{"vulnerability": "cve-2017-12842", "sightings": [{"uuid": "14a9ca12-0855-475f-96ae-e19acdf12ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12842", "type": "seen", "source": "https://gist.github.com/motolese/14f6c5a8151e9fb449829e58444e63c4", "content": "", "creation_timestamp": "2026-04-10T18:26:02.000000Z"}, {"uuid": "5490549d-f4b2-47a0-8b20-5c303383ce87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12842", "type": "seen", "source": "https://t.me/cibsecurity/10532", "content": "ATENTION\u203c New - CVE-2017-12842\n\nBitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-16T23:46:04.000000Z"}]}