Логотип exploitDog
bind:CVE-2006-3419
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-3419

Количество 4

Количество 4

ubuntu логотип

CVE-2006-3419

около 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2006-3419

около 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2006-3419

около 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_byte ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-rj3x-48ch-69xf

больше 3 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-3419

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
0%
Низкий
около 19 лет назад
nvd логотип
CVE-2006-3419

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

CVSS2: 5
0%
Низкий
около 19 лет назад
debian логотип
CVE-2006-3419

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_byte ...

CVSS2: 5
0%
Низкий
около 19 лет назад
github логотип
GHSA-rj3x-48ch-69xf

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу