Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-203 | |
| Metrics |
cvssV3_1
|
Wed, 09 Oct 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Oct 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). An attack would take days to complete. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-04T21:26:16.946Z
Reserved: 2023-06-21T00:00:00.000Z
Link: CVE-2023-36325
Updated: 2024-10-09T21:16:55.862Z
Status : Deferred
Published: 2024-10-09T06:15:11.303
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-36325
No data.
OpenCVE Enrichment
No data.