Количество 6
Количество 6
CVE-2021-34549
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
CVE-2021-34549
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
CVE-2021-34549
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Has ...
GHSA-qx32-4xrf-2j53
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
BDU:2021-04715
Уязвимость функцией SSL-Proxy анонимного веб-браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2021:0926-1
Security update for tor
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-34549 An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад | |
CVE-2021-34549 An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад | |
CVE-2021-34549 An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Has ... | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад | |
GHSA-qx32-4xrf-2j53 An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
BDU:2021-04715 Уязвимость функцией SSL-Proxy анонимного веб-браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад | |
openSUSE-SU-2021:0926-1 Security update for tor | больше 4 лет назад |
Уязвимостей на страницу