Количество 4
Количество 4
CVE-2011-4895
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
CVE-2011-4895
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
CVE-2011-4895
Tor before 0.2.2.34, when configured as a bridge, sets up circuits thr ...
GHSA-vv8x-qxvx-9wjx
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2011-4895 Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building. | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
CVE-2011-4895 Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building. | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
CVE-2011-4895 Tor before 0.2.2.34, when configured as a bridge, sets up circuits thr ... | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
GHSA-vv8x-qxvx-9wjx Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу