Show filters
28 Total Results
Displaying 11-20 of 28
Sort by:
Attacker Value
Unknown

CVE-2010-0383

Disclosure Date: January 25, 2010 (last updated October 04, 2023)
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
0
Attacker Value
Unknown

CVE-2009-0414

Disclosure Date: February 03, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
0
Attacker Value
Unknown

CVE-2008-5398

Disclosure Date: December 09, 2008 (last updated October 04, 2023)
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
0
Attacker Value
Unknown

CVE-2008-5397

Disclosure Date: December 09, 2008 (last updated October 04, 2023)
Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process.
0
Attacker Value
Unknown

CVE-2006-3408

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.
0
Attacker Value
Unknown

CVE-2006-3407

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
0
Attacker Value
Unknown

CVE-2006-3411

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
0
Attacker Value
Unknown

CVE-2006-3417

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
0
Attacker Value
Unknown

CVE-2006-3416

Disclosure Date: July 07, 2006 (last updated November 08, 2023)
Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE
0
Attacker Value
Unknown

CVE-2006-3409

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
0