Логотип exploitDog
bind:CVE-2011-2768
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-2768

Количество 4

Количество 4

ubuntu логотип

CVE-2011-2768

около 14 лет назад

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2011-2768

около 14 лет назад

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2011-2768

около 14 лет назад

Tor before 0.2.2.34, when configured as a client or bridge, sends a TL ...

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-h978-fv3x-h43g

больше 3 лет назад

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-2768

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

CVSS2: 5.8
0%
Низкий
около 14 лет назад
nvd логотип
CVE-2011-2768

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

CVSS2: 5.8
0%
Низкий
около 14 лет назад
debian логотип
CVE-2011-2768

Tor before 0.2.2.34, when configured as a client or bridge, sends a TL ...

CVSS2: 5.8
0%
Низкий
около 14 лет назад
github логотип
GHSA-h978-fv3x-h43g

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу