Количество 4
Количество 4
CVE-2011-4896
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
CVE-2011-4896
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
CVE-2011-4896
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was ...
GHSA-89m8-4ff5-r928
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2011-4896 Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
CVE-2011-4896 Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
CVE-2011-4896 Tor before 0.2.2.24-alpha continues to use a reachable bridge that was ... | CVSS2: 4.3 | 0% Низкий | около 14 лет назад | |
GHSA-89m8-4ff5-r928 Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу