Bridge Enumeration Vulnerability in Tor
CVE-2011-4895 · MEDIUM Severity
AV:N/AC:M/AU:N/C:P/I:N/A:N
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
Learn more about our Web Application Penetration Testing UK.