Логотип exploitDog
bind:CVE-2011-4895
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4895

Количество 4

Количество 4

ubuntu логотип

CVE-2011-4895

около 14 лет назад

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2011-4895

около 14 лет назад

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2011-4895

около 14 лет назад

Tor before 0.2.2.34, when configured as a bridge, sets up circuits thr ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-vv8x-qxvx-9wjx

больше 3 лет назад

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-4895

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

CVSS2: 4.3
0%
Низкий
около 14 лет назад
nvd логотип
CVE-2011-4895

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

CVSS2: 4.3
0%
Низкий
около 14 лет назад
debian логотип
CVE-2011-4895

Tor before 0.2.2.34, when configured as a bridge, sets up circuits thr ...

CVSS2: 4.3
0%
Низкий
около 14 лет назад
github логотип
GHSA-vv8x-qxvx-9wjx

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу