txaccelerator/ ViaBTC] - Working as of December 30, 2020. ViaBTC implemented this service to protest against the prior 1MB limitation of the Bitcoin network. ViaBTC gives priority to user-submitted transactions for the next mined blocks by the ViaBTC pool. The only requirement is the transaction must include a minimum fee of 10 sat/B. The free-to-use nature of the service may have made it widely popular as every hour, the number of transaction requested reaches its limit (of 100) and it is common to be presented with the message “Submissions are beyond limit. Please try later.” on the top middle of the page. This means one must wait for the next hour to try a new submission. After submitting a transaction, there is a wait for the next block to be mined by ViaBTC Pool.&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=User:Chmod755&amp;diff=69829</id>
		<title>User:Chmod755</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=User:Chmod755&amp;diff=69829"/>
		<updated>2023-08-16T03:57:19Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: No scamcoins&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Profiles==&lt;br /&gt;
* [http://bitcoin-otc.com/viewratingdetail.php?nick=chmod755 Bitcoin OTC]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=User_talk:BitTools&amp;diff=69806</id>
		<title>User talk:BitTools</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=User_talk:BitTools&amp;diff=69806"/>
		<updated>2023-07-31T12:52:51Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Created page with &amp;quot;==bitcoin accelerator sites==  What is your relationship with the sites you&amp;#039;ve been adding to the wiki? How do they work? (It seems there are accusations of scam and worse...)...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==bitcoin accelerator sites==&lt;br /&gt;
&lt;br /&gt;
What is your relationship with the sites you&#039;ve been adding to the wiki? How do they work? (It seems there are accusations of scam and worse...) Do not add them back until this discussion has been resolved. Thanks. --[[User:Luke-jr|Luke-jr]] ([[User talk:Luke-jr|talk]]) 12:52, 31 July 2023 (UTC)&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=69760</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=69760"/>
		<updated>2023-07-03T13:23:55Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Update data and remove misinformation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The purpose of this page is to provide a general overview of the Bitcoin system and economy.&lt;br /&gt;
&lt;br /&gt;
==Basic Concepts==&lt;br /&gt;
&lt;br /&gt;
===Currency===&lt;br /&gt;
&lt;br /&gt;
Alice wants to buy the [[Alpaca|Alpaca socks]] which Bob has for sale. In return, she must provide something of equal value to Bob. The most efficient way to do this is by using a medium of exchange that Bob accepts which would be classified as currency. Currency makes trade easier by eliminating the need for [https://en.wikipedia.org/wiki/Coincidence_of_wants coincidence of wants] required in other systems of trade such as barter. Currency adoption and acceptance can be global, national, or in some cases local or community-based.&lt;br /&gt;
&lt;br /&gt;
===Banks===&lt;br /&gt;
&lt;br /&gt;
Alice need not provide currency to Bob in-person. She may instead transfer this value by first entrusting her currency to a bank who promises to store and protect Alice&#039;s currency notes. The bank gives Alice a written promise (called a &amp;quot;bank statement&amp;quot;) that entitles her to withdraw the same number of currency bills that she deposited. Since the money is still Alice&#039;s, she is entitled to do with it whatever she pleases, and the bank (like most banks), for a small fee, will do Alice the service of passing on the currency bills to Bob on her behalf. This is done by Alice&#039;s bank by giving the dollar bills to Bob&#039;s bank and informing them that the money is for Bob, who will then see the amount the next time he checks his balance or receives his bank statement.&lt;br /&gt;
&lt;br /&gt;
Since banks have many customers, and bank employees require money for doing the job of talking to people and signing documents, banks in recent times have been using machines such as ATMs and web servers that do the job of interacting with customers instead of paid bank employees. The task of these machines is to learn what each customer wants to do with their money and, to the extent that it is possible, act on what the customer wants (for example, ATMs can hand out cash). Customers can always know how much money they have in their accounts, and they are confident that the numbers they see in their bank statements and on their computer screens accurately reflect the number of dollars that they can get from the bank on demand. They can be so sure of this that they can accept those numbers in the same way they accept paper banknotes (this is similar to the way people started accepting paper dollars when they had been accepting gold or silver).&lt;br /&gt;
&lt;br /&gt;
Such a system has several disadvantages:&lt;br /&gt;
* It is costly. [https://en.wikipedia.org/wiki/Electronic_funds_transfer EFTs] in Europe can cost 25 euros. Credit transactions can cost several percent of the transaction.&lt;br /&gt;
* It is slow. Checking and low cost wire services take days to complete.&lt;br /&gt;
* In most cases, it cannot be anonymous.&lt;br /&gt;
* Accounts can be frozen, or their balance partially or wholly confiscated.&lt;br /&gt;
* Banks and other payment processors like PayPal, Visa, and Mastercard may refuse to process payments for certain legal entities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bitcoin is a system of owning and voluntarily transferring amounts of so-called &#039;&#039;bitcoins&#039;&#039;, in a manner similar to an on-line banking, but pseudonymously and without reliance on a central authority to maintain account balances. If bitcoins are valuable, it is because they are useful and limited in supply.&lt;br /&gt;
&lt;br /&gt;
==Bitcoin Basics==&lt;br /&gt;
&lt;br /&gt;
===Creation of coins===&lt;br /&gt;
&lt;br /&gt;
The creation of coins must be limited for the currency to have any value. &lt;br /&gt;
&lt;br /&gt;
New coins are slowly [[Mining|mined]] into existence by following a mutually agreed-upon set of rules. A user [[Mining|mining]] bitcoins is running a software program that searches for a solution to a very difficult math problem the difficulty of which is precisely known. This difficulty is automatically adjusted on a predictable schedule so that the number of solutions found globally for a given unit of time is constant: the global system aims for 6 per hour. When a solution is found, the user may tell everyone of the existence of this newly found solution along with other information packaged together in what is called a &amp;quot;[[Block|block]]&amp;quot;. The solution itself is a [[Proof of work| proof-of-work]] or PoW. It is hard to find, but easy to verify.&lt;br /&gt;
&lt;br /&gt;
Blocks create 6.25 new bitcoins at present [July 2023]. This amount, known as the block reward, is an incentive for people to perform the computation work required for generating blocks. Roughly every 4 years, the number of bitcoins that can be &amp;quot;mined&amp;quot; in a block reduces by 50%. Originally the block reward was 50 bitcoins; it halved in November 2012; it then halved again in July 2016.  Any block that is created by a malicious user that does not follow this rule (or any other rules) will be rejected by everyone else. In the end, no more than 21 million bitcoins will ever exist. &lt;br /&gt;
&lt;br /&gt;
Because the block reward will decrease over the long term, miners will some day instead pay for their hardware and electricity costs by collecting [[Transaction_fee|transaction fees]]. The sender of money may voluntarily pay a small transaction fee which will be kept by whoever finds the next block. Paying this fee will encourage miners to include the transaction in a block more quickly.&lt;br /&gt;
&lt;br /&gt;
===Sending payments===&lt;br /&gt;
&lt;br /&gt;
To guarantee that a third-party, let&#039;s call her Eve, cannot spend other people&#039;s bitcoins by creating transactions in their names, Bitcoin uses [[Wikipedia:Public-key_cryptography|public key cryptography]] to make and verify digital signatures. In this system, each person, such as Alice or Bob, has a [[Wallet|wallet]] with one or more private keys. Only the user with the private key can sign a transaction to give some of their bitcoins to somebody else, but anyone can validate the signature using that user’s public key.&lt;br /&gt;
&lt;br /&gt;
Suppose Alice wants to send a bitcoin to Bob.&lt;br /&gt;
* Bob sends his address to Alice.&lt;br /&gt;
* Alice adds Bob’s address and the amount of bitcoins to transfer to a message: a &#039;transaction&#039; message.&lt;br /&gt;
* Alice signs the transaction with her private key.&lt;br /&gt;
* Alice broadcasts the transaction on the Bitcoin network for all to see.&lt;br /&gt;
&lt;br /&gt;
(Only the first two steps require human action. The rest is done by the Bitcoin client software.)&lt;br /&gt;
&lt;br /&gt;
Looking at this transaction from the outside, anyone who knows that this address belongs to Bob can see that someone has agreed to transfer the amount to Bob, because nobody else has the correct private key. Alice would be foolish to give her private key to other people, as this would allow them to sign transactions, removing funds from her control.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob wishes to transfer the same bitcoins to Charley, he will do the same thing:&lt;br /&gt;
* Charlie sends Bob his address.&lt;br /&gt;
* Bob adds Charlie&#039;s address and the amount of bitcoins to transfer to a message: a &#039;transaction&#039; message.&lt;br /&gt;
* Bob signs the transaction with his private key.&lt;br /&gt;
* Bob broadcasts the transaction on the Bitcoin network for all to see.&lt;br /&gt;
&lt;br /&gt;
Only Bob can do this because only he has the private key that can create a valid signature for the transaction.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change whose coins these are by replacing Bob’s address with her address, because Alice signed the transfer to Bob using her own private key, which is kept secret from Eve, and instructing that the coins which were hers now belong to Bob. So, if Charlie accepts that the original coin was in the hands of Alice, he will also accept the fact that this coin was later passed to Bob, and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
===Preventing [[double-spending]]===&lt;br /&gt;
&lt;br /&gt;
The process described above does not prevent Alice from using the same bitcoins in more than one transaction. The following process does; this is the primary innovation behind Bitcoin.&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent and forwarded]] to all or as many other computers as possible.&lt;br /&gt;
* A constantly growing chain of [[Blocks|blocks]] that contains a record of all transactions is collectively maintained by all computers (each has a full copy).&lt;br /&gt;
* To be accepted in the chain, transaction blocks must be valid and must include [[proof of work]] (one block generated by the network every 10 minutes).&lt;br /&gt;
* Blocks are chained in a way so that, if any one is modified, all following blocks will have to be recomputed.&lt;br /&gt;
* When multiple valid continuations to this chain appear, only the longest such branch is accepted and it is then extended further.&lt;br /&gt;
&lt;br /&gt;
When Bob sees that his transaction has been included in a block, which has been made part of the single longest and fastest-growing block chain (extended with significant computational effort), he can be confident that the transaction by Alice has been accepted by the computers in the network and is permanently recorded, preventing Alice from creating a second transaction with the same coin. In order for Alice to thwart this system and double-spend her coins, she would need to muster more computing power than all other Bitcoin users combined.&lt;br /&gt;
&lt;br /&gt;
===Anonymity===&lt;br /&gt;
&lt;br /&gt;
When it comes to the Bitcoin network itself, there are no &amp;quot;accounts&amp;quot; to set up, and no e-mail addresses, user-names or passwords are required to hold or spend bitcoins. Each balance is simply associated with an address and its public-private key pair. The money &amp;quot;belongs&amp;quot; to anyone who has the private key and can sign transactions with it. Moreover, those keys do not have to be registered anywhere in advance, as they are only used when required for a transaction. Transacting parties do not need to know each other&#039;s identity in the same way that a store owner does not know a cash-paying customer&#039;s name.&lt;br /&gt;
&lt;br /&gt;
===Capitalization / Nomenclature===&lt;br /&gt;
&lt;br /&gt;
Since Bitcoin is both a currency and a protocol, capitalization can be confusing. Accepted practice is to use &#039;&#039;Bitcoin&#039;&#039; (singular with an upper case letter B) to label the protocol, software, and community, and &#039;&#039;bitcoins&#039;&#039; (with a lower case b) to label units of the currency.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://bitcoinhelp.net Bitcoin Help] &amp;amp;mdash; the simple guide to Bitcoin.&lt;br /&gt;
* Learn the entire history of Bitcoin in the interactive timeline at [http://historyofbitcoin.org History of Bitcoin].&lt;br /&gt;
* [https://www.weusecoins.com What Is Bitcoin?]&lt;br /&gt;
* [https://www.bitcoinmining.com What Is Bitcoin Mining?]&lt;br /&gt;
&lt;br /&gt;
[[zh-cn:简介]]&lt;br /&gt;
&lt;br /&gt;
[[de:Einführung]]&lt;br /&gt;
[[fr:Introduction]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Wasabi_Wallet&amp;diff=69759</id>
		<title>Wasabi Wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Wasabi_Wallet&amp;diff=69759"/>
		<updated>2023-07-03T13:16:32Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by TheHiddenWiki (talk) to last revision by NotATether&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Wasabi Wallet&#039;&#039;&#039; is an open-source, non-custodial, &#039;&#039;&#039;privacy-focused&#039;&#039;&#039; Bitcoin wallet for Desktop that implements trustless &#039;&#039;&#039;[[CoinJoin]]&#039;&#039;&#039;. The code is on GitHub at [https://github.com/https://github.com/zkSNACKs/WalletWasabi zkSNACKs/WalletWasabi] where anyone can see, verify, and contribute to the project. Wasabi Wallet is trustless by design, meaning neither the public nor the developers can breach your privacy. This is accomplished via [https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki client-side block filtering](BIP158), communication over the [https://www.torproject.org Tor anonymity network], and the [https://github.com/zkSNACKs/WabiSabi WabiSabi] protocol: an anonymous credential scheme for centrally coordinated coinjoin transactions. The coinjoin coordinator is run by zkSNACKS Ltd., the company that sponsors the development of Wasabi Wallet. The developers have gone to great lengths to ensure that the coordinator cannot steal nor breach the privacy of any participant. This can all be verified by examining the open-source code.&lt;br /&gt;
&lt;br /&gt;
Wasabi Wallet strives toward establishing solid industry best practices and standards. It implements [https://en.bitcoin.it/wiki/Deterministic_wallet Hierarchical Deterministic wallets] , [https://en.bitcoin.it/wiki/Address_reuse address reuse avoidance], as well as mandatory coin labeling. The wallet uses BIP-158 client-side block filtering to obtain its own transaction history in a private way and it has a one-click partial full node integration as it ships with Bitcoin Knots. If the user already has a Bitcoin full node on a local or remote device, then it is possible to specify the IP address and port, or the Tor onion service, and Wasabi will use it to verify and enforce the rules of Bitcoin. &lt;br /&gt;
&lt;br /&gt;
In addition to this, Wasabi has advanced cutting-edge features like Opt-in PayJoin and [https://docs.wasabiwallet.io/FAQ/FAQ-UseWasabi.html#what-is-the-dust-threshold Dust attack] protections. You can find a full list of [https://docs.wasabiwallet.io/using-wasabi/BIPs.html#what-is-supported supported BIPs] in the wallet documentation. This is part of Wasabi Wallet’s [https://docs.wasabiwallet.io/ complete and detailed documentation] containing descriptions about the architecture and functionality of the wallet, as well as helpful tutorials on how to use it. There is also a [https://www.youtube.com/watch?v=ry6qIyQmzRE&amp;amp;list=PLPwc75tPMdsi2bSYL6qi79izHIvps2E6b tutorials playlist] on YouTube with short videos on how to use and interact with Wasabi Wallet.&lt;br /&gt;
=Wasabi Wallet installation=&lt;br /&gt;
[[File:Wasabiwallet.io.png|thumb|right|WasabiWallet.io homepage]]&lt;br /&gt;
&lt;br /&gt;
Wasabi Wallet is easy to install. First, you have to go to https://wasabiwallet.io or http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion (for the onion service) and download the version for your own operating system. Wasabi is available in most operating systems with 64-bit architecture.&lt;br /&gt;
&lt;br /&gt;
Linux, Windows and macOS (intel &amp;amp; M1) are the officially supported operating systems. For the complete compatibility list check the [https://github.com/zkSNACKs/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md Wasabi Compatibility document]. It is also possible to manually verify the PGP signatures and the deterministic builds.&lt;br /&gt;
&lt;br /&gt;
For a step-by-step tutorial on the installation and PGP verification, you can follow the [https://docs.wasabiwallet.io/using-wasabi/InstallPackage.html relevant chapter in the documentation].&lt;br /&gt;
&lt;br /&gt;
Once the software is installed, icons will be created on the desktop and on the menu, you can click on them to open the program. If you have downloaded the &#039;&#039;.tar.gz&#039;&#039; version, then first extract it and then run the &#039;&#039;./wassabee&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
=Run Wasabi Wallet=&lt;br /&gt;
&lt;br /&gt;
When you run Wasabi for the first time, you will be prompted to generate a wallet. You have the option to create a new wallet, connect to a hardware wallet, import a wallet from a file, or recover a wallet with a 12 word seed. When you generate the wallet, you will then be prompted to choose a unique name for it; choose a name that reflects the purpose of the wallet. If you create a new wallet you will be presented with 12 recovery words to record ([https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki BIP39]), followed by the option to encrypt your wallet with a secure password ([https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki BIP38]). You will always need the password in order to login to your wallet and whenever you spend your bitcoins, so remember to properly backup both the password and the 12 recovery words.&lt;br /&gt;
&lt;br /&gt;
=Send and Receive bitcoin via Wasabi Wallet=&lt;br /&gt;
&lt;br /&gt;
As explained above, Wasabi has &#039;&#039;&#039;mandatory coin labeling&#039;&#039;&#039;. This means that in order to send or receive bitcoin we have to specify custom labels for the address. These labels should be the name of any entities who know that this address is yours. Properly annotated labels is one of the most important features in Wasabi Wallet because it helps you better manage your privacy. A simple example of labeling is as follows: Alice pays you back for last night&#039;s pizza, so you label your receive address as &#039;&#039;Alice&#039;&#039;. Now you have a record of the specific UTXO that Alice is aware of and can trace on the [[Block chain]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Receiving Bitcoin&#039;&#039;&#039;&lt;br /&gt;
# Click &#039;&#039;Receive&#039;&#039; button&lt;br /&gt;
# Add Labels&lt;br /&gt;
# Scan or copy the unused bitcoin address.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sending Bitcoin&#039;&#039;&#039;&lt;br /&gt;
# Click &#039;&#039;Send&#039;&#039; button&lt;br /&gt;
# Paste bitcoin address&lt;br /&gt;
# Enter amount in BTC or USD&lt;br /&gt;
# Add Labels&lt;br /&gt;
# Preview Transaction (option to specify custom transaction fee rate)&lt;br /&gt;
# Enter password.&lt;br /&gt;
&lt;br /&gt;
=Coinjoin via Wasabi Wallet=&lt;br /&gt;
&lt;br /&gt;
[[File:Wasabi Wallet Coinjoin.png|thumb | right |Wasabi Wallet 2.0]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Coinjoins&#039;&#039;&#039; are the most important feature of Wasabi Wallet. &#039;&#039;&#039;Schnorr blind signatures&#039;&#039;&#039;, (which is similar to the cryptography used in chaumian blind signatures and [[blinded bearer certificates]]) make it possible to run &#039;&#039;&#039;trustless&#039;&#039;&#039; (meaning nobody can steal) and &#039;&#039;&#039;private&#039;&#039;&#039; (meaning even the coordinator cannot spy) coinjoins where nobody learns the linkage between the mixed transaction inputs and outputs.&lt;br /&gt;
&lt;br /&gt;
Wasabi Wallet implements the [https://eprint.iacr.org/2021/206 WabiSabi] protocol, which is an anonymous credential scheme for central coordinated coinjoin transactions. The zkSNACKs Ltd. company is who coordinates the coinjoin transactions for Wasabi Wallet. They take a fee for coordinating the coinjoin and use these funds to sponsors the Wasabi developers. The fee structure is as follows: coins with a value above 0.01 BTC costs 0.3% as a [https://github.com/zkSNACKs/WalletWasabi/tree/master/WalletWasabi.Backend coordinator fee] + [https://mempool.space/ mining fees]. Inputs of 0.01 BTC or below do not pay coordinator fees, nor remixes, even after one transaction. Thus, a payment made with coinjoined funds allows the sender and the recipient to remix their coins without paying coordinator fees. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
! &lt;br /&gt;
! &amp;gt; 0.01 BTC&lt;br /&gt;
! 0.01 BTC and less&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
| Fresh input&lt;br /&gt;
| 0.3% coordination fee + mining fees&lt;br /&gt;
| mining fees&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle; background-color:rgba(73, 88, 107, 0.1);&amp;quot;&lt;br /&gt;
| Remix*&lt;br /&gt;
| mining fees&lt;br /&gt;
| mining fees&lt;br /&gt;
|- style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;Remix includes a 1 hop transaction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zkSNACKs/WabiSabi WabiSabi] was introduced in Wasabi Wallet 2.0 and improves upon the original [https://github.com/nopara73/ZeroLink ZeroLink] protocol of Wasabi Wallet 1.0. WabiSabi is a novel communication protocol for creating bitcoin coinjoin transactions with arbitrary amounts, which provides more privacy at less cost for the user. This new protocol utilizes keyed verification anonymous credentials and homomorphic value commitments to enable novel use cases and reduced overhead. WabiSabi enables the emergence of much larger coinjoins rounds with hundreds of inputs and outputs (e.g., [https://mempool.space/tx/4f0436e9406e5930f9cdaaf94144de72b2b204690e7b19fe5f80067545440a7c 4f0436e9406e5930f9cdaaf94144de72b2b204690e7b19fe5f80067545440a7c]).&lt;br /&gt;
&lt;br /&gt;
=Controversies=&lt;br /&gt;
&lt;br /&gt;
On March 13 2022, Wasabi announced that its zkSNACKs coordinator had plans for blacklisting tainted coins, which would prevent them from participating in CoinJoins.&amp;lt;ref&amp;gt;https://www.coindesk.com/tech/2022/03/14/wasabi-wallets-coinjoin-coordinator-to-blacklist-certain-bitcoin-transactions/&amp;lt;/ref&amp;gt; This was met with backlash from some parts of the Bitcoin community who did not like the concept of taint.&amp;lt;ref&amp;gt;https://bitcointalk.org/index.php?topic=5405325.0&amp;lt;/ref&amp;gt;. Wasabi has stated that they do not have access to any information that can link user identities, and acknowledged that the decision to blacklist tainted outputs was done proactively, with no legislation requiring them to do so.&amp;lt;ref&amp;gt;https://bitcoinist.com/wasabi-side-reasons-blacklisting-from-coinjoin/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Privacy]]&lt;br /&gt;
&lt;br /&gt;
=References=&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CoinJoin&amp;diff=69758</id>
		<title>CoinJoin</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CoinJoin&amp;diff=69758"/>
		<updated>2023-07-03T13:16:32Z</updated>

		<summary type="html">&lt;p&gt;Luke-jr: Reverted edits by TheHiddenWiki (talk) to last revision by Jesse.am&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;CoinJoin&#039;&#039;&#039; is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient or recipients.  Unlike many other privacy solutions, coinjoin transactions do not require a modification to the bitcoin protocol.&lt;br /&gt;
&lt;br /&gt;
This type of transaction was first described in posts&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=139581 I taint rich! (Raw txn fun and disrupting &#039;taint&#039; analysis; &amp;gt;51kBTC linked!)]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[https://bitcointalk.org/?topic=279249 CoinJoin: Bitcoin privacy for the real world]&amp;lt;/ref&amp;gt; by gmaxwell.&lt;br /&gt;
&lt;br /&gt;
==Motivation==&lt;br /&gt;
&lt;br /&gt;
Bitcoin is often promoted as a tool for privacy but the only privacy that exists in Bitcoin comes from pseudonymous addresses which are fragile and easily compromised through reuse, &amp;quot;taint&amp;quot; analysis, tracking payments, IP address monitoring nodes, web-spidering, and many other mechanisms. Once broken this privacy is difficult and sometimes costly to recover.&lt;br /&gt;
&lt;br /&gt;
Traditional banking provides a fair amount of privacy by default. Your inlaws don&#039;t see that you&#039;re buying birth control that deprives them of grandchildren, your employer doesn&#039;t learn about the non-profits you support with money from your paycheck, and thieves don&#039;t see your latest purchases or how wealthy you are to help them target and scam you. Poor privacy in Bitcoin can be a major practical disadvantage for both individuals and businesses.&lt;br /&gt;
&lt;br /&gt;
Even when a user ends address reuse by switching to [http://bitcoinism.blogspot.com/2013/07/reclaiming-financial-privacy-with-hd.html BIP 32 address chains], they still have privacy loss from their old coins and the joining of past payments when they make larger transactions.&lt;br /&gt;
&lt;br /&gt;
Privacy errors can also create externalized costs: You might have good practices but when you trade with people who don&#039;t (say ones using &amp;quot;green addresses&amp;quot;) you and everyone you trade with loses some privacy.  A loss of privacy also presents a grave systemic risk for Bitcoin:  If degraded privacy allows people to assemble centralized lists of good and bad coins you may find Bitcoin&#039;s fungibility destroyed when your honestly accepted coin is later not honored by others, and its decentralization along with it when people feel forced to enforce popular blacklists on their own coin.&lt;br /&gt;
&lt;br /&gt;
==Concept==&lt;br /&gt;
&lt;br /&gt;
The idea is very simple, first some quick background:&lt;br /&gt;
&lt;br /&gt;
[[Image:Twotx.png|class=fullwidth]]&lt;br /&gt;
&lt;br /&gt;
A Bitcoin transaction consumes one or more inputs and creates one or more outputs with specified values.&lt;br /&gt;
&lt;br /&gt;
Each input is an output from a past transaction. For each input there is a distinct signature (scriptsig) which is created in accordance with the rules specified in the past-output that it is consuming (scriptpubkey).&lt;br /&gt;
&lt;br /&gt;
The Bitcoin system is charged with making sure the signatures are correct, that the inputs exist and are spendable, and that the sum of the output values is less than or equal to the sum of the input values (any excess becomes fees paid to miners for including the transaction).&lt;br /&gt;
&lt;br /&gt;
It is normal for a transaction to spend many inputs in order to get enough value to pay its intended payment, often also creating an additional &#039;change&#039; output to receive the unspent (and non-fee) excess.&lt;br /&gt;
&lt;br /&gt;
There is no requirement that the scriptpubkeys of the inputs used be the same; i.e., no requirement that they be payments to the same address. And, in fact, when Bitcoin is correctly used with one address per payment, none of them will be the same.&lt;br /&gt;
&lt;br /&gt;
When considering the history of Bitcoin ownership one could look at transactions which spend from multiple distinct scriptpubkeys as co-joining their ownership and make an assumption: How else could the transaction [[Common-input-ownership heuristic|spend from multiple addresses unless a common party controlled those addresses?]]&lt;br /&gt;
&lt;br /&gt;
In the illustration &#039;transaction 2&#039; spends coins which were assigned to 1A1 and 1C3. So 1A1 and 1C3 are necessarily the same party?&lt;br /&gt;
&lt;br /&gt;
This assumption is incorrect. Usage in a single transaction does not prove common control (though it&#039;s currently pretty suggestive), and this is what makes &#039;&#039;&#039;CoinJoin&#039;&#039;&#039; possible:&lt;br /&gt;
&lt;br /&gt;
The signatures, one per input, inside a transaction are &#039;&#039;&#039;completely&#039;&#039;&#039; independent of each other.  This means that it&#039;s possible for Bitcoin users to agree on a set of inputs to spend, and a set of outputs to pay to, and then to individually and separately sign a transaction and later merge their signatures. The transaction is not valid and won&#039;t be accepted by the network until all signatures are provided, and no one will sign a transaction which is not to their liking.&lt;br /&gt;
&lt;br /&gt;
To use this to increase privacy, the N users would agree on a uniform output size and provide inputs amounting to at least that size. The transaction would have N outputs of that size and potentially N more change outputs if some of the users provided input in excess of the target.  All would sign the transaction, and then the transaction could be transmitted. No risk of theft at any point.&lt;br /&gt;
&lt;br /&gt;
In the illustration &#039;transaction 2&#039; has inputs from 1A1 and 1C3. Say we believe 1A1 is an address used for Alice and 1C3 is an address used for Charlie. Which of Alice and Charlie owns which of the 1D and 1E outputs?&lt;br /&gt;
&lt;br /&gt;
The idea can also be used more casually. When you want to make a payment, find someone else who also wants to make a payment and make a joint payment together. Doing so doesn&#039;t increase privacy much, but it actually makes your transaction smaller and thus easier on the network (and lower in fees); the extra privacy is a perk.&lt;br /&gt;
&lt;br /&gt;
Such a transaction is externally indistinguishable from a transaction created through conventional use. Because of this, if these transactions become widespread they improve the privacy even of people who do not use them, because no longer will input co-joining be strong evidence of common control.&lt;br /&gt;
&lt;br /&gt;
There are many variations of this idea possible, and all can coexist because the idea requires no changes to the Bitcoin system. Let a thousand flowers bloom: we can have diversity in ways of accomplishing this and learn the best.&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
An example 2-party coinjoin transaction. https://chain.localbitcoins.com/tx/c38aac9910f327700e0f199972eed8ea7c6b1920e965f9cb48a92973e7325046&lt;br /&gt;
The outputs to addresses 1MUzngtNnrQRXRqqRTeDmpULW8X1aaGWeR and 1Fufjpf9RM2aQsGedhSpbSCGRHrmLMJ7yY are coinjoined because they are both of value 0.01btc.&lt;br /&gt;
&lt;br /&gt;
Another example is this 3-party coinjoin. https://chain.localbitcoins.com/tx/92a78def188053081187b847b267f0bfabf28368e9a7a642780ce46a78f551ba&lt;br /&gt;
&lt;br /&gt;
==FAQ==&lt;br /&gt;
&lt;br /&gt;
===Don&#039;t you need tor or something to prevent everyone from learning everyone&#039;s IP?===&lt;br /&gt;
&lt;br /&gt;
Any transaction privacy system that hopes to hide user&#039;s addresses should start with some kind of anonymity network. This is no different. Fortunately networks like Tor, I2P, Bitmessage, and Freenet all already exist and could all be used for this. (Freenet would result in rather slow transactions, however)&lt;br /&gt;
&lt;br /&gt;
However, gumming up &amp;quot;taint analysis&amp;quot; and reducing transaction sizes doesn&#039;t even require that the users be private from each other. So even without things like tor this would be no worse than regular transactions.&lt;br /&gt;
&lt;br /&gt;
===Don&#039;t the users learn which inputs match up to which outputs?===&lt;br /&gt;
&lt;br /&gt;
In the simplest possible implementation where users meet up on IRC over tor or the like, yes they do. The next simplest implementation is where the users send their input and output information to some meeting point server, and the server creates the transaction and asks people to sign it. The server learns the mapping, but no one else does, and the server still can&#039;t steal the coins.&lt;br /&gt;
&lt;br /&gt;
More complicated implementations are possible where even the server doesn&#039;t learn the mapping.&lt;br /&gt;
&lt;br /&gt;
E.g. Using chaum blind signatures: The users connect and provide inputs (and change addresses) and a cryptographically-blinded version of the address they want their private coins to go to; the server signs the tokens and returns them. The users anonymously reconnect, unblind their output addresses, and return them to the server. The server can see that all the outputs were signed by it and so all the outputs had to come from valid participants. Later people reconnect and sign.&lt;br /&gt;
&lt;br /&gt;
Similar things can be accomplished with various zero-knowledge proof systems.&lt;br /&gt;
&lt;br /&gt;
===Does the totally private version need to have a server at all? What if it gets shut down?===&lt;br /&gt;
&lt;br /&gt;
No. The same privacy can be achieved in a decentralized manner where all users act as blind-signing servers. This ends up needing n^2 signatures, and distributed systems are generally a lot harder to create.  I don&#039;t know if there is, or ever would be, a reason to bother with a fully distributed version with full privacy, but it&#039;s certainly possible.&lt;br /&gt;
&lt;br /&gt;
===What about DOS attacks? Can&#039;t someone refuse to sign even if the transaction is valid?===&lt;br /&gt;
&lt;br /&gt;
Yes, this can be DOS attacked in two different ways: someone can refuse to sign a valid joint transaction, or someone can spend their input out from under the joint transaction before it completes.&lt;br /&gt;
&lt;br /&gt;
However, if all the signatures don&#039;t come in within some time limit, or a conflicting transaction is created, you can simply leave the bad parties and try again. With an automated process any retries would be invisible to the user. So the only real risk is a persistent DOS attacker.&lt;br /&gt;
&lt;br /&gt;
In the non-decentralized (or decentralized but non-private to participants) case, gaining some immunity to DOS attackers is easy: if someone fails to sign for an input, you blacklist that input from further rounds. They are then naturally rate-limited by their ability to create more confirmed Bitcoin transactions.&lt;br /&gt;
&lt;br /&gt;
Gaining DOS immunity in a decentralized system is considerably harder, because it&#039;s hard to tell which user actually broke the rules. One solution is to have users perform their activity under a zero-knowledge proof system, so you could be confident which user is the cheater and then agree to ignore them.&lt;br /&gt;
&lt;br /&gt;
In all cases you could supplement anti-DOS mechanisms with proof of work, a fidelity bond, or other scarce resource usage. But I suspect that it&#039;s better to adapt to actual attacks as they arise, as we don&#039;t have to commit to a single security mechanism in advance and for all users. I also believe that bad input exclusion provides enough protection to get started.&lt;br /&gt;
&lt;br /&gt;
===Isn&#039;t the anonymity set size limited by how many parties you can get in a single transaction?===&lt;br /&gt;
&lt;br /&gt;
Not quite. The anonymity set size of a single transaction is limited by the number of parties in it, obviously. And transaction size limits as well as failure (retry) risk mean that really huge joint transactions would not be wise. But because these transactions are cheap, there is no limit to the number of transactions you can cascade.&lt;br /&gt;
&lt;br /&gt;
In particular, if you can build transactions with m participants per transaction you can create a sequence of m*3 transactions which form a three-stage [http://en.wikipedia.org/wiki/Clos_network switching network] that permits any of m^2 final outputs to have come from any of m^2 original inputs (e.g. using three stages of 32 transactions with 32 inputs each 1024 users can be joined with a total of 96 transactions).  This allows the anonymity set to be any size, limited only by participation.&lt;br /&gt;
&lt;br /&gt;
In practice I expect most users only want to prevent nosy friends (and thieves) from prying into their financial lives, and to recover some of the privacy they lost due to bad practices like address reuse. These users will likely be happy with only a single pass; other people will just operate opportunistically, while others may work to achieve many passes and big anonymity sets. All can coexist.&lt;br /&gt;
&lt;br /&gt;
===How does this compare to [http://zerocoin.org/ zerocoin]?===&lt;br /&gt;
&lt;br /&gt;
As a crypto and computer science geek I&#039;m super excited by Zerocoin: the technology behind it is fascinating and important. But as a Bitcoin user and developer the promotion of it as the solution to improved privacy disappoints me.&lt;br /&gt;
&lt;br /&gt;
Zerocoin has a number of serious limitations: &lt;br /&gt;
* It uses cutting-edge cryptography which may turn out to be insecure, and which is understood by relatively few people (compared to ECDSA, for example).&lt;br /&gt;
* It produces large (20kbyte) signatures that would bloat the blockchain (or create risk if stuffed in external storage).&lt;br /&gt;
* It requires a trusted party to initiate its accumulator. If that party cheats, they can steal coin. (Perhaps fixable with more cutting-edge crypto.)&lt;br /&gt;
* Validation is very slow (can process about 2tx per second on a fast CPU), which is a major barrier to deployment in Bitcoin as each full node must validate every transaction.&lt;br /&gt;
* The large transactions and slow validation also means costly transactions, which will reduce the anonymity set size and potentially make ZC usage unavailable to random members of the public who are merely casually concerned about their privacy.&lt;br /&gt;
* Uses an accumulator which grows forever and has no pruning. In practice this means we&#039;d need to switch accumulators periodically to reduce the working set size, reducing the anonymity set size. And potentially creating big UTXO bloat problems if the horizon on an accumulator isn&#039;t set in advance.&lt;br /&gt;
&lt;br /&gt;
Some of these things may improve significantly with better math and software engineering over time.&lt;br /&gt;
&lt;br /&gt;
But above all: &#039;&#039;&#039;Zerocoin requires a soft-forking change to the Bitcoin protocol&#039;&#039;&#039;, which all full nodes must adopt, which would commit Bitcoin to a particular version of the Zerocoin protocol. This cannot happen fast—probably not within years, especially considering that there is so much potential for further refinement to the algorithm to lower costs. It would be politically contentious, as some developers and Bitcoin businesses are very concerned about being overly associated with &amp;quot;anonymity&amp;quot;. Network-wide rule changes are something of a suicide pact: we shouldn&#039;t, and don&#039;t, take them lightly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CoinJoin transactions work today&#039;&#039;&#039;, and they&#039;ve worked since the first day of Bitcoin. They are indistinguishable from normal transactions and thus cannot be blocked or inhibited except to the extent that any other Bitcoin transaction could be blocked.&lt;br /&gt;
&lt;br /&gt;
(As an aside: ZC could potentially be used externally to Bitcoin in a decentralized CoinJoin as a method of mutually blinding the users in a DOS attack resistant way. This would allow ZC to mature under live fire without taking its costs or committing to a specific protocol network-wide.)&lt;br /&gt;
&lt;br /&gt;
The primary argument I can make for ZC over CoinJoin, beyond it stoking my crypto-geek desires, is that it may potentially offer a larger anonymity set.  But with the performance and scaling limits of ZC, and the possibility to construct sorting network transactions with CJ, or just the ability to use hundreds of CJ transactions with the storage and processing required for one ZC transactions, I don&#039;t know which would actually produce bigger anonymity sets in practice. E.g. To join 1024 users, just the ZC redemptions would involve 20k * 1024 bytes of  data compared to less than 3% of that for a complete three-stage cascade of 32 32-way joint transactions. Though the ZC anonymity set could more easily cross larger spans of time.&lt;br /&gt;
&lt;br /&gt;
The anonymity sets of CoinJoin transactions could easily be big enough for common users to regain some of their casual privacy and that&#039;s what I think is most interesting.&lt;br /&gt;
&lt;br /&gt;
===How does this compare to [https://bitcointalk.org/index.php?topic=277389.0 CoinWitness]?===&lt;br /&gt;
&lt;br /&gt;
CoinWitness is even more rocket-sciency than Zerocoin, it also shares many of the weaknesses as a privacy-improver: Novel crypto, computational cost, and the huge point of requiring a soft fork and not being available today. It may have some scaling advantages if it is used as more than just a privacy tool. But it really is overkill for this problem, and won&#039;t be available anytime real soon.&lt;br /&gt;
&lt;br /&gt;
===Sounds great! Where is it?===&lt;br /&gt;
&lt;br /&gt;
The two main ready-to-use software CoinJoin implementations are [[Wasabi Wallet]] (https://wasabiwallet.io/) and [[JoinMarket]] (https://github.com/Joinmarket-Org/joinmarket-clientserver). Currently, crypto-processing [[Apirone]] (https://apirone.com/) use pre-mix of UTXO based on CoinJoin technology.&lt;br /&gt;
&lt;br /&gt;
Wasabi Wallet implements the [https://eprint.iacr.org/2021/206 WabiSabi] protocol for the construction of CoinJoin transactions with the aid of a central coordinator (run by zkSNACKs Ltd., the company that is sponsoring the development of Wasabi) who cannot steal from, nor breach the privacy of the participants. Coinjoining coins with a value above 0.01 BTC costs 0.3% as a [https://github.com/zkSNACKs/WalletWasabi/tree/master/WalletWasabi.Backend coordinator fee] + [https://mempool.space/ mining fees]. Inputs of 0.01 BTC or below do not pay coordinator fees, nor remixes, even after one transaction. Thus, a payment made with coinjoined funds allows the sender and the recipient to remix their coins without paying coordinator fees. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
|- style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
! &lt;br /&gt;
! &amp;gt; 0.01 BTC&lt;br /&gt;
! 0.01 BTC and less&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle;&amp;quot;&lt;br /&gt;
| Fresh input&lt;br /&gt;
| 0.3% coordination fee + mining fees&lt;br /&gt;
| mining fees&lt;br /&gt;
|- style=&amp;quot;vertical-align:middle; background-color:rgba(73, 88, 107, 0.1);&amp;quot;&lt;br /&gt;
| Remix*&lt;br /&gt;
| mining fees&lt;br /&gt;
| mining fees&lt;br /&gt;
|- style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;Remix includes a 1 hop transaction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
JoinMarket, instead, works by creating a new kind of market consisting of one group of participants (called market makers) that will always be available to take part in CoinJoins at any time and another group participants (called market takers) that can create a CoinJoin at any time. The takers pay a fee which incentivizes the makers.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[User:Gmaxwell/state_of_coinjoin]]&lt;br /&gt;
* [[Common-input-ownership heuristic]]&lt;br /&gt;
* [[JoinMarket]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Privacy]]&lt;/div&gt;</summary>
		<author><name>Luke-jr</name></author>
	</entry>
</feed>