Loading...
Loading...
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
July 7, 2006
April 16, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2006-3419
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.