7.5
CVSSv3

CVE-2019-13000

Published: 31/01/2020 Updated: 03/02/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Eclair up to and including 0.3 allows malicious users to trigger loss of funds because of Incorrect Access Control. NOTE: README.md states "it is beta-quality software and don't put too much money in it."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

acinq eclair

Github Repositories

API specifications for Lightning Service Providers

Lightning Service Provider Spec API specifications for Lightning Service Providers (LSP) The goal of this repository is to provide a unified API specification for Lightning Service Providers (LSP) to create interoperability between different Lightning Network wallets/clients and LSPs The group meets every second week on Thursday 11am UTC The meeting is open to everyone Pleas

A tool that detect if your node has been victim of the invalid funding tx attack.

Detection tool for CVE 2019-13000 A tool that detect if your node has been victim of the invalid funding tx attack Usage java -jar checkfundingjar --db eclairsqlite Help $ java -jar checkfundingjar --help checkfunding 10 Usage: checkfunding [options] --db <eclairsqlite> path to eclairsqlite --conf <eclair

Lightning Network Protocol Development Curriculum

Lightning Network Curriculum What Is This? While planning the Chaincode Residency, we put considerable effort into finding the best resources and creating a curriculum around Lightning protocol development You can find all of our published materials on our resources page Lightning is still a nascent technology, and so we expect maintenance of this document to be an ongoing ta