CVE-2011-4896
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
23/12/2011
Last modified:
11/04/2025
Description
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:* | 0.2.2.23 (including) | |
| cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



