Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-4896 (GCVE-0-2011-4896)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:16:35.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-12-23T02:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4896",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blog.torproject.org/blog/tor-02224-alpha-out",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4896",
    "datePublished": "2011-12-23T02:00:00Z",
    "dateReserved": "2011-12-22T00:00:00Z",
    "dateUpdated": "2024-09-16T18:28:19.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-4896\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-12-23T03:59:22.130\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.\"},{\"lang\":\"es\",\"value\":\"Las versiones de Tor anteriores a v0.2.2.24-alpha continua utilizando un puerto en modo bridge que ya sido configurado previamente, pero que no ha sido configurado en el momento actual, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre clientes en determinadas circusntancias por medio de la monitorizaci\u00f3n del tr\u00e1fico de red que llega al puerto configurado en modo bridge.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.2.2.23\",\"matchCriteriaId\":\"01CF8C55-D712-4EB3-ABCD-A79161F0FD86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD529C5A-D6E8-4FFD-B552-B91A9BD409F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7301BA35-2522-4144-83C2-6A3A6D329A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37993416-D81F-4F6B-AB2C-16F351BE68D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295C826F-CBEB-4BA2-A760-22D58D231BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D230B213-4A35-488F-A4B5-87F77BD65E5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF88062-8726-4C1D-8F93-ABA0B1654656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A710565-6960-4D46-A1EB-86FE0927A66D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F6C954-7C0A-41E5-9719-26082E40C5E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43784D06-2D2A-46D1-ADE2-B947B3F10F33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196BF37C-CD62-4D4C-A716-827B0E6A5065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20076B65-48E6-4DA2-BDA1-AC4F904B449D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A2CCAD-397B-4037-B99B-F0A622FAF8D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E74056-DD32-49E6-808A-5A9B755F1DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2103A8-0F3F-4226-A5D8-4BF239FD6636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA35257-80F6-4DDF-94EF-ABE1ED039ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0490AB18-A839-400D-88E2-D918B1EEFA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBED980F-A8B9-4C44-957C-FD18867B1799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E033E0C-C7F6-4910-A795-28BA60E9431A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAAACA5-F431-4D83-B04D-EC9A81C96184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1D5B46C-E7D3-495F-861C-12324F09EC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639E3063-34CC-4AE2-B055-92D36ECAADF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5305AF8-E26C-44A1-B546-AAC5D1C2D053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DCAB29-4EF2-4A50-A941-DA5D89E27D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33928D26-39DF-4E15-9979-F9484913C219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8F70D6-4B9C-4131-A419-4AD9325DFFC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B8A291-E1F7-444F-8C5B-C3C38541B3D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24581D9F-02AF-42E6-A3D7-9CAD43E26477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B978E3E-69D7-46BD-BD88-1409A546FF66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7FED829-128A-4F87-9838-AD0C9C11E458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A39B543-5978-46FC-AF85-D635D87E3B92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE0BE0D-F509-4A91-BDD7-A0A8324498D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803498D9-C750-4D16-8ADF-2F98E71888A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F6A78C-76E9-4A5F-92BD-B16D1CBE934F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04309D4-FEA8-47EA-BB9A-8CBD341B475F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8607F3C9-F185-4B87-8A1B-B9495A4F244D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525A0E09-D4CF-42AA-8EB2-47E0E6CBA179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"667201BB-5FDA-4E51-B865-0AF8507DBCDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BA7280-1DF3-4A98-AFD2-C67406A32EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70542A1-34B3-4EBF-BAA7-6B009CCFD22C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2DADBB-D90B-4B9D-B9DA-65AC39C61043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E6BA17-6AE9-45ED-A8C3-F79463F427BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7D396C-36CA-4579-BCA0-672440CB5CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE716BE-10CE-49EB-9CC4-068584CD3357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5662F3D8-754D-43E3-8EE0-3DF4B0180E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F38E56-8AA3-435C-AF5D-9653BEBB3B69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0F837E-12E5-4332-9823-8B1F764042E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD35814F-3097-4298-93FA-50FDA32F6E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BF80379-BD68-4E3B-A7CC-57B51619A0B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"828F531E-5AB6-452C-8CC6-8A15876A14C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57DAA48C-4B3B-4665-87AB-38ACFD6C757C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7288D12E-6C96-4019-AF7B-FA4E8AD9E041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CF2822-88B6-41F2-B10A-A8B09B27245D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D1E264D-B441-4352-952C-EAD9228B3C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B300C56E-7DF5-4B24-84D1-A4732515325E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"3313FEB0-8192-4EFE-AE3F-F3DB065E0D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13846571-C84A-43D6-9970-444E6B4DB0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D881C4-0302-44E9-A3C5-A23EFD681B5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A10A86-8077-43B6-BCEA-86F5EC10B541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8219F1A-D6F5-4D6E-B10D-4C455073520C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A236582-6E33-4C9B-AD16-56DDB275FE13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB701014-7980-4BBE-8BD9-3FD2A0AF6941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68C31D4-9478-4EB6-B160-E9970ADA785D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"872F7B10-30EA-4945-99BC-9EC1C09D6D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBC3EFD-7F03-4DC1-988C-22007216F9F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7898C5-9450-41FD-B45D-7504D97B4CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3A247E8-F22B-4639-96D2-9BC01C904D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1233504-041A-454E-9F2E-6E2A4207879D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC39C113-6A7B-4152-8EBA-87A2B64D0F2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342D2B8A-A832-4CAB-9389-93764B0DE241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D44F099-7BC3-45C4-9DB3-03A7E40BC548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A79A0CD-7B81-417E-8DE3-0D61006003FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F0A70AA-931A-4906-B4AD-D56E90683716\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD4450F-6E15-40CD-94CA-63F70A3EC354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB51EE46-D720-4C1F-8992-67F4422E43CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"E149062A-F48E-4E99-8A3C-B32FFC922695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB76D9D-98AA-4C0E-A001-D2DF796BB78A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A3860-1FE5-4A03-9C99-2646F1AF84A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4340AB16-25B5-4371-B490-6F2563268358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA145B1E-674C-4C79-93C0-BC24EC5F8CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD8B5C4-C680-4DE2-9245-0A8F380C15E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B671031-08A4-4B9D-B3DA-7D074D8BFAC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A2098AF-763E-4F62-BBD9-A4C9AC411C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3C6BA8-9ED9-42F8-9054-F94840E653E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D917E6-7E71-4B14-8881-C22755C6899B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22F7D60-BBAE-4951-B84C-C70BEB88B6F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B2E210-F46F-4A86-A923-82599D0CFF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0372D0-8181-4812-9741-70DC4C0AEA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E983BF-8D3F-4B20-A89A-BC324C5AD150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4EC417-80F8-4B04-9176-3B9199662D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC7477A-5DDA-42A6-828E-A818CCF208B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"963FD695-512A-45A8-A60D-887D93FBBD1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ABF89E-4814-44D3-A1AD-3B7A4F876A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96F69A35-225C-41FF-A32B-AE53096516EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B218F1A-C04D-40B3-A6BE-86DA04E47D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D575EF-37BA-4E69-BDD2-B99680D2CEC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E600CF30-7D23-4F41-BCB7-26631B33A1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3729DD-BFCC-4293-9DE7-B02588753F28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D08533D-A187-4C0E-AD4C-41061FB42413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EADACB1-31D9-4297-A1C3-7F281A0AF154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"D560434E-2636-4C7B-AC6B-A5952123B8F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3334C5-92F3-403D-9116-4559D18F677F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B173DF1-D506-47F4-8F13-18026BF7A974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4462DB3B-BF33-4BFA-A9C9-CF674A18D24E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E666EDB-F72C-4B14-8FF4-95B082BB38EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"96BCAA3F-EF7F-457B-8468-A736527A4F5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D706AEC-0814-4706-BA4C-6FED01AA4D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"53FCE242-9B64-4D71-BBB3-8085F7FBA8F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9FD6A26-7219-4958-B959-C6365193F839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6307EF6-1449-43B2-A3B8-DF0EA3A6985F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C0FF05-0E18-4C48-BE3E-FBC881F468D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C32845-BAB4-422A-B1BA-568793B4E935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0159DCD6-3C52-4B4C-82EC-4E699366E917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E245295-3EF6-4E6D-8D44-D45B8A198E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"38DA0AF4-C053-4EEC-AA37-5089C9E6C778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8EE453-2FAC-4927-AC89-C92B2A947E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE434E6-63E1-44B0-AA79-BBDABC040234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC742E5-CA75-43E4-BCD5-54B712CF205E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADA7B77-7DBE-4A62-BE4A-83975D4D7311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D57B03-30FE-48E8-B6BA-77538F067D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E6BD04-775B-4EDE-BF3E-2896BB59F895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7900A51A-4E1E-412C-945E-DAB21078BD4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B68CEAF-2287-4C1B-A147-DD718E7C6418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3CE396-518B-465F-AB91-6572601F0C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3CAF65C-7E8F-4732-A8E3-A91724D4402A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70887CA-5A54-410D-B9B4-84EE31899FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6319103-D39F-4D5E-B412-9A5E29BE06F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"C538F301-D9A9-48CC-AB77-AD073935D1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F0B9C22-4B6F-465D-947F-A787A0588F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC42FE4-48BE-4EF2-900F-401CF34F113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E17189-F12A-4914-AEDC-52345D097A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B11AC29-B21C-424F-8EFF-56C40F38CB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"87591A51-BD84-459F-8BEB-6D32B392CF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB79C700-2513-4EEB-835B-454F8728DCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C8611D-02BA-486D-B53D-C357A59FB520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AF751E-3C14-4B67-9E24-DBD14E00D72D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"02525A8C-2384-409C-8D94-13D8E30904EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"04955D07-0755-473C-AD6A-1AC5B158E387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"810D53DA-CACC-4432-B8E5-C42464B316C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"334049F0-332B-4736-B0C9-45B0C1289F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8D1841-FDBB-4507-B092-F41C49285B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"02937401-0114-4D9C-9FDE-E299CC55FC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C66307-DB75-40C2-8AB6-538C9E35E141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"E511EB2D-7E75-45BC-B446-4CD0FFB7016E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF56621-A858-4881-8A07-27EE371540DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B9D629C-8D14-490B-A7FA-E765F51226EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9864C9-EB23-4859-831B-AE862D8DD0DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EFB8A30-879D-4150-B9CB-4DFAFCF8572D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98E5DC9-4D9E-4EC9-99F7-748DC7876443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DA057A-55C0-4A97-95F0-A0B7217DC6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430018D6-9DAE-40B6-A128-E4022C70B41C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E786576-91B9-4EA1-9A7E-B0DE04B87D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5F27C22-48C3-4453-B84B-00CB06B745A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E803BD-8191-449A-B48E-A97DD6F7C3F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AE55C4-F3C2-403A-B581-A7E174F6FC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C41E2D-3C63-4F83-8EF0-99DDA656C276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF7556A-8845-4515-A760-024552EDACD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6D57D7-E9C7-47D6-AC84-09960BC07723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B081491D-3080-4EDA-9A48-64CF13DE0F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C5A8F7-47C1-4113-99C1-6E3873423D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B395B51-2228-450F-B5EE-01C36BA65175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"95189D99-0E4D-4D2D-9CDA-8C4D134D658A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F8E9FA-2114-42BB-925E-30253DAB8512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F7A274C-1263-49F0-87B1-DB945058AD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"025C0F19-3C30-4C6D-9587-D56BA3CAC56B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"64AA728A-D5DA-4D35-A9B3-507334BCBAC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"588747DD-1CF8-44FB-8901-525BE0CFB910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB50C84-B708-468B-B9AF-FF3538BCE53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B12C5C-EF6A-47DB-948B-6C455C75AD4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7E8B65-B0A0-4651-A40F-029D1F3D3601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55208554-8B4A-412F-8346-B1DEBB9196FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C09EB4-AEF4-4360-997A-5B8A5D85CEBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E0C717-1931-48BB-A074-6607B5DBA194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A0A823-94D9-4BDB-9695-7B1996B0E976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C54A1BE3-CA35-4305-9B58-7AD8F6704743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5748EA55-73D4-475F-93AE-ED8081FB196E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29F6112-DAA0-4E63-98D3-AC3D78475EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"609CF2C7-01B9-4635-B488-271562774598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE848E03-E579-424A-9438-20C9D9D554D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D72E60-A110-42E8-9F9F-38B5D2108F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00616D43-0637-4F0C-9213-33D9E8E9A376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"266BBF1D-283F-4169-A943-4224F87DC95E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD0BDD6-409D-4443-AAA3-FCCD2B896E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38648AEF-6232-4A78-B306-4509FF9D431E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142C73E5-B6A1-4D12-832D-01CF3BB5DC8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281100EE-90F3-4814-B5E7-F625A84293FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155BFC2E-F388-4AD7-A5BC-3531FC81948F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF240A26-E071-4C64-B0E7-6E5F7D9BD964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C1908AB-04C3-4F96-B681-9B661C122063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF856938-A172-4BA9-86BF-7C7F3F8E382C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0FFFC75-CECB-4609-B5C2-153192FE9399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8B64406-ECC9-445A-9550-E1B8124BF85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A37134-5162-4E48-BE5C-93807F4CD055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CECAD72-6E99-400D-82A8-3792E88C65F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FD7FC5-30C3-48D7-8A95-7F923EA25457\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"38665A22-85F6-4F7E-A73B-CBB82828F63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"381A931A-7DAD-4F38-8723-692B59130967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A7277C-E314-4460-8460-282BB57BC2DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"C279687E-9E83-43A7-8C14-8074749C779A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"6427F81C-C4C6-42B0-BFF0-280DB8F5397B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC6362D-423D-4E6E-8690-F3BEABC7C18B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1AFB78-CB53-4681-994A-3932F1A7322F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AD51B4D-8222-4006-83D0-CFB48971E6EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4959EA8E-D957-4B19-9F80-637E1423980F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AB49B0-53A0-416B-8924-ACAF94580B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E4BEC5B-313B-4292-86F4-66BAAB5E0987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0486F7F-F095-4911-8F2F-E8BDABA835EB\"}]}]}],\"references\":[{\"url\":\"https://blog.torproject.org/blog/tor-02224-alpha-out\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://blog.torproject.org/blog/tor-02224-alpha-out\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}
  opensuse-su-2024:10423-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "tor-0.2.8.11-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the tor-0.2.8.11-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10423",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10423-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-0427 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-0427/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-2768 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-2768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-2769 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-2769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-2778 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-2778/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-4576 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-4576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-4894 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-4894/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-4895 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-4895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-4896 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-4896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2011-4897 page",
        "url": "https://www.suse.com/security/cve/CVE-2011-4897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-3517 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-3517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-3518 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-3518/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-3519 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-3519/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-4419 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-4419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-4922 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-4922/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2012-5573 page",
        "url": "https://www.suse.com/security/cve/CVE-2012-5573/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7295 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7295/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0160 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-5117 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-5117/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2688 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2689 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2928 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2928/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2929 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2929/"
      }
    ],
    "title": "tor-0.2.8.11-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10423-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tor-0.2.8.11-1.1.aarch64",
                "product": {
                  "name": "tor-0.2.8.11-1.1.aarch64",
                  "product_id": "tor-0.2.8.11-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tor-0.2.8.11-1.1.ppc64le",
                "product": {
                  "name": "tor-0.2.8.11-1.1.ppc64le",
                  "product_id": "tor-0.2.8.11-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tor-0.2.8.11-1.1.s390x",
                "product": {
                  "name": "tor-0.2.8.11-1.1.s390x",
                  "product_id": "tor-0.2.8.11-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tor-0.2.8.11-1.1.x86_64",
                "product": {
                  "name": "tor-0.2.8.11-1.1.x86_64",
                  "product_id": "tor-0.2.8.11-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tor-0.2.8.11-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64"
        },
        "product_reference": "tor-0.2.8.11-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tor-0.2.8.11-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le"
        },
        "product_reference": "tor-0.2.8.11-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tor-0.2.8.11-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x"
        },
        "product_reference": "tor-0.2.8.11-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tor-0.2.8.11-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        },
        "product_reference": "tor-0.2.8.11-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-0427",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-0427"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-0427",
          "url": "https://www.suse.com/security/cve/CVE-2011-0427"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-0427"
    },
    {
      "cve": "CVE-2011-2768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-2768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-2768",
          "url": "https://www.suse.com/security/cve/CVE-2011-2768"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-2768"
    },
    {
      "cve": "CVE-2011-2769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-2769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-2769",
          "url": "https://www.suse.com/security/cve/CVE-2011-2769"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-2769"
    },
    {
      "cve": "CVE-2011-2778",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-2778"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-2778",
          "url": "https://www.suse.com/security/cve/CVE-2011-2778"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739133 for CVE-2011-2778",
          "url": "https://bugzilla.suse.com/739133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2011-2778"
    },
    {
      "cve": "CVE-2011-4576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-4576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-4576",
          "url": "https://www.suse.com/security/cve/CVE-2011-4576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739719 for CVE-2011-4576",
          "url": "https://bugzilla.suse.com/739719"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 758060 for CVE-2011-4576",
          "url": "https://bugzilla.suse.com/758060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 778825 for CVE-2011-4576",
          "url": "https://bugzilla.suse.com/778825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 854391 for CVE-2011-4576",
          "url": "https://bugzilla.suse.com/854391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-4576"
    },
    {
      "cve": "CVE-2011-4894",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-4894"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-4894",
          "url": "https://www.suse.com/security/cve/CVE-2011-4894"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739133 for CVE-2011-4894",
          "url": "https://bugzilla.suse.com/739133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-4894"
    },
    {
      "cve": "CVE-2011-4895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-4895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-4895",
          "url": "https://www.suse.com/security/cve/CVE-2011-4895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739133 for CVE-2011-4895",
          "url": "https://bugzilla.suse.com/739133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-4895"
    },
    {
      "cve": "CVE-2011-4896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-4896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-4896",
          "url": "https://www.suse.com/security/cve/CVE-2011-4896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739133 for CVE-2011-4896",
          "url": "https://bugzilla.suse.com/739133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-4896"
    },
    {
      "cve": "CVE-2011-4897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2011-4897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2011-4897",
          "url": "https://www.suse.com/security/cve/CVE-2011-4897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 739133 for CVE-2011-4897",
          "url": "https://bugzilla.suse.com/739133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2011-4897"
    },
    {
      "cve": "CVE-2012-3517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-3517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-3517",
          "url": "https://www.suse.com/security/cve/CVE-2012-3517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 776642 for CVE-2012-3517",
          "url": "https://bugzilla.suse.com/776642"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-3517"
    },
    {
      "cve": "CVE-2012-3518",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-3518"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-3518",
          "url": "https://www.suse.com/security/cve/CVE-2012-3518"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 776642 for CVE-2012-3518",
          "url": "https://bugzilla.suse.com/776642"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-3518"
    },
    {
      "cve": "CVE-2012-3519",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-3519"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-3519",
          "url": "https://www.suse.com/security/cve/CVE-2012-3519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 776642 for CVE-2012-3519",
          "url": "https://bugzilla.suse.com/776642"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-3519"
    },
    {
      "cve": "CVE-2012-4419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-4419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-4419",
          "url": "https://www.suse.com/security/cve/CVE-2012-4419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 780620 for CVE-2012-4419",
          "url": "https://bugzilla.suse.com/780620"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-4419"
    },
    {
      "cve": "CVE-2012-4922",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-4922"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-4922",
          "url": "https://www.suse.com/security/cve/CVE-2012-4922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 780620 for CVE-2012-4922",
          "url": "https://bugzilla.suse.com/780620"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-4922"
    },
    {
      "cve": "CVE-2012-5573",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2012-5573"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2012-5573",
          "url": "https://www.suse.com/security/cve/CVE-2012-5573"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 791374 for CVE-2012-5573",
          "url": "https://bugzilla.suse.com/791374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2012-5573"
    },
    {
      "cve": "CVE-2013-7295",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7295"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7295",
          "url": "https://www.suse.com/security/cve/CVE-2013-7295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 859421 for CVE-2013-7295",
          "url": "https://bugzilla.suse.com/859421"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-7295"
    },
    {
      "cve": "CVE-2014-0160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0160",
          "url": "https://www.suse.com/security/cve/CVE-2014-0160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 872299 for CVE-2014-0160",
          "url": "https://bugzilla.suse.com/872299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-0160"
    },
    {
      "cve": "CVE-2014-5117",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-5117"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-5117",
          "url": "https://www.suse.com/security/cve/CVE-2014-5117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 889688 for CVE-2014-5117",
          "url": "https://bugzilla.suse.com/889688"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-5117"
    },
    {
      "cve": "CVE-2015-2688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "buf_pullup in Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2688",
          "url": "https://www.suse.com/security/cve/CVE-2015-2688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923284 for CVE-2015-2688",
          "url": "https://bugzilla.suse.com/923284"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2688"
    },
    {
      "cve": "CVE-2015-2689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2689",
          "url": "https://www.suse.com/security/cve/CVE-2015-2689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923284 for CVE-2015-2689",
          "url": "https://bugzilla.suse.com/923284"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2689"
    },
    {
      "cve": "CVE-2015-2928",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2928"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Hidden Service (HS) server implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2928",
          "url": "https://www.suse.com/security/cve/CVE-2015-2928"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 926097 for CVE-2015-2928",
          "url": "https://bugzilla.suse.com/926097"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2928"
    },
    {
      "cve": "CVE-2015-2929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
          "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2929",
          "url": "https://www.suse.com/security/cve/CVE-2015-2929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 926097 for CVE-2015-2929",
          "url": "https://bugzilla.suse.com/926097"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.aarch64",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.ppc64le",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.s390x",
            "openSUSE Tumbleweed:tor-0.2.8.11-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2929"
    }
  ]
}
  gsd-2011-4896
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2011-4896",
    "description": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.",
    "id": "GSD-2011-4896",
    "references": [
      "https://www.suse.com/security/cve/CVE-2011-4896.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2011-4896"
      ],
      "details": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.",
      "id": "GSD-2011-4896",
      "modified": "2023-12-13T01:19:05.388276Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2011-4896",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://blog.torproject.org/blog/tor-02224-alpha-out",
            "refsource": "CONFIRM",
            "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.2.23",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4896"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blog.torproject.org/blog/tor-02224-alpha-out",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2011-12-30T05:00Z",
      "publishedDate": "2011-12-23T03:59Z"
    }
  }
}
  ghsa-89m8-4ff5-r928
Vulnerability from github
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
{
  "affected": [],
  "aliases": [
    "CVE-2011-4896"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-200"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2011-12-23T03:59:00Z",
    "severity": "MODERATE"
  },
  "details": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.",
  "id": "GHSA-89m8-4ff5-r928",
  "modified": "2022-05-17T05:36:00Z",
  "published": "2022-05-17T05:36:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4896"
    },
    {
      "type": "WEB",
      "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  fkie_cve-2011-4896
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| tor | tor | * | |
| tor | tor | 0.0.2 | |
| tor | tor | 0.0.3 | |
| tor | tor | 0.0.4 | |
| tor | tor | 0.0.5 | |
| tor | tor | 0.0.6 | |
| tor | tor | 0.0.6.1 | |
| tor | tor | 0.0.6.2 | |
| tor | tor | 0.0.7 | |
| tor | tor | 0.0.7.1 | |
| tor | tor | 0.0.7.2 | |
| tor | tor | 0.0.7.3 | |
| tor | tor | 0.0.8 | |
| tor | tor | 0.0.8.1 | |
| tor | tor | 0.0.9 | |
| tor | tor | 0.0.9.1 | |
| tor | tor | 0.0.9.2 | |
| tor | tor | 0.0.9.3 | |
| tor | tor | 0.0.9.4 | |
| tor | tor | 0.0.9.5 | |
| tor | tor | 0.0.9.6 | |
| tor | tor | 0.0.9.7 | |
| tor | tor | 0.0.9.8 | |
| tor | tor | 0.0.9.9 | |
| tor | tor | 0.0.9.10 | |
| tor | tor | 0.1.0.1 | |
| tor | tor | 0.1.0.2 | |
| tor | tor | 0.1.0.3 | |
| tor | tor | 0.1.0.4 | |
| tor | tor | 0.1.0.5 | |
| tor | tor | 0.1.0.6 | |
| tor | tor | 0.1.0.7 | |
| tor | tor | 0.1.0.8 | |
| tor | tor | 0.1.0.9 | |
| tor | tor | 0.1.0.10 | |
| tor | tor | 0.1.0.11 | |
| tor | tor | 0.1.0.12 | |
| tor | tor | 0.1.0.13 | |
| tor | tor | 0.1.0.14 | |
| tor | tor | 0.1.0.15 | |
| tor | tor | 0.1.0.16 | |
| tor | tor | 0.1.0.17 | |
| tor | tor | 0.1.0.18 | |
| tor | tor | 0.1.0.19 | |
| tor | tor | 0.1.1 | |
| tor | tor | 0.1.1.1 | |
| tor | tor | 0.1.1.1 | |
| tor | tor | 0.1.1.2 | |
| tor | tor | 0.1.1.2 | |
| tor | tor | 0.1.1.3 | |
| tor | tor | 0.1.1.3 | |
| tor | tor | 0.1.1.4 | |
| tor | tor | 0.1.1.4 | |
| tor | tor | 0.1.1.5 | |
| tor | tor | 0.1.1.5 | |
| tor | tor | 0.1.1.6 | |
| tor | tor | 0.1.1.6 | |
| tor | tor | 0.1.1.7 | |
| tor | tor | 0.1.1.7 | |
| tor | tor | 0.1.1.8 | |
| tor | tor | 0.1.1.8 | |
| tor | tor | 0.1.1.9 | |
| tor | tor | 0.1.1.9 | |
| tor | tor | 0.1.1.10 | |
| tor | tor | 0.1.1.10 | |
| tor | tor | 0.1.1.11 | |
| tor | tor | 0.1.1.12 | |
| tor | tor | 0.1.1.13 | |
| tor | tor | 0.1.1.14 | |
| tor | tor | 0.1.1.15 | |
| tor | tor | 0.1.1.16 | |
| tor | tor | 0.1.1.17 | |
| tor | tor | 0.1.1.18 | |
| tor | tor | 0.1.1.19 | |
| tor | tor | 0.1.1.20 | |
| tor | tor | 0.1.1.21 | |
| tor | tor | 0.1.1.22 | |
| tor | tor | 0.1.1.23 | |
| tor | tor | 0.1.1.25 | |
| tor | tor | 0.1.1.26 | |
| tor | tor | 0.1.2.1 | |
| tor | tor | 0.1.2.1 | |
| tor | tor | 0.1.2.2 | |
| tor | tor | 0.1.2.3 | |
| tor | tor | 0.1.2.4 | |
| tor | tor | 0.1.2.5 | |
| tor | tor | 0.1.2.5 | |
| tor | tor | 0.1.2.6 | |
| tor | tor | 0.1.2.7 | |
| tor | tor | 0.1.2.8 | |
| tor | tor | 0.1.2.9 | |
| tor | tor | 0.1.2.10 | |
| tor | tor | 0.1.2.11 | |
| tor | tor | 0.1.2.12 | |
| tor | tor | 0.1.2.13 | |
| tor | tor | 0.1.2.14 | |
| tor | tor | 0.1.2.15 | |
| tor | tor | 0.1.2.16 | |
| tor | tor | 0.1.2.17 | |
| tor | tor | 0.1.2.18 | |
| tor | tor | 0.1.2.19 | |
| tor | tor | 0.1.2.30 | |
| tor | tor | 0.1.2.31 | |
| tor | tor | 0.2.0.1 | |
| tor | tor | 0.2.0.2 | |
| tor | tor | 0.2.0.3 | |
| tor | tor | 0.2.0.4 | |
| tor | tor | 0.2.0.5 | |
| tor | tor | 0.2.0.6 | |
| tor | tor | 0.2.0.7 | |
| tor | tor | 0.2.0.8 | |
| tor | tor | 0.2.0.9 | |
| tor | tor | 0.2.0.10 | |
| tor | tor | 0.2.0.11 | |
| tor | tor | 0.2.0.12 | |
| tor | tor | 0.2.0.13 | |
| tor | tor | 0.2.0.14 | |
| tor | tor | 0.2.0.15 | |
| tor | tor | 0.2.0.16 | |
| tor | tor | 0.2.0.17 | |
| tor | tor | 0.2.0.18 | |
| tor | tor | 0.2.0.19 | |
| tor | tor | 0.2.0.20 | |
| tor | tor | 0.2.0.21 | |
| tor | tor | 0.2.0.22 | |
| tor | tor | 0.2.0.23 | |
| tor | tor | 0.2.0.24 | |
| tor | tor | 0.2.0.25 | |
| tor | tor | 0.2.0.26 | |
| tor | tor | 0.2.0.27 | |
| tor | tor | 0.2.0.28 | |
| tor | tor | 0.2.0.29 | |
| tor | tor | 0.2.0.29 | |
| tor | tor | 0.2.0.30 | |
| tor | tor | 0.2.0.30 | |
| tor | tor | 0.2.0.31 | |
| tor | tor | 0.2.0.31 | |
| tor | tor | 0.2.0.32 | |
| tor | tor | 0.2.0.33 | |
| tor | tor | 0.2.0.34 | |
| tor | tor | 0.2.0.35 | |
| tor | tor | 0.2.1.1 | |
| tor | tor | 0.2.1.1.1 | |
| tor | tor | 0.2.1.1.2 | |
| tor | tor | 0.2.1.1.3 | |
| tor | tor | 0.2.1.1.4 | |
| tor | tor | 0.2.1.1.5 | |
| tor | tor | 0.2.1.1.6 | |
| tor | tor | 0.2.1.1.7 | |
| tor | tor | 0.2.1.1.8 | |
| tor | tor | 0.2.1.1.9 | |
| tor | tor | 0.2.1.1.10 | |
| tor | tor | 0.2.1.1.11 | |
| tor | tor | 0.2.1.1.12 | |
| tor | tor | 0.2.1.1.12 | |
| tor | tor | 0.2.1.1.13 | |
| tor | tor | 0.2.1.1.14 | |
| tor | tor | 0.2.1.1.15 | |
| tor | tor | 0.2.1.1.16 | |
| tor | tor | 0.2.1.1.17 | |
| tor | tor | 0.2.1.1.18 | |
| tor | tor | 0.2.1.1.19 | |
| tor | tor | 0.2.1.1.20 | |
| tor | tor | 0.2.1.1.21 | |
| tor | tor | 0.2.1.1.22 | |
| tor | tor | 0.2.1.1.23 | |
| tor | tor | 0.2.1.1.24 | |
| tor | tor | 0.2.1.1.25 | |
| tor | tor | 0.2.1.1.26 | |
| tor | tor | 0.2.1.1.27 | |
| tor | tor | 0.2.1.1.28 | |
| tor | tor | 0.2.1.2 | |
| tor | tor | 0.2.1.3 | |
| tor | tor | 0.2.1.4 | |
| tor | tor | 0.2.1.5 | |
| tor | tor | 0.2.1.6 | |
| tor | tor | 0.2.1.7 | |
| tor | tor | 0.2.1.8 | |
| tor | tor | 0.2.1.9 | |
| tor | tor | 0.2.1.10 | |
| tor | tor | 0.2.1.11 | |
| tor | tor | 0.2.1.12 | |
| tor | tor | 0.2.1.12 | |
| tor | tor | 0.2.1.13 | |
| tor | tor | 0.2.1.14 | |
| tor | tor | 0.2.1.15 | |
| tor | tor | 0.2.1.16 | |
| tor | tor | 0.2.1.17 | |
| tor | tor | 0.2.1.18 | |
| tor | tor | 0.2.1.19 | |
| tor | tor | 0.2.1.20 | |
| tor | tor | 0.2.1.21 | |
| tor | tor | 0.2.1.22 | |
| tor | tor | 0.2.1.23 | |
| tor | tor | 0.2.1.24 | |
| tor | tor | 0.2.1.25 | |
| tor | tor | 0.2.1.26 | |
| tor | tor | 0.2.1.27 | |
| tor | tor | 0.2.1.28 | |
| tor | tor | 0.2.1.29 | |
| tor | tor | 0.2.2.1 | |
| tor | tor | 0.2.2.1 | |
| tor | tor | 0.2.2.2 | |
| tor | tor | 0.2.2.2 | |
| tor | tor | 0.2.2.3 | |
| tor | tor | 0.2.2.3 | |
| tor | tor | 0.2.2.4 | |
| tor | tor | 0.2.2.4 | |
| tor | tor | 0.2.2.5 | |
| tor | tor | 0.2.2.5 | |
| tor | tor | 0.2.2.6 | |
| tor | tor | 0.2.2.6 | |
| tor | tor | 0.2.2.7 | |
| tor | tor | 0.2.2.8 | |
| tor | tor | 0.2.2.9 | |
| tor | tor | 0.2.2.10 | |
| tor | tor | 0.2.2.11 | |
| tor | tor | 0.2.2.12 | |
| tor | tor | 0.2.2.13 | |
| tor | tor | 0.2.2.14 | |
| tor | tor | 0.2.2.15 | |
| tor | tor | 0.2.2.16 | |
| tor | tor | 0.2.2.17 | |
| tor | tor | 0.2.2.18 | |
| tor | tor | 0.2.2.19 | |
| tor | tor | 0.2.2.20 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "01CF8C55-D712-4EB3-ABCD-A79161F0FD86",
              "versionEndIncluding": "0.2.2.23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*",
              "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port."
    },
    {
      "lang": "es",
      "value": "Las versiones de Tor anteriores a v0.2.2.24-alpha continua utilizando un puerto en modo bridge que ya sido configurado previamente, pero que no ha sido configurado en el momento actual, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre clientes en determinadas circusntancias por medio de la monitorizaci\u00f3n del tr\u00e1fico de red que llega al puerto configurado en modo bridge."
    }
  ],
  "id": "CVE-2011-4896",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-23T03:59:22.130",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  var-201112-0165
Vulnerability from variot
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. Tor is prone to an information disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information to launch further attacks. Versions prior to Tor 0.2.2.24 are vulnerable
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0165",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "tor",
        "version": "0.2.1.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.0.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.1.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tor",
        "version": "0.2.0.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.0.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.2.1.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.2.1.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.2.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.2.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.2.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "tor",
        "version": "0.1.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.6.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.6.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.7.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.8.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.7.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.7.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.18"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.2.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.2.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.1.0.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tor",
        "version": "0.2.1.1.4"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.2.24-alpha"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.2.2.23"
      },
      {
        "model": ".21-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".20-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".19-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".18-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".17-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".16-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".15-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": ".14-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.214"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.123"
      },
      {
        "model": ".5-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": ".4-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": ".3-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": ".2-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": ".1-alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.118"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.1.30"
      },
      {
        "model": "alpha-cvs",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.1.2.1"
      },
      {
        "model": "tor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "tor",
        "version": "0.2.224"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:torproject:tor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "51283"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-4896",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2011-4896",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-4896",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-4896",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201112-432",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. Tor is prone to an information disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive information to launch further attacks. \nVersions prior to Tor 0.2.2.24 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "BID",
        "id": "51283"
      }
    ],
    "trust": 1.89
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-4896",
        "trust": 2.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "51283",
        "trust": 0.3
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "id": "VAR-201112-0165",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4086538599999999
  },
  "last_update_date": "2024-11-23T22:56:48.886000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Tor 0.2.2.24-alpha is out",
        "trust": 0.8,
        "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://blog.torproject.org/blog/tor-02224-alpha-out"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4896"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4896"
      },
      {
        "trust": 0.3,
        "url": "http://www.torproject.org/index.html.en"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "51283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "51283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-04-12T00:00:00",
        "db": "BID",
        "id": "51283"
      },
      {
        "date": "2011-12-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "date": "2011-12-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "date": "2011-12-23T03:59:22.130000",
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-04-12T00:00:00",
        "db": "BID",
        "id": "51283"
      },
      {
        "date": "2011-12-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      },
      {
        "date": "2011-12-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      },
      {
        "date": "2024-11-21T01:33:15.350000",
        "db": "NVD",
        "id": "CVE-2011-4896"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor Vulnerability in which important information is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003517"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-432"
      }
    ],
    "trust": 0.6
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.