Количество 4
Количество 4
CVE-2013-3219
bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions.
CVE-2013-3219
bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions.
CVE-2013-3219
bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain bl ...
GHSA-8mqp-6q8h-2r3q
bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2013-3219 bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions. | CVSS2: 5 | 1% Низкий | больше 12 лет назад | |
CVE-2013-3219 bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions. | CVSS2: 5 | 1% Низкий | больше 12 лет назад | |
CVE-2013-3219 bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain bl ... | CVSS2: 5 | 1% Низкий | больше 12 лет назад | |
GHSA-8mqp-6q8h-2r3q bitcoind and Bitcoin-Qt 0.8.x before 0.8.1 do not enforce a certain block protocol rule, which allows remote attackers to bypass intended access restrictions and conduct double-spending attacks via a large block that triggers incorrect Berkeley DB locking in older product versions. | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу