MUTE 0.4 uses improper flood protection algorithms, which allows remote attackers to obtain sensitive information (privacy leak and search result data) by controlling a drop chain neighbor that is near the end of a message chain.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mute | Mute | 0.4 (including) | 0.4 (including) |